• Title/Summary/Keyword: Method of Information System

Search Result 20,620, Processing Time 0.057 seconds

A Study on Implementation of Passive RFID Tag System Using A Capacitive method (Capacitive방식을 이용한 Passive RFID Tag System 구현)

  • 배명수;여영호;손수국
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.199-202
    • /
    • 2002
  • This paper is about the implementation of Passive RFID(Radio Frequency Identification) tag system using a capacitive method, and explains the design and circuit's structure of this system. Fundamentally the capacitive RFID tag system consists of a tag reader, a passive tag and a host computer. And then this paper shows the system's prototype which analyzes a specification, and suggests the passive RFID system as a new method which manufactures a low cost tag system easily

  • PDF

Development of Optimal Real Estate Decision Support System by Geographic Information on Real Estate Appraisal - Using Internet and GIS - (부동산 감정평가에 있어 공간정보를 활용한 최적의 부동산 의사결정지원 시스템 개발 - 인터넷과 GIS를 활용하여 -)

  • Kim Han-Su;Na Sang-Youp
    • Journal of the Korean housing association
    • /
    • v.15 no.4
    • /
    • pp.45-54
    • /
    • 2004
  • This study systematized synthetically to use internet GIS and real estate appraisal method in computing system for the real estate decision. First, indicated the method of using GIS and databases to appraise the real estate by using the cost approach. Second, used the artificial neural network to predict the change of land prices and the artificial neural network convinced us that it indicates easily the result of land prices without complicated processes. Third, examined land prices using the artificial neural network but there is limits for the land price prediction because of difficult data gathering. also, this study may heighten information levels of the real estate field according to 21th century information level if use actively a internet, information users who should pay much moneys in existent real estate decisions may can approach easily.

Development of an Algorithm to Measure the Road Traffic Data Using Video Camera

  • Kim, Hie-Sik;Kim, Jin-Man
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.95.2-95
    • /
    • 2002
  • 1. Introduction of Camera Detection system Camera Detection system is an equipment that can detect realtime traffic information by image processing techniques. This information can be used to analyze and control road traffic flow. It is also used as a method to detect and control traffic flow for ITS(Intelligent Transportation System). Traffic information includes speed, head way, traffic flow, occupation time and length of queue. There are many detection systems for traffic data. But video detection system can detect multiple lanes with only one camera and collect various traffic information. So it is thought to be the most efficient method of all detection system. Though the...

  • PDF

Parallel Control of Mini Ice Storage Air Conditioner Using LonWorks System (LonWorks 시스템을 이용한 소형빙축열 에어컨의 병렬 제어)

  • Kim, Hong-Ryeol;Cho, Sung-Kyu;Chung, Nam-Jong;Kim, Dae-Won
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2358-2361
    • /
    • 2003
  • In this paper, parallel control method that enables coordinating operations of multiple mini ice storage air conditioner is proposed based on LonWorks system. The proposed parallel control method is a kind of master/slave control method based on LonTalk network communication. In the control method, master controller leading whole system operations is determined by date to avoid the disproportion of outdoor unit operations. In addition to the above, duty shift control method is proposed to avoid redundant operations of outdoor units and to equalize the operation frequencies of them. Through some simulation tests, the proposed parallel control method and the duty shift control method are evaluated and the efficiencies of them are validated by comparing with existing methods.

  • PDF

Personalized Movie Recommendation System Combining Data Mining with the k-Clique Method

  • Vilakone, Phonexay;Xinchang, Khamphaphone;Park, Doo-Soon
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1141-1155
    • /
    • 2019
  • Today, most approaches used in the recommendation system provide correct data prediction similar to the data that users need. The method that researchers are paying attention and apply as a model in the recommendation system is the communities' detection in the big social network. The outputted result of this approach is effective in improving the exactness. Therefore, in this paper, the personalized movie recommendation system that combines data mining for the k-clique method is proposed as the best exactness data to the users. The proposed approach was compared with the existing approaches like k-clique, collaborative filtering, and collaborative filtering using k-nearest neighbor. The outputted result guarantees that the proposed method gives significant exactness data compared to the existing approach. In the experiment, the MovieLens data were used as practice and test data.

An IPIMS Design for Efficient Personal Information Management (효율적인 개인정보 관리를 위한 IPIMS 설계)

  • Jeon, Byung-Jin;Shin, Seung-Soo;Lee, Jun-Yeon
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.83-90
    • /
    • 2017
  • The purpose of this study is to solve the limitations that the information security manager of company should recognize the personal information of all employees. In this study, we propose efficient personal information retention status management system to minimize information retention status of personal information and department by information security manager and departmental information security officer. To do this, we study the method of transferring the check result from the PVA system to the efficient personal information retention management system, also study ways to minimize the amount of personal information we hold. It is possible to minimize the possession of personal information by changing the one channel method managed by the information security administrator of the existing PVA system to the two channel method so that the information security manager and the information security officer can manage it.

Eigenvalue sensitivity analysis of discrete system based on the RCF method (이산시스템에서 RCF 해석법에 기초한 감도해석)

  • Kim, Deok-Young;Park, Sung-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.602-603
    • /
    • 2007
  • In this paper, the RCF method is applied to analyze small signal stability of power systems including thyristor controlled FACTS equipments such as SVC. The eigenvalue sensitivity analysis algorithm in discrete systems by the RCF method are presented and applied to the power system including SVC. As a result of simulation, the RCF analysis method is very powerful to calculate the newly generated unstable oscillation modes precisely after periodic switching operations of SVC. Also the RCF analysis method enabled to precisely calculate eigenvalue sensitivity coefficients of dominant oscillation modes after periodic switching operations. These simulation results are very different from those of the conventional continuous system analysis method such as the state space equation method.

  • PDF

Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System (함정 전투체계 군사영상 특성에 기반한 하이브리드 정보은닉 기법)

  • Lee, Joon-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.9
    • /
    • pp.1669-1678
    • /
    • 2016
  • There are many kinds of military images used in naval combat system because various sensors are operated. The military images are displayed, analysed and stored with analysed informations according to the tactical purpose on combat system. These images are used to target detection, analysis and classification. Thus the analysed information and images must be secured, the information hiding methods are the most eligible solutions to get secured informations and images. In this paper, the hybrid information hiding method based on the characteristics of the military images is proposed and the effectiveness is shown by experiments.

Schema Conflict Resolution Method on Content Integration Management System (컨텐츠 통합 관리 시스템에서의 스키마 충돌 해결 방안)

  • Lee Jung-hwa;Kwon Oh-jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1132-1141
    • /
    • 2005
  • We must have a schema conflict resolution method for integrating local schema on content integration and management system. But The Past method is inconsistent and depends on local and global databases. In this paper, we propose the management method of schema confilct using XML that can represent and interchange the structual information of schema.

Software integrity verification method in POS system (POS시스템 내 소프트웨어 무결성 검증 방안)

  • Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.987-997
    • /
    • 2012
  • A Point-of-Sales (POS) terminal manages the selling process by a salesperson accessible interface in real time. Using a POS system makes a business and customer management much more efficient. For these reasons, many store install POS terminal and used it. But it has many problem that stealing personal information by hacking and insider corruption. Because POS system stored payment information like that sales information, card valid period, and password. In this paper, I proposed software integrity verification technique in POS system based on White list. This method can prevent accidents that personal information leak by hacking and POS system forge and falsification. This proposed method provides software integrity, so it can prevent inside and outside threats in advance.