• Title/Summary/Keyword: 인터넷 이용용도

Search Result 81, Processing Time 0.024 seconds

Geological Map Database Construction Using GIS (GIS를 이용한 지질도 데이터베이스 구축에 관한 연구)

  • 이사로;최위찬;민경덕
    • Spatial Information Research
    • /
    • v.7 no.1
    • /
    • pp.147-153
    • /
    • 1999
  • Geological map and data are needed for land use planning, resources development, geological hazard prevention, environment protection and education, Since the nationwide geological database in Korea has not been constructed yet, there are many problems in using the geological map and data. There are many problems such a stratigraphy unestablishment, map conservation and edge matching in geological paper map. Therefore it is difficult to construct the geological map database, but the geological map database must be constructed as soon as possible as one of national thematic map. In this study, geological maps of pilot area such as Ansung geological map on a scale of 1:50,000, Busan on a scale of 1:250,000, Namchang on a scale of 1:25,000 and the whole Korean peninsula on a scale of 1:1,000,000 were designed and constructed to database using Geographic Information System(GIS). In addition the geological map management program was developed by GIS program. The digital geological maps were produced using the constructed geological database. The database could be of access through Internet World Wide Web(WWW) environment and be distributed in Compact Disk(CD).

  • PDF

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

Proposal for Evacuee Guidance of Cloud-based Elevator System in Emergency Situation (클라우드 기반 비상탈출 시 피난유도 승강기시스템 제안)

  • Choi, Jun-Ho;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.25-28
    • /
    • 2015
  • Lifts are used as an essential means of transportation within the building in an emergency situation, when used as a means of escape, so expect a lot of research has been conducted high effect. Number of stories in the Seoul-rise building guidelines underground 7th floor, 53 ground floor, floor area $6,800m^2$, floor area $127,050m^2$, use is cultural and convention facilities and sales facilities, business facilities and accommodation (hotel), the construction of public housing (apartments) hagieneun not efficient to install elevators for evacuation mothada was determined separately in designing the lift is designed according to the standards of passenger lifts installed under a judgment as to use for evacuation. However, this does not include detailed design guidelines so far.[1] We propose the Evacuee Guidance of Elevator System that can be used as entering air equipment, sprinkler and smart phone evacuation system.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

A Vector Tagging Method for Representing Multi-dimensional Index (다차원 인덱스를 위한 벡터형 태깅 연구)

  • Jung, Jae-Youn;Zin, Hyeon-Cheol;Kim, Chong-Gun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.749-757
    • /
    • 2009
  • A Internet user can easily access to the target information by web searching using some key-words or categories in the present Internet environment. When some meta-data which represent attributes of several data structures well are used, then more accurate result which is matched with the intention of users can be provided. This study proposes a multiple dimensional vector tagging method for the small web user group who interest in maintaining and sharing the bookmark for common interesting topics. The proposed method uses vector tag method for increasing the effect of categorization, management, and retrieval of target information. The vector tag composes with two or more components of the user defined priority. The basic vector space is created time of information and reference value. The calculated vector value shows the usability of information and became the metric of ranking. The ranking accuracy of the proposed method compares with that of a simply link structure, The proposed method shows better results for corresponding the intention of users.

Active Rule System Based on User's Emotional Margin for Power Saving Control (절전제어를 위한 사용자 감성마진 적용 능동규칙시스템)

  • Lee, Yonsik;Jang, Minseok;Kang, Sunkyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.119-124
    • /
    • 2014
  • In this paper, we propose the active rule system applying with emotional margin for power saving control. The proposed system in this paper is a part of the system which derives smart power saving by adjusting the illuminance using active rules within compromising the user's emotion. For this, we set the specific range of standard illuminance and the lower bound of user's emotional margin of illuminance based on measurements and analysis, and use these data in design of active rules. And then, we design and implement the active rule system using mobile agent. The mobile agent in the proposed system migrates to the destination sensor nodes, acquires and transmits sensor data according to the purpose and needs through the active rules, and directly executes the actions corresponding to the optional events(changed sensor data and/or time etc.). And then, we show the potential applicability of the proposed active rule system in various active sensor network applications through the interaction with the rule base and mobile sensor network middleware system.

More compact rectangular two stepped slot antenna for Wi-Fi dual band application (더욱 소형화된 와이파이 이중대역용 직사각형 2단 계단식 슬롯 안테나)

  • Kim, Min-woo;Lee, Yeong-min;Lee, Hee-jae;Lee, Young-soon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.17-23
    • /
    • 2021
  • In the present study, a more compact dual-band slot antenna is newly proposed for Wi-Fi application. The proposed antenna is composed of rectangular two stepped slot with open end which can generate standing wave resonance at dual frequency bands and L-type microstrip feed line. The measured impedance bandwidths are 50 MHz(2.412 ~ 2.470 GHz) at low frequency band and 452 MHz(5.451 ~ 5.903 GHz) at high frequency band respectiviely. Furthermore its size of 14 × 21 mm2 is reduced by 30% compared to the size of 20 × 21 mm2 of a conventional similar compact slot antenna. It has the omni-directional radiation pattern characteristics of a typical dipole antenna on the H-Plane, so it is suitable for commercial wireless network applications such as Wi-Fi.

Design and Implementation of Multimedia Education System on Mobile Device (모바일 단말에서의 SMIL을 이용한 멀티미디어 교육 시스템 설계 및 구현)

  • Lim Young-Jin;Seo Jung-Hee;Park Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.581-584
    • /
    • 2006
  • Cellular phones have been popularized and some of them even have access to the Internet. But the utilization of mobile phones has not been for education but only focused on particular services due to the text-based low capacity. This thesis proposes a multimedia education system using cell phones with SMIL. We can decrease the size of the parser and refute the resources of CPU by designing SMIL tag only, which is needed for multimedia education. In addition, the macro method for producing information for lectures will make possible decreased transmission quantity of multimedia contents and increased transmission efficiency. This will lead to overcoming the matter of insufficient CPU and memory, which is common to most mobile phone terminals.

  • PDF

Development of Real-time Video Search System Using the Intelligent Object Recognition Technology (지능형 객체 인식 기술을 이용한 실시간 동영상 검색시스템)

  • Chang, Jae-Young;Kang, Chan-Hyeok;Yoon, Jae-Min;Cho, Jae-Won;Jung, Ji-Sung;Chun, Jonghoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.85-91
    • /
    • 2020
  • Recently, video-taping equipment such as CCTV have been seeing more use for crime prevention and general safety concerns. Since these video-taping equipment operates all throughout the day, the need for security personnel is lessened, and naturally costs incurred from managing such manpower should also decrease. However, technology currently used predominantly lacks self-sufficiency when given the task of searching for a specific object in the recorded video such as a person, and has to be done manually; current security-based video equipment is insufficient in an environment where real-time information retrieval is required. In this paper, we propose a technology that uses the latest deep-learning technology and OpenCV library to quickly search for a specific person in a video; the search is based on the clothing information that is inputted by the user and transmits the result in real time. We implemented our system to automatically recognize specific human objects in real time by using the YOLO library, whilst deep learning technology is used to classify human clothes into top/bottom clothes. Colors are also detected through the OpenCV library which are then all combined to identify the requested object. The system presented in this paper not only accurately and quickly recognizes a person object with a specific clothing, but also has a potential extensibility that can be used for other types of object recognition in a video surveillance system for various purposes.

Mobile GIS Application for Managing Flood Disaster in River Basin (하천유역 홍수재해관리를 위한 Mobile GIS 기술 적용)

  • Seo, Young-Min;Kim, Sung-Bum;Jang, Kwang-Jin;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1112-1115
    • /
    • 2006
  • 모바일 GIS를 홍수재해관리 시스템에 도입하기 위한 목적은 홍수에 대비한 신속한 상황대처 통해 인명 및 재산피해를 최소화하는데 있다. 모바일 GIS 시스템 구축의 기본 방향은 하천유역에 대한 행정업무 및 정보화 업무의 효율성을 높여 현장업무에서 실시간으로 제공되는 수문정보 및 지형정보에 대한 다양한 컨텐츠를 주민들이 쉽게 접근하여 서비스를 제공받을 수 있도록 하고 현장 실무자가 하천 수위 및 유량을 관리하는 데 있어 즉각적인 조치를 가능하도록 하기 위한 것이다. 본 연구에서 이동 클라이언트와 홍수재해관리시스템 서버간의 무선통신채널은 AP(Access Point)를 통한 WLAN이나 CDMA망의 모바일 네트워크 또는 차세대 휴대인터넷 망을 대상으로 하였다. 홍수재해관리시스템은 ArcIMS, HTML, Java Script를 이용하여 구축하고 웹 서비스를 위해 마이크로소프트사의 IIS(Internet Information System) 사용하며, ArcIMS의 정상적인 구동을 위해 JRE(Java Runtime Environment)를 설치하도록 하였다. 주요 GIS 기능은 줌인, 줌아웃, 팬, 속성정보 검색, 거리측정, 버퍼링 기능 등이고 Layer는 침수위험건물, 대피건물, 침수지역 건물용도, 건물, 도로, 수계, 침수예상지역(100, 200년 빈도), 위성영상, DEM, 행정경계 등이 포함되도록 하였다. 시스템 구축에 사용될 데이터는 수리수문학적 데이터(유출량, 강우강도, 대상지역의 면적, Manning 계수 등)와 대상지역의 수치지도, DEM, 고해상 위성영상, 문헌조사와 현장조사를 통해 얻은 자료를 바탕으로 구성하도록 하였으며, 수리수문학적 데이터와 DEM 데이터를 바탕으로 침수지역 데이터를 생성하고 문헌조사와 현장조사를 통해 얻은 속성정보와 디지털 지도인 공간정보를 연결하기 위해 디지털 지도에서 건물 Layer, 도로 Layer, 등고선 Layer, 수계 Layer를 추출하여 ArcGIS에서 Coverage로 변환하여 위상관계를 설정한 후 다시 Shape 파일로 변환하여 속성정보와 연결시키도록 데이터베이스 구축방안을 제시하였다. 이와 같이 본 연구에서는 홍수재해 관리시스템에서 모바일 GIS를 적용하기 위하여 Pocket PC를 탑재한 이동 클라이언트인 PDA에 GPS 모듈을 확장하여 GPS 위성으로부터 위치정보를 획득하고 지리정보를 제공하는 모바일 GIS 서버간에 XML 기술을 이용하여 수문정보 및 지형정보 서비스를 제공하는 방안을 제시하였다.

  • PDF