• Title/Summary/Keyword: 4가지 솔루션

Search Result 52, Processing Time 0.023 seconds

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일 환경을 위한 맞춤형 서비스 유비쿼터스 영상전송 시스템의 설계)

  • Lee, Sang-Wook;Ahn, Yong-Beom;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.791-799
    • /
    • 2008
  • An image recognition for surrounding conditions is very important in image transmission. In recently rears, as the information infrastructure is more general, the user-centered demands in which they want to identify by object's states image using wire or wireless environment have increased. However, existing mobile solution could be hard to expect high quality mage, because limitation of software processing according as network based on mobile terminal which has low band width supports software codec. To solve this weak point, this paper describes on hardware codec design based on MPEG-4 which is international video compression standard. Implemented system contains the embedded CPU for optimized design and it works high quality service as transmission speed and resolution in mobile circumstance.

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

IT Service Strategy on Development of Online Floral Distribution Service : A Typhoon Positioning Strategy (화훼소매점의 온라인 유통서비스 진화에 따른 정보기술서비스 전략 - A Typhoon Positioning Strategy를 중심으로 -)

  • Lee, Seung-chang;Ahn, Sung-hyuck;Lee, Soong
    • Journal of Distribution Science
    • /
    • v.7 no.4
    • /
    • pp.15-26
    • /
    • 2009
  • The internet has dramatically changed a way of business management and competition in the business environment. Especially, it stimulated not only to evolve online floral distribution service but also to change a phase of competition among floral retail stores in industry. And that also led to keen competition among IT service providers as well. This study is to examine how floral retail stores have been evolved and competed with the radical situation of the floral distribution industry through IT service in the aspect of business and information technology. In addition, the Typhoon Positioning Strategy(TPS), a strategy for the IT service positioning, is introduced from IT service provider's perspective. For IT service providers to create high business value and continuous service providing, IT service should be positioned on the customers' "core business" and developed to the level of "solution." The Typhoon Positioning Strategy(TPS) is a strategy for the IT service positioning, indicating that IT service should be positioned according to a Business Process-Service model with the consideration of business development direction, IT service trend, and user's IT capability. That is, IT service providers should find out customers' "core business" area first to provide a right IT service to the company, and the IT service provided should meet to the level of business solution. The capability of the IT solution users is also an important factor to be considered for the advanced IT service. There are four principles of the Typhoon Positioning Strategy(TPS). Principle 1) IT service provided should be an IT solution Map suitable for customer business processes. Principle 2) IT service provided should be able to support customer core business. Principle 3) IT service provided should be a business solution. Principle. 4) IT service provided should be applied differently according to the level of customer's IT capability.

  • PDF

Managing Mobility - Enterprise Secure Wireless Control (이동성 관리 - 기업의 안전한 무선 네트워크 제어)

