• Title/Summary/Keyword: Information gathering

Search Result 841, Processing Time 0.026 seconds

Analysis on the Operation Status of National Education Information System (교육행정정보시스템의 운영실태분석)

  • Lee Dae-Sik;Jeong Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.115-122
    • /
    • 2006
  • The purpose of this paper is to suggest the improving plans about the system as searching an effective managing devices for NEIS with analysis of managing condition. For the plans, questionnaire was performed in the five sections to primary and secondary school teachers. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. The results are following: First. in spite of satisfaction with function of C/S, it have been some problems such as frequent patch and down of server. Secondly, although the introduction of NEIS was done in hurry without gathering teachers' opinions and sufficient research of system, it has been expected to settle down normally with correction and security. Thirdly, positive reaction was generally showed in research on satisfaction of specific task for school affairs and educational matters. Fourthly, most of teachers have known the functions of NEIS and recognized its convenience. Although they has not thought it reduced their work, they have realized it's convenient for dealing with statistics. Lastly, they think of NEIS as the essential system for the age of information, in spite of problems such as reveal of personal data and security. Therefore, we should keep eyes to problem of an invasion of human right. In addition, study deep into NEIS should be conducted with consistent security for the system. In order to it. technical and legal system should be carried out side by side.

  • PDF

Structural Optimization of Planar Truss using Quantum-inspired Evolution Algorithm (양자기반 진화알고리즘을 이용한 평면 트러스의 구조최적화)

  • Shon, Su-Deok;Lee, Seung-Jae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.18 no.4
    • /
    • pp.1-9
    • /
    • 2014
  • With the development of quantum computer, the development of the quantum-inspired search method applying the features of quantum mechanics and its application to engineering problems have emerged as one of the most interesting research topics. This algorithm stores information by using quantum-bit superposed basically by zero and one and approaches optional values through the quantum-gate operation. In this process, it can easily keep the balance between the two features of exploration and exploitation, and continually accumulates evolutionary information. This makes it differentiated from the existing search methods and estimated as a new algorithm as well. Thus, this study is to suggest a new minimum weight design technique by applying quantum-inspired search method into structural optimization of planar truss. In its mathematical model for optimum design, cost function is minimum weight and constraint function consists of the displacement and stress. To trace the accumulative process and gathering process of evolutionary information, the examples of 10-bar planar truss and 17-bar planar truss are chosen as the numerical examples, and their results are analyzed. The result of the structural optimized design in the numerical examples shows it has better result in minimum weight design, compared to those of the other existing search methods. It is also observed that more accurate optional values can be acquired as the result by accumulating evolutionary information. Besides, terminal condition is easily caught by representing Quantum-bit in probability.

Analyzing the Work of VTS Operators Using Eye-Tracking (시선추적을 활용한 선박교통관제사 업무 분석)

  • Sangwon Park;Youngsoo Park;Dae-won Kim;Hiroaki Seta;Sang-won Lee
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.239-248
    • /
    • 2024
  • VTS operators monitor movements of vessels within their jurisdiction and provide necessary information to ensure safe navigation. This involves communication with vessels within the VTS area. Contents of these communications are manually recorded in logbooks. However, manual logging faces limitations due to its inability to document details comprehensively and the challenge of constant recording amidst various duties. This study aimed to quantitatively analyze the workload associated with manual logkeeping by examining eye movements of VTS operators. Eye-tracking devices were used to measure gaze patterns of VTS operator at the Busan Port. Results indicated that approximately 65% of the VTS operators' gaze was directed towards the operation consoles, which were focal points for marine traffic information. In contrast, only about 9% of their gaze was directed towards logbooks. These findings suggest that while VTS operators predominantly focus on areas related to information gathering and dissemination, logbooks, being information-recording zones, receive minimal attention. For effective traffic management, the primary focus should be on information processing and provision rather than manual documentation.

Study on the 3GPP International Standard for M2M Communication Networks (M2M네트워크통신을 위한 3GPP 국제표준화 동향연구)

  • Hwang, Jin-ok;Lee, Sang-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1040-1047
    • /
    • 2015
  • This study is investigated for M2M Communication Network Standard based on 3GPP. The environment of M2M communication, we can predict the new mobile service that gathering, handling, controlling, transferring of the data for Intelligence, so that we can consider new direction for a lot of subject of study development issue. This study is shown three types of M2M network structure and four types of use cases on 3GPP International Standard. In Addition, we can introduce the future M2M communication network model, it can be propagate the industry and academic cooperation with 3GPP standards. The suggestion develops multiple applications and multiple devices for industry and academic. With the deployment of network provider, this environment support our current communication market that the standard devices of M2M network and service requirement. We are suggest this study for grasp the initial market with the intellectual property right (IPR) based on International Standards. In the future, we wish the success that grap the initial market or initial academic study with helpful issue.

Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance (서비스의 유용성과 프라이버시 염려도가 개인화 된 서비스 수용성에 미치는 영향에 관한 연구)

  • Lee, Zoon-Ky;Choi, Hee-Jai;Choi, Seon-Ah
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.37-51
    • /
    • 2007
  • As the highly improved Internet and information technology has led to the diversification of users' demands, personalization service attract lots of attention as a means to meet highly diversified demand of users. However, personalization service costs a lot. Also concerns over a possible violation of privacy have been raised since the service uses technology to find out the users' profiles. This research studies the advantages individuals acquire from personalization service and how privacy concern influences service acceptance. Research on related documents and information gathering from e-commerce sites derived six representative types of service. Questionnaires were utilized to research privacy concern according to services, service usefulness, and service acceptance. As expected, privacy concern has a negative relation to acceptance while service usefulness has a positive relation to it, thereby resulting in an offset between two variables. Moreover, they play a different role depending on what kinds of service or in formation should be provided. The results derived from this paper will help the e-commerce sites provide personalization service by collecting personal information while protecting users' privacy.

  • PDF

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Development of Building Monitoring Techniques Using Augmented Reality (증강현실을 이용한 건물 모니터링 기법 개발)

  • Jeong, Seong-Su;Heo, Joon;Woo, Sun-Kyu
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.6
    • /
    • pp.3-12
    • /
    • 2009
  • In order to effectively distribute the resources, it is very critical to understand the status or progress of construction site quickly and accurately. Augmented Reality (AR) can provide this situation with information which is convenient and intuitive. Conventional implementation of AR in outdoor or construction site condition requires additional sensors or markers to track the position and direction of camera. This research is aimed to develop the technologies which can be utilized in gathering the information of constructing or constructed buildings and structures. The AR technique that does not require additional devices except for the camera was implemented to simplify the system and improve utility in inaccessible area. In order to do so, the position of camera's perspective center and direction of camera was estimated using exterior orientation techniques. And 3D drawing model of building was projected and overlapped using this information. The result shows that by using this technique, the virtual drawing image was registered on real image with few pixels of error. The technique and procedure introduced in this paper simplifies the hardware organization of AR system that makes it easier for the AR technology to be utilized with ease in construction site. Moreover, this technique will help the AR to be utilized even in inaccessible areas. In addition to this, it is expected that combining this technique and 4D CAD technology can provide the project manager with more intuitive and comprehensive information that simplifies the monitoring work of construction progress and planning.

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

Investigation and Analysis for the Status of Urban Mining Industry in Korea (국내 도시광산산업 현황 조사·분석)

  • Kim, Lyung-Joo;Shin, Ho-Jung;Kang, Hong-Yoon
    • Resources Recycling
    • /
    • v.25 no.5
    • /
    • pp.3-13
    • /
    • 2016
  • Statistics on the urban mining industry is the essential information to develop the urban mining industry systematically and the prerequisite way to understand its related trends. Status on domestic urban mining industry was thus investigated through the integrated method which uses both the top-down way based on the national statistics utilization and the bottom-up way based on field data gathering. Results indicated that the scale of metal resources produced through domestic urban mine was 19.6 trillion won, which corresponds to approximately 22 percent of metal demand in korea. The number of firms for urban mining was 917, and they are mostly placed in metropolitan area and Gyeongsang province. It was also found that about 58 percent of urban mining firms was in small business level less than 10 employees. Compared to the results in 2009, the number of urban mining companies in 2014 generally increased, and that of rare metal companies grew up significantly. This study is particularly different from the conventional statistics investigation on the point of the actual scale findings of metal resources based on the field data.

Intermediate View Image and its Digital Hologram Generation for an Virtual Arbitrary View-Point Hologram Service (임의의 가상시점 홀로그램 서비스를 위한 중간시점 영상 및 디지털 홀로그램 생성)

  • Seo, Young-Ho;Lee, Yoon-Hyuk;Koo, Ja-Myung;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.15-31
    • /
    • 2013
  • This paper proposes an intermediate image generation method for the viewer's view point by tracking the viewer's face, which is converted to a digital hologram. Its purpose is to increase the viewing angle of a digital hologram, which is gathering higher and higher interest these days. The method assumes that the image information for the leftmost and the rightmost view points within the viewing angle to be controlled are given. It uses a stereo-matching method between the leftmost and the rightmost depth images to obtain the pseudo-disparity increment per depth value. With this increment, the positional informations from both the leftmost view point and the rightmost view point are generated, which are blended to get the information at the wanted intermediate viewpoint. The occurrable dis-occlusion region in this case is defined and a inpainting method is proposed. The results from implementing and experimenting this method showed that the average image qualities of the generated depth and RGB image were 33.83[dB] and 29.5[dB], respectively, and the average execution time was 250[ms] per frame. Also, we propose a prototype system to service digital hologram interactively to the viewer by using the proposed intermediate view generation method. It includes the operations of data acquisition for the leftmost and the rightmost viewpoints, camera calibration and image rectification, intermediate view image generation, computer-generated hologram (CGH) generation, and reconstruction of the hologram image. This system is implemented in the LabView(R) environments, in which CGH generation and hologram image reconstruction are implemented with GPGPUs, while others are implemented in software. The implemented system showed the execution speed to process about 5 frames per second.