• Title/Summary/Keyword: Web data

Search Result 5,605, Processing Time 0.036 seconds

Geographic Information System and Remote Sensing in Soil Science (GIS와 원격탐사를 활용한 토양학 연구)

  • Hong, Suk-Young;Kim, Yi-Hyun;Choe, Eun-Young;Zhang, Yong-Seon;Sonn, Yeon-Kyu;Park, Chan-Won;Jung, Kang-Ho;Hyun, Byung-Keun;Ha, Sang-Keun;Song, Kwan-Cheol
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.5
    • /
    • pp.684-695
    • /
    • 2010
  • Geographic information system (GIS) is being increasingly used for decision making, planning and agricultural environment management because of its analytical capacity. GIS and remote sensing have been combined with environmental models for many agricultural applications on monitoring of soils, agricultural water quality, microbial activity, vegetation and aquatic insect distribution. This paper introduce principles, vegetation indices, spatial data structure, spatial analysis of GIS and remote sensing in agricultural applications including terrain analysis, soil erosion, and runoff potential. National Academy of Agricultural Science (NAAS), Rural Development Administration (RDA) has a spatial database of agricultural soils, surface and underground water, weeds, aquatic insect, and climate data, and established a web-GIS system providing spatial and temporal variability of agricultural environment information since 2007. GIS-based interactive mapping system would encourage researchers and students to widely utilize spatial information on their studies with regard to agricultural and environmental problem solving combined with other national GIS database. GIS and remote sensing will play an important role to support and make decisions from a national level of conservation and protection to a farm level of management practice in the near future.

New Inlining Method for Effective Creation of Relations and Preservation of Constraints (효율적인 릴레이션 생성과 제약조건 보존을 위한 새로운 Inlining 기법)

  • An, Sung-Chul;Kim, Yeong-Ung
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.7
    • /
    • pp.773-781
    • /
    • 2006
  • XML is a standard language to express and exchange the data over the web. Recently, researches about techniques that storing XML documents into RDBMS and managing it have been progressed. These researches use a technique that are receiving the DTD document as an input and generate the relational schema from it. Existing researches, however, do not consider the semantic preservation because of the simplification of the DTD. Further, because existing studies only focus on the preservation technique to store information such as content and structure, there is a troublesomeness that have to use the stored-procedure or trigger for the data integrity during the stores of XML documents. This paper proposes a improved Inlining technique to create effective relations and to preserve semantics which can be inferred from DTD.

  • PDF

Case study in application of DVR system for field data collection and analysis (DVR(Digital Video Recorder)을 활용한 현장정보 수집 및 분석에 관한 사례연구)

  • Shin Bong-Soo;Kim Chang-Duk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.486-489
    • /
    • 2002
  • Construction management has been a target of the result and the index which were decided by whether the resourecs(time, cost and progress...etc) were used. but this has been serious problems in time and cost because of the shortage of storage space, the incident, lowering of efficiency for works, working impossible of between work categories and the demage of finished products. Therefore I noticed that more correct and more objective establish of data collecting system was necessary. it was through the diversification of information for exchange and communication between the construction site and participants. DVR(Digital Video Recorder) and internet technology were suggested for a solution to this problem. the collected information by DVR was divided to 3 steps as how long it used and how much it processed for improving efficiency of using and storage of information. and then it was verified through applying to cases at construction site.

  • PDF

A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network (무선 메쉬 망의 서비스 품질 향상을 위한 확률적 부하 분담 기법)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.375-382
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.

A Study of the Pattern of Elderly's Internet Usage, Self-efficacy, and Self-esteem (노인의 인터넷 사용 실태, 자아효능감, 자아존중감에 관한 연구)

  • Hwang, Eun-Hee;Shin, Su-Jin;Jung, Duk-Yoo
    • Journal of Korean Public Health Nursing
    • /
    • v.25 no.1
    • /
    • pp.118-128
    • /
    • 2011
  • Purpose: The purpose of this study was to investigate the patterns of internet usage, selfefficacy, and self-esteem of the elderly. Method: Study participants were 139 older than 60 years of age who had used internet and could access internet anytime at home. Data were collected from March to September, 2009 by using a structured questionnaire. The data were analyzed using PASW/WIN 18.0 program. Results: The meantime of internet use was 8.74 hours per week, frequently used web-site was 'Newspaper and magazine', and subjects mainly used internet 'not to fall behind the times'. The mean score of internet use capability was 2.42, among theses the score of 'Searching necessary information' was the highest. The internet use capability of the subjects was significantly different in terms of education level, spouse, economic status, and the length of use. The mean scores of self-efficacy and self-esteem were $28.22{\pm}4.42$ and $28.51{\pm}4.25$, respectively. Conclusions: These results suggest that the elderly people use internet not to fall behind the times but they have enough capability to use internet searching or e-mailing. Also, it is true that there are many influencing factors on internet use and capability of the elderly. Therefore, it is needed to investigate the internet use of the elderly more closely.

