• Title/Summary/Keyword: Software service

Search Result 2,457, Processing Time 0.03 seconds

Busan Tourism Industry applying OECD Tourism Policy and ICT Convergence Platform (OECD 관광정책과 ICT 융합 플랫폼을 적용한 부산관광산업)

  • Lim, Yong-Suk;Jung, Ho-Jin;Lee, Jung-Won
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.871-879
    • /
    • 2017
  • The purpose of this study is to propose a Busan tourism industry in which the 2016 OECD Tourism policy and ICT convergence platform are applied. OECD proposed 3 policies to promote the tourism industry: First, to maintain the competitiveness of the tourism industry as well as improve its efficiency and sustainability, second, to establish a seamless traffic system, and third, to build a response to the sharing economy. Centering on the OECD's three policies, we propose the developmental possibilities of tourism in Busan. At the same time, we suggest the necessity to build an ICT convergence platform that will help foster the industry. In building an ICT convergence platform, we especially focus on the necessity of: 1. Sharing and creating experience-based interactive contents on the software side, and 2. Developing high quality user experience (UX) and providing a data analysis-based customized service on the hardware side. In addition, we insist on the establishment of the Tourism Promotion Agency for the continuous performance and management of Busan tourism industry. The study ultimately suggests that the construction of ICT convergence platform based on OECD tourism policy can result in the expected outcomes of high effects with low cost for both consumers and suppliers related to the tourism industry.

Performance Analysis of GPS and QZSS Orbit Determination using Pseudo Ranges and Precise Dynamic Model (의사거리 관측값과 정밀동역학모델을 이용한 GPS와 QZSS 궤도결정 성능 분석)

  • Beomsoo Kim;Jeongrae Kim;Sungchun Bu;Chulsoo Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.6
    • /
    • pp.404-411
    • /
    • 2022
  • The main function in operating the satellite navigation system is to accurately determine the orbit of the navigation satellite and transmit it as a navigation message. In this study, we developed software to determine the orbit of a navigation satellite by combining an extended Kalman filter and an accurate dynamic model. Global positioning system (GPS) and quasi-zenith satellite system (QZSS) orbit determination was performed using international gnss system (IGS) ground station observations and user range error (URE), a key performance indicator of the navigation system, was calculated by comparison with IGS precise ephemeris. When estimating the clock error mounted on the navigation satellite, the radial orbital error and the clock error have a high inverse correlation, which cancel each other out, and the standard deviations of the URE of GPS and QZSS are small namely 1.99 m and 3.47 m, respectively. Instead of estimating the clock error of the navigation satellite, the orbit was determined by replacing the clock error of the navigation message with a modeled value, and the regional correlation with URE and the effect of the ground station arrangement were analyzed.

Soil Moisture Estimation Using KOMPSAT-3 and KOMPSAT-5 SAR Images and Its Validation: A Case Study of Western Area in Jeju Island (KOMPSAT-3와 KOMPSAT-5 SAR 영상을 이용한 토양수분 산정과 결과 검증: 제주 서부지역 사례 연구)

  • Jihyun Lee;Hayoung Lee;Kwangseob Kim;Kiwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1185-1193
    • /
    • 2023
  • The increasing interest in soil moisture data from satellite imagery for applications in hydrology, meteorology, and agriculture has led to the development of methods to produce variable-resolution soil moisture maps. Research on accurate soil moisture estimation using satellite imagery is essential for remote sensing applications. The purpose of this study is to generate a soil moisture estimation map for a test area using KOMPSAT-3/3A and KOMPSAT-5 SAR imagery and to quantitatively compare the results with soil moisture data from the Soil Moisture Active Passive (SMAP) mission provided by NASA, with a focus on accuracy validation. In addition, the Korean Environmental Geographic Information Service (EGIS) land cover map was used to determine soil moisture, especially in agricultural and forested regions. The selected test area for this study is the western part of Jeju, South Korea, where input data were available for the soil moisture estimation algorithm based on the Water Cloud Model (WCM). Synthetic Aperture Radar (SAR) imagery from KOMPSAT-5 HV and Sentinel-1 VV were used for soil moisture estimation, while vegetation indices were calculated from the surface reflectance of KOMPSAT-3 imagery. Comparison of the derived soil moisture results with SMAP (L-3) and SMAP (L-4) data by differencing showed a mean difference of 4.13±3.60 p% and 14.24±2.10 p%, respectively, indicating a level of agreement. This research suggests the potential for producing highly accurate and precise soil moisture maps using future South Korean satellite imagery and publicly available data sources, as demonstrated in this study.

