• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.033 seconds

Activation of Culture and Content Industry and Necessity of Security Industry & Concert Hall Safety (문화콘텐츠 산업의 활성화와 공연장 안전 및 보안 산업의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.55-63
    • /
    • 2016
  • The purpose of this study is that there viewing at the future development direction and awareness of the cultural contents industry targeting college students for the activation of the domestic cultural content industry. And we want to find the need of the security industry & Concert Hall Safety. Recent worldwide it has occurred 'Soft target' terror targeting unspecified civilian in the cultural space of theater and music venues, stadiums etc. But security and safety systems against terror in Korea are very deficient situation. US security market has increased sales significantly interest in increasing against crime and terrorism prevention and depending on the price cut and technology development. It is expected to require a security industry in a variety of applications to the cultural contents industry development about Korean pop music and theatrical performances, and internet and mobile games stc.

Analysis of Tendencies on WLAN Security Technology (무선랜 보안 기술 및 운영 현황 분석)

  • Kim, Su-Jin;Seo, Jong-Kyun;Han, Ki-Cheon;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.685-687
    • /
    • 2013
  • Today, as wireless communications devices such as laptops, smart phones are generalized, wireless LAN has been widely installed in the corporate office conference rooms, industrial warehouses, Internet-ready classrooms, and even in a coffee shop. Though a wired network can be accessed and attacked only by the physical penetration, the wireless network which can be accessed anywhere within the reach of anyone has relative vulnerability by unauthorized users' attack. To defend these vulnerabilities, the introduction of WIDS / WIPS is required. In this paper, we recognize the limitations of WLAN security technology, review the current technology trends and propose the solutions in the future security problems.

  • PDF

A Proposal on the Navigation Supporting System for improving the Marine Traffic Safety

  • Lee, Hyong-Ki;Jung, Chang-Hyun;Kong, Gil-Young;Park, Young-Soo
    • Journal of Navigation and Port Research
    • /
    • v.33 no.7
    • /
    • pp.463-467
    • /
    • 2009
  • In near future, more congested and dangerous marine traffic environment due to the rapid marine traffics increase and ship handling difficulty by enlargement of ship size is predicted. In this paper, an navigation supporting system proposal made to enhance the safe navigation by providing the collision avoidance informations to the navigator via marine traffic environment assessment. Proposed navigation supporting system displays results of marine traffic environment assessment, degree of the dangers and gives reason of danger which is enhance situational awareness of navigator. For this purpose, results of marine traffic environment assessment which is obtained via real time assessment sent to the designated server and through the connection with navigation supporting system navigator being enable to see all those informations on the computer screen Navigator would utilize those information to make a decision in the difficult waterways and thus safe navigation could be enhanced.

Groupware Current Status Analysis Ⅰ (그룹웨어의 현황 분석 Ⅰ)

  • Kim, Sun-Uk;Gim, Bong-Jin
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.75-93
    • /
    • 1997
  • Unlike individual applications, it is extremely hard to obtain user requirements for group systems, since there exists very complicated dynamics in group. This may result in spreading a great amount of products with a broad range of contents. Thus, this study presents a comparative analysis of groupware products. As a result, these products have been categorized into three areas which include cooperation/document management systems, collaborative writing systems, and decision-making/meeting systems. While the systems reviewed here focus on the cooperation/document management systems, the other two areas will be dealt in details in part Ⅱ. The first area ends up with two large categories such as proprietary groupware products and intranet groupware products. However, it has been observed that there is a natural convergence between these two categories. Consequently, the comparative analysis has been performed in terms of functions provided on the two categories and a combined category. Each group of the functions has been divided into three parts which consist of basic functions, quasi-basic functions, and others. Such a decision has been made based on the frequency rate of the functions provided in the products. With a more strict rule, the basic functions comprise electronic mail, sanction, bulletin board, document management, scheduling, security, Web browser, and Internet connectivity. This study also provides a framework for integrated functional model of groupware systems. The basic functions are merged into the model. However, the model is so flexible that it can partially include the quasi-functions in addition to the basic functions. In the future, it is expected that a large number of products will stem from the modification of the functional model.

  • PDF

Digital Healthcare and Main Issues (디지털 헬스케어와 주요이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.560-563
    • /
    • 2016
  • The changes in the medical and healthcare are started from the digital technology. The new field of digital healthcare has started fused with existing healthcare, medical technology, and digital technology. It can increase the service effect and reduce healthcare costs by applying ICT skills such as ICBM(Internet of Things, Cloud, Big data and Mobile), artificial intelligence, robotics, virtual, augmented reality, and wearable devices to healthcare services including healthcare, disease management. Recently there has been grafted an artificial intelligence technologies such as AlphaGo of Google and Watson of IBM onto the healthcare area. In this study, we analyze the main technology, ecosystem, platforms for digital healthcare, and lastly future changes in health care services and issues of digital healthcare.

