• Title/Summary/Keyword: Information gathering

Search Result 839, Processing Time 0.027 seconds

A Design and Implementation of Impromptu Gathering Application Based on Android Platform (안드로이드 플랫폼 기반의 즉석 모임 정보 제공 애플리케이션 설계 및 구현)

  • Lee, Won Joo;Yoo, Jung Hyun;Jeong, Won Hyeok;Lee, Hyun Bok;Kim, Hyung Gyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.93-94
    • /
    • 2020
  • 본 논문에서는 스마트폰의 GPS 센서와 구글 지도기반의 즉석 모임 정보제공 연동이 자유로운 애플리케이션을 설계하고 구현한다. 이 애플리케이션은 안드로이드 내장 센서를 이용하여 현재 위치를 기준으로 반경 1Km을 파란색 반원으로 표시하며 빠르게 접근할 수 있는 모임을 확인할 수 있다. 그리고 즉석 모임 중 자주 이루어지는 택시, 테니스같이 혼자 할 수 없는 운동, 등과 같이 주요 모임별로 다르게 표시하여 정보를 보지 않아도 직관적으로 어떤 유형인지 알 수 있도록 구현한다. 또한, 마커를 클릭하면 해당 모임에 관한 정보를 확인할 수 있고, 장소 근처에 가면 알람을 보낼지 선택할 수 있는데 지도 하단에 버튼을 통해 알람 설정한 모임을 관리 할 수 있다. 위치기반 알람을 통해서 모임에 대한 정보를 까먹지 않게 계속 알려줌으로써 참여율을 높일 수 있도록 구현한다.

  • PDF

A Development of Computational Thinking Education Model for Elementary Students (초등학생들을 위한 계산사고 교육 모델 개발)

  • Kim, Kapsu
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.73-81
    • /
    • 2013
  • Elementary students are living in the information environment at daily. Also, they are learning the school curriculum lessons are based on information. Computational thinking that based on information from everyday life and the school curriculum is important. Until now, many educational materials for the computational thinking have been developed. But, teaching and learning method for computational thinking have not been developed. In the study, the teaching and learning model for computational thinking for elementary school students will be developed. Computational thinking education model proposed in this study consists of three phases. The first phase is the information gathering stage. The second phase is to perform calculations. The last phase is the decision-making steps. Effective teaching and learning methods that are proposed model in this study for computational thinking education will be used.

  • PDF

Gathering Services of the Information Harvest Warehouse(IHWA) System (IHWA(Information Harvest Warehouses) 시스템의 정보수집 서비스)

  • 오동익;정종석
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.382-385
    • /
    • 2000
  • IHWA는 기존의 객체 컴포넌트를 통합함으로써 새로운 응용프로그램을 작성할 수 있는 CBSE(Component Based Software Engineering ) 기법을 바탕으로 개발되어진 웹 기반 정보 저장/검색 시스템이다. 이 시스템은 1997년에 그 1차 버전이 개발되어 사용되어 왔으며 현재는 보다 나은 견고함과 일반성의 제공, 그리고 전자상거래 영역에 대한 준비를 위해 시스템에 대한 중요한 수정작업이 진행중에 있다. 본 논문에서는 새로운 IHWA시스템의 설계에 적용된 원리 및 내용을 설명하고 특히 정보수집 서비스를 제공하기 위해 필수적으로 요구되는 정보 수집기들의 구조 및 구현에 대해 설명하고자한다.

  • PDF

Vertical class fragmentation in distributed object-oriented databases (분산 객체 지향 데이타베이스에서 클래스의 기법)

  • 이순미;임해철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.215-224
    • /
    • 1997
  • This paper addresses the vertical class fragmentation in distributed object-oriented databases. In the proposed vertical fragmentation, after producing the attribute fragment by partitioning attributes, then the method fragment is produced by gathering methods referring the attribute in each fragment. For partitioning attributes, we define query access matrix(QAM) and method access matrix(MAM) to express attributes that method refers, and extend QAM, MAM and attribute usage matrix(AUM) to universal class environment for representing relationship among other classes through class hierarchy and class composite hierarchy.

  • PDF

An Attribute Based Sensing Data Gathering Protocol for 6LoWPAN (6LoWPAN에서 센서의 특성을 고려한 센싱데이타 수집에 대한 연구)

  • Lee, Hye-Chan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.853-854
    • /
    • 2007
  • 센서네트워크는 유비쿼터스 사회에서 기반환경이 될 가장 중요한 기술 중 하나이다. 이러한 센서네트워크를 보다 효율적으로 관리하기 위해서는 IP 망과의 연동이 필수 적인 조건으로 부각되고 있다. 이러한 흐름에 맞춰 IEEE802.15.4 위에 TCP/IP 를 사용하기 위해 IETF 워킹그룹 6LoWPAN 이 만들어졌다. 본 논문에서는 IP 네트워크와 연동하는 센서네트워크(6LoWPAN)에서 센서의 특성에 따라 데이터를 효율적으로 요청하고 수집하는 프로토콜을 제안하였다.

  • PDF

An Implementation of Wireless Channel Scanning for Unauthorized Mobile APs Detection (비인가 모바일 AP 탐지를 위한 채널 스캔의 구현에 관한 연구)

  • Hwang, Jaeryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.363-364
    • /
    • 2015
  • On the area which is restricted an unauthorized WiFi service, mobile WiFi hotspot causes security problems like leaking and gathering internal data. In this paper, we modify a wireless lan driver and implement a detector that periodically scans the wireless channels.

  • PDF

A Study on the Improvement of Air Traffic Safety Information Management (관제 안전정보 관리체계 개선을 위한 연구)

  • Shin, Oksig;Kim, Ilyoung
    • Journal of Aerospace System Engineering
    • /
    • v.2 no.3
    • /
    • pp.7-11
    • /
    • 2008
  • This is a study to research the effective way to enhance the performance of safety management by gathering and analyzing the information of undesirable occurrences that may result in accident or serious incident. This includes the way to identify the potential hazards related with the proactive activities. As detailed improvements, this paper introduces the mandatory and voluntary reporting system, normal operation safety survey, ATC quality assurance and the encouragement of just culture.

  • PDF

Various kinds of data and reliability assessment (여러 가지 데이터와 신뢰성 평가)

  • Baik, Jai-Wook
    • Journal of Applied Reliability
    • /
    • v.9 no.4
    • /
    • pp.303-317
    • /
    • 2009
  • There are a lot of different data in a company. Some of the data can be modified to produce valuable information on reliability. In this study different types of data that can be obtained in a company are reviewed. Reliability related data that can be taken throughout the life cycle of a product are also reviewed. Developing a method of gathering all of the pertinent data from the various sources and databases and pulling them into one central location is explained.

  • PDF

OPAC user studies (온라인 열람목록의 이용자연구)

  • 사공복희
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.89-118
    • /
    • 1998
  • The findings of the CLR-OPAC studies and the major OPAC user studies are analyzed and sythesized. They are described, dividing into three categories: characteristics of users, user instruction, and user interface. Data gathering methods, and their strengths and weaknesses are also discussed.

  • PDF

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.