• Title/Summary/Keyword: 시각정보체계

Search Result 439, Processing Time 0.033 seconds

Analysis and Implications of Private-led Library Services for the Disabled in Major Advanced Countries (주요 선진국 민간주도형 도서관 장애인서비스 분석과 시사점)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.1-23
    • /
    • 2022
  • Access to knowledge and information is a universal human right. However, even after the Marrakesh Treaty was adopted on June 27, 2013, only 1-7% of standard printed materials are accessible to people with reading disabilities, including the visually impaired, and library services are very weak. As a result, the book famine of people with reading disabilities continues. This study, focusing on such severe access gaps and inequalities, analyzes Learning Ally and Bookshare in the US, the Royal National Institute of Blind People (RNIB) in the UK, Bibliothèque Numérique Francophone Accessible (BNFA) in France, and SAPIE in Japan, which are considered private organizations leading library services for the disabled in major developed countries. And based on the derived implications and the Marrakesh Treaty, a strategic plan was proposed to strengthen the services of the disabled in domestic libraries. It is urgent to enact the 'Act to Resolve Reading Barriers', amend the provisions related to the Copyright Act that restrict library services, strengthen the organizational capacity of the National Library for the Disabled, raise the service index for the disabled in library evaluation, and establish a library cooperation system centered on regional representative libraries and expand services, etc.

Traffic Signal Control Algorithm for Isolated Intersections Based on Travel Time (독립교차로의 통행시간 기반 신호제어 알고리즘)

  • Jeong, Youngje;Park, Sang Sup;Kim, Youngchan
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.6
    • /
    • pp.71-80
    • /
    • 2012
  • This research suggested a real-time traffic signal control algorithm using individual vehicle travel times on an isolated signal intersection. To collect IDs and passing times from individual vehicles, space-based surveillance systems such as DSRC were adopted. This research developed models to estimate arrival flow rates, delays, and the change rate in delay, by using individual vehicle's travel time data. This real-time signal control algorithm could determine optimal traffic signal timings that minimize intersection delay, based on a linear programming. A micro simulation analysis using CORSIM and RUN TIME EXTENSION verified saturated intersection conditions, and determined the optimal traffic signal timings that minimize intersection delay. In addition, the performance of algorithm varying according to market penetration was examined. In spite of limited results from a specific scenario, this algorithm turned out to be effective as long as the probe rate exceeds 40 percent. Recently, space-based traffic surveillance systems are being installed by various projects, such as Hi-pass, Advanced Transportation Management System (ATMS) and Urban Transportation Information System (UTIS) in Korea. This research has an important significance in that the propose algorithm is a new methodology that accepts the space-based traffic surveillance system in real-time signal operations.

Interrelationship between Records and Information (기록과 정보의 상관관계)

  • Song, Byoung-Ho
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.3-32
    • /
    • 2009
  • When the record management faces to the information environment, the practices based on self-judgment needs more open and considerate policies. New viewpoint that treat records as information and treat information as records will produce new mutual-conscious behavior that create records based on the value of information usage and maintain information data based on the reliability as an record. As the internal aspect how to create records well, how to transfer them well, and how to archives them well used to be the focus of record management, existing legislation, guidelines, and training seem to be mainly related to this front steps. We should also address issues according to the succeeding information services, including opening to the relevant, sharing, duplicating, information security, privacy protection, and constructing collections with continual supplement. This paper observe the confusion of the viewpoints in the recent reports, explain the need of fusion viewpoint, and suggest interconnecting feedback cycle between record management system and general information system.

A study on data management policy direction for disaster safety management governance (재난안전관리 거버넌스 구축을 위한 데이터관리정책 방향에 관한 소고)

  • Kim, Young Mi
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.83-90
    • /
    • 2019
  • In addition to the proliferation of intelligent information technology, the field of disaster management is being approached from a multifaceted perspective. In particular, as the interest in establishing a disaster safety management system using data increases, there is an increasing need for a large amount of big data distribution generated in real time and a systematic management. Furthermore, efforts are being made to improve the quality of data in order to increase the prevention effect of disasters through data analysis and to make a system that can respond effectively and to predict the overall situation caused by the disasters. Disaster management should seek both precautionary measures and quick responses in the event of a disaster as well as a technical approach to establishing governance and safety. This study explores the policy implications of the significance and structure of disaster safety management governance using data.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on the Application Service of 3D BIM-based Disaster Integrated Information System Management for Effective Disaster Response (효과적인 재난 대응을 위한 3차원 BIM 기반 재난 통합정보 시스템 활용 서비스 제시)

  • Kim, Ji-Eun;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.143-150
    • /
    • 2018
  • Periodic and systemic disaster management has become more important than ever owing to the recent continuous occurrence of disasters, such as fires, earthquakes, and flooding. This management goes beyond simple disaster preparedness, which was introduced minimally under the existing legal system. For effective disaster management, facilities should be managed through regular maintenance on a daily basis, and in the case of an emergency, intuitive and accurate communication is essential regarding the situation and purpose. BIM manages the entire building property data using the effective 3D visualization model, so it can be used for various management purposes from design to facility maintenance. In this study, through an expert survey on the use of services in a BIM-based integrated disaster information system, the available areas of BIM data were organized in terms of facility information management, 3D visualization, and disaster control. Later, through the use service and DB definition within the BIM-based disaster integration information system, the main facilities monitoring and response services based on BIM and BIM-based spatial management service are proposed. Based on this study, it is hoped that the BIM-based application service functions within the system will be implemented to enable an effective system response.

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

Ontology Development of School Bullying for Social Big Data Collection and Analysis (소셜빅데이터 수집 및 분석을 위한 아동청소년 학교폭력 온톨로지 개발)

  • Han, Yoonsun;Kim, Hayoung;Song, Juyoung;Song, Tae Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.10-23
    • /
    • 2019
  • Although social big data can provide a multi-faceted perspective on school bullying experiences among children and adolescents, the complexity and variety of unstructured text presents a challenge for systematic collection and analysis of the data. Development of an ontology, which identifies key terms and their intricate relationships, is crucial for extracting key concepts and effectively collecting data. The current study elaborated on the definition of an ontology, carefully described the 7 stage development process, and applied the ontology for collecting and analyzing school bullying social big data. As a result, approximately 2,400 key terms were extracted in top-, middle-, and lower-level categories, concerning domains of participants, causes, types, location, region, and intervention. The study contributes to the literature by explaining the ontology development process and proposing a novel alternative research model that uses social big data in school bullying research. Findings from this ontology study may provide a basis for social big data research. Practical implications of this study lie in not only helping to understand the experience of school bullying participants, but also in offering a macro perspective on school bullying as a social phenomenon.

A Study on Design and Color Preference Investigation using WWW (WWW을 활용한 디자인과 색채 기호 조사에 관한 연구)

  • Kim, Hyung-Min;Kwon, Eun-Sook
    • Journal of the Korea Computer Graphics Society
    • /
    • v.2 no.1
    • /
    • pp.39-47
    • /
    • 1996
  • Consumer's needs, pursuing diverse lifestyles, can be identified systematically by the development of design research method with computer technologies. Color, which is the most important factor in industrial design, has been regarded as possessing difficulties in collecting and analyzing reliable data, because it has multi-dimensional features. The purpose of this paper is to develop a new research method for design and color preference investigation, and to provide the possibilities of applying this method into the traditional color research which has many limitations in time, space, and money. This paper emphasizes that the new method using visual and concrete 3D modeling of a product can enhance the reliability of collecting and analyzing data comparing with traditional linguistic and abstract one.

  • PDF

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.