• Title/Summary/Keyword: additional information

Search Result 4,942, Processing Time 0.035 seconds

A Study for the Direction of Tourism Information Policy in Korean Tourism Industry (한국 관광산업의 정보화정책방향 연구)

  • Lee, Ung-Gyu
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.171-185
    • /
    • 2003
  • This study deals with an tourism information promotion plan that the government, businesses, and private sectors should consider implementing. Tourism information policy is crucial to tourism industry competitiveness by triggering changes in economy, culture, and society. Better tourism information policy should satisfy the tourist needs as well as create additional value for the tourism businesses.

  • PDF

A Study for the Direction of Tourism Information Policy in Korean Tourism Industry (한국 관광산업의 정보화정책방향 연구)

  • Kwon, Chang-Hee;Lee, Woong-Kyu
    • Journal of Digital Convergence
    • /
    • v.2 no.1
    • /
    • pp.25-42
    • /
    • 2004
  • This study deals with an tourism information promotion plan that the government, businesses, and private sectors should consider implementing. Tourism information policy is crucial to tourism industry competitiveness by triggering changes in economy, culture, and society. Better tourism information policy should satisfy the tourist needs as well as create additional value for the tourism businesses.

  • PDF

Evaluating the Breastfeeding Information Websites for Korean Adolescents (한국청소년의 모유수유 관련 건강교육을 위한 e-정보전략)

  • Song, Yong;Kim, Ae-Jung;Lee, Youn-Soo;Yoo, Tai-Woo;Kang, Nam-Mi
    • The Korean Journal of Food And Nutrition
    • /
    • v.20 no.4
    • /
    • pp.487-493
    • /
    • 2007
  • Internet websites are excellent resources for younger people to gain information related to breastfeeding. So in this study, we evaluated the breastfeeding knowledge of university students, as well as the currently available website information on breastfeeding. Among the criteria, the six most important evaluation categories for the breastfeeding information on websites were selected and identified. The study participants completed the modified Williams and Hammer's tool, in order to evaluate their breastfeeding knowledge. An additional tool took into consideration the website breastfeeding information criteria, to evaluate the Korean websites. This 34 item tool was categorized into milk supply, comfort during breastfeeding, health of the baby and mother, social support, presentation of message, and products or financial motivation. Thirty-seven websites related to breastfeeding were evaluated, and the results were then discussed by nursing students. The students in this study were not knowledgeable on breastfeeding management with regard to the expression and storage of breast milk, the prevention and care of sore nipples, or use of breastfeeding aids. The breastfeeding information found on the Korean websites received positive evaluations for milk supply, comfort during breastfeeding, and health of the baby and mother. However, the educational content on social support, the message presentation, and the product areas on websites were rare or required additional information from breastfeeding specialists. In conclusion, based on our empirical survey, we need to design websites and evaluation tools for accurate website information regarding the social and economic benefits of breastfeeding, so that Korean women are better motivated to breastfeed by the information they obtain through the Internet.

Mobile Point-of-Sales System (모바일 판매 시점 관리 시스템)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.87-93
    • /
    • 2007
  • We propose a mobile point-of-sale system, which consists of only mobile information terminals and personal computers. The proposed system provides most of functionalities related with resource planning, adminstration and management, provided by medium-scale or large-scale POS systems, with additional functionalities, such as automatic information gathering and management through mobile interconnection, while eliminating the necessity of additional special-purpose devices, such as bar-code systems. The proposed system transmits order information through wireless and wired communication lines, thus allowing real-time sharing of order information among diverse information devices, such as mobile order receiving terminals, main server within stores, monitors and printers located in production lines. Also, the system is able to transfer such detail information produced within stores in real-time to the enterprise-level accounting, sales, logistics, personnel management system, which facilitate enterprise-wide management and administrative decision-making. No additional programs are required for mobile terminals. Order information received by such terminals are entered into databases through web server of main server and that information is again transferred to main server and production line printers. The proposed system can handle all the point-of-sale information and can provide almost of the POS functionalities by simply utilizing wireless internet, personal computers, and mobile terminals without installing specific-purpose peripheral devices. The proposed system can be widely applied to the small-scale stores and will contribute in reducing construction and maintenance cost required for point-of-sale management.

  • PDF

Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism (HV-KEM을 이용한 생체 정보 기반 인증 프로토콜)

  • Seo, Minhye;Hwang, Jung Yeon;Kim, Soo-hyung;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.69-79
    • /
    • 2016
  • Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.

