• Title/Summary/Keyword: 대학정보시스템

Search Result 1,886, Processing Time 0.031 seconds

A Study on the Current Status Analysis and Operation Strategies for Establishing the Mid- to Long-term Development Plans for Anyang Municipal Libraries (안양시 공공도서관 중장기 발전 계획 수립을 위한 현황 분석 및 운영 전략 연구)

  • Chang, Inho;Hoang, Gum-Sook;Song, Min Sun
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.145-170
    • /
    • 2022
  • The purpose of this study is to derive the operation strategies for establishing the mid-to-long-term comprehensive library development plans considering the identity and specificity of Anyang City. For this purpose, this study proceeded as follows. First, to understand the internal and external environment and regional characteristics of Anyang City, various literature and statistical data related to Anyang City were collected, analyzed, and organized. Second, the operation status of Anyang municipal libraries was analyzed with data such as 「National Library Statistics System」, 「Gyeonggido Public Library Yearbook」, and various library-related laws. Third, a survey with open-ended questions was conducted for twenty-six librarians working in Anyang municipal libraries to collect opinions on the identity of Anyang and the overall operations of the libraries. Lastly, by reflecting the current status analysis, the latest library trends, policies, and sociocultural environments, detailed operation strategies that can serve as a basis for establishing mid-to long term development plans for Anyang municipal libraries in the future were proposed. The above operating strategies were proposed by dividing into six areas such as (1) the plans for organizational system and manpower composition, (2) the facility plans for balanced regional development, (3) the collection development and preservation direction, (4) the special subject materials service plans, (5) the for establishing cooperation system, and (6) the public relations plans.

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

Iris Region Masking based on Blurring Technique (블러링기법 기반의 홍채영역 마스킹 방법)

  • Lee, Gi Seong;Kim, Soo Hyung
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.25-30
    • /
    • 2022
  • With the recent development of device performance such as smartphones, cameras, and video cameras, it has become possible to obtain human biometric information from images and photos. A German hacker group obtained human iris information from high-definition photos and revealed hacking into iris scanners on smartphones. As high-quality images and photos can be obtained with such advanced devices, the need for a suitable security system is also emerging. Therefore, in this paper, we propose a method of automatically masking human iris information in images and photos using Haar Cascades and Blur models from openCV. It is a technology that automatically masks iris information by recognizing a person's eye in a photo or video and provides the result. If this technology is used in devices and applications such as smartphones and zoom, it is expected to provide better security services to users.

Design and Implementation of Virtual Machines as an Aid in Teaching Computer Concepts (컴퓨터의 개념 교육을 위한 가상 머신의 설계 및 구현)

  • Nah, Jeong-Ho;Jo, Gang-Won;Kang, Soo-Yeon;Jung, Woo-Keun;Lee, Jae-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.131-133
    • /
    • 2012
  • 본 연구에서는 컴퓨터의 개념을 학부 신입생 교육과정에서 쉽게 이해할 수 있도록 ARM 명령어 집합의 부분 집합을 정의하고, 어셈블리 언어 코드를 입력받아 실행하는 가상 머신을 설계하고 구현하였다. 기존 교육 과정의 컴퓨터 구조 과목에서 다루는 어셈블리 언어는 실제의 머신을 기반으로 하기 때문에 개념을 학습하는데 있어서 불필요하게 복잡하다는 단점이 있다. 하지만 본 연구에서는 교육에 필요한 내용만을 포함한 가상 머신을 새롭게 정의함으로써 좀 더 우아한 방법으로 컴퓨터의 개념을 이해할 수 있도록 하였다. 특히 어셈블리 언어 학습을 통해서 컴퓨터 구조와 고급 언어 간의 상호작용을 이해하는데 도움이 될 수 있다. 제안한 가상 머신은 자바로 구현하였으며, 스캐너 및 파서를 구현하기 위해서 오픈소스 컴파일러-컴파일러 시스템을 사용하였다. 해당 가상 머신은 공과대학 학부 신입생을 위한 실습 프로그램으로 사용되었으며 컴퓨터 개념의 이해를 돕는데 유의미한 기여를 하였다.

Quad-rotor Robust Controller Design for Autonomous Flight (쿼드로터의 자율비행을 위한 로보스트 제어기 설계)

  • Kim, Min;Byun, Gi-Sik;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.539-540
    • /
    • 2012
  • 최근까지 무인 항공기는 군사적인 목적으로 활용하기 위해 활발하게 연구 되어 왔다. 근래에 들어 레저용, 또는 상업용으로 활용도가 급격히 증대되고 있다. 이에 국내외의 대학 및 연구기간에서 무인항공기의 자동비행 제어시스템을 위한 연구를 활발히 진행되고 있다. 최근 들어 무인항공기로 제어하기가 쉽고 활용도가 높은 쿼드로터 비행체가 각광을 받고 있는데 이미 많은 연구가 진행되어 왔다. 이러한 쿼드로터는 4개의 로터의 속도 제어로 비행체의 위치제어가 가능하다. 쿼드로터의 구조적인 이점으로 제어가 쉬운 반면 바람과 같은 외란에 매우 취약하다는 단점이 있어 실제 위치 제어가 쉽지가 않다. 본 논문에서는 외란(disturbance)에 취약한 쿼드로터의 위치제어를 안정하게 제어하기 위해 비행체의 자세 측정 센서인 관성측정장치(Inertial Measurement Unit)를 만들어 비행체의 자세를 측정 할 수 있도록 하였다. IMU는 자이로(Gyro)와 가속도(Accelerometer) 센서를 융합하여 비행체의 Roll, Pitch, Yaw 자세를 계측할 수 있도록 하였다. 본 논문에서는 일반적인 PID 제어기법을 적용하여 기존의 쿼드로터의 비행체에 대한 제어 성능을 실험을 제시하고자 한다.

