• Title/Summary/Keyword: use for information

Search Result 27,364, Processing Time 0.05 seconds

An Empirical Study of the Sido.Saeol System Service Quality : Local Government User Satisfaction and Job Satisfaction (시도행정·새올행정시스템 서비스 품질이 지방자치단체 사용자 만족도 및 직무 만족도에 미치는 영향에 관한 실증연구)

  • Kang, Du-Ho;Lee, Hyun-Kyu
    • The Journal of Information Systems
    • /
    • v.20 no.2
    • /
    • pp.135-154
    • /
    • 2011
  • The Sido.Saeol system, a local government information system cost too much for having been designed and developed during last four years but the effectiveness of this system is still open to doubt. Also maintenance cost is still too high and become increasing year by year. To find out the reasons and to suggest how to solve these problems, a service quality of an Sido Saeol system and the public servant's job satisfaction were investigated based on the Delone and McLean's updated IS success Model(2003). To investigate of the effectiveness of the Sido Saeol system, 8 variables are analyzed to test 3 main hypothesis. After all the analysis, we found that Sido.Saeol systems have many aspects to be improved for system use and job satisfaction and have to be revise in the aspects of system qualities.

Trend and Application for Green Information Technology (그린 IT기술의 국내외 동향과 응용사례)

  • Jin, Tae-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.491-494
    • /
    • 2011
  • We propose a green computing which similar to green chemistry; reduce the use of hazardous materials, maximize energy efficiency during the product' s lifetime, and promote the recyclability or biodegradability of defunct products and factory waste. Research continues into key areas such as making the use of computers as energy-efficient as possible, and designing algorithms and systems for efficiency-related computer technologies.

  • PDF

TCP-friendly RTP Rate Control

  • 하상석;정선태
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.255-258
    • /
    • 2003
  • TCP is taking over 95% among the Internet traffics. Recently the demands of multimedia services in the Internet has been increasing. These multimedia services mostly need real-time deliverly, and then RTP has been a de facto to transmission protocol for these real-time multimedia services. RTP uses UDP as its underlying transport protocol, and thus it does not support any rate and congestion control. Thus, for fair use of the Internet bandwidth with TCP traffics. RTP also needs a rate control. One constraint of RTP is that the feedback information(delivered by, RTP's twin protocol, RTCP) is recommended to be sent no less than 5 seconds. In this paper, we propose a TCP-friendly RTP rate control which use only RTCP feedback information at every 5 seconds. The experiment results show that our proposed algorithm works. But, it is found that we need more time to test the effects of parameters and policies of the algorithms, which will be reported later.

  • PDF

A New Multi-layer Multimedia for Copyright Protection (저작권보호를 위한 다중계층 멀티미디어)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.135-145
    • /
    • 2008
  • Needs for copyright protection of multimedia content are getting increased because of the internet growth. In this paper, a new technology which protects the content copyright to provide different content services by user level using the digital watermarking technology was proposed. The service can be provided by two layers of a paid user and a free user. By the proposed method, the paid user can use the high quality content and the free user only can use the low quality content. The digital watermarking technology was used to hide information to be able to improve the content quality.

  • PDF

Implementation of Attendance Management Sysem Utilizing RFID and Smart Phone (RFID와 스마트 폰을 이용한 출결관리 시스템 구현)

  • Yun, Nam Il;Ahn, Sung Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.151-157
    • /
    • 2012
  • This paper implements an effective attendance management and monitoring system utilizing the RFID(Radio Frequency IDentification) and Smart phone for student. In this paper, RFID system use 13.56MHz to control the attendance, and we can show that information of RFID and dynamic image through IP camera in Smart phone. We also make up the contents and database utilizing the labview program in computer. Especially, proposed technique can obtain dynamic image by server implementation at real time basis so that it is possible to use simultaneously several Smart phone. From the various and practical experiment, it is confirm that proposed system is useful for attendance management and remotely monitoring.

