• Title/Summary/Keyword: Digital Information Society

Search Result 10,630, Processing Time 0.037 seconds

A Method of Digital Credit Cards Management in Smart-Phone (스마트폰에서의 디지털 신용카드 관리 방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.67-79
    • /
    • 2012
  • As credit cards are more convenient than cash of heavy and volume, they are used widely in on_line (internet) and off_line in nowadays. A head of the economically active population had 4.8 credit cards in the third quarter 2011. The economically active population in their 20's and 30's may have more than 10 credit cards. If the membership card and point card are included, the count rise to 20 cards in a man. Therefore, the their purse become thick by several cards. Nowadays, the smart-phone is widely used. Therefore, a lot of credit cards are come in smarty-phone from analog form to digital form. In this paper, we study a method of digital credit cards management in smart-phone. For the method, the hardware need in small and existing system have a few change. All kinds of credit cards are used in smarty-phone. We compare the method with Moneta card and NFC of smarty-phone. The digital credit cards feature a light, safety and convenience of mobile users in several ways.

A Study on the Performance Digital Beamforming using Antenna Error Correction and Modified Optimum Weight for Improved Signal Estimation (향상된 신호 추정을 위한 안테나 오차 보정 과 수정된 최적 가중치를 이용한 디지털 빔 형성 성능 분석에 관한 연구)

  • Cho, Sung Kuk;Lee, Jun Dong;Yang, Gill Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.63-70
    • /
    • 2014
  • Method a target estimation in spatial are mobile wireless communication using network cell and GPS. It have much error that mobile wireless communication depend on cell size. GPS method can't find a target in shadow and inner area. In this paper, we estimate a target as direction of arrival method using adaptive array antenna system. Adaptive array antenna system can obtain desired signal to remove other signal This paper studied digital beamforming method in order to estimation a target. Proposed method is modified optimum weight and antenna error correction to estimation an optimal receive signal. Digital beamforming method decided a signal phase and amplitude from received signal on array antenna element. But if it is not to do error correction of received signal, system performance have decreased. Firstly, we proposed modified optimum weight in order to finding desired target. Secondly, we are error correction of antenna incident signals by optimal weight before digital beamforming method. Thirdly, throughly simulation, we showed that system performance of proposed method compare proposal method with general method. It have improved resolution of estimation target to good performance more proposed method than general method.

The Analysis of 3-Dimensional Shape Using Non-Metric Cameras (비측량용 카메라를 이용한 3차원 형상 해석)

  • Jeong, Soo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2009
  • In the field of geospatial information, 3D shape information has been considered as a frame data for GIS. Many kind of physical shape information is, especially, required for the works related with space, such as planning, maintenance, management, etc. Conventional photogrammetry was implemented under the conditions with expensive metric cameras and analytical plotters operated by experts. Nowadays, however, the metric cameras and analytical plotters are replaced by low price non-metric digital cameras and personal computers by virtue of the progress in digital photogrammetry. This study aims to investigate the technology to easily and promptly produce 3D shape information required in geospatial information system using close-range photogrammetry with non-metric digital cameras. As the results of this study, 3D shape of an experimental object was made out with a common compact digital camera and only a known length of a line component in the object and the accuracy of the dimension of 3D shape was analyzed to be less than one pixel.

  • PDF

Vulnerability Analysis on Digital Signature Function of Word Processors (워드프로세서의 전자서명 기능에 대한 취약성 분석)

  • Lee, Chang-Bin;Park, Sun-Woo;Lee, Kwang-Woo;Kim, Jee-Yeon;Nam, Jung-Hyun;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.109-118
    • /
    • 2011
  • Recently, electronic documents are deployed in many areas. However, trust concerns arise owing to the fact that detecting whether an electronic document is modified or not is not an easy process. To facilitate this process, many word processors provide digital signature capabilities on themselves. However, there were not much research on the security of digital signature function of various programs including Microsoft Word and Hancom Hangul. Therefore, in this paper, we analyze the security of Microsoft Word and Hancom Hangul, and propose improvements for their digital signature schemes.

