• Title/Summary/Keyword: Environment Information

Search Result 26,258, Processing Time 0.051 seconds

The research regarding 'Game system does simulation Phisical Phenomenon that happen on the earth' at online games (온라인게임상에 '지구환경의 물리적 현상을 시뮬레이션 한 게임 시스템'에 관한 연구)

  • Lee, Ji-Won;Cho, Sam-Ha;Kyung, Byung-Pyo
    • Journal of Korea Game Society
    • /
    • v.4 no.1
    • /
    • pp.26-33
    • /
    • 2004
  • OlineGame Player suffers very big impact in environment of game World. Therefore, physical environment that is embodied to Gameworld is truth and immersion important element that experience to Player. Also, Game-System that embodied physical environment influences in Game Play can give more game player truth and immersion. I mainly MMORPG that is serviced present in this study investigated. 'What earth habitat factor was embodied and What influence does embodied earth habit at factor exert on game play'. I searched what problem is to design game system that do earth environment simulation. And I asserted development of environment information system to approach game system that do earth environment simulation by easier method. Environment information system is system that process status information of stand-by status, wind, wind speed, topography etc.. of game World.

  • PDF

Design and Implementation of Dynamic Recommendation Service in Big Data Environment

  • Kim, Ryong;Park, Kyung-Hye
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Recommendation Systems are information technologies that E-commerce merchants have adopted so that online shoppers can receive suggestions on items that might be interesting or complementing to their purchased items. These systems stipulate valuable assistance to the user's purchasing decisions, and provide quality of push service. Traditionally, Recommendation Systems have been designed using a centralized system, but information service is growing vast with a rapid and strong scalability. The next generation of information technology such as Cloud Computing and Big Data Environment has handled massive data and is able to support enormous processing power. Nevertheless, analytic technologies are lacking the different capabilities when processing big data. Accordingly, we are trying to design a conceptual service model with a proposed new algorithm and user adaptation on dynamic recommendation service for big data environment.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Analysis on Broadcasters and Internet Reports that Provide Weather Information Regarding Typhoons (태풍시기 기상정보 제공에 대한 방송사와 인터넷 보도자료 분석)

  • Lee, Bo-Ram;Park, Jong-Kil;Jung, Woo-Sik
    • Journal of Environmental Science International
    • /
    • v.26 no.1
    • /
    • pp.37-46
    • /
    • 2017
  • As a result of broadcasters' websites, there were more reports during the typhoon Bolaven/Tembin in 2012 than in 2002 and 2003. Checking related press releases of each broadcaster on NAVER, YTN reports are 3 times more than KBS. Considering great technology progress in the Internet and smart phone user environment compared to the past, it is thought to be rather regretful in that KBS has been the supervising broadcaster over Korean disaster. As a result of daily reports, the year 2002 typhoon Rusa was reported from the date of its arrival on Korean Peninsular to 3 days, but the information required to be provided for disaster prevention before its arrival was too scarce. 2003 typhoon Maemi was reported as many times as the 2002 typhoon, but its information was provided before its arrival. This is meaningful because the information provision was intended for disaster prevention unlike the past. In 2012, the number of weather forecast broadcast on the typhoon Bolaven/Tembin increased greatly compared to 2002 and 2003. This was also determined to be due to abundant information provided by broadcasters and the Internet portal sites as a result of great progress in Korea internet industry.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

Analysis of the Perception of Extreme Heat Watch Warning and Usefulness of Special Weather Reports ; Focus on the Perception of University Students (폭염특보 인지도와 기상특보 활용도 분석 ; 대학생들의 인지)

  • Park, Jong-Kil;Oh, Jin-A;Jung, Woo-Sik;Kim, Eun-Byul;Choi, Su-Jin
    • Journal of Environmental Science International
    • /
    • v.19 no.10
    • /
    • pp.1237-1246
    • /
    • 2010
  • This paper aims to analyze the perception of university students for the extreme heat watch warning and suggest the usefulness of special weather reports. For this, we have made up a descriptive questionnaires including the perception, mass media, usefulness and satisfaction of special weather report. Using the SPSS 17.0 program, descriptive statistics, t-test, ANOVA and Scheffe test were used to analyze the collected data. The result are as follows; The perception of extreme heat watch warning was some low as 59.1 percentile, we think it needs education and public relations about the extreme heat watch warning. The usefulness of special weather report was 66.6 percentile and of girl students of university that was educated about health care was higher than one of boy students of university, it needs continuous education of these students in order to upgrade satisfaction of special report and mitigate the hazard of extreme heat according to climate change. The main media to get the meteorological information of university undergraduate students were TV and Internet, it needed education and development of new contents. From these findings, suggestions are presented to help improve the extreme heat watch warning.

