• Title/Summary/Keyword: Government Cloud

Search Result 139, Processing Time 0.027 seconds

Jumpstarting the Digital Revolution: Exploring Smart City Architecture and Themes

  • Maha Alqahtani;Kholod M. Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.110-122
    • /
    • 2023
  • Over the last few decades, various innovative technologies have emerged that have significantly contributed to making life easier for humans. Various information and communication technologies (ITCs) have emerged as a result of the global technological revolution, including big data, IoT, 4G and 5G networks, cloud computing, mobile computing, and artificial intelligence. These technologies have been adopted in urban planning and development, which gave rise to the concept of smart cities in the 1990s. A smart city is a type of city that uses ITCs to exchange and share information to enhance the quality of services for its citizens. With the global population increasing at unprecedented levels, cities are overwhelmed with a myriad of challenges, such as the energy crisis, environmental pollution, sanitation and sewage challenges, and water quality issues, and therefore, have become a convergence point of economic, social, and environmental risks. The concept of a smart city is a multidisciplinary, unified approach that has been adopted by governments and municipalities worldwide to overcome these challenges. Though challenging, this transformation is essential for cities with differing technological and social features, which all have the potential to determine the success or failure of the digital transformation of cities into smart cities. In recent years, researchers, businesses, and the government have all turned their attention to the emerging field of smart cities. Accordingly, this paper aims to represent a thorough understanding of the movement toward smart cities. The key themes identified are smart city definitions and concepts, smart city dimensions, and smart city architecture of different layers. Furthermore, this article discusses the challenges and some examples of smart cities.

Research on Digital Twin Automation Techniques in the Construction Industry through 2D Design Drawing Data Extraction and 3D Spatial Data Construction (2D 설계도면 데이터 추출 및 3차원 공간 데이터 구축을 통한 건설산업 디지털 트윈 자동화 기법 연구)

  • Lee, Jongseo;Moon, Il-YOUNG
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.609-612
    • /
    • 2021
  • Government agencies and companies are establishing and promoting digital transformation strategies in various industrial fields, and are leading the era of the 4th industrial revolution through successful technological innovation. In this time of change, we can see many stories of global companies Nike and Starbucks as successful examples of digital transformation. These two companies are showing successful results through digital transformation. Domestic companies are also conducting digital innovation based on mobile, cloud, IoT, artificial intelligence, and AR/VR technologies, and are establishing RPA (Robotic Process Automation) processes for high efficiency and high productivity. In this paper, we introduce the 3D digital twin space construction automation process technique using data from the entire construction cycle of design, construction, and maintenance of the construction industry, and look into the digital transformation strategy of the construction industry in the future.

  • PDF

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

A Study on the Strategic Trade Policy of Korea, China and Japan in the Era of Digital Trade (디지털무역 시대의 한국·중국·일본의 전략적 무역정책에 관한 연구)

  • Jia-Jia Liu;Nak-Hyun Han
    • Korea Trade Review
    • /
    • v.47 no.6
    • /
    • pp.335-353
    • /
    • 2022
  • There are two aspects of digital trade: the digitalisation of goods/services being traded and the digitalisation of the transactional act. Digital data (i.e. machine-readable industrial data and transactional data) is the major driving force for both aspects of digital trade. Digital data is a non-rivalrous input, whether for production or marketing activities, and is thus able to be used by many firms or government agencies without limiting the use of others. Digital platforms provide online infrastructure for the interactions between groups, for instance, consumers and producers. The externality effect refers to the situation in which prosperity in one group on a given platform will improve the returns of other groups on the same platform. In the era of the data-driven economy, strategic trade policy can involve data-related policies. The major objective of these policies is to improve the competitiveness of domestic firms. For instance, firms may be subsidised if they use cloud services provided by specific platforms. This strand of strategic trade policies might be useful for increasing the competitiveness of small-and medium-sized enterprises (SMEs) via the digitalisation of production/marketing processes. Alternatively, strategic trade policy may also exploit the externality effect via platform economy-related policies. Further, some countries may form data coalitions to facilitate cross-border data flow. This paper uses cases in Asian countries to illustrate which role these strategic trade policies can play in the digital economy.

