• Title/Summary/Keyword: information needs analysis

Search Result 2,542, Processing Time 0.033 seconds

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

YouTube Channel Ranking Scheme based on Hidden Qualitative Information Analysis (유튜브 은닉 질적 정보 분석 기반 유튜브 채널 랭킹 기법)

  • Lee, Ji Hyeon;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.757-763
    • /
    • 2019
  • Youtube has become so popular that it is called the age of YouTube. As the number of users and contents increase, the choice of information increases. However, it is difficult to select information that meets the needs of users. YouTube provides recommendations based on their watch list. Therefore, in this study, we want to analyze the channel of user's subject in various angles and provide the proposed scheme based on the crawled channels, measurement of the perception of channels and channel videos through quantitative data and hidden qualitative data analysis. Based on the above two data analysis, it is possible to know the recognition of the channel and the recognition of the channel video, thereby providing a ranking of the channels that deal with the topic. Finally, as a case study, we recommend English learning channels to users based on numerical data statistics and emotional analysis results to maximize flipped learning effect regardless of time and space.

A Study on the Patent Trend of 'Smart Farm' in Domestic through Network Analysis (네트워크 분석을 통한 국내 '스마트 팜' 특허 동향 연구)

  • Min, Kyong-Bin;Park, Hong-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.413-422
    • /
    • 2022
  • Smart farms are receiving a lot of attention as a way to solve the chronic labor shortage and aging problems in agriculture. The smart farm industry, called the 6th industrial revolution, needs to strengthen its competitiveness. In order to apply innovative IT technology to agriculture, it is important to collect and analyze information about prior research or patents. This paper examines smart farm patent trends through 5,789 patent data related to smart farm using the domestic patent information search service(KIPRIS). This paper examines the domestic patent trends of smart farm information through keyword network, ego network, simultaneous appearance network, and bigram network analysis. As a result of network analysis related to smart farm patents, patents related to smart farm systems and control technologies were the most common. This paper can provide help in setting the direction of future smart farm-related patent research.

A Study on the Information Use Behaviors through Citation Analysis (인용문헌 분석을 통한 정보 이용 행태 연구 - 화학분야 박사학위논문을 중심으로 -)

  • Lee, Seung-Won
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.185-209
    • /
    • 2008
  • This study was carried out on the citations within the chemistry field Ph.D. dissertations to ascertain what types of documents are the most frequently used in the research process, the most frequently consulted journals and obsolescence rate of the journals. The analysis covered 42 doctoral theses presented at 'K' university in Seoul from 2000 to 2008. The results obtained from the 3,258 citations revealed that the most frequently used documents were Academic Journal, which accounted for 91 percent of the total; 27 journals met 50 percent of the information needs; and the age of 50 percent of the citations was no older than 9 years. Finally, the results can be used as a tool for the collection management of the library. and Researcher with the chemistry field Ph.D. dissertation.

An Analysis on Access Points of Children's Materials : Using "A" Online Library Catalog and "N" Children's Database in the U. S. (어린이자료의 접근점 분석 - 미국의 사례를 중심으로 -)

  • Chung, Jin-Soo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.4
    • /
    • pp.101-113
    • /
    • 2009
  • This paper reports the results of the analysis on the access points of two bibliographic databases specialized in children's materials: "A" public library's online catalog and "N" children's novel database. The analysis particularly focused on the access points that lead users to discover their own needs and on the ways users search and navigate. The findings showed that the selected bibliographic systems supported many access points that were taken from the materials as well as from other relevant information sources and that browsing and navigating with hyperlinks supported the users' 'recognition' of information through 'interactivity' between the users and the systems, 'information encountering,' and 'serendipity.' The findings of this paper have implications for librarians and systems designers who want to develop user-friendly bibliographic systems that give access to children's materials.

