• Title/Summary/Keyword: 사용자 유형

Search Result 1,148, Processing Time 0.025 seconds

A Study on the Annotation of Digital Content (디지털 콘텐트의 어노테이션에 관한 연구)

  • Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.267-286
    • /
    • 2006
  • Tools are needed to have access to more effective information and to select it in the environment of digital information where information pours in. and some of the advanced techniques to make up these tools are metadata and annotation. Annotation additionally records the marks for the supplementary explanation of and emphasis on a specific part of the original text and kas more various merits than metadata in terms of the search and use of digital resources. This research aims at suggesting methods that annotation. which has a range of functions including access to information. its reuse and sharing in the digital surroundings of late, can be applied to digital contents such as web services, digital libraries and electronic books. As to the research method, the case studies of annotation systems applied to web services and digital libraries have been carried out, and the metadata formation of the systems has been analyzed.

Allowing a Large Access Timing Offset in OFDM-CDMA Using ZCZ Code and Block Spreading (ZCZ 부호와 블록 확산을 이용한 사용자 동기화 경감 OFDM-CDMA)

  • Na, Donj-jun;Choi, Kwonhue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.23-36
    • /
    • 2016
  • We propose a new type of OFDM-CDMA scheme which allows large inter-user timing offset using zero correlation zone(ZCZ) code in conjunction with block spreading technique. Moreover to maximize spectral efficiency, the proposed OFDMA does not have guard time(GT). This is opposite to the trends in the conventional schemes where GT are supposed to be larger to allow larger inter-user timing offset. It is remarkable that the proposed GT-free OFDM-CDMA scheme completely cancels inter-user interference in the multipath fading simply by despreading process. This inter-user interference-free feature still remains even there exist inter-user timing offsets as large as multiple OFDM symbols. Although the self-user interference exists due to no GT, it can be effectively suppressed by simple successive interference cancellation(SIC) from the first symbol in spread block as it is free from inter symbol interference(ISI).

A Study on the Characteristics in Image Expression of Interior Space (실내공간의 이미지 표현 특성에 관한 연구 -상업공간의 디자인을 중심으로-)

  • 홍승대
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.243-250
    • /
    • 1999
  • Interior design is depend on combination way of between invisible meaning and visible form, then it has a several meaning by that. The meaning of interior space is a invisible concept which is shown by a form and it is mainly recognized by a image. The purpose of this study is to explore that characters of image in communication process, typical aspect and structural aspect have been shown in interior design. On this study, I try to study space analysis about commercial space to explore character of spatial image through theoretical approach. In a result, the image of interior space is made by deep representation as a designer's basic concept and is delivered by conversion of various codes. Therefore, the image of interior space is not a additional concept which is made by natural factor of space, it is a design concept which must be dealt with space planning.

  • PDF

Optimization of image data for Mobile Game Gontents (모바일게임 콘텐츠 개발을 위한 이미지 데이터 최적화)

  • Lee, Hwan-joong;Kim, young-bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.38-42
    • /
    • 2008
  • In the 2000s, the PC package game market has withered, but the internet based on-line game, the wireless internet based mobile game and high-powered console game market have been main stream. Among those markets, mobile game market has rapidly increased because it has 'mobility' that overcomes the limitation of time and area. But, unlike other platforms, mobile game user have to pay the higher price for download mobile game contents through the wireless internet and mobile game developer have to overcome the limitation of storage memory capacity.of mobile phone. Chiefly, the image data consume the storage capacity of mobile game contents, this paper present a technology to optimize image data for mobile game contents through analyzing type of compression method and image formats.

