• Title/Summary/Keyword: Space information network

Search Result 1,270, Processing Time 0.036 seconds

An Analysis on the Mechanism and Algorism of ET·IT Based Future City Space (환경기술과 정보기술 기반의 미래도시 공간 메커니즘과 알고리즘 분석)

  • Han, Ju-Hyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.296-305
    • /
    • 2017
  • This study aims to create a new urban space through mechanism structure and algorism analysis between IT and ET. The results are as follows. First, the development trends of ET IT are classified into 4 types, "Eco-Friendly Development", "Energy Production Technology Development", "Energy Saving Technology Development" and "Wide Area IT Network Development", which are found to be constantly evolving. Second, Sang-Am DMC developed through the environmentally protective and eco-friendly aspects of ET from the Korean War to 1978. Wide area IT networks developed rapidly from 1990 to 2000. However, in 2010, urban spaces began to develop by the fusion of the Environment and Information. The fusion of Environment and Information in the development trends in the past is referred to as "Individual Development", that in the present is referred to as "Semi-fusion Development" and that in the future will be referred to as "Total Fusion Development". Third, the mechanism structure of DMC has evolved through creation, extinction and fusion processes. The creation process will serve to supplement the insufficiencies of the existing systems, the extinction process will be the compactification of the fusion process, and the fusion process will be the standard for creation and extinction. Finally, the future of new innovative urban and architectural spaces will be forged by the mechanism symbolization patterns of IT ET.

Effect of Experiential Space Perception on Performing Interactive Digital Contents (체험적 공간감이 상호작용 콘텐츠 수행에 미치는 영향)

  • Yun, Han-Kyung;Song, Bok-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.2
    • /
    • pp.111-118
    • /
    • 2011
  • It is not easy to define a boundary between TV and home computer in these day since developing H/W and S/W of computer technology induces that TV is conflated with computer. Coming digital HD broadcasting forces for replacement of TV at home and the trend of TV is became bigger. The evolved TV is able to replace the computer by connecting to the network and people want to do interactions with contents by using the bidirectional communication. Therefore, it is expected to changing the human lifestyle. It is natural that contents for all members of family are needed, since screen of TV become bigger. It is required that the contents should guarantees the accessability of information to the all of family members and the easy interaction with contents. But, the related basic research is not enough to catch the user's eye to induce flow or presence. Our goal of this study is to analyse effects of experiential space perception on performing interactive digital contents. The result shows that users interacted with contents without any difficulty when they met a same dimension and shape of objects as dimension and shape objects in their experiences or learning.

Analysis of Space Use Patterns of Public Library Users through AI Cameras (AI 카메라를 활용한 공공도서관 이용자의 공간이용행태 분석 연구)

  • Gyuhwan Kim;Do-Heon Jeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.4
    • /
    • pp.333-351
    • /
    • 2023
  • This study investigates user behavior in library spaces through the lens of AI camera analytics. By leveraging the face recognition and tracking capabilities of AI cameras, we accurately identified the gender and age of visitors and meticulously collected video data to track their movements. Our findings revealed that female users slightly outnumbered male users and the dominant age group was individuals in their 30s. User visits peaked between Tuesday to Friday, with the highest footfall recorded between 14:00 and 15:00 pm, while visits decreased over the weekend. Most visitors utilized one or two specific spaces, frequently consulting the information desk for inquiries, checking out/returning items, or using the rest area for relaxation. The library stacks were used approximately twice as much as they were avoided. The most frequented subject areas were Philosophy(100), Religion(200), Social Sciences(300), Science(400), Technology(500), and Literature(800), with Literature(800) and Religion(200) displaying the most intersections with other areas. By categorizing users into five clusters based on space utilization patterns, we discerned varying objectives and subject interests, providing insights for future library service enhancements. Moreover, the study underscores the need to address the associated costs and privacy concerns when considering the broader application of AI camera analytics in library settings.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