Understanding the Artificial Intelligence Business Ecosystem for Digital Transformation: A Multi-actor Network Perspective (디지털 트랜스포메이션을 위한 인공지능 비즈니스 생태계 연구: 다행위자 네트워크 관점에서)

  • Yoon Min Hwang;Sung Won Hong
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.125-141
    • /
    • 2019
  • With the advent of deep learning technology, which is represented by AlphaGo, artificial intelligence (A.I.) has quickly emerged as a key theme of digital transformation to secure competitive advantage for businesses. In order to understand the trends of A.I. based digital transformation, a clear comprehension of the A.I. business ecosystem should precede. Therefore, this study analyzed the A.I. business ecosystem from the multi-actor network perspective and identified the A.I. platform strategy type. Within internal three layers of A.I. business ecosystem (infrastructure & hardware, software & application, service & data layers), this study identified four types of A.I. platform strategy (Tech. vertical × Biz. horizontal, Tech. vertical × Biz. vertical, Tech. horizontal × Biz. horizontal, Tech. horizontal × Biz. vertical). Then, outside of A.I. platform, this study presented five actors (users, investors, policy makers, consortiums & innovators, CSOs/NGOs) and their roles to support sustainable A.I. business ecosystem in symbiosis with human. This study identified A.I. business ecosystem framework and platform strategy type. The roles of government and academia to create a sustainable A.I. business ecosystem were also suggested. These results will help to find proper strategy direction of A.I. business ecosystem and digital transformation.

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

Proposed Test Method for Verification of Survivability Improvement of KASS Augmented Navigation of a Beam-formed GPS Receiver (빔포밍 GPS 위성항법장치의 KASS 보정항법 생존성 향상을 검증하기 위한 시험평가 방법 제안)

  • Junwoo Jung;Hyunhee Won;Daeyoung Park;Seungmin Kang;Jonggyu Go;Seungbok Kwon;Kwi Woo Park;Bongwoo Jo;Woogeun Ahn;Sung Wook Yun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.257-268
    • /
    • 2024
  • The Korea Augmentation Satellite System (KASS) satellite was successfully launched and service is being started. By receiving messages transmitted from the KASS satellite, users can employ the messages to improve positioning accuracy or to verify the integrity of Global Positioning System (GPS). In this paper, we propose a test method for a beam-formed GPS receiver developed to improve the survivability of KASS augmented messages that can enhance positioning accuracy even in an environment with jamming or interfering signals. Through the test method proposed in this paper, quantitative verification is performed for a beam-formed GPS receiver aimed at maintaining the augmented navigation solution to which KASS augmented messages are applied by tracking the KASS signal as much as possible under conditions where the jamming signal strength is gradually increasing. In addition, the proposed test method includes three conditions; first, a static lab test method for repeated verification of functions under the same conditions; second, a static outdoor test method for performance verification in an operating environment of a platform equipped with the beam-formed GPS receiver; and finally, a dynamic lab test method for performance verification of a moving platform equipped with the beam-formed GPS receiver toward a jammer. In this paper, we propose a method for simulating the jamming signal incident direction through the phase delay of an RF cable designed to prevent unintentional jamming signal emission in both lab and outdoor tests, and a method of applying test software for injecting a jamming signal to compare the survivability performance consistently according to the presence or absence of beamforming signal processing. Through the proposed test method, it was verified that the augmented navigation solution could be output for a longer time period when the beamforming signal processing was applied to the KASS satellite signal in the beam-formed GPS receiver.

A Study on Integrated Logistic Support (통합병참지원에 관한 연구)