Motion Tracking Algorithm for A CCTV System (CCTV 시스템을 위한 움직임 추적 기법)

  • Kang, Seoung-Il;Hong, Sung-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.295-296
    • /
    • 2006
  • This paper implements a method that tracking the moving objects that detected by the motion detection function of the digital CCTV system. We simply implement the motion detection function of the digital CCTV system that use frame difference and thresholding. When motion is detected, the motion detection function generates two outputs. One output is the event that the motion is arised in input image frame. The other output is coordinate that motion is exists. Then, do the block matching algorithm[2] using coordinate, that motion is exists, as initial coordinate of the block matching algorithm. The best matched coordinate is new initial coordinate of the block matching algorithm for the next image frame. We simply use the block matching algorithm that implements tracking the moving objects. It is simple, but useful the actual digital CCTV system.

  • PDF

Quality Inspection of Dented Capsule using Curve Fitting-based Image Segmentation

  • Kwon, Ki-Hyeon;Lee, Hyung-Bong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.125-130
    • /
    • 2016
  • Automatic quality inspection by computer vision can be applied and give a solution to the pharmaceutical industry field. Pharmaceutical capsule can be easily affected by flaws like dents, cracks, holes, etc. In order to solve the quality inspection problem, it is required computationally efficient image processing technique like thresholding, boundary edge detection and segmentation and some automated systems are available but they are very expensive to use. In this paper, we have developed a dented capsule image processing technique using edge-based image segmentation, TLS(Total Least Squares) curve fitting technique and adopted low cost camera module for capsule image capturing. We have tested and evaluated the accuracy, training and testing time of the classification recognition algorithms like PCA(Principal Component Analysis), ICA(Independent Component Analysis) and SVM(Support Vector Machine) to show the performance. With the result, PCA, ICA has low accuracy, but SVM has good accuracy to use for classifying the dented capsule.

The study of preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient

  • Kim, Hyun-Ji;Kang, Jung-Ae;Lee, Sang-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.57-63
    • /
    • 2016
  • The purpose of the study is to investigate the preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient. Results show that women mostly prefer to use dynamic and imaged emoticon than men. However, the preference of using text messages increases when both men and women express uncomfortable emotion. Especially, when users send family messages, they tend to prefer for text message. And when users send close friends messages, the preference for dynamic and imaged emoticon is high. When users send distant friends messages, the similar tendency is shown regardless of emotion. These results can provide the information to use emoticon in the filed of education and take advantage in digital education and mobile education.

A study of Engineering analysis for improvement in practical use of RFID+4D system (RFID+4D 시스템 활용도 향상을 위한 엔지니어링 분석)

  • Hwang, Kyoung-Hoon;Ahn, Chi-Sun;Yoon, Su-Won;Schin, Sang-Yoon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2011.05a
    • /
    • pp.173-175
    • /
    • 2011
  • A study is for improvement in practical use of RFID+4D. In the yard of construction industry, using information has become more important part to control total process. One of the way to improve the information using that comes from each step, RFID is getting attention. But it's not really adapted on construction industry. Especially, a study on the curtain wall part has a problem of engineering process. Each steps of curtain wall process are separated. If it' could be connect totally, controling information of curtain wall from producing to fitting become more efficient with adapted RFID+4D.

  • PDF

Gröbner Basis Attacks on Lightweight RFID Authentication Protocols

  • Han, Dae-Wan
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.691-706
    • /
    • 2011
  • Since security and privacy problems in RFID systems have attracted much attention, numerous RFID authentication protocols have been suggested. One of the various design approaches is to use light-weight logics such as bitwise Boolean operations and addition modulo $2^m$ between m-bits words. Because these operations can be implemented in a small chip area, that is the major requirement in RFID protocols, a series of protocols have been suggested conforming to this approach. In this paper, we present new attacks on these lightweight RFID authentication protocols by using the Gr$\ddot{o}$bner basis. Our attacks are superior to previous ones for the following reasons: since we do not use the specific characteristics of target protocols, they are generally applicable to various ones. Furthermore, they are so powerful that we can recover almost all secret information of the protocols. For concrete examples, we show that almost all secret variables of six RFID protocols, LMAP, $M^2AP$, EMAP, SASI, Lo et al.'s protocol, and Lee et al.'s protocol, can be recovered within a few seconds on a single PC.