• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.028 seconds

Distributed In-Memory based Large Scale RDFS Reasoning and Query Processing Engine for the Population of Temporal/Spatial Information of Media Ontology (미디어 온톨로지의 시공간 정보 확장을 위한 분산 인메모리 기반의 대용량 RDFS 추론 및 질의 처리 엔진)

  • Lee, Wan-Gon;Lee, Nam-Gee;Jeon, MyungJoong;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.963-973
    • /
    • 2016
  • Providing a semantic knowledge system using media ontologies requires not only conventional axiom reasoning but also knowledge extension based on various types of reasoning. In particular, spatio-temporal information can be used in a variety of artificial intelligence applications and the importance of spatio-temporal reasoning and expression is continuously increasing. In this paper, we append the LOD data related to the public address system to large-scale media ontologies in order to utilize spatial inference in reasoning. We propose an RDFS/Spatial inference system by utilizing distributed memory-based framework for reasoning about large-scale ontologies annotated with spatial information. In addition, we describe a distributed spatio-temporal SPARQL parallel query processing method designed for large scale ontology data annotated with spatio-temporal information. In order to evaluate the performance of our system, we conducted experiments using LUBM and BSBM data sets for ontology reasoning and query processing benchmark.

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

Public information signage design for driving in perspective of improving contextual visibility (주행 공공 안내표지판의 맥락적 시인성 향상을 위한 표지판 디자인 연구)

  • Lee, SaYa;Cho, IkHyun;Kim, ChaeHee;Lee, JoongSup;Kim, SeungJun;Lee, EunJong
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.63-70
    • /
    • 2021
  • Public Signs guiding drivers on the road should help make decisions within a short period of time, so appropriate information should be effectively expressed at the point. Currently, the road marking rules revised by the law show a significant change in the type of information, expression method, and weight of expression compared to existing road signs to be based on road name addresses. This study analyzed whether the revised road signs changed based on the road name were effective in perspective of perception-cognition-understanding-projection and examined whether they provided appropriate information for the actual driving environment. Based on the analyzed information, an experiment was conducted to present an improved design, evaluate the degree of visibility compared to existing road name-oriented signs, and a qualitative investigation was conducted on the suitability of the sign contents. Through this, it is expected that more suitable driving information and measures to increase intuitive visibility can be reviewed.

Building a Satellite Image Based Blog System using PPGIS(People Participatory GIS) (국민참여형 위성영상 블로그 시스템 구축)

  • Lee, Gi-Hwan;Lee, Dong-Cheon;Park, Seok-Ho;Kim, Il;Sin, Sang-Hui
    • Proceedings of the KSRS Conference
    • /
    • 2007.03a
    • /
    • pp.92-96
    • /
    • 2007
  • 전라남도 국민참여형 위성영상 블로그 시스템은 2006년도 행정자치부 자치단체정보화지원사업의 일환으로 구축된 것으로서, 사용자가 고해상도 위성영상 위에 직접 자신의 글,사진, 동영상을 올리고,이를 다른 사용자나 시스템과 공유할 수 있도록 구축된 시스템이다. 본 시스템이 궁극적으로 구현하고자 했던 과제는 다음과 같다. (1)지리정보 혹은 기타 정보의 고정성을 탈피하고,(2)지리정보와 멀티미디어 자료의 효율적 통합을 통해 geoUCC를 구축하며,(3)사용자의 참여를 통한 지리정보 제공 방식의 쌍방향성을 구현하여,(4) 사용자를 일방적 자료 활용자에서 자료 생성자로 발전시키고 궁극적으로는 자치단체와 국민 간 새로운 방식의 소통 방식을 생성하는 것이다. 본 시스템 구축의 결과로서 본 시스템에서 일반 국민에게 서비스되는 내용은 다음과 같다. (1) 전라남도 전역의 1m급 고해상도 위성영상의 대국민 서비스,(2)전라남도 전역에 대한 지번 단위까지의 주소 검색 서비스,(3)웹 상에서의 실시간 3차원 GIS 서비스,(4)Web2.0의 철학을 반영한 RSS, Trackback 및 Tag 검색 기능,(5)사용자가 직접 고해상도 위성영상 위에 자신의 글, 사진,동영상,홈페이지 등을 올릴 수 있는 "위성영상 블로그 쓰기 기능",(6)국내 거의 모든 포털 사이트의 블로그와 홈페이지를 지원하는 시스템 연계(퍼가기) 기능 등이다. 결론적으로 본 시스템의 사용자는 고해상도 위성영상 기반의 지도 위에 자신의 여행기,사진, 동영상을 올림으로써 자신만의 사용자제작콘텐츠(UCC)를 생성할 수 있을 뿐만 아니라, 이를 다른 사용자와 공유, 활용함으로써 실질적인 쌍방향,참여형 지리정보시스템을 이용하게 된 것이다.

