• Title/Summary/Keyword: Location정보

Search Result 5,610, Processing Time 0.035 seconds

Estimating the Interim Rate of Votes Earned Based on the Exit Poll Results during the Coverage of Ballot Results by Broadcasters (선거 개표방송에서 출구조사 자료를 활용한 중간 득표율 추정에 관한 연구)

  • Lee, Yoon-Dong;Park, Jin-Woo
    • Survey Research
    • /
    • v.12 no.1
    • /
    • pp.141-152
    • /
    • 2011
  • During major elections, three terrestrial broadcasting stations in Korea have covered the progresses of election results by announcing the simple sum of ballot counts of all ballot counting stations. The current approach, however, does not properly reflect the actual ballot count differences by ballot counting location, leading to cause unnecessary but possible confusions. In addition, the current coverage approach restricts the broadcasters from using regional poll data gained through exit polls by letting them to use the significant information on a one-off purpose to announce the initial prediction of the poll results and to fully disregard the exit poll results during the ballot counting process. Based on the understanding, this paper is designed to suggest a Bayesian approach to consolidate the exit poll results with the progressive ballot counting results and announce them as such. The suggested consolidation approach is expected to mitigate or avoid the possible confusions that may arise in connection with the different ballot counting paces by ballot counting station.

  • PDF

A Study on LED Energy Efficiency in Buildings through Cloud-based User Authentication in IoT Network Environment (IoT 네트워크 환경에서 클라우드 기반의 사용자 인증을 통한 건물 내의 LED에너지 효율화 연구)

  • Ahn, Ye-Chan;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.235-240
    • /
    • 2017
  • Recently, Internet of things have been applied to various fields and are becoming common in our everyday life. Everything in our daily lives is networked, interacting with each other and giving us more useful effects. In this paper, we implemented an algorithm that can illuminate the LED lighting to the authorized person 's place in the network environment connected with the authentication device only once with the user authentication. User authentication in one building User authenticated through a single user search for the location of the user's lab stored in the database using the certified information and LED lights up to the lab where the user works. Through this, unnecessary energy is generated because people do not pass frequently.

Evolution of Context Aware Services in Next Generation Mobile Service Environment (차세대 이동통신 서비스 환경에서의 상황 인식 서비스 진화)

  • Bae, Jung-Sook;Sihn, Gyung-Chul;Lee, Jae-Yong;Kim, Byung-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10A
    • /
    • pp.960-967
    • /
    • 2006
  • Mobile communication is evolving toward next generation system that is capable to provide ubiquitous human-centric services with giving no restriction on time and location. In particular, context-awareness will be realized using various sensors and devices and related technologies under the ubiquitous Next Generation (NG) mobile communications environment where user's demand and surrounding context are changing dynamically. By such context awareness, context aware service which provides best suitable services for a user by analyzing user's needs and situational information, will be one of the promising NG mobile services. In this article, we propose NG mobile service environment with focusing on generic service traffic flows supported by the NG service platform which gives various means of connecting users and service providers. Then, we propose evolutional phases of context-aware services based on ranges of context information and evolutional trend of telecommunication technologies and networking environment in NG mobile service environment.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs

  • Park, Lai-Hyuk;Na, Woong-Soo;Lee, Gun-Woo;Lee, Chang-Ha;Park, Chang-Yun;Cho, Yong-Soo;Cho, Sung-Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.12
    • /
    • pp.2272-2293
    • /
    • 2011
  • Communication technology of future networks is predicted to provide a large variety of services including WiFi service in vehicular network. In this paper, we assume that vehicles are embedded with WiMAX antenna and in-vehicle terminals receive WiMAX traffic through WiFi interface. This assumption will impose severe performance degradation due to interference among mobile BSSs when WiFi access points (APs) are densely located. Existing interference avoidance techniques cannot properly resolve the above problems and do not cope with dynamically moving vehicular scenario since they focus only on the fixed network topology. In this paper, we propose a mobility-aware interference avoidance scheme for WiFi services. The proposed scheme computes the interference duration by exploiting mobility vector and location information of neighboring APs. If the interference duration is not negligible, our scheme searches for another channel in order to avoid interference. However, if the interference duration is negligible, our scheme continues to use the channel to reduce switching overhead. To measure the effectiveness of the proposed scheme against other existing techniques, we evaluated performance by using OPNET simulator. Through the simulation, we obtained about 60% reduction in the maximum interference frequency and about 67% improvement in throughput. Furthermore, our scheme provides fair channel usage.

Development of Management Information System of Rural Environmental Resources (농촌환경자원의 정보관리시스템 구축)

  • Rhee, Sang-Young;Kim, Sang-Bum
    • Journal of Korean Society of Rural Planning
    • /
    • v.13 no.1 s.34
    • /
    • pp.73-84
    • /
    • 2007
  • The first theme of this study is to preserve and manage rural multi-functionality resource Information. This study is to suggest the method that can irradiate rural multi-functionality resource Information efficiently and constructively. GIS uses PDA and Tablet PC as an investigation tool and verifies the outcome of the development in the investigation system. This study enhanced the mobility function of PDA by installing recording system and camera to the PDA. Also, Using GPS has been ensured scientific precision and realism to the investigation. Direct input on spot can save time, cost and minimize human error by simplifying the investigation process. Database is composed of characters like scale, form, location, distance, resident's opinion and image of 37 resources. The survey system was applied in 170 villages and got a total of 12,270 resources data. Management system should be easy to input and output the surveyed information and to get reports in any kind of form ( i.e. final result can be produced as a map). By utilizing of the Rural Resource information system, the study made a simulation to compare the target areas before and after. Also, digitalized investigation system, minimized re-input and reprocessing of data and enabled to simplify and standardize the process than memorandum investigation. Data collected through digital system could offer people useful information by Web-GIS. It was need to specify practical way in decision-making and a way to measure the value of resources to align with the regional plan. Also, need to keep on developing statistical data and application program that can connect us to present the best solution to support regional planning. Therefore, quality of data is very important. Finally, it is very important to develop various programs to analyze space md rural resource by monitoring rural environment.