A study on the transformation of cadastral map using Geo-Spatial Information System (지형공간정보체계를 활용한 지적도의 변환에 관한 연구)

  • Kim, Jung-Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.111-120
    • /
    • 2000
  • A cadastral map that is base map on Land Information System is divided by two categories, graphical and digital cadastre. And digital cadastre can be displayed with location coordinates of nodes that depict parcel boundary on digital cadastral records. The transformation of digital cadastral records means that imported text data of node coordinate would be transformed into system data. This study was implemented to search reasons of errors resulted from transformation of graphic data and then to analyze the accuracy in terms of Position and area. For this, checking of software used in Geo-Spatial Information System was implemented at first and it was found that the accuracy is up by using double precision in coordinate transformation. On the position accuracy the errors at nodes was erased during making topology and the errors did not effect other nodes. On the area may the area errors because of being in error limit of allowable area had no problems in using of system.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

The Effects of Willingness to use Technology, Digital Alienation and Assistant Experiences on the Life Satisfaction of Elderly Consumers (기술 활용의지, 디지털 소외감, 조력자 경험이 고령소비자의 삶의 만족도에 미치는 영향)

  • Jang, Eun-Gyo;Lee, Jin-Myong
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.133-141
    • /
    • 2021
  • Recently, the elderly who actively use the Internet and digital devices are increasing. This study aims to investigate the effect of the willingness to use technology, digital alienation and experience of assistant who help technology use on life satisfactions of elderly consumers who are considered to be the vulnerable in the use of information technology. A total of 311 elderly consumers over 60 who can utilize information technology were selected as a research sample and data were collected through an online survey. As a result, it was found that elderly consumers have a strong will to utilize information technology independently, perceive a low sense of digital alienation, and receive help from others when using technology. In addition, the lower the perceived digital alienation, the greater the experience of help from others in the use of technology, the higher the elderly consumers' life satisfaction significantly increased. This study is valuable in that it reveals the factors affecting the improvement of life satisfaction of elderly consumers in the high-tech environment and suggests political and practical implications.

Design of Digital Logic for Passive RFID(Type B) Tag (Passive RFID(Type B) 태그 Digital Logic 설계)

  • Lee, Seung-Hyuk;Cho, Tae-Kyung
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.453-456
    • /
    • 2006
  • 본 논문은 유비쿼터스 컴퓨팅 시대를 열어가는 유비쿼터스의 핵심 기술인 RFID 시스템의 구성요소 중 하나인 Type B RFID 태그를 설계하였다. RFID 태그는 전원공급 여부에 따라 능동형과 수동형으로 구분한다. 본 논문에서는 현재의 IT분야에서의 RFID 시장과 연구동향에 맞춰 수동형 Type B RFID 태그의 Digital 파트를 설계하고, 성능을 검증하였으며, 향후 RFID 시스템의 연구방향에 대해서도 제시하였다.

  • PDF

Robust Fractal Compression Based Watermarking System (프랙탈 압축 기법을 이용한 워터마킹 시스템)

  • 김연희;김동윤;위영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.421-423
    • /
    • 2001
  • 디지털 워터마킹(Digital Watermarking)은 디지털 영상에 저작권을 증명할 수 있는 정보를 삽입하는 방법으로써 영상의 화질 저하를 최소화하면서 저작권 신호 추출의 정확도를 최대화하여야 한다. 본 논문에서는 프랙탈(Fractal) 영상 압축에서 변환 함수의 계수를 디지털 워터마킹 키(Key)에 따라 제한하여 디지털 워터마킹(Digital Watermarking) 신호를 삽입하는 방법을 제한한다. 본 방법은 탐색 범위 제한에 의한 기존의 프랙탈(Fractal) 기반 디지털 위터마킹(Digital Watermarking) 방법보다 영상 변형에 강인하고 화질의 저하를 완화하는 장점을 가진다.

  • PDF

Digital Item Processing and Consuming System based on MPEG-21 (MPEG-21 기반 디지털 아이템 처리 및 소비 시스템)

  • 한희준;김천석;노용만
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.211-213
    • /
    • 2003
  • 본 논문에서는 MPEG-21 통합 멀티미디어 프레임워크에서 이용되는 기본 단위인 디지털 아이템(Digital Item)의 처리 방안에 대해 설명하고, 디지털 아이템 소비 시스템에 대해 논하였다. 현재 MPEG을 중심으로 표준화중인 디지털 아이템 프로세싱(Digital Item Processing; DIP)을 이용한 디지털 아이템 처리는 디지털 아이템에 소비 및 이용에 대한 기능을 부여한다. DUP 에 기반을 둔 디지털 아이템 처리 및 소비 구조의 적용을 위해 교육용 멀티미디어 컨텐츠를 표현하는 디지털 아이템을 구조화하고 디지털 아이템 소비기를 구현하여 구조화된 디지털 아이템 처리 및 소비 시스템의 유효성을 입증하였다.

  • PDF