• Title/Summary/Keyword: 정보기술 발달과정

Search Result 431, Processing Time 0.034 seconds

The Algorithm Design and Implement of Microarray Data Classification using the Byesian Method (베이지안 기법을 적용한 마이크로어레이 데이터 분류 알고리즘 설계와 구현)

  • Park, Su-Young;Jung, Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2283-2288
    • /
    • 2006
  • As development in technology of bioinformatics recently makes it possible to operate micro-level experiments, we can observe the expression pattern of total genome through on chip and analyze the interactions of thousands of genes at the same time. Thus, DNA microarray technology presents the new directions of understandings for complex organisms. Therefore, it is required how to analyze the enormous gene information obtained through this technology effectively. In this thesis, We used sample data of bioinformatics core group in harvard university. It designed and implemented system that evaluate accuracy after dividing in class of two using Bayesian algorithm, ASA, of feature extraction method through normalization process, reducing or removing of noise that occupy by various factor in microarray experiment. It was represented accuracy of 98.23% after Lowess normalization.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

해양기본지리정보구축에 관한 기본연구

  • Kim, Jeong-Hyeon;O, Sun-Bok;Seo, Sang-Hyeon;Choe, Yun-Su
    • 한국지형공간정보학회:학술대회논문집
    • /
    • 2002.03a
    • /
    • pp.79-89
    • /
    • 2002
  • 해양기본지리정보란 해양의 여러 정보 중 기초적인 주요지리정보로서 연안 및 해양의 지형 및 경계등의 위치 및 속성에 관한 정보를 말하며, 이러한 정보는 국가기본지리정보 체계와 다양한 해양정보시스템의 기본데이터 항목으로 사용된다. 해양기본지리정보구축을 위해서는 먼저 해양기본지리정보의 항목이 선정되어야 할 것이다. 또한 해양의 측량, 관측분야에서도 급격한 기술의 발달에 따라 선정된 항목의 기존 획득자료의 활용성 여부에 대한 분석이 필요하다. 이러한 자료검증과정을 통해 기본 지리정보 자료획득에 대한 계획을 수립할 수 있을 것이며, 수립된 계획을 바탕으로 정확도 높은 자료의 획득을 위해 노력해야 한다. 다양한 방법에 의해 획득 및 구축되어진 해양기본지리정보는 해양수산관련 정보화시스템과 인터넷 등을 통해 여러 분야에서 활용 및 제공되어질 것이다. 해양기본지리정보와 나아가 해양지리정보체계의 보다 나은 구축을 위해 기존의 해양관련지리정보 및 외국사례의 분석을 통해 현재 추진중인 해양기본지리정보 구축의 방향 및 구축자료의 활용방안에 대해 간략히 언급해 보았다. 해양을 보존 관리하기 위해서는 다양한 정보를 유기적으로 구축, 관리 및 공급할 수 있는 지리정보시스템(Geographic Information System, GIS)의 중요성은 앞으로도 계속 커질 것이다.

  • PDF

Co-Registration of Aerial Photos, ALS Data and Digital Maps Using Linear Features (선형기하보정 요소를 이용한 항공레이저측량 자료, 항공사진, 대축척 수치지도의 기하보정에 관한 연구)

  • Lee, Jae-Bin;Yu, Ki-Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.14 no.4 s.38
    • /
    • pp.37-44
    • /
    • 2006
  • To use surveying data obtained from different sensors and different techniques, it is a pre-requite step that register them in a common coordinate system. For this purpose, we developed methodologies to register airborne photos, ALS (Airborne Laser Scanning) data and digital maps. To achieve this, conjugate features from these data should be extracted in advance. In this study, linear features are chosen as conjugate features. Based on such a selection strategy, a simple and robust algorithm is proposed for extracting such features from ALS data. Then, to register them, observation equations are established from similarity measurements of the extracted features and the results was evaluated statistically. The results clearly demonstrate that the proposed algorithms are appropriate to register these data.

  • PDF

The study of the field customized SW training course design based on the analysis of the field suitability of the university SW education (대학 SW 교육의 현장 적합도 분석에 기반한 현장 맞춤형 SW 교육 과정 설계에 대한 연구)

  • Cha, Joon Seub
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.86-92
    • /
    • 2015
  • Recently, it is entering the hyper connectivity age due to the development of sensor and communication technology. In particular, it is emerging new industries such as the IoT, bigdata, cloud by convergence with the ICT and other industries. Because these industries are high the gravity of the software, the demand for software manpower is increasing rapidly. But university curriculum don't deviate from the traditional curriculum, and lack of positive response to these changes is occurring a mismatch with the industry demand. In this paper, investigate a software curriculums of the four-year university, and will attempt to investigate the perception about the university software course of the corporate perspective. Also, we draw a on-site fitness of universities training course by analysis of importance on software training courses between universities and businesses. Finally, we propose a strategy model for software training course design appropriate for the field.