Analysis on the Observation Environment of Surface Wind Using GIS data (GIS 자료를 활용한 지상 바람 관측환경 분석)

  • Kwon, A-Rum;Kim, Jae-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.31 no.2
    • /
    • pp.65-75
    • /
    • 2015
  • In this study, the observation environment of surface wind at an automatic weather station (AWS 288) located at Naei-dong, Mirang-si was analyzed using a computational fluid dynamics (CFD) model and geographic information system (GIS). The 16 cases with different inflow directions were considered before and after construction of an apartment complex around the AWS 288. For three inflow directions (south-south-westerly, south-south-easterly, and north-north-westerly), flow characteristics around the AWS 288 were investigated in detail, focusing on the changes in wind speed and direction at the AWS location. There was marked difference in wind speed between before and after construction of the apartment complex in the south-south-westerly case. In the south-south-easterly and north-north-westerly cases which were frequently observed at the AWS 288, the construction of the apartment complex had no marked influence on the observation of surface wind.

Design and Implementation of Event Hierarchy through Extended Spatio-Temporal Complex Event Processing (시공간 복합 이벤트 처리의 확장을 통한 계층적 이벤트 설계 및 구현)

  • Park, Ye Jin;Yom, Jae-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.549-557
    • /
    • 2012
  • Spatial phenomena such as environment pollution, disease and the risk of spreading information need a rapid initial response to perceive spread event. Moving data perceive spread event through real-time processing and analysis. To process and analysis the event, spatial-temporal complex event processing is used. Previous spatialtemporal complex event processing is possible basis spatial operator but insufficient apply to design spatialtemporal complex event processing to perceive spatial phenomena of high complexity. This study proposed hierarchical spatio-temporal CEP design which will efficiently manage the fast growing incoming sensor data. The implementation of the proposed design is evaluated with GPS location data of moving vehicles which are used as the incoming data stream for identifying spatial events. The spatial component of existing CEP software engine has been extended during the implementation phase to broaden the capabilities of processing spatio-temporal events.

Assessment of Inundation Rainfall Using Past Inundation Records and CCTV Images (CCTV영상과 과거침수기록을 활용한 침수 강우량 평가 - 강남역을 중심으로 -)

  • Kim, Min Seok;Lee, Mi Ran;Choi, Woo Jung;Lee, Jong Kook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.567-574
    • /
    • 2012
  • For the past few years, the video surveillance market has shown a rapid growth due to the increasing demand for Closed Circuit Television(CCTV) by the public sector and the private security industry. While the overall utilization of CCTV in the public and private sectors is expanding, its usage in the field of disaster management is less than sufficient. Therefore, the authors of this study, in an effort to revisit the role of CCTV in disaster situations, have carried out a case analysis in the vicinity of the Gangnam Station which has been designated as a natural disaster-prone area. First, the CCTV images around the target location are collected and the time and depth of inundation are measured through field surveys and image analyses. Next, a rainfall analysis was conducted using the Automatic Weather Station(AWS) data and the past inundation records. Lastly, the authors provide an estimate of rainfall for the areas around the station and suggest viable warning systems and countermeasures. The results from this study are expected to make positive contributions towards a significant reduction of the damages caused by the floods around the Gangnam Station.

A Robust Mobile Video Streaming in Heterogeneous Emerging Wireless Systems

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2118-2135
    • /
    • 2012
  • With the rapid development of heterogeneous emerging wireless technologies and numerous types of mobile devices, the need to support robust mobile video streaming based on the seamless handover in Future Internet is growing. To support the seamless handover, several IP-based mobility management protocols such as Mobile IPv6 (MIPv6), fast handover for the MIPv6 (FMIPv6), Hierarchical MIPv6 (HMIPv6) and Proxy Mobile IPv6 (PMIPv6) were developed. However, MIPv6 depreciates the Quality-of-Service (QoS) and FMIPv6 is not robust for the video services in heterogeneous emerging wireless networks when the Mobile Node (MN) may move to another visited network in contrast with its anticipation. In Future Internet, the possibility of mobile video service failure is more increased because mobile users consisting of multiple wireless network interfaces (WNICs) can frequently change the access networks according to their mobility in heterogeneous wireless access networks such as 3Generation (3G), Wireless Fidelity (Wi-Fi), Worldwide Interoperability for Microwave Access (WiMax) and Bluetooth co-existed. And in this environment, seamless mobility is coupled according to user preferences, enabling mobile users to be "Always Best Connected" (ABC) so that Quality of Experience is optimised and maintained. Even though HMIPv6 and PMIPv6 are proposed for the location management, handover latency enhancement, they still have limit of local mobility region. In this paper, we propose a robust mobile video streaming in Heterogeneous Emerging Wireless Systems. In the proposed scheme, the MN selects the best-according to an appropriate metric-wireless technology for a robust video streaming service among all wireless technologies by reducing the handover latency and initiation time when handover may fail. Through performance evaluation, we show that our scheme provides more robust mechanism than other schemes.