Research on the introduction and use of Big Data for trade digital transformation (무역 디지털 트랜스포메이션을 위한 빅데이터 도입 및 활용에 관한 연구)

  • Joon-Mo Jung;Yoon-Say Jeong
    • Korea Trade Review
    • /
    • v.47 no.3
    • /
    • pp.57-73
    • /
    • 2022
  • The process and change of convergence in the economy and industry with the development of digital technology and combining with new technologies is called Digital Transformation. Specifically, it refers to innovating existing businesses and services by utilizing information and communication technologies such as big data analysis, Internet of Things, cloud computing, and artificial intelligence. Digital transformation is changing the shape of business and has a wide impact on businesses and consumers in all industries. Among them, the big data and analytics market is emerging as one of the most important growth drivers of digital transformation. Integrating intelligent data into an existing business is one of the key tasks of digital transformation, and it is important to collect and monitor data and learn from the collected data in order to efficiently operate a data-based business. In developed countries overseas, research on new business models using various data accumulated at the level of government and private companies is being actively conducted. However, although the trade and import/export data collected in the domestic public sector is being accumulated in various types and ranges, the establishment of an analysis and utilization model is still in its infancy. Currently, we are living in an era of massive amounts of big data. We intend to discuss the value of trade big data possessed from the past to the present, and suggest a strategy to activate trade big data for trade digital transformation and a new direction for future trade big data research.

A Study on the Development Trend of Marine Spatial Policy Simulator Technology through Patent Analysis (특허 분석을 통한 해양공간 정책 시뮬레이터 기술개발 동향 연구)

  • Jun-hee Lee;Jeong-eun Lee;Dae-sun Kim;Min-eui Jeong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.1
    • /
    • pp.32-42
    • /
    • 2024
  • In this study, 1,474 effective patents were derived for quantitative analysis of five major countries, including Korea, China, Japan, the United States and Europe, for marine space policy simulator technology used as a support for integrated marine space management means, and domestic technology competitiveness and domestic and foreign technology trends were identified through annual and national patent application trends and word cloud analysis. This diagnosed the need for active policy support for research and development of marine space policy simulator technology at the government level and preparation through linkage strategies such as patent application consideration and standardization preoccupation for surrounding technologies to prepare for China-led market monopoly and preoccupation.

The Impact of Digital Transformation on Corporate Performance: Based on Shanghai and Shenzhen A-Share Listed Companies

  • Wang HuiJun;Tumennast Erdenebold
    • Asia-Pacific Journal of Business
    • /
    • v.15 no.3
    • /
    • pp.17-45
    • /
    • 2024
  • Purpose - This paper studies the impact of digital transformation on corporate performance based on the stakeholder and dynamic capability theories. Digital transformation is divided into digital technologies (big data, artificial intelligence, blockchain, and cloud computing) and digital technology practical applications. Corporate performance includes financial performance and non-financial performance. The mechanism of dynamic capabilities (innovation capability, absorptive capacity, and adaptive capacity) is further explored. Design/methodology/approach - A fixed-effects model is used to construct a panel data of China's Shanghai and Shenzhen A-share listed companies from 2011 to 2023, and Stata is used for empirical analysis. Findings - In general, digital transformation directly improves corporate performance and indirectly promotes corporate performance through dynamic capabilities (innovation, absorptive capacity, and adaptive capacity). After robustness and endogeneity tests, the conclusion still support. In terms of subdivision, the two dimensions of digital transformation and the practical application of digital technology have different effects on corporate financial performance and non-financial performance. Research implications or Originality - Theoretically, the mechanism of digital transformation on corporate performance is fully and deeply explored, filling the research gap whiting this study. Additionally, the model is constructed using the innovation, absorption and adaptability of dynamic capabilities, providing a different perspective. Practically, it helps to alleviate the current situation of some companies "not wanting to transform" or "not daring to transform", and also clarifies how digital transformation can help companies use dynamic capabilities to improve performance. It provides a decision-making basis for government departments to promote the integration of digital economy and real economy, so that digital transformation can better empower and release corporate performance, thereby promoting the development of China's economy.