A Study on Efficient IPv6 Address Allocation for Future Military (미래 군을 위한 효율적인 IPv6 주소 할당에 관한 연구)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.613-618
    • /
    • 2023
  • The advancement of Information and Communication Technology (ICT) is accelerating innovation across society, and the defense sector is no exception as it adopts technologies aligned with the Fourth Industrial Revolution. In particular, the Army is making efforts to establish an advanced Army TIGER 4.0 system, aiming to create highly intelligent and interconnected mobile units. To achieve this, the Army is integrating cutting-edge scientific and technological advancements from the Fourth Industrial Revolution to enhance mobility, networking, and intelligence. However, the existing addressing system, IPv4, has limitations in meeting the exponentially increasing demands for network IP addresses. Consequently, the military considers IPv6 address allocation as an essential process to ensure efficient network management and address space provisioning. This study proposes an approach for IPv6 address allocation for the future military, considering the Army TIGER system. The proposal outlines how the application networks of the Army can be differentiated, and IP addresses can be allocated to future unit structures of the Army, Navy, and Air Force, from the Ministry of National Defense and the Joint Chiefs of Staff. Through this approach, the Army's advanced ground combat system, Army TIGER 4.0, is expected to operate more efficiently in network environments, enhancing overall information exchange and mobility for the future military.

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

Effective indexing of moving objects for current position management in Road Networks (도로 네트워크 환경에서 이동 객체의 현재 위치 관리를 위한 효율적인 색인 기법)

  • Kim, Tae-Gyu;Shin, Soong-Sun;Chung, Weo-Nil;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.33-43
    • /
    • 2011
  • Recently, advances in mobile communication and location identifying technology of the moving object is evolving. Therefore, the location-based services based on request for service have increased and a variety of the indexing for the position management of moving objects has been studied. Because the index based on Euclidean space are no restriction of movement, it is difficult to apply to the real world. Also, there is additional cost to find adjacent road segments in road networks-based indexing. Existing studies of fixed static objects such as buildings or hospitals are not considered. In this paper, we propose an efficient road networks-based indexing for management of current positions. The proposed indexing partitions road networks by grids and has integrated road connection informations and manage separated extra indexing for fixed static objects. Through the experiment, we show that the proposed indexing based on road networks improves the performance of operation for search or update than existing indexing.

The Structure and Operations of Geodata Collaboratives in Metropolitan Area: U.S. Cases (미국 광역권 지리정보협력체 구성 및 운영방안)

  • Nam, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.4
    • /
    • pp.35-45
    • /
    • 2007
  • Currently, the necessity of inter-system integration and sharing system increases to additionally construct and efficiently utilize the geographical information data in accordance with the increase in demand for geographical information. The provision of the data within the domestic sharing system is led by the tasks within national geographical information distribution network or intra-local governmental combined system. However, any voluntary geographical information sharing cooperation body is increasingly required with the increase in necessity of administrative cooperation among neighboring metropolitan areas, including space planning and development. Accordingly, this study is aimed at looking into the constitutions and roles of cooperation bodies within metropolitan areas by the composition, distribution, update and management of data with special regard to overseas advanced cases whose sharing systems and their effects are highly evaluated, and at presenting any model of the domestic future voluntary sharing cooperation organization within metropolitan area.

  • PDF

Monthly Dam Inflow Forecasts by Using Weather Forecasting Information (기상예보정보를 활용한 월 댐유입량 예측)

  • Jeong, Dae-Myoung;Bae, Deg-Hyo
    • Journal of Korea Water Resources Association
    • /
    • v.37 no.6
    • /
    • pp.449-460
    • /
    • 2004
  • The purpose of this study is to test the applicability of neuro-fuzzy system for monthly dam inflow forecasts by using weather forecasting information. The neuro-fuzzy algorithm adopted in this study is the ANFIS(Adaptive neuro-fuzzy Inference System) in which neural network theory is combined with fuzzy theory. The ANFIS model can experience the difficulties in selection of a control rule by a space partition because the number of control value increases rapidly as the number of fuzzy variable increases. In an effort to overcome this drawback, this study used the subtractive clustering which is one of fuzzy clustering methods. Also, this study proposed a method for converting qualitative weather forecasting information to quantitative one. ANFIS for monthly dam inflow forecasts was tested in cases of with or without weather forecasting information. It can be seen that the model performances obtained from the use of past observed data and future weather forecasting information are much better than those from past observed data only.