Semantic-Based Web Information Filtering Using WordNet (어휘사전 워드넷을 활용한 의미기반 웹 정보필터링)

  • Byeon, Yeong-Tae;Hwang, Sang-Gyu;O, Gyeong-Muk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3399-3409
    • /
    • 1999
  • Information filtering for internet search, in which new information retrieval environment is given, is different from traditional methods such as bibliography information filtering, news-group and E-mail filtering. Therefore, we cannot expect high performance from the traditional information filtering models when they are applied to the new environment. To solve this problem, we inspect the characteristics of the new filtering environment, and propose a semantic-based filtering model which includes a new filtering method using WordNet. For extracting keywords from documents, this model uses the SDCC(Semantic Distance for Common Category) algorithm instead of the TF/IDF method usually used by traditional methods. The world sense ambiguation problem, which is one of causes dropping efficiency of internet search, is solved by this method. The semantic-based filtering model can filter web pages selectively with considering a user level and we show in this paper that it is more convenient for users to search information in internet by the proposed method than by traditional filtering methods.

  • PDF

An Efficient Medical Information Authentication Scheme in Mobile Cloud Environment (모바일 클라우드 환경에서 효율적인 의료정보 인증 기법)

  • You, Mi-kyeong;Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.721-723
    • /
    • 2015
  • Recently importance and scalability of cloud computing technology is rapidly emerging, it tends to have applied to various information systems. Many services have been made in mobile cloud environment, and medical information service quick application is required. When the medical information is important information of individuals to leakage, because you can cause serious problems, the problem of secure authentication procedures must be resolved. Therefore, in this paper, we propose an authentication scheme that can be more efficiently manage the medical information system in a mobile cloud environment.

  • PDF

Library Management in Information Society (정보사회의 도서관 경영)

  • Chun Myung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.151-183
    • /
    • 1993
  • As many Korean libraries has begun to be automated and become a part of the worldwide, open library system, they need a new management. Therefore, the purpose of this paper is to explore the library management in automated libraries and to establish a theory of the library management in information society, The automated libraries could be well explained by the systems theory and the environment of the libraries could be well explained by the contingency theory, The following hypothesis were set to direct this research. 1. As the libraries are automated and become a part of one big, worldwide library system, the libraries interact closely with the environment so that the library and the environment become one. 2. As the libraries are automated and become a part of one big, worldwide library system, the librarians need to work in the environment for the library networks, standardization of cataloging, or government information policy making. 3. As the libraries are automated and become a part of one big, worldwide library system, the librarians only manage the library, The various other library staffs take over the traditional library services directly related to books. The data were gathered from the research done previously, Also the date were collected from the American and Japanese libraries. The findings were as follows: The environment of the library integrated all types of the library services such as school library, university library, etc. And it also integrated all the services of the media centers and the press centers, etc. to library services. And the new library services began in the environment. Librarians worked for these new services. In the library, the librarians distingushed the library system from the environment by planning : mission, goal, objectives, policy, procedures and rules. Library organization became temporary such as forming task forces or matrix or free form. The environment controlled the library. Staffs were controlled by plans or computers. And the professional librarians were controlled by their ability to solve problems raised outside the libraries. Library leaders brought in the technology to the library from its environment. The librarians led the formal and informal organizations so that the staffs cooperated well in their work. And librarians tought the library procedures to the partime workers or the temporary staffs. Participative management and management by objectives were the means of motivating staffs. Budget was based on the ever changing environment. The zero based budget method was applied. Therfore, in the information society, the professional librarians become the able managers in the library and global librarians in the environment.

  • PDF

Designing a Platform of Online Inquiry-Based Learning for Information Literacy

  • KWON, Sung-ho;RYU, Sook-young
    • Educational Technology International
    • /
    • v.6 no.1
    • /
    • pp.121-137
    • /
    • 2005
  • In today's information-rich society, the need for information literacy has urgency. Three tasks of information processing are filtering, meaning-matching, meaning-construction that could be strengthened through inquiry-based learning. The cycles of reflection and practice develop the habit of mind, or conscious information processing that allow the learners to acquire higher level of information literacy. An on-line inquiry-based learning environment designed for information literacy may help learners to perform their lifelong learning better with the ability to appreciate, locate, evaluate, and use information effectively.