  • PDF

화물위치추적 기술 현황 및 개발 방향

  • 박남규;최형림;송근곤;오상환
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1999.10a
    • /
    • pp.199-206
    • /
    • 1999
  • 본 연구에서는 웹기반의 화물차량위치추적시스템의 개발과 관련된 문제를 다루고 있다. 화물위치추적 시스템이란 이동하는 화물차량으로부터 위치데이터 및 관련 정보를 수신하여 중앙관제센터에서 이 정보를 데이터베이스에 저장하여 두고 화물위치 정보를 지도 위에 표시하는 시스템으로 화주, 운송회사 등 육상물류관련 기관에서 화물위치추적, 공동수배송, 화물차량 통제 등 다양한 목적으로 사용될 수 있다. 화물차량위치추적시스템은 AVLS(Automatic Vehicle Location System)라 불리우면서 산업계에서 활용되고 있으며 위치획득 방법의 종류에 따라 다양한 유형의 AVLS모델이 등장하고 있다. 예를 들면 전통적인 GPS(Global Positioning System) 위성 수신, DGPS(Differential GPS) 기지국, PCS(Personal Communication System) Cell, 도로기반 시설에 포함되는 비콘 등의 방법에 의해 AVLS는 구현되고 있다. AVLS는 정보통신 요소 기술과 정보통신 기반 시설로 구성되는데, 정보통신 요소기술로는 위치획측의 매개체인 AVL단말기와 관제시스템 S/W. 그리고 GIS(Geographic Information System)가 있고, 정보통신 기반 시설로는 차량의 단말기와 관제시스템 사이의 데이터 중계를 담당하는 네트워크가 있다. 화물차량위치추적시스템을 구성하기 위한 구비요건으로 중계망의 안정성과 신뢰성, 획득한 위치데이터의 정확성, 관제시스템의 완성도와 AVL단말기의 사용자 인터페이스, GIS S/W개발을 위한 Map API(Application Program Interface)등을 들 수 있다. 본 연구에서는 PCS Cell 방식에 의한 위치결정방식을 채택하였는데, 이것은 PCS망을 기반으로 데이터를 주고받이며 인터넷 단말기로 확장 가능한 PCS 단말기를 사용해서 위치추적을 하는 시스템이다. 이러한 시스템을 선정하게된 배경은 단말기아 망 이용료의 가격이 저렴하여 현실적으로 트럭이 쉽게 부착할 수 있다는 장점이 있으며 나아가 인터넷 단말기를 활용하여 차량과 관제센터사이에 메시지 전송 등 부가적인 서비스가 가능하기 때문이다.

Development of Level of Service by Complaints Characteristics through the Analysis of Complaints Data (민원 자료 분석을 통한 민원 특성별 서비스 관리기준 설정)

  • Park, Mi-Yun;Sho, Byung-Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3525-3534
    • /
    • 2015
  • One of the most important requirements in the development of asset management system of wastewater facilities is to determine the level of management of the service related to supply of wastewater. After the sewage facilities were built, many parts of the replacement or repair items will be occurred by the requests of the users on the way of operation and management. To manage the level of those services, where site and which complains is occurred have to be searched, and have to setting the aim of managing the service for objects to improvement. In this study, the complaints related with the sewage of S-area were analyzed, in which is progressed the domestic asset management development for the facilities and pipes related to wastewater. Based on these complaints data, the regional characteristics of S-area by causes and subject of complaints is analysed, and developed more detail management standard than current level. And also service level management strategies of advanced asset management benchmark agency for improving to service level management standard is compared and constructed basement for building the best practice of S area.

How to Construct Spatio-Temporal Ontologies for U-City Contents (유시티 콘텐츠를 위한 시공간 온톨로지 구축 방법)

  • Nah, Bang-Hyun;Kwon, Chang-Hee;Park, Rae-Hoon;Yoon, Hyung-Goog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2632-2637
    • /
    • 2010
  • Information in UbiComp Environment are transformed to knowledge by relationship in a spatio-temporal location, and then became intelligent contents with task procedures or application models. The entities in U-City has lots of relationships. It is important in U-City contents to provide intelligent and personalized response to meet the intention of users. We extend the spatial ontology model of SPIRIT to other domain. Domain ontologies are consist of type, relation, and instance ontologies. When the relationship model by shared concepts are not defined, we used the spatio-temporal events to find relationships. So we proposed the methods to recommend semantically related terms, not syntactically.

Extension of Aggregate Functions for Spatiotemporal Data Analysis (데이타 분석을 위한 시공간 집계 함수의 확장)

  • Chi Jeong Hee;Shin Hyun Ho;Kim Sang Ho;Ryu Keun Ho
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.43-55
    • /
    • 2005
  • Spatiotemporal databases support methods of recording and querying for spatiotemporal data to user by offering both spatial management and historical information on various types of objects in the real world. We can answer to the following query in real world: 'What is the average of volume of pesticide sprayed for cach farm land from April to August on 2001, within some query window' Such aggregation queries have both temporal and spatial constraint. However, previous works for aggregation are attached only to temporal aggregation or spatial aggregation. So they have problems that are difficult to apply for spatiotemporal data directly which have both spatial and temporal constraint. Therefore, in this paper, we propose spatiotemporal aggregate functions for analysis of spatiotemporal data which have spatiotemporal characteristic, such as stCOUNT, stSUM, stAVG, stMAX, stMIN. We also show that our proposal resulted in the convenience and improvement of query in application systems, and facility of analysis on spatiotemporal data which the previous temporal or spatial aggregate functions are not able to analyze, by applying to the estate management system. Then, we show the validity of our algorithm performance through the evaluation of spatiotemporal aggregate functions.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF