• Title/Summary/Keyword: 정보기술관리자

Search Result 2,001, Processing Time 0.038 seconds

A Study on Children Edutainment Contents Development with Hand Gesture Recognition and Electronic Dice (전자주사위 및 손동작 인식을 활용한 아동용 에듀테인먼트 게임 콘텐츠 개발에 관한 연구)

  • Ok, Soo-Yol
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1348-1364
    • /
    • 2011
  • As the existing edutainment contents for children are mostly comprised of educational tools which unilaterally induce educatees to passively respond to them, the content-creating methodologies in terms of which active and voluntary learning is made possible is urgently needed. In this paper, we present the implementation of the tangible 'electronic dice' interface as an interactive tool for behavior-based edutainment contents, and propose a methodology for developing edutainment contents for children by utilizing the recognition technique of hand movement based on depth-image information. Also proposed in the paper are an authoring and management tool of learning quizzes that allows educators to set up and manage their learning courseware, and a log analysis system of learning achievement for real-time monitoring of educational progress. The behavior-based tangible interface and edutainment contents that we propose provide the easy-to-operate interaction with a real object, which augments educatees' interest in learning, thus leading to their active and voluntary attitude toward learning. Furthermore, The authoring and management tool and log analysis system allow us to construct learning programs by children's achievement level and to monitor in real-time the learning development of children educatees by understanding the situation and behavior of their learning development from the analytic results obtained by observing the processes of educatees' solving problems for themselves, and utilizing them for evaluation materials for lesson plans.

Key Risks and Success Factors on the China's Public-Private Partnerships Water Project (중국 수처리 민관협력사업 사례분석을 통한 시사점 도출: 위험 및 성공 요인 도출)

  • Choi, Jae-Ho;Lee, Seung-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.3
    • /
    • pp.134-144
    • /
    • 2010
  • In China, the enhancement of water services has become the most crucial issue confronted with the rapid urbanization and industrialization process. A huge financial gap to meet the demand for water infrastructure and need for adopting advanced operation technology precipitated the rapid growth of PPP over the last 10 years. Diverse schemes of PPP such as TOT, Divestiture, and Management Contract and Lease have been practiced. Local governments and private investors/operator have adjusted their objectives and strategies to avoid potential pitfalls behind BOT projects in China. However, current academic research outcomes do not properly reflect important issues of BOT projects or related case studies in China. This limitation has brought in the lack of assessment of important risks and success factors required for the improvement of the body of risk management. In this regard, this study uses the market analysis method to identify major schemes of PPP water projects and conducts case studies on five PPP projects to identify key risk and success factors in association with each different scheme. It is expected that the risk and success factors identified from the cases will be used as reference to Korean companies which plan to enter the Chinese water market.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

A Virtual Object Hosting Technology for IoT Device Controlling on Wireless AP's (무선 인터넷 공유기에서 사물 인터넷 장치 제어를 위한 가상 오브젝트 호스팅 기술 연구)

  • Yang, Jinhong;Park, Hyojin;Kim, Yongrok;Choi, Jun Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.164-172
    • /
    • 2014
  • Recently, as the number of IoT (Internet of Things) devices for personal or home intelligence increases, the need for unified control and cooperative utilization is required. This paper presents a novel idea, proposes methods for virtualizing Internet of Things (IoT) devices and hosting them on the home AP instead of relying on a cloud service or purchasing a new device to do so. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScript-based objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method and their interfaces are designed. The implementation and performance section demonstrates the proposed system's stability and operability by showing the stress test results while the wireless AP is running for its wireless routing.

Librarians' Experiences of Facilitating Makerspace in Public Libraries (공공도서관 메이커스페이스 담당자의 운영 경험 연구)

  • Kim, Soojung;Lee, Jongwook;Oh, Sanghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.4
    • /
    • pp.249-272
    • /
    • 2019
  • This study aims to investigate the experiences of librarians/staff members who are responsible for facilitating makerspaces in public libraries, including their works and core competencies, their needs and experiences of training, and future plans in makerspaces. To do that, we carried out semi-structured interviews with 11 librarians/staff members and 1 library director from 7 public library makerspaces. Findings show that the participants received financial supports from the government agencies or/and relied on their library budget to run makerspaces. They identified competencies such as technology literacy, domain knowledge, teaching/programming, willingness to learn and curiosity, communication skills, leadership, and design-thinking. They have future plans for expanding spaces, purchasing equipments, program development, and so on. We believe findings could be useful for those who currently manage or plan to implement a public library makerspace by understanding practical issues and training needs in makerspaces.

Process Improvements for Reducing Apartment Defects after Completion (준공후 아파트 하자 저감을 위한 절차개선 방안 연구)

  • Cho, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.4
    • /
    • pp.355-361
    • /
    • 2018
  • Many defects are occurring in apartments, the main residential area in Korea. This is due to a lack of construction skills and a lack of management. As many apartments are provided to buyers, the dispute over defects after completion is increasing rapidly. The Housing Act was amended so that local governments could order contractors to repair defects. However, even if defects are resolved after a defect is generated, it is not a fundamental solution that can be satisfied because buyers have to endure the pain caused by the defect. So, it is necessary to protect the interests of buyers by fundamentally reducing defects in apartments. Therefore, in this study, it was suggested that the asymmetry of the information about the apartment buyers should be resolved at the time of sale of the apartment, the final drawings should be a contract document, the review period of the apartment house supervision should be secured, the appropriate supervisory fee should be secured at the time of contract change and the payment procedure should be improved.

SDCS: Secure D-CAS System for Secure Contents Download in Ubiquitous Environment (SDCS: 유비쿼터스 환경의 안전한 콘텐츠 다운로드를 위한 안전한 D-CAS 시스템)

  • Yeo, Sang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.249-257
    • /
    • 2010
  • The emerging ubiquitous environment is improving IT technologies and the popularization of broadband Internet is encouraging creation and sharing of various contents. The contents include the concept of production and circulation of digital information/contents, in forms of characters, codes, voices, sounds, client and videos for being used on the Internet and networks. The contents are widely shared in networks and users can have a wide range of knowledge and gain the freedom of presentation from them. So now users participations are augmented gradually. However, many contents without acquiring agree of copyright are sharing on the Internet, so many problems happen in the manufacturing process of digital contents. To solve this problem, many research projects to limit contents utilization onto legitimate users and to provide secure contents protection and download, are in progress. Therefore, in this paper, we propose a secure D-CAS system (SDCS) which provides security for contents downloading.

An Energy-Efficient Routing Protocol based on Static Grid in Wireless Sensor Networks (무선 센서 네트워크에서 정적 그리드 기반의 에너지 효율적 라우팅 프로토콜)

  • Choi, Jae-Min;Mun, Hyung-Jin;Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.791-800
    • /
    • 2010
  • Recently wireless sensor networks as a field of ubiquitous computing technology was in the limelight. To use and collect the necessary information, Sink node mobility is essential. TTDD(Two-Tier Data Dissemination) proposed most common technique associated with Mobile sink node in wireless sensor networks, but issues exist that the use of many control packet falls into the energy efficiency. The technique for solving problems is Cluster-Based Energy-efficient Routing protocol (CBPER). But CBPER does not transmit the data correctly to sink node or source node. In this paper, we propose An Energy-Efficient Routing Protocol based on Static Grid using mobile sink nodes in order to solve the data transmission failure and reduce the energy consumption in Wireless Sensor Networks. We have evaluated it with the NS-2 simulator. Our results show that the proposed protocol saves the energy consumption up to 34% in comparison with CBPER. We also prove that the proposed protocol can transmit more accurate data to the sink de than CBPER.

A Study on QoS Measurement & Evaluation for MPEG Transmission in Network (통신망에서 MPEG 영상 전송을 위한 QoS 측정 및 평가에 관한 연구)

  • Suh Jae-Chul
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.101-111
    • /
    • 2002
  • Lately development of network around Internet expands range of data traffic to multimedia information, and so for the guarantee of multimedia services end-to-end QoS(Quality of Service) must service because comparing with existing Internet service can not support For satisfying those QoS requirements, network have to guarantee not only network on parameter, such as delay, jitter, throughput but also system resources like CPU utilization, memory usage. Therefore it is urgent to develop QoS based middleware to distribute multimedia data and maximize network utilization in the limited resource environment. And it must be necessary of network to provide end-to-end QoS(Quality of Service) for multimedia applications. Multimedia applications want that QoS which satisfy their own service properties be guaranteed Then, We must analyze those necessary QoS requirements md define QoS parameter which specify as two viewpoint, user's and network's perspective. Therefore network provider supplying network for usual user and university, enterprise must want to find about their own network performance and problem. It is essential for network manager to want to use a tool like this. On the basis of technique about QoS test-bed in the AIM network, We studied on the method of QoS measurement and management about end-to-end connection in the Internet. We measured network status about end-to-end connection and analyze the result of performance.

  • PDF

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF