• 제목/요약/키워드: Electronic Paper Technology

Search Result 6,033, Processing Time 0.038 seconds

Realization on the Integrated System of Navigation Communication and Fish Finder for Safety Operation of Fishing Vessel (어선의 안전조업을 위한 항해통신 및 어탐기의 통합시스템 구현)

  • In-suk Kang;In-ung Ju;Jeong-yeon Kim;Jo-cheon Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.433-440
    • /
    • 2021
  • The problem of maritime accidents due to the carelessness of fishing vessels, which is affected by the aging of fishing vessel operators. And there is navigation, communication and fish finder that is installed inside the narrow bridge of a fishing vessel. Therefore these system are monitors as many as of each terminal, which is bad influence on obscuring view of front sea from a fishing vessel bridge. In addition a large problem, it is occurs to reduce of the information recognition ability due to the confusion, which is can not check the display information each of screen equipments. Therefore, there has been demand to simply integrated the equipment, and it has wanted the integrated support system of these equipment. The display must be provided on a fishing vessels such as electronic charts, communications equipments and fish detection into one case. In this paper, the integrated system will be installed the GPS plotter, AIS, VHF-DSC, V-pass, fish finder and power supply in the narrow wheelhouse on a fishing vessel, which is configured in one case and operated by multi function display (MFD). The MFD is integrated to simplify for several multi terminals and provided necessary information on a single screen. This integration fishery support system will has improved in sea safety operation and fishery environment of fishing vessels by this implementation.

An Analysis of the Status of National Research and Development Projects in Records Management (기록관리 분야 국가연구개발사업 현황 분석)

  • Hoemyeong Jeong;Soonhee Kim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.137-157
    • /
    • 2023
  • The scale of research and development (R&D) investment is increasing to strengthen national competitiveness through technological innovation, leading to an increased interest in investment efficiency. In records management, the National Archives of Korea has been leading the national research and development project since 2008. Accordingly, this study analyzed R&D projects in records management regarding implementing organization, performance or outcomes, and subjects, targeting 111 National Archives of Korea contract research projects from 2008 to 2022. The analysis showed that small and medium-sized enterprises (SMEs) were the most likely to conduct research, the majority of the research outcomes were academic publications, and there were some discrepancies between the reported performance in research and the actual performance. In terms of research subjects, the most common type of records are paper or print documents, establishing an electronic management system among the National Archives' works. In terms of the frequency of keywords in the records management process and research projects, it was found that research was mainly conducted on "preservation." Meanwhile, only 10 cases, or 9% of the 111 projects, were found to be relevant in terms of utilizing big data and developing intelligent technologies related to digital transformation. Therefore, the effectiveness of the R&D project must be improved through follow-up management of the results even after the research project is completed. In addition, in terms of research topics, it was identified that aside from "preservation," studies focusing on "transfer," "classification," "evaluation," and "collection," as well as research that responds to digital transformation, are needed.

Development of Korea eCall System and Effects Analysis through Integrated Demonstration (한국형 eCall 시스템 개발 및 통합실증을 통한 기대효과 분석)

  • Sangheon Kim;Youngsung Cho;Sunwoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.61-81
    • /
    • 2024
  • eCall system assists traffic accident victims by connecting emergency rescue institutions with accurate accident information, helping them to identify the on-site situation in the event of a traffic accident. The purpose of this paper is to develop a Korean eCall system that reflects the requirements of domestic emergency rescue institutions and to analyze the expected effects through an integrated demonstration. The results of an integrated demonstration indicated that the communication success rate between the eCall IVS and the call center was 99.25%, and the average location information error was 1.2 m. In particular, it has been confirmed that the average location information error is less than 21.6 meters, as assessed by the Korea Communications Commission when evaluating the accuracy of domestic emergency rescue location information. When the eCall system was introduced, it was confirmed that the time from traffic accidents to hospital arrival could be shortened by 3 m 38 s for highways and 1 m 22 s for general roads. By it to traffic deaths from 2005 to 2022, it was analyzed that the number of fatalities decreased by 82,662, resulting in a reduction of approximately social costs.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

