• Title/Summary/Keyword: Social Computing

Search Result 486, Processing Time 0.033 seconds

A Study on Evaluating Digital Illusion Level of Public Library (공공도서관의 디지털 통합 수준 평가에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.167-203
    • /
    • 2015
  • This study tends to apprehend how much public library contributes to a role of upbuilder of digital integrated local society through a survey. For this, I performed the survey on 935 organization of public library in the whole country registered in national library statistical system. As a result, firstly, it's apprehended that equipment infra, Internet infra, etc like computer, laptop, scanner, tablet PC, etc are in relatively high level. Secondly, service or resource like electronic book, digital and virtual reference service, library service mobile App, etc that users can use are in relatively high level but software supporting cooperation and group task, fusibility of participating space, etc are shown very low level. Thirdly, the rate of literacy training relating to technology were only 22.4%, education subject focused on resource searching subject and somewhat future-oriented technical education like directions of video conference technique, cloud computing application education, etc wasn't conducted. Finally, we should consider expansion of providing technology and equipment and provision of future-oriented service and education according to a flow of the time that needs to seek change in various roles of library as enjoying culture space or creative space.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Design and Development of GIS-based Air Quality Information System for Ubiquitous Public Access (Ubiquitous Public Access 구현을 위한 GIS 기반 대기환경 정보시스템 설계 및 개발)

  • Hong, Sungchul
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.1
    • /
    • pp.195-201
    • /
    • 2017
  • Urbanization and industrialization have led to a severe deterioration in urban air qualities. As an air pollution is closely associated with human health, citizen has a growing concern about the air quality policy to improve their residential environment. Due to the recently advance in web- and mobile computing technologies, citizens can easily access various air quality information and public authorities utilize the social media service to communicate citizens with air quality issues. Also citizens' participation and role has been increased to improve urban air qualities. Thus, to meet the technical and societal changes, a GIS-based air quality information system is developed based upon the Ubiquitous Public Access (UPA) model in ISO19154. The proposed system employs the context information model to provide air quality information depending on citizens' health conditions and locations. Also, citizens can present their perceptions of an air quality at their current location Public authorities can thus utilize the citizens' perceptions when establishing new air quality policies.

Design and Implementation of SNS-linked Location based Mobile AR Systems using OpenAPI on Android (안드로이드 기반 OpenAPI를 이용한 SNS 연동 지역정보 서비스를 위한 모바일 증강현실 시스템 설계 및 구현)

  • Kim, Cheong-Ghil;Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • As the recent advances in network and wireless communications and semiconductor design and process technologies, our computing platform is rapidly shifting from desktop PCs to mobile devices such as UMPC (Ultra Mobile PC), Tablet PC, and Smartphone. Especially, wide-spreading Smartphones allow a new field of application based on location based services available with an user interface called augmented reality (AR). Therefore, this paper introduces an implementation of AR using various OpenAPls on Android Smartphones. In order to utilize enrich user data in real time, the system integrates with location based social network services also with OpenAPI. These APIs enable third-party developers to make use of rich contents of many portal web sites. The prototype was implemented on the real Android phone, Sky Sirius, and the result shows that it can provide an efficient location based service using AR technology without any constraints on mobile devices; in addition, it connects SNS to AR for sharing user data including photos, videos, and messages based on a specific location.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Analysis of Big Data Visualization Technology Based on Patent Analysis (특허분석을 통한 빅 데이터의 시각화 기술 분석)

  • Rho, Seungmin;Choi, YongSoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.149-154
    • /
    • 2014
  • Modern data computing developments have led to big improvements in graphic capabilities and there are many new possibilities for data displays. The visualization has proven effective for not only presenting essential information in vast amounts of data but also driving complex analyses. Big-data analytics and discovery present new research opportunities to the computer graphics and visualization community. In this paper, we discuss the patent analysis of big data visualization technology development in major countries. Especially, we analyzed 160 patent applications and registered patents in four countries on November 2012. According to the result of analysis provided by this paper, the text clustering analysis and 2D visualization are important and urgent development is needed to be oriented. In particular, due to the increase of use of smart devices and social networks in domestic, the development of three-dimensional visualization for Big Data can be seen very urgent.

A Study on the Improvement of Smart Work Satisfaction and Productivity (스마트워크를 통한 직원 만족도와 업무 생산성 증대에 관한 연구 : 홈오피스 환경에서)

  • Lee, Dae Hyung;Cho, Seung Yeon;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.24-48
    • /
    • 2014
  • Smart working, along with the spread of smart device use, has recently garnered increased interest. The issue has become focused on low labor productivity over working time, work-life balance and social discussion. There has also been a shift in working styles due to the development of mobile, security, and cloud computing-related IT technology support and activation of the smart work environment. However, former research show concern that smart working may not meet the initially expected levels of productivity. This empirical study was carried out to introduce the impact of teleworking on increased productivity and satisfaction in companies and public institutions through user interviews, a socio-technical systems approach and surveys. To summarize the results of this study, 'Telework satisfaction' is directly influenced by 'Work-life balance', 'Telework-system fit, and 'Telework-job fit'. Direct impact factors of 'Telework productivity'are 'Telework-job fit', 'Telework satisfaction', and 'Telework environment quality'.

Development of a Prototype System for Slope Failure Monitoring Based on USN Technology (USN 기술을 이용한 사면붕괴모니터링 시범시스템 개발)

  • Han, Jae-Goo;Kim, Kyoon-Tai
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.316-321
    • /
    • 2007
  • The casualties due to slope failures such as landslide, rock fall, debris flow etc. are about 24% in total casualties caused by natural disasters for the last 10 years. And these slope failures are focused in the season in which typhoon and torrential rain take place. Not much attention, however, have been put into landslide mitigation research. Meanwhile, USN(Ubiquitous Sensor Network) forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability. Accordingly, USN is embossed a social point technology. The objective of this paper is to develop a prototype system for slope failure monitoring using USN technology. For this we develop module that collects and change slope movement data measured by two tiltermeter and a tension wire, store transferred data in database. Also we develop application program that can easily analyze the data. We apply the prototype system to a test site at KICT for testing and analyzing the system's performance.

  • PDF