Water-well Management Data Modeling using UML 2.0 based in u-GIS Environment (u-GIS 환경에서 UML 2.0을 활용한 지하수 관리 데이터 모델링)

  • Jung, Se-Hoon;Kim, Kyung-Jong;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.523-531
    • /
    • 2011
  • Many of the wells which were constructed to use ground water resource are abandoned and not managed efficiently after its use. And a variety of heavy metals and organic compounds are released from the abandoned wells and this can cause ground water pollution. Therefore in this paper implemented to monitor locational information drill holes and underground water sensing information on real time basis using u-GIS environment to combined ubiquitous sensor node and GIS technology to improve these problems. In addition, this system suggests using system by UML 2.0 by analyzing variety requirement of user and between system internal modules interaction and data flow. It provides graphical user interfaces (GUI) to system users to monitor water-well related property information and its managements for each water-well at remote site by variety platform by GIS map and web environment and mobile device based on smart phone.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

A Case Study of e-Business Implementation in Part Manufacturing Industry(B2B in PCB Industry) (부품 제조 산업에서의 e-Business 구축 사례(PCB 산업의 B2B))

  • Bae, Joon-Soo;Bae, Eun-Hae;Cheong, Min-Chang;Shin, In-Ki;Park, Young-Chul
    • IE interfaces
    • /
    • v.13 no.3
    • /
    • pp.503-511
    • /
    • 2000
  • The main theme of this research is a case of e-Business implementation in part manufacturing industry, especially in a PCB manufacturing company. The characteristics of part manufacturing industry are as follows. First, an ERP system runs as a legacy system that is ready to be combined with e-Business system. Secondly, the number of customers is very small. The customers are not many individuals but only a few big electronic enterprises that are strategically affiliated with the part manufacturing company. This means that the e-Business of the part manufacturing industry needs to focus on sharing pertinent information throughout the transactions with the customers, not on data-warehousing or data-mining customers' potential needs or requests. In this paper, we extracted e-Business opportunity domains from a PCB manufacturing company, a typical part manufacturing industry. We are intended to enhance information sharing between customers and the company, and provide functions of transactions necessary in the whole value chain from order to shipment. Implementing the e-Business system on the Web can increase the visibility of customers, and further, the company can be transformed into an extended enterprise where the relationship with the customers becomes very close and interleaved. Also, the Cyber Office functionality of the e-Business system can support the salespersons effectively, so that they can spend more time on customer satisfaction. Such efforts, in the future, can be a basis for active adaptation to the industry transformations such as forming e-community and participating in the marketplace.

  • PDF

Neural Theorem Prover with Word Embedding for Efficient Automatic Annotation (효율적인 자동 주석을 위한 단어 임베딩 인공 신경 정리 증명계 구축)

  • Yang, Wonsuk;Park, Hancheol;Park, Jong C.
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.399-410
    • /
    • 2017
  • We present a system that automatically annotates unverified Web sentences with information from credible sources. The system turns to neural theorem proving for an annotating task for cancer related Wikipedia data (1,486 propositions) with Korean National Cancer Center data (19,304 propositions). By switching the recursive module in a neural theorem prover to a word embedding module, we overcome the fundamental problem of tremendous learning time. Within the identical environment, the original neural theorem prover was estimated to spend 233.9 days of learning time. In contrast, the revised neural theorem prover took only 102.1 minutes of learning time. We demonstrated that a neural theorem prover, which encodes a proposition in a tensor, includes a classic theorem prover for exact match and enables end-to-end differentiable logic for analogous words.

A Efficient Contents Verification Scheme for Distributed Networking/Data Store (분산 환경에서의 효율적인 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.839-847
    • /
    • 2015
  • To seamlessly provide content through the Internet, it is generally considered to use distributed processing for content requests converged on original content providers like P2P, CDN, and ICN. That is, after other nodes temporally save content, they handle content requests instead of original content providers. However, in this case, it may be possible that a content sender is different from the original provider of the content. In this case, users may be exposed to various risks. To solve such a problem, it is highly recommended to verify received contents before using them, but it can cause network traffic increases as well as a serious service delay. This paper proposes an efficient content verification scheme for distributed networking/data store environments and analyzes its performance.