• Title/Summary/Keyword: 콘텐츠추적정보

Search Result 168, Processing Time 0.024 seconds

A Case Study of RAM Analysis Using Field Data: Focusing on Korean Warship (야전운용제원을 활용한 RAM분석 사례: 해군함정을 중심으로)

  • Sohn, Jung-Mok;Chang, Chung-Moo;Won, You-Dong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.395-412
    • /
    • 2012
  • RAM analysis using field data is important and useful for acquisition and operation of weapon systems. But this kind of analysis didn't conducted due to the absence of weapon system's failure data in case of warship. This study suggest failure tracking process based on maintenance and repair parts consumption data and proves suggested method enables conducting RAM analysis. This method obtains validity through field operator's reviews. The results on 9 warships in this study significantly correspond with weapon system operator's experiences. Because the result of this study contains effects of various operational environments in field, it will useful for correction and verification on existing another weapon system's RAM estimates. If this kind of RAM data are sufficiently accumulated, it will be used to DB of korean unique RAM analysis.

Implementation of GPS-based Wireless Loss Prevention System using the LoRa Module (LoRa 모듈을 이용한 GPS기반 무선 분실 방지 시스템 구현)

  • Ko, Jun-Hyeok;Han, Dong-Kyun;Lee, Se-Ra;Park, Ha-Yeon;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.761-768
    • /
    • 2017
  • As the loss prevention system using bluetooth has a short communication range, it has a problem which its location is not known if it is strayed out of a certain distance. To overcome shortcoming of such an existing loss prevention system, this paper proposes a GPS-based wireless loss prevention system without communication fee using the LoRa Communication with a long distance. The proposed system performs a remote control application on the smart-phone and then is able to get a long-distance GPS coordinates about the location of the loss prevention system on the google map. For performance evaluation of the implemented proposed system, the experiments for transmitting and receiving data are done in open terrain, indoor and outdoor areas and the experiment results identified the superiority of the proposed system in the long-distance.

Design of Management System for Registering Agricultural Machine Using Blockchain (블록체인을 활용한 농업기계 등록 관리 시스템의 설계)

  • Son, Yong-Bum;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.18-27
    • /
    • 2019
  • Through the technology of the 4th industrial revolution, agricultural machinery is becoming increasingly intelligent, and the machine is replacing the role of farmer manpower as a whole. However, safety accidents caused by careless use of agricultural machines and theft accidents due to the difficulty of keeping them are increasing every year. Because agricultural machines do not manage the history of events and accidents unlike automobiles, they are often used for crime. There is also no way to cope with the issues if there happens issues on agricultural machines. In this paper, we propose the system based on block chain which can manage the history of the agricultural machinery by registering the chassis number at the same time when purchasing the agricultural machinery. Since this system contains the history of accident and repair information about the owner's agricultural machinery, it is possible to trace back even if a theft occurs. The proposed system also allows buyers to secure transactions by providing reliable data through inquiry of this system when trading in the secondary market in the future.

Analysis of Correlation Coefficient Between Movements of Thoracoabdominal Tumors and External Respiration Using Image Guided Radiotherapy(IGRT) (영상유도 방사선치료장치(IGRT)를 이용한 흉·복부 종양의 움직임과 외부호흡과의 상관관계 분석)