A Study on Nam Nyeong-wie Yun Uiseon's Gwanbok Described in the List of Wedding Gifts in 1837 (남녕위(南寧尉) 윤의선(尹宜善)의 1837년 「혼수발기」 속 관복(冠服) 고찰)

  • Lee, Eunjoo
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.3
    • /
    • pp.200-221
    • /
    • 2019
  • The National Hangeul Museum houses a document list of the wedding gifts that Queen Sunwon granted her royal son-in-law, Nam Nyeong-wie, in August 1837. A total of 55 items were recorded in Hangeul Gungseo style on yellow paper. This list included four types of government officials' uniforms, casual wear, accessories, etc. The results of studying the 19th-century male officials' uniforms through this historic record were as follows. The clothing record in the List of Wedding Gifts was more accurate than that in the Dukongongju Garyedeungrok. The four types of government official uniforms for Nam Nyeong-wie included jeobok, sangbok, sibok, and gongbok. For the joebok, there was geumkwan, daehong-hangrah joebok, baeksam, ahole, seodae, gakpae, peseul, paeok, husu, and mokhwa. The record of the List confirms that baeksam was used as jungdan for joebok. For the gongbok, there was daehong-hangrah gongbok, blue seolhancho duhgre, blue saenggyeonggwangju changui, and green waehangrah kurimae. The record of the List shows that the lining of the gongbok was duhgre, and confirms, for the first time, that changui and kurimae were worn inside the gongbok. For the sangbok, there was samo, ssanghakhyungbae embroidered with golden thread, dark green cloud patterned gapsa gwandae, blue cloud patterned gapsa duhgre, blue ssangmuncho changui, and Chinese purple hwamunsa kurimae. For the sibok, there was pink gwangsa gwandae, and blue gwangcho duhgre. For the lining, blue duhgre was used. Lastly, the fabrics used for those costumes were all suitable for the climate in August.

Creation of Actual CCTV Surveillance Map Using Point Cloud Acquired by Mobile Mapping System (MMS 점군 데이터를 이용한 CCTV의 실질적 감시영역 추출)

  • Choi, Wonjun;Park, Soyeon;Choi, Yoonjo;Hong, Seunghwan;Kim, Namhoon;Sohn, Hong-Gyoo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1361-1371
    • /
    • 2021
  • Among smart city services, the crime and disaster prevention sector accounted for the highest 24% in 2018. The most important platform for providing real-time situation information is CCTV (Closed-Circuit Television). Therefore, it is essential to create the actual CCTV surveillance coverage to maximize the usability of CCTV. However, the amount of CCTV installed in Korea exceeds one million units, including those operated by the local government, and manual identification of CCTV coverage is a time-consuming and inefficient process. This study proposed a method to efficiently construct CCTV's actual surveillance coverage and reduce the time required for the decision-maker to manage the situation. For this purpose, first, the exterior orientation parameters and focal lengths of the pre-installed CCTV cameras, which are difficult to access, were calculated using the point cloud data of the MMS (Mobile Mapping System), and the FOV (Field of View) was calculated accordingly. Second, using the FOV result calculated in the first step, CCTV's actual surveillance coverage area was constructed with 1 m, 2 m, 3 m, 5 m, and 10 m grid interval considering the occluded regions caused by the buildings. As a result of applying our approach to 5 CCTV images located in Uljin-gun, Gyeongsnagbuk-do the average re-projection error was about 9.31 pixels. The coordinate difference between calculated CCTV and location obtained from MMS was about 1.688 m on average. When the grid length was 3 m, the surveillance coverage calculated through our research matched the actual surveillance obtained from visual inspection with a minimum of 70.21% to a maximum of 93.82%.

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.