• Title/Summary/Keyword: Location정보

Search Result 5,606, Processing Time 0.036 seconds

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

A Study on the RCS Analysis and Reduction Method of Unmanned Surface Vehicles (무인수상정의 RCS 해석 및 감소 방법에 대한 연구)

  • Han, Min-Seok;Ryu, Jae-Kwan;Hong, Soon-Kook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.425-433
    • /
    • 2019
  • In this paper, the RCS analysis of the 10m unmanned surface vehicles was performed, and the factors of RCS increase were analyzed. Modeling techniques by transforming a geometric shape can reduce the RCS area, which can be used to develop stealth unmanned surface vehicles. In order to reduce the RCS, the existing Top Mast part was moved 1m to the tail part, the 5 degree tilt angle was moved below 0.5 m, and additional guided walls were installed to minimize the influence on the center and surrounding corner reflecting structures. As a result of comparing and analyzing the RCS analysis value with the existing model, it can be seen that the reduced countermeasure model is -3.79 dB lower than the existing model for all elevations. In particular, it can be seen that the strong scattering phenomenon is substantially removed in the region except the sacrificial angle region. In addition, it can be seen that in the case of -5m to 2m where the guide wall is added, the reflected signal is improved up to 20 to 40 dB or more, so that it does not appear on the 2D ISAR image. RCS analysis of unmanned surface vehicles explained the process of analyzing and identifying problem location through distance profile analysis and ISAR image analysis.

Formulating Strategies from Consumer Opinion Analysis on AI Kids Phone using Text Mining (AI 키즈폰의 소비자리뷰 분석을 통한 제품개선 전략에 대한 연구)

  • Kim, Dohun;Cha, Kyungjin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.71-89
    • /
    • 2019
  • In order to come up with satisfying product and improvement, firms use traditional marketing research methods to obtain consumers' opinions and further try to reflect them. Recently, gathering data from consumer communication platforms like internet and SNS has become popular methods. Meanwhile, with the development of information technology, mobile companies are launching new digital products for children to protect them from harmful content and provide them with necessary functions and information. Among these digital products, Kids Phone, which is a wearable device with safe functions that enable parents to learn childern's location. Kids phone is relatively cheaper and simpler than smartphone but it is noted that there are several problems such as some useless functions and frequent breakdowns. This study analyzes the reviews of Kids phones from domestic mobile companies, identifies the characteristics, strengths and weaknesses of the products, proposes improvement methods strategies for devices and services through SNS consumer analysis. In order to do that customer review data from online shopping malls was gathered and was further analyzed through text mining methods such as TF/IDF, Sentiment Analysis, and network analysis. Customer review data was gathered through crawling Online shopping Mall and Naver Blog/$Caf\acute{e}$. Data analysis and visualization was done using 'R', 'Textom', and 'Python'. Such analysis allowed us to figure out main issues and recent trends regarding kids phones and to suggest possible service improvement strategies based on sentiment analysis.

A Study on the Effects of Droplets Characteristics of Water Mist on the Spray Density on the Floor (미분무 액적특성이 살수밀도에 미치는 영향 연구)

  • Kim, Jong-Hoon;Park, Won-Hee;Kim, Woon-Hyung;Myoung, Sang-Yup
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.120-127
    • /
    • 2021
  • Purpose: In this study, the effect of changes in the variables related to water droplets on the spray density on the floor in the analysis of the water mist fire protection system using FDS was analyzed. Method: When the spray of the water mist nozzle was analyzed in FDS, Particles Per Seconds, Particle Velocity, Size Distribution, and Spray Pattern Shape that can be set in relation to droplets were input to review the analyzed results. Result: In the analysis results, when the number of particles per second was set above a certain value, the spray density of the floor was similar. In the case of Particle Velocity, as the velocity decreases, the spray density of the central portion increases but decreases at a distance of 0.15m or more. From the analysis of the change in the size distribution function, it was found that an increase in the 𝛾 value increases the spray density of the central part, but the value at a remote location decreases. Compared to the result of applying the Gaussian distribution, the median value decreases dramatically when the uniform distribution is applied, but the value at the adjacent position increases. Conclusion: Variables related to the droplet properties of the FDS affect the spray density of the floor. Therefore, in order to increase the reliability of results before performing analyses such as fire suppression or cooling, a sufficient review of input variables is required.