Context Information and Active Proxy for Mobile GIS Web Service (모바일 GIS 웹 서비스를 위한 컨텍스트 정보와 액티브 프록시)

  • Lee, Hun;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.1-16
    • /
    • 2007
  • Recently the computing environment has been moved to open architectures that include Web technologies. Web Service is one of import component of the new paradigm. This paper presents a design and implementation of GIS Web Service for mobile devices. As many mobile devices are equipped with GPS (Global Positioning System), it is required to handle the position information more effectively. We have extended the proxy program in the client device to actively send the context information to the server. Based on the context information the server determines the optimal service mode to a particular client. A working example of location?based GIS Web Service is also presented. By using Web Service standards and XML messages we can achieve the maximal interoperability for heterogeneous mobile devices.

  • PDF

Location Information Processing with Bloom Filter on PMIPv6 (블룸 필터를 이용한 Proxy Mobile IPv6에서의 위치 정보 처리)

  • Kim, Soo-Duek;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1190-1193
    • /
    • 2009
  • 최근 무선네트워크의 급격한 발달로 이동 중에도 통신을 할 수 있는 요구사항에 IETF에서는 Mobile IPv6(MIPv6)라는 기술을 제안하였다. MIPv6는 IPv6환경에서 모바일 노드(모바일 노드)가 이동을 하면서도 통신을 할 수 있는 기술인데, 실제 상용망에서는 사용되지 않고 있다. 그 이유는 모바일 노드에 이동성을 제공하는 모바일 스택의 탑재가 높은 오버헤드를 가지고 있고, 시그널링 비용이 많이 들기때문이다. 이와 같은 문제를 해결하기 위해서 지난 해 Proxy Mobile IPv6(PMIPv6)가 표준화 되었다. PMIPv6는 모바일 노드에 이동성을 제공하는 모바일 스택을 올리지 않고 네트워크 엔티티가 대신 모바일 스택을 가지고 시그널링을 처리하기 때문에 결과적으로 시그널링 비용을 줄였다. 하지만 PMIPv6에서는 인접한 네트워크 사이에서 패킷을 전송할 때 MAG간의 통신이 가능하지 않고, 오직 LMA를 통하여 대응 노드(대응 노드)에게 패킷을 전송할 수 있다. 게다가 같은 서브넷에 있는 대응 노드에게 패킷을 전송할 때도 LMA를 거치게 되는 불필요한 과정이 발생한다. 게다가 LMA를 통하여 패킷을 전송하는 방식은 지연과 리오더링(Re-Ordering)을 발생시켜본 패킷 재전송을 유발하여 전송 품질을 떨어뜨리게 된다. 본 논문에서는 인접한 MAG간의 통신, 또는 같은 서브넷 내에서의 통신에서 LMA를 거치지 않고 통신을 할 수 있는 방안으로 블룸 필터를 이용한 통신 기법을 제안한다.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

Auditory in formation and Planning of Reactive Interface (리액티브-인터페이스설계와 청각정보)

  • 김상식
    • Archives of design research
    • /
    • v.20
    • /
    • pp.123-132
    • /
    • 1997
  • These days we live in society which the expanion and variety f information continuse with the evolution of technology. However, because much information exists in a black box, we have difficulty in using information embodied in products. For example, companies do not consider that much the position of users in using information and they thnd to tely too much on LCDs. But the limitation of monitors' screen and the tendency of miniaturization cause users some burden in obtaining visual information. Accordingly, the objective of this paper is to study an extent to which the auditory information is able to support userinterface, to compare it with the visual information, and eventually to find the way of suing auditory information as a means of expression.

  • PDF

Contingent valuation method implemented by R: Case study - measuring value of information (R을 활용한 조건부 가치 측정법: 정보 가치 측정 사례 연구)

  • Jung, Byung-Joon;Pak, Ro-Jin
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1041-1051
    • /
    • 2011
  • The development of information technology provides us with more useful information but it arose to protect such information from inappropriate users. In the course of analyzing and managing the risks associated with information, it should be needed to accurately measure the value of information. We try to consider the contingent valuation method for this purpose. The contingent valuation method which is used to assess the value of public goods or nonmarket goods makes an statistical estimation for the willingness-to-pay. We show with an example how we can estimate the value of information by calculating the amount we are willing to pay the value of information that exists on the information system. Calculation is carried out by using R.