The Acquisition, Construction and Common Use of Modern and Post-modern Document DB in the NAK, NIKH, and AKS (근·현대 지역사료 수집, DB 구축 및 공동 활용 - 국가기록원, 국사편찬위원회, 한국학중앙연구원을 중심으로 -)

  • Kang, Soon-Ae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.8 no.2
    • /
    • pp.39-60
    • /
    • 2008
  • This paper deals with the four aspects of the acquisition, construction and common use of modern and post-modern document DB in the NAK, NIKH, and AKS. First, The concept of Korean regional history includes provincial history, local history and regional history and as far as modern and post-modern history is concerned, the concept of regional history is on expansion. Second, National Archives of Korea has been systematically collecting and managing modern and post-modern regional history records in compliance to Public Institutes Records Management Law, enacted in 1999 and currently is in charge of handling public records of 373 central government administration offices, 514 regional government offices, Office of Education, universities and of other public agencies. National Institute of Korean History is working on a ten year project from 2004 to collect the scattered modern and post-modern regional history records and to classify them regionally and thematically. The Academy of Korean Studies has been collecting modern and post-modern regional history records and collection was initiated by Modern History Research. Those records that are collected from 1997 and 2005 are mainly from the liberation period. Third, characteristics of Central Archives Management System and Nara Records Portal System of NAK, Korean History Database System of NIKH and of The AKS' Korean Provincial Culture Electronic Encyclopedia are elaborated. Fourth, establishing 'Modern and Post-modern Regional History Records Council' as an affiliated organization of National Archives Management Committee is recommended, NAK leading the council and promoting further cooperation. In this section, an emphasis on allotted tasks of three institutes in order to achieve technology development for digitalized resource sharing, to improve on contents and to promote public and international use is placed as well.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Study of the ENC reduction for mobile platform (모바일 플랫폼을 위한 전자해도 소형화 연구)

  • 심우성;박재민;서상현
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.181-186
    • /
    • 2003
  • The satellite navigation system is widely used for identifying a user's position regardless of weather or geographic conditions and also make effect on new technology of marine LBS(Location Based Service), which has the technology of geographic information such as the ENC. Generally, there are conceivable systems of marine LBS such as ECDIS, or ECS that use the ENC itself with powerful processor in installed type on ships bridge. Since the ENC is relatively heavy structure with dummy format for data transfer between different systems, we should reduce the ENC to small and compact size in order to use it in mobile platform. In this paper, we assumed that the mobile system like PDA, or Webpad can be used for small capability of mobile platform. However, the ENC should be updated periodically by update profile data produced by HO. If we would reduce the ENC without a consideration of update, we could not get newly updated data furthermore. As summary, we studied considerations for ENC reduction with update capability. It will make the ENC be useful in many mobile platforms for various applications.

  • PDF

An Empirical Study on the Impact of the Perception of the Monitoring Function on Effective BPMS Adoption (모니터링 기능에 대한 인식이 효과적인 BPMS 도입에 미치는 영향)

