• Title/Summary/Keyword: Digital Policy

Search Result 8,346, Processing Time 0.031 seconds

An Efficient Caching Strategy in Data Broadcasting (데이터 방송 환경에서의 효율적인 캐슁 정책)

  • Kim, Su-Yeon;Choe, Yang-Hui
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1476-1484
    • /
    • 1999
  • TV 방송 분야에서 다양한 정보와 상호 작용성을 제공하기 위해서 최근 기존 방송 내용인 A/V 스트림 외 부가정보 방송이 시도되고 있다. 데이타 방송에 대한 기존 연구는 대부분 고정된 내용의 데이타를 방송하는 환경을 가정하고 있어서 그 결과가 방송 내용의 변화가 많은 환경에 부적합하다. 본 논문에서는 데이타에 대한 접근이 반복되지 않을 가능성이 높고 사용자 접근 확률을 예상하기 어려운 상황에서 응답 시간을 개선하는 방안으로 수신 데이타를 무조건 캐쉬에 반입하고 교체가 필요한 경우 다음 방송 시각이 가장 가까운 페이지를 축출하는 사용자 단말 시스템에서의 캐슁 정책을 제안하였다. 제안된 캐쉬 관리 정책은 평균적인 캐쉬 접근 실패 비용을 줄임으로써 사용자 응답 시간을 개선하며, 서로 다른 스케줄링 기법을 사용하는 다양한 방송 제공자가 공존하는 환경에서 보편적으로 효과를 가져올 수 있다.Abstract Recently, many television broadcasters have tried to disseminate digital multimedia data in addition to the traditional content (audio-visual stream). The broadcast data need to be cached by a client system, to provide a reasonable response time for a user request. Previous studies assumed the dissemination of a fixed set of items, and the results are not suitable when broadcast items are frequently changed. In this paper, we propose a novel cache management scheme that chooses the replacement victim based on the remaining time to the next broadcast instance. The proposed scheme reduces response time, where it is hard to predict the probability distribution of user accesses. The caching policy we present here significantly reduces expected response time by minimizing expected cache miss penalty, and can be applied without difficulty to different scheduling algorithms.

A Study on the Semantic Network Structure of the Regime in the Image Contents (영상콘텐츠분야의 정권별 의미연결망 연구)

  • Hwang, Go-Eun;Moon, Shin-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.3
    • /
    • pp.217-240
    • /
    • 2017
  • The purpose of this study was to investigate the semantic network analysis to understand image contents and to examine the degree to which words, word clusters contributed to the formation of semantic map within image contents. For this research, from 1993 until 2016 the field of the image contents were collected for a total of 2,624 cases papers. The word appeared in Title analyzed the social network by using the R program of Big Data. The results were as follows: First, The field of image contents is based on researches related to 'image', 'media' and 'contents'. Second, there is a three-step flow ('education' -> 'media' -> 'contents') of research in the field of image contents. Third, researches related to 'broadcasting', 'digital', 'technology', and 'production' were continuously carried out. Finally, There were new research subjects for each regime.

An Empirical Study on the Factors and Resolution Methods of the Smart Divide of Older Adults (노년층의 스마트 정보격차 요인 및 해소방안에 관한 실증적 연구)

  • Paek, Kihun;Bong, Jinsook;Shin, Yongtae
    • Journal of KIISE
    • /
    • v.42 no.10
    • /
    • pp.1207-1221
    • /
    • 2015
  • This research was conducted both to analyze the determining factors of and to suggest resolution methods for the smart divide of adults over 65 years of age in the rapidly aging society of the 2000s and the smart society of the 2010s following the information society of the 1990s. The research model based on the Technology Acceptance Model (TAM) includes 6 determining factors derived from existing studies: Self Efficacy, Training, Accessibility, Playfulness, Cost Rationality, and Policy Support. Research data were collected through a survey given to a total of 243 older adults in 14 Senior Welfare Centers nationwide, and research hypotheses were verified by structural equation model (SEM) analysis. The results of this research that gives priority to the order of Political Support, Playfulness, Self Efficacy, Accessibility, Cost Rationality, and Training can be used to develop various resolution methods for the smart divide of adults over 65 years of age.

Near Real Time Flood Area Analysis Based on SAR Image and GIS (GIS와 SAR 영상을 연계한 근 실시간 홍수지역 분석)

  • Sohn, Hong-Gyoo;Song, Yeong-Sun;Kim, Gi-Hong;Yun, Kong-Hyun
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.4 no.4 s.15
    • /
    • pp.35-42
    • /
    • 2004
  • Accurate classification of water area is a preliminary step to analyze the flooded area and damages caused by flood. This is essential process for monitoring the region where annually repeating flood is a problem. The accurate estimation of flooded area can ultimately be utilized as a primary source of information for the policy decision. In this paper, flooded areas was classified using 1:25,000 land use map and a RADARSAT image of Ok-Chun and Bo-Eun located in Chung-Book province taken in 12th of August, 1998. Then we analyzed the flood area based on GIS. A RADARSAT image was used to classify the flooded areas with slope theme generated from digital elevation model. In processing on a RADARSAT image, the geometric correction was performed by a backwardgeocoding method based on ephemeris data and one control point for near real time flood area analysis.

