• Title/Summary/Keyword: Digital Access

Search Result 1,439, Processing Time 0.024 seconds

Spatio-temporal Analysis of Forest Change using Spatial Information : A case study of Heongseong and Wonju (공간정보를 활용한 산림 변화 시공간분석: 횡성과 원주를 사례로)

  • Oh, Yi Kyun
    • Journal of Cadastre & Land InformatiX
    • /
    • v.48 no.2
    • /
    • pp.21-30
    • /
    • 2018
  • The spatial information recently observed by various sensors and platforms has been provided by national portals through the establishment of a database over a number of time periods, with easy access to various types of information. Therefore, it is possible to analyze the changes in the national territory space according to time. This study is intend to analyze forest changes based on a case of some areas in Heongseong and Wonju using the various spatial information observed in many ways, such as aerial photographs, ortho photos, digital topographical maps, DEM and DSM. DSM created by the airborne lidar and the aerial photos was able to analyze forest change areas more effectively than DEM of topographical maps. Also, forest management and analysis could provide basic data for efficient preservation and management of forests using spatial information.

Production of Farm-level Agro-information for Adaptation to Climate Change (기후변화 대응을 위한 농장수준 농업정보 생산)

  • Moon, Kyung Hwan;Seo, Hyeong Ho;Shin, Min Ji;Song, Eung Young;Oh, Soonja
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.158-166
    • /
    • 2019
  • Implementing proper land management techniques, such as selecting the best crops and applying the best cultivation techniques at the farm level, is an effective way for farmers to adapt to climate change. Also it will be helpful if the farmer can get the information of agro-weather and the growth status of cultivating crops in real time and the simulated results of applying optional technologies. To test this, a system (web site) was developed to produce agro-weather data and crop growth information of farms by combining agricultural climate maps and crop growth modeling techniques to highland area for summer-season Chinese cabbage production. The system has been shown to be a viable tool for producing farm-level information and providing it directly to farmers. Further improvements will be required in the speed of information access, the microclimate models for some meteorological factors, and the crop growth models to test different options.

A Secure License Sharing Scheme for Domain DRM System Against Replay Attack (재생 공격에 안전한 Domain DRM 시스템을 위한 License 공유 방식)

  • Choi, Dong-Hyun;Lee, Yun-Ho;Kang, Ho-Gab;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.97-101
    • /
    • 2007
  • The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Moreover, consumers' rights of use of the content obtained legally were frequently harmed by arbitrary limitations. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism for withdraw process. The second is that the modules still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme presents the content from being played by modules which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and prevent replay attack.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Evaluating Accuracy according to the Evaluator and Equipment Using Electronic Apex Locators

  • Yu, Beom-Young;Son, Keunbada;Lee, Kyu-Bok
    • Journal of Korean Dental Science
    • /
    • v.13 no.2
    • /
    • pp.52-58
    • /
    • 2020
  • Purpose: Using two types of electronic apex locators, this study aimed to investigate the differences in accuracy according to the evaluator and equipment. Materials and Methods: Artificial teeth of the lower first premolars and two mandibular acrylic models (A and B) were used in this study. In the artificial teeth, the pulp chamber was opened and the access cavity was prepared. Using calibrated digital Vernier calipers, the distance from the top of the cavity and the root apex was measured to assess the actual distance between two artificial teeth. The evaluation was conducted by 20 dentists, and each evaluator repeated measurements for each electronic apex locator five times. The difference between the actual distance from the top of the cavity to the root apex and the distance measured using electronic measuring equipment was compared. For statistical analysis, the Friedman test the Mann-Whitney U-test were conducted and the differences between groups were analyzed (α=0.05). Result: As for the accuracy of measurement according to the two types of electronic apex locators, the value of the measurement error was 0.4753 mm in Dentaport ZX and 0.3321 mm in E-Cube Plus. Moreover, electronic apex locators Dentaport ZX and E-Cube Plus showed statistically significant differences (P<0.05). As for the difference in the accuracy of the two types of electronic apex locators according to the evaluator, the resulting values differed depending on the evaluator and showed a statistically significant difference (P<0.001). Conclusion: Electronic apex locator E-Cube Plus showed higher accuracy than did Dentaport ZX. Nevertheless, both types of electronic apex locators showed 100% accuracy in finding the region within root apex ±0.5 mm zone. Furthermore, according to the evaluator, the two electronic apex locators showed different resulting values.

