• Title/Summary/Keyword: International Standard Identification System

Search Result 63, Processing Time 0.029 seconds

E-government Skills Identification and Development: Toward a Staged-Based User-Centric Approach for Developing Countries

  • Khan, Gohar Feroz;Moon, Jung-Hoon;Rhee, Cheul;Rho, Jae-Jeung
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.1-31
    • /
    • 2010
  • One of the prominent challenges of e-government identified in developing countries is low level of ICT literacy and skills of e-government users. For those countries at the nascent stage of e-government development, it is crucial to identify and provide e-skills needed from the demand side. However, prior research has mostly focused on the supply side of e-skills, ignoring the consumption side of e-skills. In addition, no user centric approach for e-skills identification and development for e-service consumption, with respect to the stages of e-government development, have been proposed and validated. The purpose of this article is thus to: 1) Identify skills required for e-services utilization by all participants-citizens, public, and private sector employees-involved in G2C, G2B, and G2E e-government relationships respectively; assuming they are consumers of e-government and to 2) Propose and validate an user-centric approach for e-skills identification and development based on stages of e-government utilizing the Delphi method. As a result of the study, a comprehensive list of e-skills (N = 81) was generated. We found that e-skills required for e-service consumption are not merely technical; they include a wide variety of related skills that can be applied to enhancing e-skills. Therefore, the findings can serve as a standard curriculum for training and educating both citizens and government employees in developing countries. Moreover, the findings of this research may also facilitate international organizations in indentifying and measuring citizens' readiness for e-government in terms of e-skills.

Locally-Weighted Polynomial Neural Network for Daily Short-Term Peak Load Forecasting

  • Yu, Jungwon;Kim, Sungshin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.163-172
    • /
    • 2016
  • Electric load forecasting is essential for effective power system planning and operation. Complex and nonlinear relationships exist between the electric loads and their exogenous factors. In addition, time-series load data has non-stationary characteristics, such as trend, seasonality and anomalous day effects, making it difficult to predict the future loads. This paper proposes a locally-weighted polynomial neural network (LWPNN), which is a combination of a polynomial neural network (PNN) and locally-weighted regression (LWR) for daily shortterm peak load forecasting. Model over-fitting problems can be prevented effectively because PNN has an automatic structure identification mechanism for nonlinear system modeling. LWR applied to optimize the regression coefficients of LWPNN only uses the locally-weighted learning data points located in the neighborhood of the current query point instead of using all data points. LWPNN is very effective and suitable for predicting an electric load series with nonlinear and non-stationary characteristics. To confirm the effectiveness, the proposed LWPNN, standard PNN, support vector regression and artificial neural network are applied to a real world daily peak load dataset in Korea. The proposed LWPNN shows significantly good prediction accuracy compared to the other methods.

Assessment of Urban Land Suitability Analysis for Public Park Planning

  • Sungmin Cho
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.259-266
    • /
    • 2024
  • One of the most time consuming issues in a city development is the identification of suitable areas for urban infrastructures and proper land uses. Suitability analysis is the process and procedures to find the best available land in given area -that is, the ability of a system to select the needs of users in land use. This paper studied the usage of Geographic Information System technique and methods for the selection of the most appropriate sites for public park in the city of Gwangju. GIS was used as a standard technique to find the best available sites for development in urban areas. For this cause, digital elevation model and spatial data were used to produce different thematic layers by using software Idrisi. Criteria for finding the suitable site for park development were decided to evaluate the land and the followings 4 criteria were selected: on land with less than 3 degrees in slope, outside a 200m buffer around lakes, on land currently designated as forests, and 20ha or greater in size. To meet and measure each criterion, distance and context operators were applied to reclassify the importance of certain weight and Boolean images were generated to meet the criteria. These weights and maps has been combined using ArcGIS tools and the final map was prepared showing the most suitable sites. We may assist city planners and government officials in future development of public facilities including parks and related land use plans at urban level and act as to ensure proper land use planning and management of the urban areas.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

Vocabularies for Defining Business Process of International Logistics (국제 물류 비즈니스 프로세스 정의를 위한 어휘 사전)

  • Lee, Jong-Yun;Lee, Sang-Ho;Bae, Woo-Sik;Lee, Sun-Young;Song, Byung-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.179-184
    • /
    • 2007
  • EPCglobal 네트워크란 EPC(Electronic Product Code)와 RFID(Radio Frequency Identification) 기술을 바탕으로 제품에 식별번호를 부여하고 정보를 저장할 수 있는 공간을 네트워크로 연동하여 공급자, 수요자, 소비가 제품에 관련된 정보를 알 수 있게 해주는 시스템을 말한다. 또한 EPCglobal 네트워크 아키텍처 프레임워크(EPCglobal network architecture framework)는 EPC를 사용하여 공급과 유통망 강화라는 업체간의 공동 목표를 위한 서비스하는 것이다. EPCglobal 네트워크 아키텍처 중 EPCIS(EPC Information System) 수집 애플리케이션, EPCIS 접근 애플리케이션에서 이벤트 정의 시 공통적인 의사소통을 위한 표준 어휘 정의가 필수적이며, 그 어휘 종류에는 표준 어휘(standard vocabulary)와 사용자어휘(user vocabulary)가 있다. 이 논문은 이 가운데 EPCglobal 네트워크 아키텍처의 표준 어휘 정의에 초점을 두고, 사용자 어휘는 부분적으로 정의하고자 한다. 따라서 이 논문은 EPCglobal 네트워크 프레임 아키텍처의 이벤트 정의 시 사용될 표준 어휘를 제안하고, XML 구현을 통해 실제 사용 가능한 환경을 제공할 것이다.