  • Kim, Gha-Jung;Hong, Ju-Youn;Han, Sang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.362-370
    • /
    • 2014
  • This study measured and analyzed the correlation coefficient between movements of thoracoabdominal tumors and external respiration in a free-breathing state, using cyberknife image guided radiotherapy(IGRT). This study subjects included a total of 30 patients with lung tumors(n=10), liver tumors(n=10) and pancreatic tumor(n=10) who underwent radiotherapy, and the movements of tumors were analyzed using converted log data of the tumor motion tracking system(MTS). In a free-breathing state, In relation to Peason's correlation coefficient between external respiration and lung tumors in the entire treatment process, the correlation coefficient was 0.646(p<0.05) in the cranio-caudal direction, 0.365(p<0.088) in the left and right direction and 0.196(p<0.115) in the antero-posterior direction. The correlation coefficient of liver tumors was 0.841(p<0.000) in the cranio-caudal direction, 0.346 (p<0.179) in the left and right direction and 0.691(p<0.001) in the antero-posterior direction. The correlation coefficient of Pancreatic tumors was 0.683(p<0.000) in the cranio-caudal direction, 0.397(p<0.006) in the left and right direction and 0.268(p<0.127) in the antero-posterior direction. In conclusion, the measurement findings of thoracoabdominal tumor movement using IGRT would be helpful in determining an accurate target volume. Moreover, the analysis of correlation between external respiration and movements of internal tumors would provide important information to correct movements of tumors for diverse radiotherapy techniques.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Design of Mobile Application for Learning Chemistry using Augmented Reality

  • Kim, Jin-Woong;Hur, Jee-Sic;Ha, Min Woo;Kim, Soo Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.139-147
    • /
    • 2022
  • The goal of this study is to develop a mobile application so that a person who is new to chemistry can easily acquire the knowledge necessary for chemical structure learning using image tracking technology. The point of this study is to provide a new chemical structure learning experience by recognizing a two-dimensional picture, augmenting the chemical structure into a three-dimensional object, showing it on the user's screen, and using a service that simultaneously provides related information in multiple fields. characteristic. Login API and real-time database technology were used for safe and real-time data management, and an application was developed using image tracking technology for image recognition and 3D object augmentation service. In the future, we plan to use the chemical structure data library to efficiently load and output data.

Smart Browser based on Semantic Web using RFID Technology (RFID 기술을 이용한 시맨틱 웹 기반 스마트 브라우저)

  • Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.37-44
    • /
    • 2008
  • Data entered into RFID tags are used for saving costs and enhancing competitiveness in the development of applications in various industrial areas. RFID readers perform the identification and search of hundreds of objects, which are tags. RFID technology that identifies objects on request of dynamic linking and tracking is composed of application components supporting information infrastructure. Despite their many advantages, existing applications, which do not consider elements related to real.time data communication among remote RFID devices, cannot support connections among heterogeneous devices effectively. As different network devices are installed in applications separately and go through different query analysis processes, there happen the delays of monitoring or errors in data conversion. The present study implements a RFID database handling system in semantic Web environment for integrated management of information extracted from RFID tags regardless of application. Users’ RFID tags are identified by a RFID reader mounted on an application, and the data are sent to the RFID database processing system, and then the process converts the information into a semantic Web language. Data transmitted on the standardized semantic Web base are translated by a smart browser and displayed on the screen. The use of a semantic Web language enables reasoning on meaningful relations and this, in turn, makes it easy to expand the functions by adding modules.

Applying Action Research on Improving Navigability for the Website of Korean Ministry of Health and Welfare: Gaze Analysis (보건복지부 웹사이트의 항행성 개선에 관한 실행 연구법 적용: 시선 분석을 중심으로)

  • Kim, Taekyung;Moon, Junghoon;Lee, Dongwon;Yeo, Euijoo
    • Information Systems Review
    • /
    • v.17 no.2
    • /
    • pp.157-177
    • /
    • 2015
  • Website usability has been considered as a critical success factor for e-business. It has been widely acknowledged that website design with high level of usability results in positive outcomes including the increased number of visitors and vigorous user activities. Navigation which is an action for accessing and finding information is closely related with web usability when user access website providing information. The purpose of this study is to obtain design insights for improving website navigability of Korean Ministry of Health and Welfare (MHW). Action research and gaze analysis methods were applied, and we found design issues with regard to navigability in MHW website and the way how to improve. The lessons and implementation experiences will be beneficial in stimulating further theoretical work from researchers in the area of web usability. We also expect our study provide significant insights for design practitioners.