  • Lee Daniel H.
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.282-290
    • /
    • 2004
  • 80년대 초반에 등장한 퍼스널 컴퓨터에서부터 90년대에 급격히 확산된 클라이언트/서버 환경에 이르기까지 분산 컴퓨팅은 관리가 어렵다고 증명되었다. IBM의 Tivoli나 HP의 OpenView 등을 포함한 거대한 엔터프라이즈 관리 시스템 산업이 이러한 표면상의 극복하기 힘든 법칙처럼 여겨지는 것이 그 증거라고 하겠다. 이 후 무선의 개념이 등장했다. NOP World Technology가 Cisco사를 위해 2001년에 시행한 조사에 의하면 최종 사용자는 무선랜을 사용함으로써 생산성이 최고 22% 향상되었고 조사대상의 63%가 일상적인 직무에서 정확도가 향상되었다. 이 모든 것은 투자대비수익(ROI) 계산상 사용자 당 $550 해당한다. 현재 이동성과 IT 관리 기능의 딜레마를 동시에 고려하며 저렴한 몇몇 솔루션들이 소개되고 있다. 본 논문에서는 분산 컴퓨팅의 다음 진화 단계인 무선 네트워킹과 관련된 문제를 해결할 수 있는 혁신적이고 전체적인 접근법을 소개한다. 본 논문에서는 무선 컴퓨팅과 보안의 본질 및 무선랜이라는 새로운 컴퓨팅 패러다임으로 인하여 파생되는 운영과 관리의 어려움을 소개한다. 이러한 환경이 정의되면 본 논문은 이해하기 쉬운 5x5 레이어 매트릭스를 바탕으로 각 레이어의 독특한 본질을 고려한 혁신적인 무선랜 관리 방법에 대해 설명한다. 마지막으로 무선 네트워킹, 컨버젼스, 궁극적으로 분산 컴퓨팅만이 가지는 문제점을 해결할 수 있는 Red-M의 백 오피스 애플리케이션에 기반한 솔루션을 소개한다. 본 논문의 목표는 Red-M의 성공에 관한 두 가지 중요한 과정을 설명하고자 함이다. 이는 안전한 무선 네트워크 제어에서 비롯되는 무선 환경이 약속하는 장점들을 고루 제공하는 것과 나쁜 의도의 사용자를 차단할 뿐 아니라 올바른 사용자와 또한 나머지 일반 사용자를 총체적으로 관리할 수 있는, 안정적이고 확장 가능하며 직관적인 시스템을 제공하는 것이다.가 생성된다. $M_{C}$에 CaC $l_2$를 첨가한 경우 $M_{C}$는 완전히 $M_{Cl}$ 로 전이를 하였다. $M_{Cl}$ 에 CaC $l_2$를 첨가하였을 경우에는 아무런 수화물의 변화는 발생하지 않았다. 따라서 CaS $O_4$.2$H_2O$를 CaC $O_3$및 CaC $l_2$와 반응시켰을 때의 AFm상의 안정성 순서는 $M_{S}$ < $M_{C}$< $M_{Cl}$ 로 된다.phy. Finally, Regional Development and Regional Environmental Problems were highly correlated with accommodators.젼 공정을 거쳐 제조된다는 점을 고려할 때 이용가능한 에너지 함량계산에 직접 활용될 수는 없을 것이다.총단백질 및 AST에서 시간경과에 따른 삼투압 조절 능력에 문제가 있는 것으로 보여진다.c}C$에서 5시간 가열조리 후 잔존율은 각각 84.7% 및 73.3%였고, 질소가스 통기하에서는 잔존율이 88.9% 및 81.8%로 더욱 안정하였다.8% 및 12.44%, 201일 이상의 경우 13.17% 및 11.30%로 201일 이상의 유기의 경우에만 대조구와 삭제 구간에 유의적인(p<0.05) 차이를 나타내었다.는 담수(淡水)에서 10%o의 해수(海水)로 이주된지 14일(日) 이후에 신장(腎臟)에서 수축된 것으로 나타났다. 30%o의 해수(海水)에 적응(適應)된 틸라피아의 평균 신사구체(腎絲球體)의 면적은 담수(淡水)에 적응된 개체의 면적보다 유의성있게 나타났다. 해수(海水)에 적응(適應)된 틸라피아의 신단위(腎

  • PDF

A Trend of Artificial Intelligence in the Healthcare (헬스케어산업에서의 인공지능 활용 동향)

  • Lee, Sae Bom;Song, Jaemin;Park, Arum
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.5
    • /
    • pp.448-456
    • /
    • 2020
  • In the era of the Fourth Industrial Revolution, how well the explosive information and data are handled and used is recognized as a problem directly related to the competitiveness of the industry. In particular, the introduction of artificial intelligence technology in the medical field can be said to have a great social impact on its use, and this research was conducted to understand the trends of artificial intelligence according to the range of use case. In this study, the application of artificial intelligence in the healthcare field is divided into four scopes, (1) hospital solutions, (2) personal health care, (3) insurance, and (4) new drug development. Based on various cases and trends in artificial intelligence technology, this study tried to give directions on how to develop artificial intelligence in Korea. In this study, we wanted to find out the use cases of artificial intelligence in various areas of healthcare industry and describe the latest issues in healthcare to help the overall medical industry. The development of artificial intelligence-based medical systems has made it easier to manage the chronic patients, increased the accuracy of cancer or disease diagnosis, and helped developing new drugs faster and more efficiently. Through this study, the medical industry we wanted to give a direction to the future development of artificial intelligence in Korea.