A Robust Sequential Preprocessing Scheme for Efficient Lossless Image Compression (영상의 효율적인 무손실 압축을 위한 강인한 순차적 전처리 기법)

  • Kim, Nam-Yee;You, Kang-Soo;Kwak, Hoon-Sung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we propose a robust preprocessing scheme for entropy coding in gray-level image. The issue of this paper is to reduce additional information needed when bit stream is transmitted. The proposed scheme uses the preprocessing method of co-occurrence count about gray-levels in neighboring pixels. That is, gray-levels are substituted by their ranked numbers without additional information. From the results of computer simulation, it is verified that the proposed scheme could be reduced the compression bit rate by up to 44.1%, 37.5% comparing to the entropy coding and conventional preprocessing scheme respectively. So our scheme can be successfully applied to the application areas that require of losslessness and data compaction.

  • PDF

RF Power Detector for Location Sensing

  • Kim, Myung-Sik;Kubo, Takashi;Chong, Nak-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1771-1774
    • /
    • 2005
  • Recently, RFID has become popular in the field of remote sensing applications. Location awareness is one of the most important keys to deploying RFID for advanced object tracking. Generally, multiple reference RF stations or additional sensors are used for the location sensing with RFID, but, particularly in indoor environments, spatial layout and cost problems limit the applicability of those approaches. In this paper, we propose a novel method for location sensing with active RFID systems not requiring the need for reference stations or additional sensors. The system triangulates the position of RF signal source using the signal pattern of the loop antenna connected to the power detector. The power detector consists of a signal strength detector and a signal analysis unit. The signal analysis unit indicates the signal strength and serial number using the signal from the strength detector, and provides the direction of the signal to the application target. We designed three different signal analysis units depending on the threshold type. The developed system can sense the direction to the transponder located over 10 m away within the maximum error of $5^{\circ}$. It falls within a reasonable range in our normal office environment.

  • PDF

Internal Pattern Matching Algorithm of Logic Built In Self Test Structure (Logic Built In Self Test 구조의 내부 특성 패턴 매칭 알고리즘)

  • Jeon, Yu-Sung;Kim, In-Soo;Min, Hyoung-Bok
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1959-1960
    • /
    • 2008
  • The Logic Built In Self Test (LBIST) technique is substantially applied in chip design in most many semiconductor company in despite of unavoidable overhead like an increase in dimension and time delay occurred as it used. Currently common LBIST software uses the MISR (Multiple Input Shift Register) However, it has many considerations like defining the X-value (Unknown Value), length and number of Scan Chain, Scan Chain and so on for analysis of result occurred in the process. So, to solve these problems, common LBIST software provides the solution method automated. Nevertheless, these problems haven't been solved automatically by Tri-state Bus in logic circuit yet. This paper studies the algorithm that it also suggest algorithm that reduce additional circuits and time delay as matching of pattern about 2-type circuits which are CUT(circuit Under Test) and additional circuits so that the designer can detect the wrong location in CUT: Circuit Under Test.

  • PDF

Performance Evaluation of Left-Comer and Look-Ahead Chart Parsing for Small-Sized Context Free Grammar (소규모 문맥 자유 문법에 대한 Left-Corner / Look-Ahead 차트 파싱 알고리즘의 성능 평가)

  • Shim, Kwang-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.571-579
    • /
    • 2009
  • A left-comer and look-ahead chart parsing algorithm suppresses the generation of meaningless intermediate structures, and thus, gains parsing speed-ups. However, the algorithm requires additional costs to maintain left-comer and look-ahead information throughout the parsing process. Albeit the additional costs, previous research shows that significant parsing speed-ups have been achieved for large-sized context-free grammars. In this paper, we perform similar experiments with a small-sized grammar. We still get parsing speed-ups, but relatively low. We also find that left-comer information has rather negative effects on parsing speed-ups.

Chaos system using PPM-DCSK modulation (PPM-DCSK 변조를 이용한 카오스 시스템)

  • Kim, Sung-Gon;Jang, Eun-Young
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.814-820
    • /
    • 2020
  • In the M-ary DCSK system up to now, as M increases, the distance between constellation signal points becomes closer and performance deteriorates. we propose a hybrid modulation scheme based on PPM and DCSK to improve the BER performance. one part of the bit is modulated by the PPM and the other part by DCSK. Thus, the information bearing signal is modulated simultaneously according to the selected pulse position of the PPM determined by the information bit and the additional information bit. The analytical BER performance of the proposed plan is derived and verified by simulation. The results show that the proposed scheme outperforms conventional M-DCSK, code index modulation DCSK and rectified code index DCSK in additional white Gaussian noise and multipath Rayleigh fading channels.