• Title/Summary/Keyword: 인터넷콘텐츠

Search Result 2,593, Processing Time 0.029 seconds

A Study on Development and Prospects of Archival Finding Aids (기록 검색도구의 발전과 전망)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.23
    • /
    • pp.3-43
    • /
    • 2010
  • Finding aids are tools which facilitate to locate and understand archives and records. Traditionally there are two types of archival finding aids: vertical and horizontal. Vertical finding aids such as inventories have multi-level descriptions based on provenance, while horizontal ones such as catalogs and index are tools to guide to the vertical finding aids based on the subject. In the web environment, traditional finding aids are evolving into more dynamic forms. Respecting the principles of provenance and original order, vertical finding aids are changing to multi-entity structures with development of ISAD(G), ISAAR(CPF) and ISDF as standards for describing each entity. However, vertical finding aids can be too difficult, complicated, and boring for many users, who are accustomed to the easy and exciting searching tools in the internet world. Complementing them, new types of finding aids are appearing to provide easy, interesting, and extensive access channels. This study investigates the development and limitation of vertical finding aids, and the recent trend of evolving new finding aids complementing the vertical ones. The study finds three new trends of finding aid development. They are (i) mixture, (ii) integration, and (iii) openness. In recent days, certain finding aids are mixed with stories and others provide integrated searches for the collections of various heritage institutions. There are cases for experimenting user participation in the development of finding aids using Web 2.0 applications. These new types of finding aids can also cause some problems such as decontextualised description and prejudices, especially in the case of mixed finding aids and quality control of user contributed annotations and comments. To solve these problems, the present paper suggests to strengthen the infrastructure of vertical finding aids and to connect them with various new ones and to facilitate interactions with users of finding aids. It is hoped that the present paper will provide impetus for archives including the National Archives of Korea to set up and evaluate the development strategies for archival finding aids.

Analysis of Emerging Geo-technologies and Markets Focusing on Digital Twin and Environmental Monitoring in Response to Digital and Green New Deal (디지털 트윈, 환경 모니터링 등 디지털·그린 뉴딜 정책 관련 지질자원 유망기술·시장 분석)

  • Ahn, Eun-Young;Lee, Jaewook;Bae, Junhee;Kim, Jung-Min
    • Economic and Environmental Geology
    • /
    • v.53 no.5
    • /
    • pp.609-617
    • /
    • 2020
  • After introducing the industry 4.0 policy, Korean government announced 'Digital New Deal' and 'Green New Deal' as 'Korean New Deal' in 2020. We analyzed Korea Institute of Geoscience and Mineral Resources (KIGAM)'s research projects related to that policy and conducted markets analysis focused on Digital Twin and environmental monitoring technologies. Regarding 'Data Dam' policy, we suggested the digital geo-contents with Augmented Reality (AR) & Virtual Reality (VR) and the public geo-data collection & sharing system. It is necessary to expand and support the smart mining and digital oil fields research for '5th generation mobile communication (5G) and artificial intelligence (AI) convergence into all industries' policy. Korean government is suggesting downtown 3D maps for 'Digital Twin' policy. KIGAM can provide 3D geological maps and Internet of Things (IoT) systems for social overhead capital (SOC) management. 'Green New Deal' proposed developing technologies for green industries including resource circulation, Carbon Capture Utilization and Storage (CCUS), and electric & hydrogen vehicles. KIGAM has carried out related research projects and currently conducts research on domestic energy storage minerals. Oil and gas industries are presented as representative applications of digital twin. Many progress is made in mining automation and digital mapping and Digital Twin Earth (DTE) is a emerging research subject. The emerging research subjects are deeply related to data analysis, simulation, AI, and the IoT, therefore KIGAM should collaborate with sensors and computing software & system companies.

An Empirical Study Applying the PAD Factors to Loyalty of Culture and Arts Website Service (감정반응(PAD) 요인이 문화예술 웹사이트 서비스에서의 만족과 구전을 통해 충성도에 미치는 영향)

