• Title/Summary/Keyword: 실시간 이슈

Search Result 316, Processing Time 0.026 seconds

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

A Study on Smart Fitness Models for Active Senior (액티브시니어를 위한 스마트 피트니스 모델에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.135-140
    • /
    • 2022
  • This study aims to analyze exercise cases and issues using smart devices and technologies, and to present the development direction of a smart exercise environment suitable for the wellness life of active seniors with high activity and economic power unlike the existing silver generation. In the fitness industry, the subscription economy that regularly receives or uses necessary exercise tools, services, and digital content is expanding, and business models based on hardware sales and content subscription continue to emerge. In order to have value competitiveness as a platform that provides active seniors with integrated exercise services for health care, not only fitness centers, but also home training exercise equipment, fitness-related applications, and smart wearable device markets should be organically connected to form an expanded total platform. In order to have value competitiveness as a platform that provides active seniors with integrated exercise services for health care, not only fitness centers, but also home training exercise equipment, fitness-related applications, and smart wearable device markets should be organically connected to form an expanded total platform. The linkage of the digital healthcare function, which provides real-time changes to exercise programs based on continuous monitoring and feed back through wearable devices before, after, and during exercise by receiving and selecting exercise programs suitable for individual health status, is the differentiating factor in the smart fitness model.

A Study on the Construction of Geospatial DB for the Connectivity Transfer Pedestrian Concierge Service (교통연계환승 보행자 컨시어지를 위한 공간 DB 구축 방안 - 광명역 환승센터를 중심으로 -)

  • Kang, Kyung Hoon;Lee, Seung Taek;Oh, Seung;Kim, Hwang Bae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5D
    • /
    • pp.609-615
    • /
    • 2008
  • A Pedestrian Space in the transit transfer center is compositively made of a variety of activities for pedestrians. The pedestrians avoid access to the transit transfer center and the revitalization of the transit transfer center is obstructed as the travel cost of the pedestrians increases. This study provides the pedestrians using the transit transfer center with the significant real-time routing service and helps the movement of pedestrians to minimize the economical loss considering the travel cost and congestion of the pedestrians in the transit transfer center. In this paper, we propose a solution to construct a spatial map for the pedestrians in the transit transfer center to receive the significant real-time routing service based on Ubiquitous technique which is big issue around the world.

The Background and Present Situation of the Chinese Broadcasting Content (중국 방송 콘텐츠의 발전 배경과 현황)

  • You, Wenjing
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.4
    • /
    • pp.149-155
    • /
    • 2019
  • In order to let the world know a real China, China has been strengthening the cultural pursuit of radio and TV programs and accelerating the development of cultural TV programs. By developing cultural TV programs, we can maintain the characteristics of national culture, publicize Chinese traditional culture and introduce the time-honored Chinese civilization to the world. Television can not only keep people informed of current events and social issues, but also provide people with colorful cultural life and entertainment. It is an innovation to spread cultural programs by means of entertainment. TV programs convey relevant cultural contents to the audience through various forms so as to improve the audience's cultural literacy and social influence. This paper summarizes the development background and current situation of Chinese TV culture, and gives some thoughts on the development of current cultural programs, which can provide some references for the communication and development of Chinese cultural TV programs.

Proximity based Circular Visualization for similarity analysis of voting patterns between nations in UN General Assembly (UN 국가의 투표 성향 유사도 분석을 위한 Proximity based Circular 시각화 연구)

  • Choi, Han Min;Mun, Seong Min;Ha, Hyo Ji;Lee, Kyung Won
    • Design Convergence Study
    • /
    • v.14 no.4
    • /
    • pp.133-150
    • /
    • 2015
  • In this study, we proposed Interactive Visualization methods that can be analyzed relations between nations in various viewpoints such as period, issue using total 5211 of the UN General Assembly voting data.For this research, we devised a similarity matrix between nations and developed two visualization method based similarity matrix. The first one is Network Graph Visualization that can be showed relations between nations which participated in the vote of the UN General Assembly like Social Network Graph by year. and the second one is Proximity based Circular Visualization that can be analyzed relations between nations focus on one nation or Changes in voting patterns between nations according to time. This study have a great signification. that's because we proposed Proximity based Circular Visualization methods which merged Line and Circle Graph for network analysis that never tried from other cases of studies that utilize conventional voting data and made it. We also derived co-operatives of each visualization through conducting a comparative experiment for the two visualization. As a research result, we found that Proximity based Circular Visualization can be better analysis each node and Network Graph Visualization can be better analysis patterns for the nations.

Issue tracking and voting rate prediction for 19th Korean president election candidates (댓글 분석을 통한 19대 한국 대선 후보 이슈 파악 및 득표율 예측)

  • Seo, Dae-Ho;Kim, Ji-Ho;Kim, Chang-Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.199-219
    • /
    • 2018
  • With the everyday use of the Internet and the spread of various smart devices, users have been able to communicate in real time and the existing communication style has changed. Due to the change of the information subject by the Internet, data became more massive and caused the very large information called big data. These Big Data are seen as a new opportunity to understand social issues. In particular, text mining explores patterns using unstructured text data to find meaningful information. Since text data exists in various places such as newspaper, book, and web, the amount of data is very diverse and large, so it is suitable for understanding social reality. In recent years, there has been an increasing number of attempts to analyze texts from web such as SNS and blogs where the public can communicate freely. It is recognized as a useful method to grasp public opinion immediately so it can be used for political, social and cultural issue research. Text mining has received much attention in order to investigate the public's reputation for candidates, and to predict the voting rate instead of the polling. This is because many people question the credibility of the survey. Also, People tend to refuse or reveal their real intention when they are asked to respond to the poll. This study collected comments from the largest Internet portal site in Korea and conducted research on the 19th Korean presidential election in 2017. We collected 226,447 comments from April 29, 2017 to May 7, 2017, which includes the prohibition period of public opinion polls just prior to the presidential election day. We analyzed frequencies, associative emotional words, topic emotions, and candidate voting rates. By frequency analysis, we identified the words that are the most important issues per day. Particularly, according to the result of the presidential debate, it was seen that the candidate who became an issue was located at the top of the frequency analysis. By the analysis of associative emotional words, we were able to identify issues most relevant to each candidate. The topic emotion analysis was used to identify each candidate's topic and to express the emotions of the public on the topics. Finally, we estimated the voting rate by combining the volume of comments and sentiment score. By doing above, we explored the issues for each candidate and predicted the voting rate. The analysis showed that news comments is an effective tool for tracking the issue of presidential candidates and for predicting the voting rate. Particularly, this study showed issues per day and quantitative index for sentiment. Also it predicted voting rate for each candidate and precisely matched the ranking of the top five candidates. Each candidate will be able to objectively grasp public opinion and reflect it to the election strategy. Candidates can use positive issues more actively on election strategies, and try to correct negative issues. Particularly, candidates should be aware that they can get severe damage to their reputation if they face a moral problem. Voters can objectively look at issues and public opinion about each candidate and make more informed decisions when voting. If they refer to the results of this study before voting, they will be able to see the opinions of the public from the Big Data, and vote for a candidate with a more objective perspective. If the candidates have a campaign with reference to Big Data Analysis, the public will be more active on the web, recognizing that their wants are being reflected. The way of expressing their political views can be done in various web places. This can contribute to the act of political participation by the people.

Analysis on Learners' Satisfactions of Video Conferencing in Global Engineering Education (글로벌 공학교육의 원격화상강의에 대한 학습자 만족도 분석)

  • Lim, Cheol-Il;Kim, Hye-Kyung;Kim, Dong-Ho
    • Journal of Engineering Education Research
    • /
    • v.15 no.4
    • /
    • pp.66-75
    • /
    • 2012
  • The purpose of this study is to analyze the learners' satisfactions of the video conferencing for global engineering education and provide the implications for effective video conferencing. This study analyzed the learners' satisfactions on their participation in the video conferencing. We conducted a questionnaire survey with 132 subjects who studied in the video conferencing universities, and performed interviews with 27 learners. The results include learners wanted to have more practical themes to satisfy their interests; faculty roles among domestic professors and abroad professors should be specified: distance learners should be guided to have diverse interactions among themselves. The implications are explored for the future study and video conferencing practices.

A Study on Privacy Influencing the Continuous Intention to Use in Closed-Type SNS: Focusing on BAND Users (폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구: 밴드 사용자를 중심으로)

  • Lim, Byungha;Kang, Dongwon
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.191-214
    • /
    • 2014
  • In this study, based on Privacy Calculus Model, we study whether users' intention of continuous use of closed-type SNS is affected by information privacy concern. In addition, we propose a model that studies if the major factors of the intention of continuous use which are trust, satisfaction and benefits could control the information privacy concern's effect on the intention of use. As a result, companies have to consider protecting the psychological privacy and information privacy of the individual when they design SNS.

The Research on Constructing Networks into Clusters;Focusing on the networks that support the growth of an enterprise (클러스터 내 성장지원 네트워크 구축에 관한 실증연구;대덕 첨단클러스터 성장지원 네트워크 중심으로)

  • Park, Chang-Hyeon;Park, Jun-Byung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.4
    • /
    • pp.19-41
    • /
    • 2007
  • This research has a goal which is suggesting the way of constructing 'Cluster' which mean scheming the commencement of an enterprise in an early stage. Now it is reorganized into a IT industry structure 'Time-to market growth' is burst as a big issue. in that point, this research analyze the core success factor which is drawing from the existing IT industrial complex, and then it will be used to draw up to the 'Idealistic growth-support Cluster' on the basis of it, we pulled out various issues about the Corporate in the early stage of its growth. Therefore, this research is focused on presenting the ideal network(net) by considering the Network that organizations and business in Cluster or the network including the factors linked organizations and business in Cluster. therefore, this research carried out three big analysis. from the case investigation we pulled out the core growth factor, and then we approached the analysis of net structure for making application to Network Analysis. and then we analyzed that the characteristics of the Network after measuring by on the basis of analyzing core growth factor. and especailly, this research carried out the Core analysis for recognition of Core- support-frame by base Centrality Test on the net which is composed of growth support organizations at each Business. Judging from this, we can help to make full use of resources for the network analysis in Cluster and establish the Network Strategy by Structure comparison between the structure of industry-Cluster and ideal Business-support networks on the basis of the analysis from the Core-success-factor

  • PDF

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF