• 제목/요약/키워드: IT-based Society

검색결과 64,834건 처리시간 0.081초

DEVS 기반의 GPS 위치추적 시스템 개발에 관한 연구 (Study on DEVS Based Development that GPS Location Tracking System)

  • 서희석;주승환;이은정;이승재
    • 디지털산업정보학회논문지
    • /
    • 제6권3호
    • /
    • pp.1-8
    • /
    • 2010
  • Recently, the missing due to the heinous crimes occurred in succession has been the focus of attention, so measures for these are urgently needed. So, it is necessary that we need to check and take care the weak like children, women, the elderly with dementia and insane person to prevent these social problems. This study is location-based service that suggests the tracking system and way to guard a family and property from the various risk factors which are possible in our life. To acquire the location of the user who is in motion, a communications network technologies were integrated and the system will be able to be monitoring in real time through the website. So, it is convenient and safe because it is possible to use anywhere. Concretely, it was described around location-based service, GPS system, tracking system, process of the service solution and composition for the system. Also, the way to activate the system will be suggested. The final suggested system was verified the possibility through the placement. With this, i will offer effective measures which is more convenient to use and reliable.

CIDOC-CRM을 이용한 지역기록의 공간 기반 구조화 - 부산항을 사례로 - (A Space-Based Approach to Organizing Local Records Using CIDOC CRM: A Case of the Port of Busan)

  • 현문수
    • 한국기록관리학회지
    • /
    • 제15권2호
    • /
    • pp.83-101
    • /
    • 2015
  • 이 연구의 목적은 공간을 기반으로 한 지역기록의 구조화 가능성을 실험하는 것이다. 문헌연구를 통해 공간은 지역기록의 이용과 이해를 지원할 수 있는 중요한 기록 맥락으로 여겨질 수 있음을 확인하였다. 이에 공간을 독립 개체로 추가한 공간 중심의 기록 모형을 정의하였으며, 이에 따라 사례 지역과 기록을 대상으로 구조화 실험을 진행하였다. 실험은 CIDOC CRM 6.0 버전을 사용하여 진행하였다. 사례 공간인 부산항을 거점으로 확인된 기록 중 5개 유형을 사례로 구조화하였다. 실험을 통해 공간은 기록을 포함한 다양한 개체와 다양한 연관 관계로 구조화될 수 있었다. 최종적으로 공간은 지역기록 구조화에 있어 독립 개체로 정의될 수 있음을 확인하였으며, 기록의 맥락 이해를 지원하는 주요 개체로 다루어질 수 있음을 확인하였다.

고객 감성 분석을 위한 학습 기반 토크나이저 비교 연구 (Comparative Study of Tokenizer Based on Learning for Sentiment Analysis)

  • 김원준
    • 품질경영학회지
    • /
    • 제48권3호
    • /
    • pp.421-431
    • /
    • 2020
  • Purpose: The purpose of this study is to compare and analyze the tokenizer in natural language processing for customer satisfaction in sentiment analysis. Methods: In this study, a supervised learning-based tokenizer Mecab-Ko and an unsupervised learning-based tokenizer SentencePiece were used for comparison. Three algorithms: Naïve Bayes, k-Nearest Neighbor, and Decision Tree were selected to compare the performance of each tokenizer. For performance comparison, three metrics: accuracy, precision, and recall were used in the study. Results: The results of this study are as follows; Through performance evaluation and verification, it was confirmed that SentencePiece shows better classification performance than Mecab-Ko. In order to confirm the robustness of the derived results, independent t-tests were conducted on the evaluation results for the two types of the tokenizer. As a result of the study, it was confirmed that the classification performance of the SentencePiece tokenizer was high in the k-Nearest Neighbor and Decision Tree algorithms. In addition, the Decision Tree showed slightly higher accuracy among the three classification algorithms. Conclusion: The SentencePiece tokenizer can be used to classify and interpret customer sentiment based on online reviews in Korean more accurately. In addition, it seems that it is possible to give a specific meaning to a short word or a jargon, which is often used by users when evaluating products but is not defined in advance.

UFID를 활용한 객체기반 수치지도 이력관리 방안 연구 (A Study on the history management of Object-based digital map by UFID)

  • 박청;박기석
    • 한국측량학회:학술대회논문집
    • /
    • 한국측량학회 2010년 춘계학술발표회 논문집
    • /
    • pp.57-59
    • /
    • 2010
  • 현재 수치지도는 그 이력관리의 방법이 모호해 파일기반으로 영역단위 혹은 도엽단위로 관리되고 있다. 이는 변화되지 않은 지역을 중복적으로 관리하여 비용의 소모가 클 뿐 아니라 수치지도의 시간적, 공간적 관리방법이 제시되지 못하고 있다. 또한 수치지도를 파일기반으로 관리하기 때문에 관리의 보안성의 보장을 받지 못하며 관리의 체계화가 이루어지지 않는다. 따라서 본 연구에서는 수치지도의 각 객체별 이력관리를 위해 객체단위에 UFID를 부여 후 객체의 갱신이 이루어질 때마다 객체단위로써 이력관리 할 수 있는 방안을 연구하고자 한다.

  • PDF

IoT 기반 라돈 측정 제어시스템 설계 및 구현 (The Design and Implementation of IoT-Based Radon Measurement Control System)

  • 안희학;구자영;이상윤
    • 디지털산업정보학회논문지
    • /
    • 제16권1호
    • /
    • pp.1-10
    • /
    • 2020
  • This paper is a IoT-based radon meter control system and a radon meter control method using it. The IoT-based radon meter control system is control system for controlling a radon meter by network-connecting radon meter and a user terminal. The radon measuring device may be provided with a radon sensor to measure a radon value of a preset management target area, it collect and store numerical data. The radon meter control system monitors the condition of the radon meter, it includes control center configured to deliver radon meter management information generated to a user terminal. Also radon measurements to determine the exact amount of radon gas. Therefore, the situation-specific actions based on radon numbers can be promptly implemented to ensure adequate protection for those who are vulnerable to radon and those who live in the area. Condition monitoring allows the radon meter to respond quickly to failure or failure of the radon meter. In addition, it is possible to secure a baseline of radon's influence and to obtain research data to cope with radon by establishing big data with radon measurements.

레시피 데이터 기반의 식재료 궁합 분석을 이용한 레시피 추천 시스템 구현 (Implementation of Recipe Recommendation System Using Ingredients Combination Analysis based on Recipe Data)

  • 민성희;오유수
    • 한국멀티미디어학회논문지
    • /
    • 제24권8호
    • /
    • pp.1114-1121
    • /
    • 2021
  • In this paper, we implement a recipe recommendation system using ingredient harmonization analysis based on recipe data. The proposed system receives an image of a food ingredient purchase receipt to recommend ingredients and recipes to the user. Moreover, it performs preprocessing of the receipt images and text extraction using the OCR algorithm. The proposed system can recommend recipes based on the combined data of ingredients. It collects recipe data to calculate the combination for each food ingredient and extracts the food ingredients of the collected recipe as training data. And then, it acquires vector data by learning with a natural language processing algorithm. Moreover, it can recommend recipes based on ingredients with high similarity. Also, the proposed system can recommend recipes using replaceable ingredients to improve the accuracy of the result through preprocessing and postprocessing. For our evaluation, we created a random input dataset to evaluate the proposed recipe recommendation system's performance and calculated the accuracy for each algorithm. As a result of performance evaluation, the accuracy of the Word2Vec algorithm was the highest.

aCN-RB-tree: Constrained Network-Based Index for Spatio-Temporal Aggregation of Moving Object Trajectory

  • Lee, Dong-Wook;Baek, Sung-Ha;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권5호
    • /
    • pp.527-547
    • /
    • 2009
  • Moving object management is widely used in traffic, logistic and data mining applications in ubiquitous environments. It is required to analyze spatio-temporal data and trajectories for moving object management. In this paper, we proposed a novel index structure for spatio-temporal aggregation of trajectory in a constrained network, named aCN-RB-tree. It manages aggregation values of trajectories using a constraint network-based index and it also supports direction of trajectory. An aCN-RB-tree consists of an aR-tree in its center and an extended B-tree. In this structure, an aR-tree is similar to a Min/Max R-tree, which stores the child nodes' max aggregation value in the parent node. Also, the proposed index structure is based on a constrained network structure such as a FNR-tree, so that it can decrease the dead space of index nodes. Each leaf node of an aR-tree has an extended B-tree which can store timestamp-based aggregation values. As it considers the direction of trajectory, the extended B-tree has a structure with direction. So this kind of aCN-RB-tree index can support efficient search for trajectory and traffic zone. The aCN-RB-tree can find a moving object trajectory in a given time interval efficiently. It can support traffic management systems and mining systems in ubiquitous environments.

단말기간 직접통신(Device-to-Device) 기반 4G 이동통신 서비스 발굴 및 비즈니스 모델 개발 방법론 (Development of Service Use Cases and Business Models for 4G Mobile Communications Based on Device-to-Device Communications)

  • 오슬기;류승완;박세권;신동천;김이강
    • 한국IT서비스학회지
    • /
    • 제11권2호
    • /
    • pp.339-353
    • /
    • 2012
  • Mobile communication technology is advancing forward to deliver more connected devices and richer content and applications. The number of subscriptions continues to grow along with an explosive increase in the mobile data traffic demand. Thereby, it creates a significant network capacity shortage concerns for mobile network operators. In order to address this problem, it is essential to increase the network capacity at a low additional cost. The device-to-device (D2D) communication based proximity service is believed to have a promising future mobile communication technology that is capable to create new mobile service opportunities and offload traffic to the eNB. In addition, it is also required to develop new mobile communication services and its business models not only to accommodate the increasing mobile traffic demand but also to foster profitability of mobile business service providers such as the network providers, contents providers and platform providers. In this article, we first analyze current mobile business eco-system in the context of CPNT based value chain. Then, propose service development framework and business model creation methodologies for the device-to-device communication based services in the beyond LTE/LTE-Advanced systems.

클라우드 스토리지에서의 중요데이터 보호 (Securing Sensitive Data in Cloud Storage)

  • 이셜리;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

인문학 기반 예비대학 모델 연구: P 대학 사례를 중심으로 (A Study on the Humanities-based Preliminary University Model : Focused on the P University)

  • 백상미;정선호
    • 한국융합학회논문지
    • /
    • 제13권1호
    • /
    • pp.357-364
    • /
    • 2022
  • 본 연구는 인문학적 사고를 향상시키기 위해 예비대학 프로그램을 개발, 운영, 평가하는 플랫폼 설계를 목적으로 한다. 이를 위해 본 연구에서는 P 대학의 특성에 맞는 예비대학을 설계하기 위하여 전문가 인터뷰와 재학생 설문조사를 실시하고, 분석된 결과를 토대로 인문학을 기반으로 하는 예비대학의 모델을 제안하였다. 전문가 대상 인터뷰 결과 온라인 플랫폼에 기반한 예비대학 모델 구축 및 인문학적 사고에 기반한 인재 양성 교육의 필요성 등이 제시되었다. 재학생 대상 설문 결과에서는 인문학 기반의 예비대학 운영의 필요성을 인식하고 있는 것으로 나타났다. 연구 결과를 반영하여 본 연구에서는 P 대학에 적합한 인문학 기반 예비대학 모델을 제안하고자 한다. 제안된 예비대학 모델 운영을 통해 참여 학생들이 대학인으로서 갖추어야 할 인문학적 사고가 확장되는 계기가 될 것으로 본다. 후속 연구에서는 플랫폼 기반 프로그램 운영을 통해 교육적 효과를 검증할 필요가 있다.