  • PDF

Research on solution for protecting victim privacy of crime deposit with depository

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.209-216
    • /
    • 2020
  • As depository system for negotiation or reimbursement to the victim in criminal case is reflected to consideration for diminishing punishment and hence, it is very important in the process. According to the current law, one needs to fill out victim's personal information such as name, address, and ID number for processing depository. However, if the victim is sexual violence victim, all the personal information is covered up becoming anonymous. Therefore, it becomes difficult for the accused person to get necessary information. Such covering up action is to prevent further second damage that may be caused such as threatening for the negotiation whereas victim has no willingness to forgive the accused. However, even if the accused person regrets his/her crime and make reimbursement to the victim, as they have no personal information on the victim it becomes impossible for them to make the depository. If we apply ESCROW system here it will allow victims to avoid any direct contact with the accused person as well as preventing any privacy disclosure. Also, for the accuse person, they can show how much they regret by making depository within their capability.

Design and Implementation of μ-Webpage based on QR Code (QR 코드 기반 마이크로 웹페이지 설계 및 구현)

  • Ha, Sunju;Eun, Seongbae;So, SeonSub;Yun, Young-Sun;Jung, Jinman
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.239-246
    • /
    • 2015
  • QR(Quick Response) Code has been developed to provide greater storage capacity and more functionality compared to 1D bar codes. With the emergence of increasingly mobile devices equipped with cameras such as smart-phones and tablets, QR codes have become very popular and more important in mobile businesses. Typically, most QR codes are used as a URL link for redirecting users to webpages. However, the URL based QR codes are required to be connected over the internet and to be run a server. This can incur unnecessary traffics in the Internet. Furthermore, it is not suitable for the country lagging behind others in its network infrastructure. In this paper, we propose a server-less ${\mu}$-webpage to provide mobile web services and be optimized for the capabilities and limitations of QR Code. We have implemented the ${\mu}$-webpage in Android, and the results showed that the proposed mechanism can provide web-services without requiring extra servers or incurring mobile traffic data compared to the URL-based QR Codes.

Lessons from the Application of GIS for Local Government - Some Examples from Korea and Australia - (지방자치단체에서의 GIS 활용에 대한 제언 - 한국과 호주에서의 사례연구를 중심으로 -)

  • Peterson, Jim;Kim, Chang Hwan;Yoo, Jae Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.107-117
    • /
    • 2002
  • Public policy responses to the digital/information revolution and the micro-economic reforms that it facilitates have inspired exploration of the scope for local government implementation of digital spatial data handling(DSDH) of information relating to, among other things, asset inventory, environmental and utility management, address management, and planning. The results from these explorations are such that few doubt the value of bringing the public policies to practice, but diffusion rate and pattern of the approaches demonstrated by the scoping experiments will reflect institutional/cultural matters, indicators of the relative significance of which might be at least partly predicted from appraisal of case studies. This argument is exemplified by reference to case studies in adoption of DSDH by local government organizations in Korea and in Australia.

  • PDF

Design and Implementation of an Unused Ports-based Decoy System to Redirect Hackers toward Honeypots (사용되지 않는 포트를 이용하여 해커를 허니팟으로 리다이렉트하는 시스템 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.15-24
    • /
    • 2006
  • Many computer security systems use the signatures of well-known attacks to respond to hackers. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible. For this reason, honeypots and honeypot farms have been actively researched. However, they can only collect a small amount of information because hackers have a strong tendency to directly attack servers of which IP addresses are allocated. In this paper, we propose an unused ports-based decoy system to redirect hackers toward honeypots. This system opens unused ports to lure hackers. All interactions with the unused ports are considered as suspect, because the ports aren't those for real service. Accordingly, every request sent to the unused ports is redirected to a honeypot. Consequently, this system enables honeypots to collect information about hackers attacking real servers other than themselves.

A Hybrid Mapping Technique for Logical Volume Manager in SAN Environments (SAN 논리볼륨 관리자를 위한 혼합 매핑 기법)

  • 남상수;피준일;송석일;유재수;최영희;이병엽
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.99-113
    • /
    • 2004
  • A new architecture called SAN(Storage Area Network) was developed in response to the requirements of high availability of data, scalable growth, and system performance. In order to use SAN more efficiently, most of SAN operating softwares support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually h logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. A logical volume manager also supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add/remove storage devices to/from SAN even while the system is running. To support the snapshot and the on-line reorganization, most logical volume managers have used table based mapping methods. However, it is very difficult to manage mapping table because the mapping table is large in proportion to a storage capacity. In this paper, we design and implement an efficient and flexible hybrid mapping method based on mathematical equations. The mapping method in this paper supports a snapshot and on-line reorganization. The proposed snapshot and on-line reorganization are performed on the reserved area which is separated from data area of a volume. Due to this strategy normal I/O operations are not affected by snapshot and reorganization. Finally, we show the superiority of our proposed mapping method through various experiments.