  • PDF

Unstable Approach Mitigation Based on Flight Data Analysis (비행 데이터 분석 기반의 불안정 접근 경감방안)

  • Kim, Hyeon Deok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.52-59
    • /
    • 2021
  • According to the International Air Transport Association (IATA), 61% of the accidents occurred during the approach and landing phase of the flight, with 16% of the accidents caused by unstable access of the commercial aircraft. It was identified that the pilot's unstable approach and poor manipulation of correction led to accidents by continuing the excessive approach without go-around manuever. The causes of unstable access may vary, including airport approach procedures, pilot error, misplanning, workload, ATC (Air Traffic Contol) congestion, etc. In this study, we use the flight data analysis system to select domestic case airports and aircraft type where unstable approach events occur repeatedly. Through flight data analysis, including main events, airport approach procedures, pilot operations, as well as various environmental factors such as weather and geographical conditions at the airport. It aims to identify and eliminate the tendency of unstable approach events and the causes and risks of them to derive implications for mitigating unstable approach events and for developing navigation safety measures.

AIS-ASM Standardised Communication Message Development Based on Users' Communication Needs at Sea (사용자 요구 기반의 AIS-ASM 표준통신메시지 개발에 관한 연구)

  • Choi, Seung-Hee;Ahn, Young-Joong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.6
    • /
    • pp.639-645
    • /
    • 2017
  • Application Specific Messages (ASM) have been introduced by a number of international bodies, such as the International Maritime Organization (IMO), the International Telecommunication Union (ITU) and the International Association of Lighthouse Authorities (IALA), for the purpose of resolving AIS overloading issues caused by an increasing number of ships using AIS systems. ASM communication will transmit a large amount of safety-related information at sea, including meteorological information, accident reporting, and navigational warnings. Specifically, this message transaction system is expected to be actively used for communication among ships and for ship-to-shore (4S), where VHF communication through voice was standard. In order to design a user-oriented service through standardised AIS-ASM messaging in the future, the need for analysis of this seems to be quite critical. In order to reflect users' AIS-ASM communication needs, therefore, frequently-occurring marine communication messages were analysed through a questionnaire survey conducted on 57 marine officers and 50 VTS operators. Based on the survey results, a list of key standardised messages was suggested as a reference for future AIS message development.

A Study on the Applicability of ISNI for Authority Control (전거제어를 위한 국제표준이름식별자(ISNI)의 활용가능성에 관한 연구)

  • Lee, Mihwa
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.3
    • /
    • pp.133-151
    • /
    • 2014
  • This study was to investigate the concept of ISNI and to find its availability in authority control, realizing importance of ISNI as the bridge identifier including all the information media content industries. ISNI is needed for global and comprehensive name authority control as the bridge identifier for the identification of public identities of parties involved throughout the information media content industries in the creation, production, management and content distribution chains. First of all, it was to inquire ISNI concept, goal, terms and definitions, structure and syntax, allocation of ISNI, administration of the ISNI system, and metadata. Next, it was to suggest the applicability of ISNI in authority control. First, it should be needed to consider in applying ISNI for cooperative authority control. It is possible to interactively use the authority data created in library and other information industries area by constructing KISNI system. Second, it is possible to construct linked data by linking various identifier through ISNI identifier as bridge identifier. Third, it is needed to develop KORMARC for describing ISNI identifier in KORMARC bibliographic and authority record.

Metadata Design Based on Vector Type Geospatial Information Standard for the Collection and Management of Inundation Map (침수지도 수집 및 관리를 위한 벡터형 공간정보 표준 기반의 메타데이터 설계)

  • Sim, Gyu-Seong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.42-48
    • /
    • 2016
  • Inundation Maps are used to predict potential areas of flooding through the signs of past flooding and flood inundation analysis for flooding expected in the future, and this has led to the development of various forms of disaster-related services by governments. However, each institution has its own individual scenarios for making maps for spatial expression. Therefore, the type of spatial information is not standardized and has many forms and structures. In this study, we attempted to design the metadata that would allow Inundation Map information to be shared and used in various fields. The international standard, ISO 19115, and the domestic standards, KS X ISO 19115, TTAS.IS - 19115 and TTAS.KO - 10.0139/R1 of TTA, were used in the design to derive an appropriate standard for comparative analysis by dividing into maintenance, constraints, metadata, spatial reference system, identification, and distribution. It is expected that inundation maps will be easier to utilize and distribute among institutions and private companies by systematically collecting and managing them through the metadata design based vector space information standard developed in this study.