  • Baek, Heon;Kwon, Doo-Soon;Lee, Jae-Beom;Kim, Jin-Hwa
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.105-128
    • /
    • 2012
  • The Culture and Arts Website, one of the parts of providing information related to culture and art utilizing internet, is the website that giving information of arts genre like theater, music, art, architecture, video, and literature. As growing interest in the field of culture and arts, market of this website has been increasing and providing customized content which each customer wants in the field of culture and arts. Developers of culture and arts website consider the website media for increasing and developing awareness about culture and arts. They are accelerating development of various business models and application of culture and arts website service which it meets trend of the times and customers needs. This study will seize about influencing factors to culture and arts website service of domestic website users and analyze how these factors affect loyalty through satisfaction and word of mouth. This study presented research model applied main parameters of PAD(Pleasure, Arousal, Dominance) theory emphasized human's emotions that they are expected to affect the loyalty of culture and arts website service users based on satisfaction and word of mouth. The researcher in this study surveyed students of Seoul S University who had experiences with such culture and arts website to validate the model empirically. The results, firstly, if you experienced feeling related to pleasure and dominance in culture and arts website, you would satisfy this website and it could lead to loyalty. Secondly, the feeling related to ventilation does not affect the loyalty through satisfaction and word of mouth. Thirdly, the results show that all of three factors of emotional responses do not influence the loyalty through word of mouth.

  • PDF

A Study on the Perception of Foreign Undergraduates on Online Lecture

  • Kim, Yoon-Hee;Lim, Eun-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.203-212
    • /
    • 2020
  • The purpose of this study is to analyze the perception of non-face-to-face online undergraduate lectures experienced by foreign learners, to identify problems of online lectures, and to suggest improvements. For this study, the perception of online lectures was investigated and analyzed by foreign undergraduate students who took online lectures at A and B universities. Through this, I explored the design direction, complementary measures, and direction of online lectures to be held at Korean universities in the future. As a result of this study, non-real-time lectures through E campus were recognized as advantages in that they could learn repeatedly and listen to lectures at home., Real-time lectures using Zoom were recognized as an advantage of being able to communicate between professors and learners. Both types of online lectures had many tasks and had difficulty in focusing on the lecture until the end. In the future, it was found that the amount of lecture contents and the amount of tasks should be reduced and the condition and sound quality of the lecture image should be improved. As for the evaluation method, they preferred online evaluation rather than offline evaluation, and they preferred relative evaluation rather than absolute evaluation. The results of this study were able to closely understand how learners perceive online lectures. Also, when conducting online lectures, I was able to know the points that need to be improved in the future. The results of this study are expected to contribute to the design direction of online lectures and the development of online contents at each university.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

An User Experience Analysis of Virtual Assistant Using Grounded Theory - Focused on SKT Virtual Personal Assistant 'NUGU' - (근거 이론을 적용한 가상 비서의 사용자 경험 분석 - SKT 가상 비서 'NUGU'를 중심으로 -)

  • Hwang, Seung Hee;Yun, Ray Jaeyoung
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.31-40
    • /
    • 2017
  • This a qualitative research about the virtual personal assistant, voice recognition device SKT 'NUGU' which was launched on September 1, 2016. For the study, an in-depth interview was committed with the 9 research participants who had used this device for more than a month. For the result of the interview, 362 concepts were discovered and through open coding, axis coding, selective coding the concepts got categorized in 16 sub-categories and 10 top categories. After recognizing 362 concepts from the interview sources, I proposed a paradigm model from the open coding. And from the selective coding, the main category of the study has been narrowed down to understand the 'Usage Patterns by Each Type'. As a result of the typification, it was confirmed that the usage pattern can be described in two different types of the dependent and inquiry type. From the result of the research, it provided the basic data about the user experience of virtual assistant which can be utilized when suggesting virtual personal assistant in the near future.

Development of Android Smartphone App for Corner Point Feature Extraction using Remote Sensing Image (위성영상정보 기반 코너 포인트 객체 추출 안드로이드 스마트폰 앱 개발)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.1
    • /
    • pp.33-41
    • /
    • 2011
  • In the information communication technology, it is world-widely apparent that trend movement from internet web to smartphone app by users demand and developers environment. So it needs kinds of appropriate technological responses from geo-spatial domain regarding this trend. However, most cases in the smartphone app are the map service and location recognition service, and uses of geo-spatial contents are somewhat on the limited level or on the prototype developing stage. In this study, app for extraction of corner point features using geo-spatial imagery and their linkage to database system are developed. Corner extraction is based on Harris algorithm, and all processing modules in database server, application server, and client interface composing app are designed and implemented based on open source. Extracted corner points are applied LOD(Level of Details) process to optimize on display panel. Additional useful function is provided that geo-spatial imagery can be superimposed with the digital map in the same area. It is expected that this app can be utilized to automatic establishment of POI (Point of Interests) or point-based land change detection purposes.

