• Title/Summary/Keyword: User Need

Search Result 2,132, Processing Time 0.026 seconds

Design of Marine IoT Wireless Network for Building Fishing Gear Monitoring System (어구 모니터링 시스템 구축을 위한 해상 IoT 무선망 설계)

  • Kwak, Jae-Min;Kim, Se-Hoon;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.76-83
    • /
    • 2018
  • In order to prevent overusing the fishing gear and to reduce discarded fishing gear, there is a need for a technique that can efficiently transmit the information including the type and location of the fishing gear and the user's real name to the fishing boat and the control center using IoT-based communication. In order to do this, it is necessary to be able to confirm the position information of a plurality of buoys that can be identified by the base stations on the land. In this paper, in order to service the maritime IoT communication system, we calculate the link budget between the land base station and the targets on the sea to derive the service coverage. To design a marine IoT radio network for building a fishing gear monitoring system, we calculate link budget for wireless service optimization at sea for NB-IoT using 1.8 GHz frequency band and LoRa service using 900 MHz frequency band. In addition, the link budget between the land base station and buoy, the link budget between the land base station and fishing boat are calculated and the results are analyzed.

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

A Study on a Non-Voice Section Detection Model among Speech Signals using CNN Algorithm (CNN(Convolutional Neural Network) 알고리즘을 활용한 음성신호 중 비음성 구간 탐지 모델 연구)

  • Lee, Hoo-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.33-39
    • /
    • 2021
  • Speech recognition technology is being combined with deep learning and is developing at a rapid pace. In particular, voice recognition services are connected to various devices such as artificial intelligence speakers, vehicle voice recognition, and smartphones, and voice recognition technology is being used in various places, not in specific areas of the industry. In this situation, research to meet high expectations for the technology is also being actively conducted. Among them, in the field of natural language processing (NLP), there is a need for research in the field of removing ambient noise or unnecessary voice signals that have a great influence on the speech recognition recognition rate. Many domestic and foreign companies are already using the latest AI technology for such research. Among them, research using a convolutional neural network algorithm (CNN) is being actively conducted. The purpose of this study is to determine the non-voice section from the user's speech section through the convolutional neural network. It collects the voice files (wav) of 5 speakers to generate learning data, and utilizes the convolutional neural network to determine the speech section and the non-voice section. A classification model for discriminating speech sections was created. Afterwards, an experiment was conducted to detect the non-speech section through the generated model, and as a result, an accuracy of 94% was obtained.

A Study on the Public Service of Big Data in Ocean Information -Focusing on user requirements of government services- (해양 정보 빅데이터의 대국민 서비스 제공 방안: 정부기관 서비스의 사용자 요구 사항을 중심으로)

  • Kim, Seungmin;Park, Byoung yong
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.241-255
    • /
    • 2020
  • In Korea, utilizing and protecting the ocean from the sea on three sides can be considered the basis of national power. Recently, it has been distributed to IOT and 5G networks, and attempts to provide various information based on telecommunication infrastructure are continuing in the public and private sectors. In this study, an online survey was conducted with the aim of improving the services of marine information services (KOMC, safe and open seas) provided by the Government Agency for Oceanographic Research. Through an online survey, the survey was conducted on sites that are mainly used to survey people's need for marine information and to collect information. In addition, the survey was conducted on the UX, UI problems and improvements of KOMC, open and safe sea sites provided by the National Oceanographic Research Institute. The awareness and experience of marine information service by the Korea Oceanographic Research Institute were confirmed. Later, the previous steps of FGI also examined the usability of various users after allowing them to use the actual service. Here, the experience of collecting marine information from actual users was investigated, not just by looking at and evaluating the design of the service website and application. As a result, users presented a variety of opinions related to marine information services, including accessibility, reliability of information, providing media, and importance of information provided. The findings could be used as data to identify ocean-related data and ways to provide information required by users of various age groups and occupational groups.

Analysis of Collaboration Method Used according to the Characteristics of Each Stage of the Design Process (디자인 과정 단계별 특성에 따라 활용되는 협업 방식 분석)

  • Jung, Young-Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.300-308
    • /
    • 2021
  • The epidemic of COVID19 caused a big change in design collaboration, which has been conducting using face-to-face interaction. Designers actively used video conferencing and online document tools in situations where face-to-face meetings were difficult, and this gave them an opportunity to experience that non-face-to-face collaboration can be more effective in a specific design process. In this regard, this study attempted to find out which activities during the design process are more compelling in face-to-face collaboration or non-face-to-face collaboration. To do this, three user experience design projects conducted after the COVID19 epidemic were analyzed through a retrospective interview method. As a result, during four design stages, 'Discover, Define, Develop, Deliver', face-to-face collaboration is necessary for the areas that require creative problem solving through active interaction. In contrast, non-face-to-face collaboration is preferred and more effective when designers need their own space and proceed their design work. In addition, the aspects of design tools supporting non-face-to-face collaboration were also illustrated. Findings discovered through this study are expected to contribute to research on the design process later.

A Study on the Current State of the Library's AI Service and the Service Provision Plan (도서관의 인공지능(AI) 서비스 현황 및 서비스 제공 방안에 관한 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.155-178
    • /
    • 2021
  • In the era of the 4th industrial revolution, public libraries need a strategy for promoting intelligent library services in order to actively respond to changes in the external environment such as artificial intelligence. Therefore, in this study, based on the concept of artificial intelligence and analysis of domestic and foreign artificial intelligence related trends, policies, and cases, we proposed the future direction of introduction and development of artificial intelligence services in the library. Currently, the library operates a reference information service that automatically provides answers through the introduction of artificial intelligence technologies such as deep learning and natural language processing, and develops a big data-based AI book recommendation and automatic book inspection system to increase business utilization and provide customized services for users. Has been provided. In the field of companies and industries, regardless of domestic and overseas, we are developing and servicing technologies based on autonomous driving using artificial intelligence, personal customization, etc., and providing optimal results by self-learning information using deep learning. It is developed in the form of an equation. Accordingly, in the future, libraries will utilize artificial intelligence to recommend personalized books based on the user's usage records, recommend reading and culture programs, and introduce real-time delivery services through transport methods such as autonomous drones and cars in the case of book delivery service. Service development should be promoted.

The Effects of the Bestseller Ranks on Public Library Circulation: Based on Panel Data Analysis (베스트셀러 순위가 공공도서관 대출에 미치는 영향 분석: 패널자료 분석을 중심으로)

  • Lee, Jongwook;Kang, Woojin;Park, Jungkyu
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.4
    • /
    • pp.1-23
    • /
    • 2021
  • The purpose of this study is to analyze the effects of the bestseller ranks on the book circulations in public libraries. To achieve this goal, the weekly data sets of 179 books' library circulation and bestseller list from January 1, 2018 to December 29, 2019 were constructed based on the data collected from BigData MarketC and YES24. Three methods for analyzing panel data including linear regression, fixed-effect, and random effect models were compared, and it turned out that fixed-effect model was better than other methods. The results show that the average ranks of bestsellers were associated with their public library circulations visually. Also, the analysis of fixed-effect model showed that the single rank decline of a book on the bestseller list decreases its average circulation of 0.108 while the size of effect varied depending on subject of books. The study empirically demonstrated the impact of a bestseller list on people's book circulation behavior, suggesting that public libraries need to reference sociocultural context as well as bestseller book lists to predict library user needs and to formulate collection development policy.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.