  • 나명환;김종걸;이낙영;권영일;홍연웅;전영록
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2001.06a
    • /
    • pp.277-278
    • /
    • 2001
  • The successful operation of a product In service depends upon the effective provision of logistic support in order to achieve and maintain the required levels of performance and customer satisfaction. Logistic support encompasses the activities and facilities required to maintain a product (hardware and software) in service. Logistic support covers maintenance, manpower and personnel, training, spares, technical documentation and packaging handling, storage and transportation and support facilities.The cost of logistic support is often a major contributor to the Life Cycle Cost (LCC) of a product and increasingly customers are making purchase decisions based on lifecycle cost rather than initial purchase price alone. Logistic support considerations can therefore have a major impact on product sales by ensuring that the product can be easily maintained at a reasonable cost and that all the necessary facilities have been provided to fully support the product in the field so that it meets the required availability. Quantification of support costs allows the manufacturer to estimate the support cost elements and evaluate possible warranty costs. This reduces risk and allows support costs to be set at competitive rates.Integrated Logistic Support (ILS) is a management method by which all the logistic support services required by a customer can be brought together in a structured way and In harmony with a product. In essence the application of ILS:- causes logistic support considerations to be integrated into product design;- develops logistic support arrangements that are consistently related to the design and to each other;- provides the necessary logistic support at the beginning and during customer use at optimum cost.The method by which ILS achieves much of the above is through the application of Logistic Support Analysis (LSA). This is a series of support analysis tasks that are performed throughout the design process in order to ensure that the product can be supported efficiently In accordance with the requirements of the customer.The successful application of ILS will result in a number of customer and supplier benefits. These should include some or all of the following:- greater product uptime;- fewer product modifications due to supportability deficiencies and hence less supplier rework;- better adherence to production schedules in process plants through reduced maintenance, better support;- lower supplier product costs;- Bower customer support costs;- better visibility of support costs;- reduced product LCC;- a better and more saleable product;- Improved safety;- increased overall customer satisfaction;- increased product purchases;- potential for purchase or upgrade of the product sooner through customer savings on support of current product.ILS should be an integral part of the total management process with an on-going improvement activity using monitoring of achieved performance to tailor existing support and influence future design activities. For many years, ILS was predominantly applied to military procurement, primarily using standards generated by the US Government Department of Defense (DoD). The military standards refer to specialized government infrastructures and are too complex for commercial application. The methods and benefits of ILS, however, have potential for much wider application in commercial and civilian use. The concept of ILS is simple and depends on a structured procedure that assures that logistic aspects are fully considered throughout the design and development phases of a product, in close cooperation with the designers. The ability to effectively support the product is given equal weight to performance and is fully considered in relation to its cost.The application of ILS provides improvements in availability, maintenance support and longterm 3ogistic cost savings. Logistic costs are significant through the life of a system and can often amount to many times the initial purchase cost of the system.This study provides guidance on the minimum activities necessary to Implement effective ILS for a wide range of commercial suppliers. The guide supplements IEC60106-4, Guide on maintainability of equipment Part 4: Section Eight maintenance and maintenance support planning, which emphasizes the maintenance aspects of the support requirements and refers to other existing standards where appropriate. The use of Reliability and Maintainability studies is also mentioned in this study, as R&M is an important interface area to ILS.

  • PDF

Study of Web Services Interoperabiliy for Multiple Applications (다중 Application을 위한 Web Services 상호 운용성에 관한 연구)

  • 유윤식;송종철;최일선;임산송;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.217-220
    • /
    • 2004
  • According as utilization for web increases rapidly, it is demanded that model about support interaction between web-based applications systematically and solutions can integrate new distributed platforms and existing environment effectively, accordingly, Web Services appeared by solution in reply. These days, a lot of software and hardware companies try to adoption of Web Services to their market, attenpt to construct their applications associationing components from various Web Services providers. However, to execute Web Services completely. it must have interoperability and need the standardization work that avoid thing which is subject to platform, application as well as service and programming language from other companies. WS-I (Web Services Interoperability organization) have established Basic Profile 1.0 based on XML, UDDI, WSDL and SOAP for web services interoperability and developed usage scenario Profile to apply Web Services in practice. In this paper, to verify suitability Web Services interoperability between heterogeneous two applications, have design and implements the Book Information Web Services that based on the Web Services Client of J2SE platform and the Web Services Server of .NET platform, so that analysis and verify the service by adaptation of WS-I Basic Profile.

  • PDF

The Case on Valuation of IT Enterprise (IT 기업의 가치평가 사례연구)

  • Lee, Jae-Il;Yang, Hae-Sul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.881-893
    • /
    • 2007
  • IT(Information Technology)-based industries have caused a recent digital revolution and the appearance of various types' information service, being largely expanded toward info-communication device company, info-communication service company, software company etc.. Therefore, the needs to evaluate the company value of IT business for M&A or liquidation are growing tremendously. Unlike other industries, however, IT industry has a short lift cycle and so it doesn't have not only a company value-evaluating model for general businesses but the objective one for IT companies yet. So, this thesis analyzes various value-evaluating technique and newly rising ROV. DCF, the change method of company's cash flow including tangible assets into future value, had been applied during the past industrialization economy era and has been persuasively applied to the present. However, the DCF valuation has no option but to make many mistakes because IT companies have more intangible assets than tangible assets. Accordingly, it is ROV, recognized as the new method of evaluating companies' various options normally and quantitatively, that is brought up recently. But the evaluation on the companies' various options is too subjective and theoretical up to now and due to the lack of objective ground and options, it's not possible to be applied to reality. In this thesis, it is found that ROV is more accurate than DCF, comparing DCF and ROV through four examples. As the options applied to ROV are excessively limited, we tried to develop ROV into a new method by deriving five invisible value factors within IT companies. Therefore, on this occasion, we should set up the basic valuation methods on IT companies and should research and develop an effective and various valuation methods suitable to each company like an internet-based company, a S/W developing enterprise, a network-related company among IT companies.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.