XML-based Single Sign-On Scheme for Internet Protocol TV(IPTV)Services (IPTV 서비스 제공을 위한 XML 기반의 단일인증 구조)

  • Lee, Seung-Hun;Shin, Dong-Il;Shin, Dong-Kyoo
    • Journal of Broadcast Engineering
    • /
    • v.14 no.4
    • /
    • pp.463-474
    • /
    • 2009
  • By employing the subscriber concept in broadcasting services, IPTV (Internet Protocol Television) operators provide various grades of services to subscribers based on the billing level of the subscribers. With the income from subscribers for a basis, IPTV operators plan to provide high quality services. Since Web browser-based IPTV provides T-commerce and E-commerce services as well as television services, users may frequently visit other service domains to buy goods or content. To provide the user with charged or private services, these service domains request authentication of user. The existing authentication system is not appropriate for the IPTV service environment because the environment unavoidably forces the user to cross from one authentication-based service domain to another. Single sign-on provides a user with transparent authentication services by enabling an authenticated user to move between authentication-based service domains without any re-authentication. Like this distributed environment, since the IPTV service environment also provides a variety of authentication-based services, transparent authentication service needs to be provided to subscribers who want to access charged or private services. In this paper, we propose a new user authentication scheme for the IPTV environment. This scheme integrates the Security Assertion Markup Language (SAML), which is a standard for XML-based single sign on. We validate this scheme using a simple use case scenario.

Implementation of a Library Function of Scanning RSSI and Indoor Positioning Modules (RSSI 판독 라이브러리 함수 및 옥내 측위 모듈 구현)

  • Yim, Jae-Geol;Jeong, Seung-Hwan;Shim, Kyu-Bark
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1483-1495
    • /
    • 2007
  • Thanks to IEEE 802.11 technique, accessing Internet through a wireless LAN(Local Area Network) is possible in the most of the places including university campuses, shopping malls, offices, hospitals, stations, and so on. Most of the APs(access points) for wireless LAN are supporting 2.4 GHz band 802.11b and 802.11g protocols. This paper is introducing a C# library function which can be used to read RSSIs(Received Signal Strength Indicator) from APs. An LBS(Location Based Service) estimates the current location of the user and provides useful user's location-based services such as navigation, points of interest, and so on. Therefore, indoor, LBS is very desirable. However, an indoor LBS cannot be realized unless indoor position ing is possible. For indoor positioning, techniques of using infrared, ultrasound, signal strength of UDP packet have been proposed. One of the disadvantages of these techniques is that they require special equipments dedicated for positioning. On the other hand, wireless LAN-based indoor positioning does not require any special equipments and more economical. A wireless LAN-based positioning cannot be realized without reading RSSIs from APs. Therefore, our C# library function will be widely used in the field of indoor positioning. In addition to providing a C# library function of reading RSSI, this paper introduces implementation of indoor positioning modules making use of the library function. The methods used in the implementation are K-NN(K Nearest Neighbors), Bayesian and trilateration. K-NN and Bayesian are kind of fingerprinting method. A fingerprint method consists of off-line phase and realtime phase. The process time of realtime phase must be fast. This paper proposes a decision tree method in order to improve the process time of realtime phase. Experimental results of comparing performances of these methods are also discussed.

  • PDF

A Proxy based QoS Provisioning Mechanism for Streaming Service in Wireless Networks (무선이동통신망에서 스트리밍 서비스를 위한 프락시 기반Qos 보장 방안)

  • Kim Yong-Sul;Hong Jung-Pyo;Kim Hwa-Sung;Yoo Ji-Sang;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.608-618
    • /
    • 2006
  • The increasing popularity of multimedia streaming services introduces new challenges in content distribution. Especially, it is important to provide the QoS guarantees as they are increasingly expected to support the multimedia applications. The service providers can improve the performance of multimedia streaming by caching the initial segment (prefix) of the popular streams at proxies near the requesting clients. The proxy can initiate transmission to the client while requesting the remainder of the stream from the server. In this paper, in order to apply the prefix caching service based on IETF's RTSP environment to the wireless networks, we propose the effective RTSP handling scheme that can adapt to the radio situation in wireless network and reduce the cutting phenomenon. Also, we propose the traffic based caching algorithm (TSLRU) to improve the performance of caching proxy. TSLRU classifies the traffic into three types, and improve the performance of caching proxy by reflecting the several elements such as traffic types, recency, frequency, object size when performing the replacement decision. In simulation, TSLRU and RTSP handling scheme performs better than the existing schemes in terms of byte hit rate, hit rate, startup latency, and throughput.