  • PDF

Research on Utilizing Emulab for Malware Analysis (악성코드 분석을 위한 Emulab 활용 방안 연구)

  • Lee, Man-hee;Seok, Woo-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.117-124
    • /
    • 2016
  • Virtual environment is widely used for analyzing malware which is increasing very rapidly. However, knowing this trend, hackers are adopting virtual environment detection techniques for malware to kill itself or stop malicious behaviors when detecting virtual environments. Various research is going on in order to thwart any efforts to utilize anti-virtualization techniques, but until now several techniques can evade most of well known virtual environments, making malware analysis very difficult. Emulab developed by Utah University assigns real systems and networks as researchers want in realtime. This research seeks how to use Emulab for malware analysis.

An Entity Attribute-Based Access Control Model in Cloud Environment (클라우드 환경에서 개체 속성 기반 접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.32-39
    • /
    • 2020
  • In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.

Meta-Model Transformations for Efficient Storing DDS Topics (효율적인 DDS 토픽 저장을 위한 메타 모델 변환 방법)

  • Lee, Hyun-Woo;Yim, Hyung-Jun;Choi, Hoon;Kim, Jum-Su;Lee, Kyu-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.123-126
    • /
    • 2011
  • 최근 전투체계는 동시에 다수의 장비들 사이에 실시간으로 데이터를 전달해야 하는데, 이러한 특성을 만족하는 통신 미들웨어로서 OMG (Object Management Group)에서 정의한 데이터 분배 서비스 (DDS ; Data Distribution Service)가 적합하다. 이를 구현한 DDS 시스템에는 RTI의 NDDS, PrismTech의 OpenSplice, 충남대학교의 ReTicom 등이 있다. 이 중 NDDS와 OpenSplice는 데이터의 영속성을 지원하지만 ReTicom에서는 영속성을 아직 지원하지 못한다. 이를 해결함과 동시에 실시간성을 보장하기 위해서 ReTicom은 메인 메모리 기반의 객체 관계형 데이터베이스를 사용하여 구현중이다. 이를 위해서는 DDS의 객체 모델 데이터를 정의하는 IDL과 객체 관계형 데이터베이스의 데이터 타입 및 구조 등이 동일하지 않기 때문에 IDL과 객체 관계형 데이터베이스간의 데이터 타입 및 구조를 변환하는 메타 모델 변환 방법이 제공되어야 한다. 본 논문에서는 이러한 메타 모델 변환 방법을 해결하고자 IDL을 구조파악이 쉬운 XML 스키마로 변환 후 이를 객체 관계형 데이터베이스의 데이터 타입 및 구조 형태로 변환 해주는 방법을 제안한다.

A Study on Functional Details and Importance of Geoscience Research Data Management (Geoscience 연구데이터 관리를 위한 기능별 세부요소 및 중요도에 관한 연구)

  • Kim, Juseop;Kim, Suntae;Choi, Sangki
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.411-440
    • /
    • 2020
  • The purpose of this study is to derive the detailed elements of each RDM function that can be applied to the development of research data management system in Geoscience field in Korea. Eight institutions related to RDM services were analyzed to achieve the research purpose. As a result of the analysis, 80 detailed elements of Geoscience RDM function were derived, and a survey was conducted to domestic experts to verify the derived details. As a result, 80 RDM functional details for Geoscience are presented in order of importance. The elements presented can be presented as functional details in the establishment and operation of RDM services in the field of Geoscience in research institutes or university libraries in Korea.

Construction of Full-Text Database and Implementation of Service Environment for Electronic Theses and Dissertations (학위논문 전문데이터베이스 구축 및 서비스환경 구현)

  • Lee, Kyi-Ho;Kim, Jin-Suk;Yoon, Wha-Muk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2000
  • Form the middle of 199os, most universities in Korea have requested their students to submit not only the original text books but also their Electronic Theses and Dissertations(ETD) for masters degree and doctorates degree. The ETD submitted by the students are usually developed by various kinds of word processors such as MS-Word, LaTex, and HWP. Since there is no standard format for ETD to merge various different formats yet, it is difficult to construct the integrated database that provides full-tex service. In this paper, we transform three different ETD formats into a unified one, construct a full-text database, and implement the full-text retrieval system for effective search in the Internet environment.

  • PDF