• Title/Summary/Keyword: information operations

Search Result 4,612, Processing Time 0.029 seconds

Sector Based Multiple Camera Collaboration for Active Tracking Applications

  • Hong, Sangjin;Kim, Kyungrog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1299-1319
    • /
    • 2017
  • This paper presents a scalable multiple camera collaboration strategy for active tracking applications in large areas. The proposed approach is based on distributed mechanism but emulates the master-slave mechanism. The master and slave cameras are not designated but adaptively determined depending on the object dynamic and density distribution. Moreover, the number of cameras emulating the master is not fixed. The collaboration among the cameras utilizes global and local sectors in which the visual correspondences among different cameras are determined. The proposed method combines the local information to construct the global information for emulating the master-slave operations. Based on the global information, the load balancing of active tracking operations is performed to maximize active tracking coverage of the highly dynamic objects. The dynamics of all objects visible in the local camera views are estimated for effective coverage scheduling of the cameras. The active tracking synchronization timing information is chosen to maximize the overall monitoring time for general surveillance operations while minimizing the active tracking miss. The real-time simulation result demonstrates the effectiveness of the proposed method.

Ransomware Threat Countermeasures for the Defense Information System: In terms of Information Security Risk Management (국방정보시스템에서의 랜섬웨어 위협 대응방안: 정보보안 위험관리 관점에서)

  • Yoo, Jincheol;Moon, Sangwoo;Kim, Jong-hwa
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.75-80
    • /
    • 2020
  • Damage caused by ransomware has continued to increase since last year, but cyber operations are managed without any separate classification of ransomware types in the military's guidelines for carrying out cyber operations. However, unlike other malware, ransomware is a threat that could paralyze all defense operations in one moment, and the military should reevaluate ransomware and take countermeasures. Accordingly, this paper aims to analyze the assets, vulnerabilities, and threats related to defense information service based on information security risk management, and propose alternatives to ensure continuity of defense work from ransomware threats.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

Analyzing the Dysfunction of Fully Shared Stock Information in a Supply Chain with Competiting Retailers (경쟁적 소매상으로 구성된 공급사슬에서 정보공유의 역효과에 관한 연구)

  • Seo, Yong-Won
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.95-116
    • /
    • 2012
  • The purpose of this paper is to show the effect of information sharing strategy on the supply chain performances. While traditional information sharing models assumed centralized stock information, recent supply chain practices often implement fully shared stock information, where real-time stock information is accessible on retailers. When retailers are competing with each other, this fully shared stock information may incur retailers' strategic order behaviors. Thus, this paper analyzes a simple two-level supply chain consisting of one warehouse and two identical competing retailers where the real time stock information is fully shared. The warehouse uses the traditional echelon stock policy. Under this environment the retailers' reorder decisions are derived using the order risk concept and the retailer competition mechanism is analyzed. Computational results show that the supply chain performace degradation in the fully shared stock information is quite significant, implying the importance of designing information sharing strategies in the supply chain design phase.

A Study for the Development of Value added and New-media Services (부가통신 및 뉴미디어 서비스의 개발 방향에 관한 연구)

  • 정인근;윤종욱
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.1
    • /
    • pp.107-107
    • /
    • 1989
  • Demand for new information services is ever increasing as information technology advances in an unprecedented pace. Capabilities of information technology to overcome the time and space limitations enables efficient storage and processing of a large volume of data shared by many users in geographically dispersed areas. As the users ask for more useful information services, it is necessary to develop information services tp meet the needs of users. Enhancing information services is also necessary to cope actively with the pressures to open the information service is also necessary to cope actively with the pressures to open the information and telecommunications market as the level of Korean information services industry is still in its infancy. Value Added Network(VAN) services have a tremendous growth potential and its economic and social impact would be great as the information society matures. This study suggests a direction for the development of value added and new-media services based on the survey of individual and business users of information services.

A complementary approach to strategic information systems planning

  • Han, Jaemin;Shin, Young-J.;Yang, Jeong-Sik
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1990.04a
    • /
    • pp.61-70
    • /
    • 1990
  • The information revolution is sweeping through the global economy. The strategic significance of the information and information technology have been some what underestimated. Now they are transforming the structure of competition. Information technology must be applied to improve and sustain an organization's competitive advantage. The successful implementation of information technology is dependent on the effectiveness of information systems planning. However, the selection of the right methodology still remains a open question. This paper describes the existing methodologies for information system planning. A complementary approach to strategic information systems planning, which was developed for a steel company, is suggested. The approach attempts to combine Business Systems Planning of IBM and Critical Success Factors Analysis for effective information systems planning. Although this approach is in the experimental stage it looks to be of benefit to large organizations which require information planning for managerial level.

  • PDF

Enterprise Process Reverse Engineering(EPRE):Form-based approach

  • Kim, Kyong-Ho;Kim, Young-Gul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.113-116
    • /
    • 1996
  • Firms spend enormous efforts identifying current processes and understanding the related details before establishing new business processes in their business process redesign (BPR) projects. Considering excessive efforts required during the analysis phase and limited support to BPR projects, need for a better method is evident This article describes a method of modeling enterprise business processes bayed on common business forms. By identifying form operations and form field types, the proposed method provides redesign view on the information handling as well as the current process flows in the form of an Event-Process Chain (EPC) diagram.

  • PDF

Gray-scale thinning algorithm using local min/max operations (Local min/max 연산에 의한 계조치 세선화 알고리즘)

  • 박중조
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.1
    • /
    • pp.96-104
    • /
    • 1998
  • A new gray-scale thinning algorithm using local min/max operations is proposed. In this method, erosion and dilation properties of local min/max operations are using for generating new rides and detecting ridges in gray scale image, and gray-scale skeletons are gradually obtained by accumulating the detected ridges. This method can be applicable to the unsegmented image in which object are not specified, and the obtained skeletons correspond to the ridges (high gray values) of an input image.

  • PDF

A Temporal Relational Database:Modeling and Language

  • Kim, Jae-Kyeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.2
    • /
    • pp.139-158
    • /
    • 1995
  • A temporal database systems provides timing information and maintains history of data compared to the conventional database system. In this paper, we present a temporal relational database which use an interval-stamping method for instant-based events and for interval-based states. A set of temporal algebraic operators are developed on an instance of time and interval of time so that we can manipulate events and states at a same time. The set of operation is the basis for creating a relational algebra that is closed for temporal relations. And temporal SQL is also suggested as a temporal query relational language for our algebraic operations on temporal relations.

  • PDF

Analysis of the performance of supply chain partnership based on information sharing and lead-time distribution (정보공유와 리드타임 분포를 바탕으로 한 파트너쉽이 공급사슬 성능에 미치는 영향에 관한 연구)

  • 박국흠;김기범;정봉주
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.342-345
    • /
    • 2003
  • Due to the rapid development of manufacturing and information technology, traditional supply chain scheme has been changed dramatically Most companies have been forced to relocate or redesign their logistics network in different countries. A supply chain partnership is a relationship formed between two independent members in supply chain through information sharing to achieve specific objectives and benefits in terms of reductions in total costs and inventories. This study illustrates the benefits of supply chain partnerships based on information sharing and lead-time patterns. We consider three level of information sharing: (1) immediate order information; (2) demand information; (3) inventory information. Given a fixed total lead-time, how lead-time distribution will affect the bullwhip effect and inventory cost under information sharing strategies. The results can help improving supply chain performance and selecting suitable direction for the re-configuration of supply chain network.

  • PDF