• Title/Summary/Keyword: 방기천

Search Result 41, Processing Time 0.022 seconds

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF

A Study for a Method of Response Time Evaluation Through Latency Test in Intranet System (Latency Test를 활용한 인트라넷 시스템에서의 응답시간 측정방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.501-507
    • /
    • 2009
  • On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efeciency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

  • PDF

A study on the eye Location for Video-Conferencing Interface (화상 회의 인터페이스를 위한 눈 위치 검출에 관한 연구)

  • Jung, Jo-Nam;Gang, Jang-Mook;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.1
    • /
    • pp.67-74
    • /
    • 2006
  • In current video-conferencing systems. user's face movements are restricted by fixed camera, therefore it is inconvenient to users. To solve this problem, tracking of face movements is needed. Tracking using whole face needs much computing time and whole face is difficult to define as an one feature. Thus, using several feature points in face is more desirable to track face movements efficiently. This paper addresses an effective eye location algorithm which is essential process of automatic human face tracking system for natural video-conferencing. The location of eye is very important information for face tracking, as eye has most clear and simplest attribute in face. The proposed algorithm is applied to candidate face regions from the face region extraction. It is not sensitive to lighting conditions and has no restriction on face size and face with glasses. The proposed algorithm shows very encouraging results from experiments on video-conferencing environments.

  • PDF

A Study on Development of the Digital Curture Contents Production (디지털 문화컨텐츠 제작을 위한 발전 방안 연구)

  • Park Man-Soo;Ro Heon-Jun;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.5 no.4
    • /
    • pp.300-305
    • /
    • 2004
  • The industry of digital culture contents has resulted in the high growth of added value at the area of game and movie in 2004 but the markets of animation character, and music disc have been weaken. Animation industries in Digital culture contents have attracted the attention of the people as the business of multi culture contents which has the possibility to expend and to enhance the added value nut only for the field of image and character business but also for the area of the copy right on. The stable structure of market, however, has not been settked down except a few of successful projects due to the rapid decline of 2D animation and the strong market of 3D in overseas. The purpose of this study is to analyze and research the basic logic of the market structure at the domestic business of 3D animation. In addition this paper is to suggest an alternative in terms of benchmarkin in overseas. It could be expected to achieve the effective production in this field, if the result of this study could be applied to the related world as a development model at the area of 3D animation in digital culture contents.

  • PDF

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF

A Study on the Extraction of Emotional Words for Media Facade (내용분석 및 자유연상을 통한 미디어 파사드의 감성어휘 추출)

  • Lee, Seung-min;Bang, Kee-chun
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.741-748
    • /
    • 2015
  • The aim of this paper is to select a distinct vocabulary for understanding the media facade of user and to lay the foundation for a media facade emotional scale. Firstly, we assembled a set of emotional words that were sufficient to represent a general overview of korean emotions, collected from various literature studies. Secondly, we found emotional words from collecting user opinion on the Youtube website. Finally the emotional words were collected from phrase by using non-structural survey. The collected words were integrated according to standards and they were organized 39 pieces that can be used in the survey. As a result, we extracted 21 emotional words for measuring user's emotions expressed while watching media facade, such as 'novel', 'cool', 'awesome', 'gorgeous', 'exciting', 'amazing', 'wonderful,', 'showy', 'great,', 'intense', 'good', 'grand', 'colorful', 'unique', 'variety', 'new', 'fun', 'beautiful', 'luxurious,', 'mysterious', 'satisfactory'. And we categorized the 21 words to form 5 elements by using factor analysis such as 'surprise', 'attention', 'variety', 'aesthetics', 'interest'.

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

Selection of Oriental Medicinal Plants for Screening of Anticancer Agents (항암소재의 발굴을 위한 한방소재의 선별)

  • Park, Keun-Hyoung;Kim, So-Young;Chae, Hee-Jeong
    • KSBB Journal
    • /
    • v.22 no.3
    • /
    • pp.139-145
    • /
    • 2007
  • An oriental medicinal database was used from medicinal plants for screening of anticancer agents. The prescription frequency and dosage of medicinal plats in 170 anticancer prescriptions were analyzed. From the total prescription score of each medical plant, it was found that high-scored medicinal plants have been widely studied in the previous research on the cancer treatment. Consequently, dangui, hwangui, banha, bachul, jinpy, insam, bacjakyak, deahwang, chungoong, jimo, chunnamsung, omija, hyunggae, huekchook, banggi, boclyung, osooyou were selected as raw materials for the screening of anticancer agents.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.