  • Chae, Myung-Sin;Park, Jin-Suk;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.105-130
    • /
    • 2007
  • Recently, there is a substantial interest in implementing Business Process Management System(BPMS) among enterprises with the purpose of business process innovation. BPMS redesigns and coordinates business processes in terms of both automated steps and human involvement in order to maximize the value of both involved people and systems. The reason why BPMS is getting attention from top managers is that it has the possibility to optimize the business processes by cycling the process of modeling, execution, monitoring, evaluation, and redesigning work processes. Thus, it has created high expectations about not only productivity improvement but also business process innovation. However. having an innovative nature, which is used for process innovation, BPMS implementation has great potential to stir up employee resistance. The analysis and the discussion about the prevention of the resistance against IS(Information Systems) is important because IS change the way people work and also alter the power structure within the organization, in general. The purpose of this study is to investigate factors that have an impact on the effective adoption of BPMS at the enterprise level. To find out these factors, this study considers two characteristics of BPMS: First. BPMS shares some characteristics with other enterprise-wide IS such as ERP. Second, it has special BPMS-specific characteristics. Due to the lack of previous research on BPMS adoption, interviews were carried out with IT-consultants and CIOs who conducted BPMS projects previously to find out BPMS-specific features that would make BPMS unique when compared to other enterprise-wide IS. As a result, the monitoring function was chosen as the main BPMS-specific factor. Thus, this paper reviewed studies both on enterprise-wide IS adoptions, which applied Technology Acceptance Model (TAM) and secondly on computer based monitoring to find out factors that would influence the employees' perception on the monitoring function of BPMS. Based on the literature review, the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses, out factors that would impact the employees' perception on the monitoring function of BPMS. Based on the literature review the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses. The data analysis results showed that two among three monitoring function related factors - enterprise evaluation system and fairness of the boss - were significant. This implies that employees would worry less about the BPMS implementation as long as they perceive the monitoring results will be used fairly for their performance evaluation. However, employees' high self-efficacy on their job was not a significant factor in their perception of the usefulness of BPMS. This is related to cases that showed employees resisted against the information systems because they automated their works (Markus, 1983). One specific case was an electronic company, where the accounting department workers were requested to redefine their job because their working processes were automated due to BPMS implementation.

The Photography as Technological Aesthetics (데크놀로지 미학으로서의 사진)

  • Jin, Dong-Sun
    • Journal of Science of Art and Design
    • /
    • v.11
    • /
    • pp.221-249
    • /
    • 2007
  • Today, photography is facing to the crisis of identity and dilemma of ontology from the digital imaging process in the new technology form. It is very important points to say rethinking of the traditional photographic medium, that has changed the way we view the world and ourselves is perhaps an understatement and that photography has transformed our essential understanding of reality. Now, no longer are photographic images regarded as the true automatic recording, innocent evidence and the mirror to the reality. Rather, photography constructs the world for our entertainment, helping to create the comforting illusions by which we live. The recognition that photographs are not constructions and reflections of reality, is the basis for the actual presence within the contemporary photographic world. It is shock. This thesis's aim is to look for the problems of photographic identity and ontological crisis that is controlling and regulating digital photographic imagery, allowing the reproduction of the electronic simulations era. Photography loses its special aesthetic status and becomes no more true information and, exclusively evidence by traditional film and paper that appeared both as a technological accuracy and as a medium-specific aesthetic. The result, photography is facing two crises, one is the photographic ontology(the introduction of computerized digital images) and the other is photographic epistemology(having to do broader changes in ethics, knowledge and culture). Taken together, these crises apparently threaten us with the death of photography, with the 'end' of photography and the culture it sustains. The thesis's meaning is to look into the dilemma of photography's ontology and epistemology, especially, automatical index and digital codes from its origin, meaning, and identity as the technological medium. Thus, in particular, thesis focuses on the analog imagery presence, from the nature in the material world, and the digital imagery presence from the cultural situations in our society. And also thesis's aim is to examine the main issues of the history of photography has been concentrated on the ontological arguments since the discovery of photography in 1839. Photography has never been only one static technology form. Rather, its nearly two centuries of technological development have been marked by numerous, competing of technological innovation and self revolution from the dual aspects. This thesis examines recent account of photography by the analysis of the medium's concept, meaning, identity between film base image and digital base image from the aspects of photographic ontology and epistemology. Thus, the structure of thesis is fairy straightforward to examine what appear to be two opposing view of photographic conditions and ontological situations. Thesis' view contrasts that figure out the value of photography according to its fundamental characteristic as a medium. Also, it seeks a possible solution to the dilemma of photographic ontology through the medium's origin from the early years of the nineteenth century to the raising questions about the different meaning(analog/digital) of photography, now. Finally, this thesis emphasizes and concludes that the photographic ontological crisis reflects to the paradoxical dynamic structure, that unsolved the origins of the medium, itself. Moreover, even photography is not single identity of the photographic ontology, and also can not be understood as having a static identity or singular status from the dynamic field of technologies, practices, and images.

  • PDF