• Title/Summary/Keyword: Digital divides

Search Result 65, Processing Time 0.026 seconds

Availability Analysis of Single Sensor Node using Hierarchical Model (계층적 모델을 이용한 단일 센서 노드의 가용성 분석)

  • Yoon, Young Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.87-93
    • /
    • 2009
  • In this paper, we propose and evaluate the availability of single sensor node using a hierarchial modeling approach. We divides a sensor node into a software and hardware and analyze failures of each component. We construct Markov chains to represent the components of a sensor node, and then we construct a hierarchical model which use fault tree in upper level and Markov chains in lower level. We evaluate the availability and down of single sensor node.

Gender, Social Economic Status and Internet Use: Based on Time Diary Data (성, 사회경제적 지위와 인터넷 이용: 2004년과 2009년 생활시간조사자료의 활용)

  • Jeong, Jae-Ki
    • Korea journal of population studies
    • /
    • v.34 no.3
    • /
    • pp.85-107
    • /
    • 2011
  • Based on two cross-sectional Time Diary data. this study examines the change in internet use pattern of Koreans. Building on the literatures on Digital Divides, it traces the changes in frequency, diversity and specific purpose of internet use and tries to identify factors affecting these changes. The results show that the frequency and diversity of internet use increases across five years. They also reveal that the usage gap in internet between genders increases While the usage gap across social economic status still exists. The implication of these results are discussed.

Recent Research on Self-interference Incoherent Digital Holography

  • Youngrok Kim;Ki-Hong Choi;Chihyun In;Keehoon Hong;Sung-Wook Min
    • Current Optics and Photonics
    • /
    • v.8 no.1
    • /
    • pp.1-15
    • /
    • 2024
  • This paper presents a brief introduction to self-interference incoherent digital holography (SIDH). Holography conducted under incoherent light conditions has various advantages over digital holography performed with a conventional coherent light source. We categorize the methods for SIDH, which divides the incident light into two waves and modulates them differently. We also explore various optical concepts and techniques for the implementation and advancement of SIDH. This review presents the system design, performance analysis, and improvement of SIDH, as well as recent applications of SIDH, including optical sectioning and deep-learning-based SIDH.

Analysis of Global Trends in the Cross-border Transfer of Personal Data and Its Implications for Korea (개인정보 국외이전 관련 규범 국제 동향 분석 및 한국에의 시사점)

  • Bomin-Ko
    • Korea Trade Review
    • /
    • v.46 no.6
    • /
    • pp.239-255
    • /
    • 2021
  • To review the theoretical background of regulatory approaches to cross-border transfer of personal data, this paper divides major digital trade participating countries into four types according to the OECD - non-regulatory, post-intervention, pre-supervision, and national control. It then analyzes the US, Japan, the EU, and China respectively that belong to each type. South Korea, which is currently about to pass the amendment by the National Assembly, has identified that it is in the middle of post-intervention and pre-supervision, and needs to evolve into pre-supervision norms like the EU while it has to participate more actively in the process of establishing international digital trade rules. Korea first needs to sign digital trade agreements and promote mutual certification projects more actively from the standpoint of a medium-sized open country with growing digital companies and digitally-open consumers. Second, the government should fully consider the interests of not only companies but also various trade stakeholders including domestic consumers, when drafting and implementing trade policies. To this end, 'a single window approach' is needed not only at the Ministry of Trade, Industry, and Energy, but also at the level of the entire government which require an integrated form of digital trade policy governance.

Internet, Educational Aspiration, and Family's Social-Economic Status (인터넷, 교육열망, 가족의 사회경제적 지위)

  • Jeong, Jae-Ki
    • Survey Research
    • /
    • v.12 no.3
    • /
    • pp.123-142
    • /
    • 2011
  • This study examines how the family background and educational aspiration of adolescents affect the usage pattern of internet among adolescents. Recently, the focus of studies on digital divides shifts from the gap in the access to the internet to the difference in usage pattern of internet. Building on these studies, this study deals with the concerns that the difference in usage pattern of internet among adolescents potentially lead to the reproduction of social inequality across the generations. The analysis of the Korean Youth Panel Study reveals that the higher educational attainment and higher income level of parents, the children tend to spend more time in searching with the internet and spend less time in doing the internet game. The level of educational aspiration exerts similar effects on internet use of adolescents. The results also show that the effects of educational apsiration is larger among older adolescents. The implications and limitations of this study are discussed.

  • PDF

The Effect of Research Autonomy's Factors on the Organizational Effectiveness : Focusing on Researcher of the Government-supported Research Institutes (연구자율성 구성요인에 따른 조직효과성 연구 : 공공연구기관 연구자를 중심으로)

  • Kim, Jong-Gyu
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.161-172
    • /
    • 2017
  • The purpose of this research is to take a look at what are research autonomy's factors of the government-supported research institutes with a new angle and how these factors influence on organizational effectiveness at the same time. ultimately, this research will suggest what government should guarantee and support researcher of the government-supported research institutes. In the groundwork, this research divides the level of research autonomy individual and organizational level, and divides the type of research autonomy intrinsic and extrinsic autonomy and also organizational commitment, and measure job satisfaction for organizational effectiveness. consequently, intrinsic autonomy which is associated with 'selection of research project', 'freely and lively traffic in ideas', 'choice of research methodology', 'utilization of research's result' is much more important than extrinsic autonomy for researchers to improve organizational effectiveness.

Development of a Traversability Map for Safe Navigation of Autonomous Mobile Robots (자율이동로봇의 안전주행을 위한 주행성 맵 작성)

  • Jin, Gang-Gyoo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.449-455
    • /
    • 2014
  • This paper presents a method for developing a TM (Traversability Map) from a DTM (Digital Terrain Model) collected by remote sensors of autonomous mobile robots. Such a map can be used to plan traversable paths and estimate navigation speed quantitatively in real time for robots capable of performing autonomous tasks over rough terrain environments. The proposed method consists of three parts: a DTM partition module which divides the DTM into equally spaced patches, a terrain information module which extracts the slope and roughness of the partitioned patches using the curve fitting and the fractal-based triangular prism method, and a traversability analysis module which assesses traversability incorporating with extracted terrain information and fuzzy inference to construct a TM. The potential of the proposed method is validated via simulation works over a set of fractal DTMs.

Gaussian noise estimation using adaptive filtering (적응적 필터링을 이용한 가우시안 잡음 예측)

  • Joh, Beom Seok;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.13-18
    • /
    • 2012
  • In this paper, we propose a noise estimation method for noise reduction. It is based on block and pixel-based noise estimation. We assume that an input image is contaminated by the additive white Gaussian noise. Thus, we use an adaptive Gaussian filter and estimate the amount of noise. It computes the standard deviation of each block and estimation is performed on pixel-based operation. The proposed algorithm divides an input image into blocks. This method calculates the standard deviation of each block and finds the minimum standard deviation block. The block in flat region shows well noise and filtering effects. Blocks which have similar standard deviation are selected as test blocks. These pixels are filtered by adaptive Gaussian filtering. Then, the amount of noise is calculated by the standard deviation of the differences between noisy and filtered blocks. Experimental results show that our proposed estimation method has better results than those by existing estimation methods.

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

A Study against Attack using Virtualization Weakness (가상화 기술의 취약점을 이용한 공격 대응에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.