Comparing the Results of Big-Data with Questionnaire Survey (빅데이터 분석결과와 실증조사 결과의 비교)

  • Kim, Do-Goan;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2027-2032
    • /
    • 2016
  • The rapid diffusion of smart phones and the development of data storage and analysis technology have made the field of big-data a promising industry in the future. In the marketing field, big-data analysis on social data can be used for understanding the needs of consumers as an effective and efficient marketing tool. Before the age of big-data, companies had relied upon the traditional methods such as questionnaire survey and marketing test in which a small number of consumers had participated. The traditional methods have still been used. Although both of big-data analysis and traditional methods are useful to understand consumers. It is need to check whether the results from both include similar implications. In this point, this study attempts to compare the results of big-data analysis with that of questionnaire survey on some cosmetics brands methods. As the results of this study, both results of big-data analysis and questionnaire survey include similar implications.

A Workflow Execution System for Analyzing Large-scale Astronomy Data on Virtualized Computing Environments

  • Yu, Jung-Lok;Jin, Du-Seok;Yeo, Il-Yeon;Yoon, Hee-Jun
    • International Journal of Contents
    • /
    • v.16 no.4
    • /
    • pp.16-25
    • /
    • 2020
  • The size of observation data in astronomy has been increasing exponentially with the advents of wide-field optical telescopes. This means the needs of changes to the way used for large-scale astronomy data analysis. The complexity of analysis tools and the lack of extensibility of computing environments, however, lead to the difficulty and inefficiency of dealing with the huge observation data. To address this problem, this paper proposes a workflow execution system for analyzing large-scale astronomy data efficiently. The proposed system is composed of two parts: 1) a workflow execution manager and its RESTful endpoints that can automate and control data analysis tasks based on workflow templates and 2) an elastic resource manager as an underlying mechanism that can dynamically add/remove virtualized computing resources (i.e., virtual machines) according to the analysis requests. To realize our workflow execution system, we implement it on a testbed using OpenStack IaaS (Infrastructure as a Service) toolkit and HTCondor workload manager. We also exhaustively perform a broad range of experiments with different resource allocation patterns, system loads, etc. to show the effectiveness of the proposed system. The results show that the resource allocation mechanism works properly according to the number of queued and running tasks, resulting in improving resource utilization, and the workflow execution manager can handle more than 1,000 concurrent requests within a second with reasonable average response times. We finally describe a case study of data reduction system as an example application of our workflow execution system.

IS/IT Knowledge/Skill sets required by IS/IT Practitioners : findings from Korea

  • Kyung, Won-Hyun;Koh, Seok-Ha
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.343-351
    • /
    • 2005
  • It will not be impossible to develop an Information Systems and Information Technologies (IS/IT) program and a curriculum that represents the true needs of the IS/IT industry until IS/IT educator, reduce the gap perception and IS/IT practitioner's perception of IS/IT knowledge and technical skills that the industry might need. This paper represents and analysis of perceptions about IS/IT knowledge and skills that IS/IT practitioners might consider important. This study is based in Korean. The findings give us a very important lesson for IS/IT academicians that their understanding about the required knowledge and skills for the IS/IT career is not in line with that of IS/IT industry. Classifies the critical knowledge/skill set according to content or domain of knowledge by means of a survey. This is conducted in accordance with what IS/IT practitioners and educators can easily relate. The survey uses this approach and includes four broad categories of critical information Systems and Information technologies (IS/IT) knowledge/skills: IS/IT technology knowledge/skills, organizational and societal knowledge/skills, interpersonal knowledge/skills, and personal trait knowledge/skills.

  • PDF

The Analysis of the Academic Information Seeking Behavior of Electronic Engineering Graduate Students (전자공학전공 대학원생들의 학술정보 이용행태 분석)

  • 박일종;백수연
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.3
    • /
    • pp.31-58
    • /
    • 2001
  • The objective of this study was to provide the basic information necessary for the efficient library service policy for the graduate students in engineering field as investigating the academic information seeking behavior and demands of users who major in electronic engineering at a graduate program. Literature studies and survey through questionnaire were conducted for the purpose. The established theories were synthetically examined through literature studies, and theoretical systematization and structure for positive research were framed. Graduate students in engineering field were classified into two groups: those who major in electronic engineering and the others, and their demands for information and its seeking behavior were comparatively analyzed in this thesis.

  • PDF