  • PDF

Applications and Issues of Medical Big Data (의료 빅데이터의 활용과 해결과제)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.545-548
    • /
    • 2016
  • Big data is all data generated in the digital environment which has a variety of large and a short life cycle. The amount and type of data are becoming more and more produced on a larger scale, as a smart phone and the internet are popular, and consequently it has been converted into time for users to take advantage and extract only the valuable and useful data from the generated big data. Big data can also be applied to the medical industry and health sectors. It has created the synergy to be fused with ICT such as IoT, smart healthcare, and so on. However, there will be challenges like data security in order securely to use a meaningful and useful vast amounts of data. In this study, we analyze the future prospects of the healthcare, applications and issues of medical big data, and the expected challenges.

  • PDF

A Study on Protection Model of Propagation through Smartphone Malware Analysis (스마트폰 악성코드 분석을 통한 확산 방지 모델에 관한 연구)

  • Lim, Su-Jin;Lee, Jung-Hyun;Kang, Hyung;Park, Won-Hyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • Recently, the number of internet users using smartphone is increasing worldwide, and the interest in the smartphone malware is increasing. Especially, since mobile malware are occurring to the smartphones using Symbian or Windows Mobiles in the abroad, it is necessary to have an action plan against these mal wares. This paper describes the possible security threat through the analysis of the mal wares occurred after 2004. Also we present a model for the future propagation prevention system which can cope with domestic smartphone mal wares.

BioCC: An Openfree Hypertext Bio Community Cluster for Biology

  • Gong Sung-Sam;Kim Tae-Hyung;Oh Jung-Su;Kwon Je-Keun;Cho Su-An;Bolser Dan;Bhak Jong
    • Genomics & Informatics
    • /
    • v.4 no.3
    • /
    • pp.125-128
    • /
    • 2006
  • We present an openfree hypertext (also known as wiki) web cluster called BioCC. BioCC is a novel wiki farm that lets researchers create hundreds of biological web sites. The web sites form an organic information network. The contents of all the sites on the BioCC wiki farm are modifiable by anonymous as well as registered users. This enables biologists with diverse backgrounds to form their own Internet bio-communities. Each community can have custom-made layouts for information, discussion, and knowledge exchange. BioCC aims to form an ever-expanding network of openfree biological knowledge databases used and maintained by biological experts, students, and general users. The philosophy behind BioCC is that the formation of biological knowledge is best achieved by open-minded individuals freely exchanging information. In the near future, the amount of genomic information will have flooded society. BioGG can be an effective and quickly updated knowledge database system. BioCC uses an opensource wiki system called Mediawiki. However, for easier editing, a modified version of Mediawiki, called Biowiki, has been applied. Unlike Mediawiki, Biowiki uses a WYSIWYG (What You See Is What You Get) text editor. BioCC is under a share-alike license called BioLicense (http://biolicense.org). The BioCC top level site is found at http://bio.cc/

Visitor perception survey on the Saemangeum reclamation district (새만금 사업 지구의 방문객 인식 조사)

  • Son, Jae-Gwon;Kim, Seong-Su;Choi, Jin-Kyu;Jang, Dong-Heon
    • Korean Journal of Agricultural Science
    • /
    • v.39 no.4
    • /
    • pp.595-602
    • /
    • 2012
  • Main objective is to examine visitors the image, awareness of Saemangeum to examine its image, awareness, expected projects, and areas of improvement. This can establish measures for publicity and nation-wide participation. Main results are as following. First, visitors are broadly distributed to all age groups. Majority of visiting is travel and rate of returning visit is high as well. Second, the Saemangeum project is positively recognized and it is expected to be a prime development of the west coast in the future. Third, TV has significantly contributed to the visit to Saemangeum but the internet has larger effects in younger generations. Furthermore, rest and experience facilities, accommodations, and food items are major areas of improvement. Fourth, visitors have high expectations for tours, leisure, and ecosystems. Therefore, efforts should be made to become the Mecca of greed-development and cultural tourism. Fifth, many people replied that Saemangeum is an assistance to the national development but water quality management should be continued. In addition, the public participation should be made centrically cultural and economical participations.

Gesture based Natural User Interface for e-Training

  • Lim, C.J.;Lee, Nam-Hee;Jeong, Yun-Guen;Heo, Seung-Il
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.577-583
    • /
    • 2012
  • Objective: This paper describes the process and results related to the development of gesture recognition-based natural user interface(NUI) for vehicle maintenance e-Training system. Background: E-Training refers to education training that acquires and improves the necessary capabilities to perform tasks by using information and communication technology(simulation, 3D virtual reality, and augmented reality), device(PC, tablet, smartphone, and HMD), and environment(wired/wireless internet and cloud computing). Method: Palm movement from depth camera is used as a pointing device, where finger movement is extracted by using OpenCV library as a selection protocol. Results: The proposed NUI allows trainees to control objects, such as cars and engines, on a large screen through gesture recognition. In addition, it includes the learning environment to understand the procedure of either assemble or disassemble certain parts. Conclusion: Future works are related to the implementation of gesture recognition technology for a multiple number of trainees. Application: The results of this interface can be applied not only in e-Training system, but also in other systems, such as digital signage, tangible game, controlling 3D contents, etc.