• Title/Summary/Keyword: ICT-based system

Search Result 921, Processing Time 0.029 seconds

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Current Status of Registered Patents Related to Food Tech in Korea and Japan (푸드테크 관련 한국과 일본의 특허 등록 현황)

  • Choi, Jiyu;Kim, So-young
    • The Korean Journal of Food And Nutrition
    • /
    • v.31 no.5
    • /
    • pp.616-630
    • /
    • 2018
  • This study analyzed the current status of registered patents related to food tech in Korea and Japan. Using the patent information search services of Korean and Japanese Patent Offices, patents registered during the past 10 years from January 1, 2005 to December 31, 2015 were searched with the following key words/phrases: "food or meal or diet" and "program or information system". A total of 669 patents (539 for Korea and 130 for Japan) were finally selected and analyzed. Based on Porter's value chain theory, the patents were categorized into three dimensions related to "manufacturing/processing/distribution", "sales & marketing", and "consumer support". The results showed that in Korea, 41.7% of the total patents were related to sales & marketing followed by consumer support (37.3%) and manufacturing/processing/distribution (21.0%). In Japan, patents related to consumer support accounted for 56.2% followed by manufacturing/processing/distribution (32.3%), and sales & marketing (11.5%). In the area of manufacturing/processing/distribution, "food quality management system" in Korea, and "food manufacturing and processing management system" and "food safety control and hazard analysis system" in Japan tended to show a significantly higher proportion of patents registered (p<.05). Under sales & marketing, patents in the categories of "food purchase and delivery service system" in Korea and "restaurant information sharing system" in Japan tended to be more frequently registered (p<.05). Finally, in the area of consumer support, "kitchen facility and cooking device control system" in Korea and "menu and nutrition management system" in Japan tended to account for a significantly higher proportion of patents registered (p<.001). The results are expected to provide useful insights into the development of new patents and markets for food tech in the future.

A Geographical Study on the Behavior Changes of Telemedicine Participants in Terms of Time and Space (시공간 관점에서 본 원격진료 이용자 행태 변화에 관한 연구)

  • Park, Sookyung;Hanashima, Yuki
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.16 no.2
    • /
    • pp.198-217
    • /
    • 2013
  • This research aims to examine the behavior changes of telemedicine participants with regard to time-space reconfiguration and to address the implications of telemedicine in terms of extensibility and restrictions (ambilaterality). According to the results of this research, telemedicine can lead to behavior changes in telemedicine participants, particularly patients. However, it is difficult to anticipate the time-space reconfiguration of telemedicine participants drastically. In other words, although telemedicine minimizes patients' burden of accessibility to and utilization of medical institutions, it requires the patients to visit medical institutions at least once due to the restricted application of telemedicine related to technological problems, the characteristics of medical practice and mutual stakes among the medical institutions involved in telemedicine. And physicians (telemedicine providers as mediators between medical specialists and patients) and medical specialists (as the ultimate telemedicine providers) do not evidence considerable changes in their behaviors, except for offline meetings for information sharing and medical training. Because the present telemedicine system does not require simultaneity between physicians, patients and medical specialists. Furthermore, present telemedicine operation is absorbed into existing medical activities as a health care delivery method. These phenomena are due to 1) the interests among medical institutions and the limitation or generalization of telemedicine technologies to stimulate regional-based telemedicine operation and 2) the goal of face-to-face interactions between patients and doctors, which is to avoid misdiagnosis and side effects. Finally, medical activities related to telemedicine do not differ from general medical activities. The ambilaterality of telemedicine in terms of extensibility and the restriction of time-space reconfiguration is an unsettled problem in the ICT technologies of medical services.

  • PDF

Automatic Detection of Malfunctioning Photovoltaic Modules Using Unmanned Aerial Vehicle Thermal Infrared Images

  • Kim, Dusik;Youn, Junhee;Kim, Changyoon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.6
    • /
    • pp.619-627
    • /
    • 2016
  • Cells of a PV (photovoltaic) module can suffer defects due to various causes resulting in a loss of power output. As a malfunctioning cell has a higher temperature than adjacent normal cells, it can be easily detected with a thermal infrared sensor. A conventional method of PV cell inspection is to use a hand-held infrared sensor for visual inspection. The main disadvantages of this method, when applied to a large-scale PV power plant, are that it is time-consuming and costly. This paper presents an algorithm for automatically detecting defective PV panels using images captured with a thermal imaging camera from an UAV (unmanned aerial vehicle). The proposed algorithm uses statistical analysis of thermal intensity (surface temperature) characteristics of each PV module to verify the mean intensity and standard deviation of each panel as parameters for fault diagnosis. One of the characteristics of thermal infrared imaging is that the larger the distance between sensor and target, the lower the measured temperature of the object. Consequently, a global detection rule using the mean intensity of all panels in the fault detection algorithm is not applicable. Therefore, a local detection rule was applied to automatically detect defective panels using the mean intensity and standard deviation range of each panel by array. The performance of the proposed algorithm was tested on three sample images; this verified a detection accuracy of defective panels of 97% or higher. In addition, as the proposed algorithm can adjust the range of threshold values for judging malfunction at the array level, the local detection rule is considered better suited for highly sensitive fault detection compared to a global detection rule. In this study, we used a panel area extraction method that we previously developed; fault detection accuracy would be improved if panel area extraction from images was more precise. Furthermore, the proposed algorithm contributes to the development of a maintenance and repair system for large-scale PV power plants, in combination with a geo-referencing algorithm for accurate determination of panel locations using sensor-based orientation parameters and photogrammetry from ground control points.

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.

Analysis on ISMS Certification and Organizational Characteristics based on Information Security Disclosure Data (정보보호 공시 데이터를 이용한 정보보호 관리체계 인증과 조직의 특성 분석)

  • SunJoo Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.205-231
    • /
    • 2023
  • The Information Security Management System (ISMS) is a protection procedure and process that keeps information assets confidential, flawless, and available at any time. ISMS-P in Korea and ISO/IEC 27001 overseas are the most representative ISMS certification systems. In this paper, in order to understand the relationship between ISMS certification and organizational characteristics, data were collected from Korea Internet & Security Agency (KISA), Ministry of Science and ICT, Information Security Disclosure System (ISDS), Financial Supervisory Service, Data Analysis, Retrieval and Transfer System (DART), and probit regression analysis was performed. In the probit analysis, the relationship with four independent variables was confirmed for three cases: ISMS-P acquisition, ISO/IEC 27001 acquisition, and both ISMS-P and ISO/IEC 27001 acquisition. As a result of the analysis, it was found that companies that acquired both ISMS-P and ISO/IEC 27001 had a positive correlation with the total number of employees and a negative correlation with business history. In addition, the improvement direction of the ISMS-P certification system and information security disclosure system could also be confirmed.

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Design for Navigation Simulation Architecture with Modeling for Critical Systems and Agents of Vessel (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (I) : 항해 시뮬레이션 아키텍처 설계와 선박 핵심 장비 및 에이전트 모델링)

  • Woo, Sang-Min;Lee, Jang-Se;Hwang, Hun-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1038-1048
    • /
    • 2019
  • Recently, various systems have been developed to support ship navigation safety. In order to verify the usefulness of such a system, it is most ideal to try it on a real vessel, but there are many difficulties. As an alternative, usability verification methods applied with modelling and simulation (M&S) techniques are required such as FMSS, which is closest to reality, is very expansive to construct, and there needs the specialized operator. For this reason, this paper proposes a method to verify the navigation safety support system by modeling and simulation techniques based on the Discrete Event System Specification (DEVS) formalism. As a first step, we designed the navigation simulation architecture based on the SES/MB framework, and details on modelling ship core equipment and navigator agents based on the DEVS. Through this, we are able to implement the navigation simulation system for vessels, and evaluate the effectiveness of navigation safety support elements such as collision avoidance, etc. using developed scenarios.

Design & Construction of Korean Type Smart Work Center on the basis of User-Oriented Smart Work System (사용자를 지향한 스마트워크 시스템 기반의 한국형 스마트워크 센터 설계 및 구축)

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.73-81
    • /
    • 2013
  • This research proposes design and construction of Korean type SWC based on user oriented smart work system. To achieve this proposal, the research suggested improvements of related law, changes to working environment, and strengthening information security for users, stronger Korean ICT based; the study investigated for an efficient and suitable Korean type SWC by analyzing Korean government plans and foreign developed countries' cases. The user-oriented smart work service platform suggested in this study aims to offer a solution to national crisis and establish infrastructure to knowledge-industry and creative-industry by collaborative smart work environment of 'Context Awareness' and 'Tangible User Interface'. As a result, smart work suggests methods to produce creative work by IT workers and efficient work environment for better standing in world competition. In conclusion, Korean SWC system is proved to be superior in satisfaction rate at 75.41%, 20.18% higher than average score shown in 5 categories in 5 countries from USA, Japan, and EU's which was 55.23%.

The Impact of Perceived Risks and Switching Costs on Switching Intention to Cloud Services: Based on PPM Model (지각된 위험과 전환비용이 클라우드 서비스로의 전환의도에 미치는 영향에 관한 연구: PPM 모델 중심으로)

  • Lee, Seung Hee;Jeong, Seok Chan
    • The Journal of Information Systems
    • /
    • v.30 no.3
    • /
    • pp.65-91
    • /
    • 2021
  • Purpose In this study, we investigated the impact of perceived risk and switching costs on switching intention to cloud service based on PPM (Pull-Push-Mooring) model. Design/methodology/approach We focused on revealing the switching factors of the switching intention to the cloud services. The switching factors to the cloud services were defined as perceived risk consisting of performance risk, economic risk, and security risk, and switching costs consisting of financial and learning costs. On the PPM model, we defined the pull factors consisting of perceived usefulness and perceived ease of use, and the push factor as satisfaction of the legacy system, and the mooring factor as policy supports. Findings The results of this study as follows; (1) Among the perceived risk factors, performance risk has a negative effect on the ease of use of pull factors, and finally it was found to affect the switching intention to the cloud services. Therefore, cloud service providers need to improve trust in cloud services, service timeliness, and linkage to the legacy systems. And it was found that economic risk and security risk among the perceived risk factors did not affect the switching intention to the cloud services. (2) Of the perceived risk factors, financial cost and learning cost did not affect the satisfaction of the legacy system, which is a push factor. It indicates that the respondents are positively considering switching to cloud service in the future, despite the fact that the respondents are satisfied with the use of the legacy system and are aware of the switching cost to cloud service. (3) Policy support was found to improve the switching intention to cloud services by alleviating the financial and learning costs required for cloud service switching.