Development of 3D Addressing Data Model Based on the IndoorGML (IndoorGML 기반 입체주소 데이터 모델 개발)

  • Kim, JI Young
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.591-598
    • /
    • 2020
  • The all revision of the Road Name Address Act, which contains the contents to be used by expanding the road name address as a means of indicationg the location, has been resloved by the National Assembly. Addresses will be assigned to large-sized facilities (3D mixed-use complex spaces). Here, the 3D (Three-dimensional) address is assigned an indoor path section in the inner passage, dividing the section at intervals. The 3D address will be built on the address information map. For 3D address, data should be built and managed for a 3D complex space(indoor space). Therefore, in this study, the object of the 3D address is defined based on the address conceptual model defined in the international standard, and the 3D address data model is proposed based on IndoorGML. To this, it is proposed as a method of mapping the Core and Navigation module of IndoorGML so that the entity of the 3D address can be expressed in IndoorGML. This study has a limitation in designing a 3D address data model only, but it is meaningful that it suggested a standard for constructing 3D address data in the future.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Analysis of Borrows Demand for Books in Public Libraries Considering Cultural Characteristics (문화적 특성을 고려한 공공도서관 도서 대출수요 분석 : 대구광역시 시립도서관을 사례로)

  • Oh, Min-Ki;Kim, Kyung-Rae;Jeong, Won-Oong;Kim, Keun-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.55-64
    • /
    • 2021
  • Public libraries are a space where residents learn a wide range of knowledge and ideologies, and as they are directly connected to life, various related studies have been conducted. In most previous studies, variables such as population, traffic accessibility, and environment were found to be highly relevant to library use. In this study, it can be said that the difference from previous studies is that the book borrow demand and relevance were analyzed by reflecting the variables of cultural characteristics based on the book borrow history (1,820,407 cases) and member information (297,222 persons). As a result of the analysis, it was analyzed that as the increase in borrows for social science and literature books compared to technical science books, the demand for book borrows increased. In addition, various descriptive statistical analyzes were used to analyze the characteristics of library book borrow demand, and policy implications and limitations of the study were also presented based on the analysis results. and considering that cultural characteristics change depending on the location and time of day, it is believed that related research should be continued in the future.

Technology Development for Non-Contact Interface of Multi-Region Classifier based on Context-Aware (상황 인식 기반 다중 영역 분류기 비접촉 인터페이스기술 개발)

  • Jin, Songguo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.175-182
    • /
    • 2020
  • The non-contact eye tracking is a nonintrusive human-computer interface providing hands-free communications for people with severe disabilities. Recently. it is expected to do an important role in non-contact systems due to the recent coronavirus COVID-19, etc. This paper proposes a novel approach for an eye mouse using an eye tracking method based on a context-aware based AdaBoost multi-region classifier and ASSL algorithm. The conventional AdaBoost algorithm, however, cannot provide sufficiently reliable performance in face tracking for eye cursor pointing estimation, because it cannot take advantage of the spatial context relations among facial features. Therefore, we propose the eye-region context based AdaBoost multiple classifier for the efficient non-contact gaze tracking and mouse implementation. The proposed method detects, tracks, and aggregates various eye features to evaluate the gaze and adjusts active and semi-supervised learning based on the on-screen cursor. The proposed system has been successfully employed in eye location, and it can also be used to detect and track eye features. This system controls the computer cursor along the user's gaze and it was postprocessing by applying Gaussian modeling to prevent shaking during the real-time tracking using Kalman filter. In this system, target objects were randomly generated and the eye tracking performance was analyzed according to the Fits law in real time. It is expected that the utilization of non-contact interfaces.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.