Science and Technology Research Support Service Trends for Open Science Era (오픈 사이언스 시대를 위한 과학기술 연구지원 서비스 동향 분석)

  • Kim, Soon;Lee, Boram;Kim, Hwanmin;Kim, Hyesun
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.229-249
    • /
    • 2017
  • Open science projects are being actively carried out globally. Publishing the results of public research (publications and data) in digital format and enhancing access to these materials are getting more important. Various research support tools are being used to support open research, open access, open data, open peer review and open research performance evaluation. We analyzed research support services to prepare open science movement in Korea. Korea is not ready for research data management and research collaboration except open access and institutional repositories. It can be seen as an urgent matter to analyze these international open science research support services carefully and reflect them in research support policy and service guideline.

A Study on Big data Utilization Policy by the Complex System Theory: Focused on 2030 Seoul City Comprehensive Plan (복잡계이론에서의 빅데이터 활용방안에 관한 연구 (『2030 서울도시기본계획』을 중심으로))

  • Eum, Hee-Kyoung;Choi, Doo-Jin;Park, Sung-Chan;Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.4
    • /
    • pp.281-298
    • /
    • 2015
  • From the complexity system theory, City is dynamic system which has evolved through evolution and adaptation in initial conditions and different situation. So people's active should involve in decision-making processes in the urban planning. And this suggests that responding to the demands of its citizens are important factors influencing the process of urban planning. The implications of this study are following: using big data helps people understand current social phenomena. Specifically, it figured out latent needs of citizens that traditional survey methods could not before. we can make the most of new opportunities given by digital data and prevent potential dangers in advance. They are complementary and do not replace one another.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.

Implementation of Internet of Things Maker Kit Based on MQTT Protocol (MQTT 프로토콜 기반의 사물인터넷 메이커 키트 구현)

  • Kwon, Dong-hyeon;Lim, Ji-yong;Heo, Sung-uk;Kim, Gwan-Hyung;Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2145-2152
    • /
    • 2017
  • As the ubiquitous paradigm that allows users to access the Internet anytime and anywhere is expanding, the expectation and interest of the Internet is increasing. As interest in the Internet has increased, interest in open source hardware has also increased. As a result, the maker, who is a creator who actually uses the digital production tools to create a product that he thought, is emerging as a new trend. As these makers shared how to make products, the 'maker movement', an open source manufacturing movement, spread. In the case of the domestic market, the government's policy support is also stimulating the maker movement. However, compared to developed countries, there is not enough awareness and environment of maker culture, and only open platform hardware and software are used without special education / development equipment or kit for maker.

Storage Policies for Versions Management of XML Documents using a Change Set (변경 집합을 이용한 XML 문서의 버전 관리를 위한 저장 기법)

  • Yun Hong Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1349-1356
    • /
    • 2004
  • The interest of version management is increasing in electronic commerce requiring data mining and documents processing system related to digital governmentapplications. In this paper, we define a change set that is to manage historicalinformation and to maintain XML documents during a long period of time and propose several storage policies of XML documents using a change set. A change set includes a change oper-ation set and temporal dimensions and a change operation set is composed with schema change operations and data change operations. We pro-pose three storage policies using a change set. Three storage policies are (1) storing all the change sets, (2) storing the change sets and the versions periodically. (3) storing the aggregation of change sets and the versions at a point of proper time. Also, we compare the performance between the existing storage policy and the proposed storage policies. Though the performance evaluation, we show that the method to store the aggregation of change sets and the versions at a point of proper time outperforms others.

Application of Principal Component Analysis in Automobile Body Assembly : Case Study (자동차 차체 조립공장에서 주성분 분석의 응용 : 사례 연구)

  • Lee, Myung-D.;Lim, Ik-Sung;Kim, Eun-Jung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.125-130
    • /
    • 2008
  • Multivariate analysis is a rapidly expanding approach to data analysis. One specific technique in multivariate analysis is Principal Component Analysis (PCA). PCA is a statistical technique that linearly transform a given set of variables into a new set of composite variables. These new variables are orthogonal to each other and capture most of the information in the original variables. PCA is used to reduce the number of control points to be checked by measurement system. Therefore, the structure of the data set is simplified significantly It is also shown that eigenvectors obtained by conducting principal component analysis on the basis of the covariance matrix can be used to physically interpret the pattern of relative deformation for the points. This case study reveals the twisting deformation pattern of the underbody which is the largest mode of the total variation.