The Access Network Architecture for Multi-service (멀티서비스 적합형 액세스네트워크 구조)

  • Lee Sang-Moon;Lee Gwang-Yong;Kwon Kyoung-In
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.90-94
    • /
    • 2004
  • 본 고에서는 지금까지의 통신 서비스의 주류를 형성했던 접속 중심의 서비스가 한계상황에 도달함에 따라 사업자 또는 네트워크 장비측면에서 그 대안으로 부각되고 있는 응용 및 솔루션 기반의 멀티서비스를 제공하기 위한 액세스네트워크 차원의 구축 방안을 살펴보고자 한다. 즉, 지금까지의 액세스네트워크는 음성 서비스면 음성 서비스에 적합하게, 데이터 서비스면 데이터 서비스에 적합한 구도로 구축되어 왔지만 향후에는 멀티서비스를 효과적으로 처리하기 위해 망 구조를 단순화하고 트래픽을 집선하며 가입자에 대한 인증 및 개별 과금 등과 연계될 수 있도록 하며, 서비스에 따라 QoS 및 라우팅할 수 있는 기능이 요구된다. 이러한 요구사항을 제공할 수 있는 방안으로 기존 네트워크 상에 별도 시스템을 통해 구축하는 방안과 시스템 내부 기능을 통해 구축하는 방안의 두 가지를 비교하고 향후의 바람직한 구축 방향을 살펴보고자 한다. 본 고의 구성은 다음과 같다. 2장에서는 현재 국내 액세스네트워크의 구축 연혁 및 구조를, 3장에서는 멀티서비스 중심의 서비스 체계로의 전환의 당위성과 멀티서비스를 제공하기 위한 요구사항, 기능을 구체화하고 현재 및 신규 액세스네트워크를 위한 구조를 비교한다. 그리고 마지막 4장에서는 바람직한 액세스네트워크의 구조의 방향을 제안하고 결론을 맺는다.

  • PDF

Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment (SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증)

  • Lee, Yong-Hwan;Jan, Werner;Janos, Sztipanovits
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.139-149
    • /
    • 2009
  • In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of policy verification, this solution has two kinds of policies: static policies, dynamic policies.

  • PDF

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Design of outside orbit style supersonic waves multi curer for Fracture patient's type (radish stimulation, radish invasion) rehalibitation promotion) (Fracture 환자의 유형(무자극, 무침습) 재활촉진을 위한 외부궤도형 초음파 다층치료기의 설계)

  • Kim Whi-Young
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.3
    • /
    • pp.245-252
    • /
    • 2006
  • Estrangement hierarchical by bipolarization is deepened and time space that social welfare by graying corresponds great so. Specially, is real condition that indifference by patient's increase which is solitary life string is come to involve by social Voblem. Together, Jaetaek bone fracture patient's ratio is zooming. <중략>Supersonic waves operation frequency used on both end because do 1mHz, 1.3mHz, supersonic waves origination that have 1.5mHz's Piezo-ceramic crystal tranducer material each 4 premature senilitys in this research, and outside diameter according to impedance and Phase d used Gakgak4mm, 5.4mm, Dukke0.5mm, transformer deuce of length 70mm. Manufactured, and investigated supersonic waves distribution chart by capacity 50m W. Supersonic waves used by diagnosis mainly but is seen to become convenient medical treatment mounting in bone fracture patient's treatment if supplement clinically. If supplement system furthermore, is going to apply to osteoporosis patient, and this research tried to design poetic theme width directly and study rain standardization special qualify and approach basic form because do modelling.

  • PDF

A TBM data-based ground prediction using deep neural network (심층 신경망을 이용한 TBM 데이터 기반의 굴착 지반 예측 연구)

  • Kim, Tae-Hwan;Kwak, No-Sang;Kim, Taek Kon;Jung, Sabum;Ko, Tae Young
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.1
    • /
    • pp.13-24
    • /
    • 2021
  • Tunnel boring machine (TBM) is widely used for tunnel excavation in hard rock and soft ground. In the perspective of TBM-based tunneling, one of the main challenges is to drive the machine optimally according to varying geological conditions, which could significantly lead to saving highly expensive costs by reducing the total operation time. Generally, drilling investigations are conducted to survey the geological ground before the TBM tunneling. However, it is difficult to provide the precise ground information over the whole tunnel path to operators because it acquires insufficient samples around the path sparsely and irregularly. To overcome this issue, in this study, we proposed a geological type classification system using the TBM operating data recorded in a 5 s sampling rate. We first categorized the various geological conditions (here, we limit to granite) as three geological types (i.e., rock, soil, and mixed type). Then, we applied the preprocessing methods including outlier rejection, normalization, and extracting input features, etc. We adopted a deep neural network (DNN), which has 6 hidden layers, to classify the geological types based on TBM operating data. We evaluated the classification system using the 10-fold cross-validation. Average classification accuracy presents the 75.4% (here, the total number of data were 388,639 samples). Our experimental results still need to improve accuracy but show that geology information classification technique based on TBM operating data could be utilized in the real environment to complement the sparse ground information.