An Exploratory Study on the Establishment and Provision of Universal Literacy for Sustainable Development in the Era of Fake News (가짜뉴스의 시대, 지속가능한 발전을 위한 보편적 리터러시의 구축 및 제공에 대한 실험적 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.85-106
    • /
    • 2021
  • The purpose of this study is to examine the concept and definition of fake news focusing on misinformation/false information and is to examine the ways in which our society can respond to the distortion of social reality and damage to democracy caused by information distortion such as fake news. To do this, the concept of fake news was examined based on the level of facticity and intention to device, and our social environment in which fake news was created and spread was examined from the perspective of datafication. In this environment, the library community, which plays a pivotal role in human access to and use of information, argued that it should strive to establish and provide universal literacy education in order to realize the Sustainable Development Goals of the UN 2030 agenda. The core of universal literacy education is to understand the society by investigating and analyzing data communication types according to the degree of datafication and the political, economic, social, and cultural background of society. For this reason, it was concluded that universal literacy should be implemented flexibly according to the degree of datafiation and users of each society.

A Study on the Improvement of Web Archive OASIS (웹 아카이브 OASIS 개선방안에 관한 연구)

  • Nam, Jae-Woo;Lee, Su-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • OASIS(Online Archiving & Searching Internet Sources) is a web archiving project of the National Library of Korea started in 2004 to systematically collect, manage, and preserve online digital information resources. In this study, the following problems were derived by analyzing the access log of the OASIS website and conducting a user survey. First, people's awareness of the OASIS project was very low, and there were many first-time visitors to the website. Second, active promotion and service reorganization to improve the use of OASIS was insufficient. The study suggested that the improvement point of this was to strengthen its own direct promotion and indirect promotion in connection with other agencies. In addition, it was proposed to enhance the service through user-customized services and to reinforce content that induces interest and fun.

Empirical Analysis of Medical Accessibility for People with Disabilities using Health Insurance Big Data (건강보험빅데이터의 고혈압 입원율 분석을 통한 장애인의 의료접근성 실증 분석)

  • Jeon, HuiWon;Hong, MinJung;Jeong, JaeYeon;Kim, YeSoon;Lee, ChangWoo;Lee, HaeJong;Shin, EulChul
    • Korea Journal of Hospital Management
    • /
    • v.27 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • Background: This study aims to empirically compare and evaluate the current status of medical accessibility and health inequality between people with disabilities and without. We calculated the ACSC hospitalization rate, which is a medical accessibility index, for hypertension, a major risk factor for cardiovascular disease that accounts for more than 20% of deaths among people with disabilities using the 2016 National Health Insurance Big Data. Methods: The subjects of the study were a total of 601,520, including 64,018 people with disabilities and 537,501 people without. Logistic regression was performed to analyze the differences in hypertension hospitalization rates adjusted for demographic and sociological characteristics and disease characteristics using SAS 9.4 program. Results: Before adjusting for the characteristics, the hypertension hospitalization rate of people with disabilities was 1.55%, and the people without disabilities were 0.49%. After adjusting, it was found that people with disabilities were 2.11 times higher than people without disabilities, and it was statistically significant. Conclusion: The preventable hospitalization rate of people with disabilities is higher than that of people without, suggesting that the disabled have problems with access to medical care and health inequality. Therefore, the government's policy improvement is required to close the medical gap for the disabled.

A Study on the Implementation of a Web-browser-based Global e-Navigation Service Discovery System for Decentralized Maritime Service Registries (탈중앙화 MSR 환경에서의 웹 브라우저 기반 글로벌 이내비게이션 서비스 검색 시스템 구현에 대한 연구)

  • Jinki, Jung;Young-Joong, Ahn
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.501-508
    • /
    • 2022
  • The flow of global digitalization is leading to the emergence of a decentralized system environment based on blockchain or distributed ledger technology in the fields of economy, identity authentication, and logistics. Accordingly, a requirement that public services be searchable from several decentralized maritime service registries (MSRs) has been derived in terms of the discoverability of e-navigation services. This study describes a decentralized MSR environment composed of the MSR ledger and multiple local MSRs, and it has implemented a service search system that can search global e-navigation services in the environment through a web browser. This system is a decentralized application that dynamically generates service attributes, geometry information, and free text queries, and that provides users with relevant MSR and service access information from search results that are registered in the MSR ledger. In this study, we tested the established decentralized MSR environment and the system that performs service search within that environment, and we discussed its advantages and limitations.

Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy (제로 트러스트를 위한 소프트웨어 정의 경계(SDP) 인증 메커니즘 제안 및 ECC 암호 구현)

  • Lee, Yun-kyung;Kim, Jeong-nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1069-1080
    • /
    • 2022
  • Zero trust, which means never trust anything before verifying it, is emerging as a hot issue in security field. After authenticating users, zero trust establishes network boundaries so that only networks in the trusted range can be accessed. This concept is also consistent with the concept of SDP, which performs pre-verification and creates a network boundary with a dynamic firewall so that clients can access only as many as they have permission to connect. Therefore, we recommend the SDP model as an example of how zero trust can be achieved in a zero trust architecture. In this paper, we point out the areas where SDP needs to be modified for zero trust and suggest ways to overcome them. In addition, we propose an onboarding method, which is one of the processes for becoming an SDP entity, and present performance measurement results.