• Title/Summary/Keyword: IS요구도

Search Result 25,669, Processing Time 0.057 seconds

A management system for plural viewing coordinates of multiplanar reformation (의료영상 시스템의 다중 단면 재구성을 위한 좌표계 제어 시스템)

  • Kim, Jun-Ho;Kye, Hee-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.163-170
    • /
    • 2010
  • Multi-planar reformatting(MPR) is a volume rendering technique which generates images of sectional planes users define, so that it is essential for medical imaging system. Due to the recent advances of medical imaging system, users require to place plural planes on a single dataset and to enable an individual and easy control for each plane. In this paper, we enumerate various user operations for recent MPR and analyze user requirements to update the plane equation. For the effective control of coordinate system, each plane is considered in a separated coordinate system and all informations which form a coordinate system are grouped into two components: the individual components and the common components. The proposed system is implemented on a graphics hardware, so that it smoothly performs MPR including recent requirements.

Dynamic Composition of Web Services using Semantic e-Workflow Processes (시멘틱 e-워크플로우 프로세스를 이용한 동적 웹 서비스 조합)

  • Lee Yong Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.101-112
    • /
    • 2005
  • Recently, one of the most challenging Problems is to compose web services dynamically, that is, on demand. In particular, when a functionality that cannot be directly realized by existing services is required, existing services may be combined together to fulfill the request. This paper is to implement the dynamic composition of web services using existing workflow technologies. Workflow systems play a major role in E-businesses. However, due to the composition of web services using workflows differs from the design of traditional workflow systems, two problems need to be solved. (1) how to efficiently discover web services and (2) how to facilitate the interoperability of heterogeneous web services. In this paper, we present a matching algorithm for web service discovery and propose an approach based on the use of ontologies to facilitate the integration of web services. Finally, we have built a prototype system to illustrate how to the dynamic composition of web services are achieved.

  • PDF

Requirements Analysis in ID-based Future Internet (식별자 기반 미래 인터넷에서의 요구사항 분석)

  • Kwak, Byeong-Ok;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.43-48
    • /
    • 2016
  • Current address-based Internet has started to expose the number of limitations, with the growth of the Internet. Most of the problems have been solved by adding new features to the Internet or some modification of existing features but some problems can not be solved because it is believed that the structural limitations of the Internet. Overcoming to fundamentally the limitations of the Internet, ID-based Future Internet research is under active research going on in the competitive atmosphere of the United States and Europe. However, most studies have been promoted in a specific field is concentrated in a limited area. For the future Internet, there is a need to derive the requirements to overcome the limitation and accommodate the features and advantages of the existing studies. This paper compares and analyzes the characteristics and advantages and disadvantages for the ID-based Future Internet Research, and describes the requirements to have the ID-based Future Internet.

Data Anonymity Decision (데이터 익명화 결정 기법)

  • Jung, Min-Kyoung;Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.173-180
    • /
    • 2010
  • The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before being opened in terms of the improvement of data utilization as well as the privacy protection. It is also important to check to which attack the table is vulnerable and which of anonymity methods should be applied in the table. This paper describe two possible privacy attacks based upon related references. Also, we suggest the technique to check whether data table is vulnerable to any attack of them and describe what kind of anonymity methods should be done in the table. The technique we suggest in this paper can also be applied for checking the safety of anonymity tables in which insert or delete operations occurred as well from privacy attacks.

QoS guaranteed IP multicast admission control mechanism (품질 보장형 IP 멀티캐스트 수락 제어 메커니즘)

  • Song, kang-ho;Rhee, wooo-Seop
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.51-55
    • /
    • 2008
  • Request High-Images, High-quality, duplex transmission, BcN Voice telephone, Broadcast, Data internet service came to be all possible and demolished original communication service area. Also, The quality is guaranteed stablely to new business and ISP the requirement comes to become a multicasting quality guarantee mechanism which there is the reliability for a information communication and High-quality multimedia service. Like this, a multicast mechanism to be guaranteed must become air control End-to-End QoS for a service supply, a transmission delay a packet loss or requirement which the user requests guarantee and multicast Path-NET which there is the reliability must be provided. Therefor, we proposed IP base multicast new join the present the multicast mechanism of Probing packet foundation which there is the efficiently a linking acceptance, we used ns-2 simulator for the performance evaluation of the proposed.

  • PDF

A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling (위협모델링을 이용한 전기차 충전 인프라의 보안요구사항에 대한 연구)

  • Cha, Ye-Seul;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1441-1455
    • /
    • 2017
  • In order to build a secure electric vehicle charging infrastructure, security research is required because various data including charging and payment data are transmitted in the electric vehicle charging infrastructure. However, previous researches have focused on smart grid related security research such as power system infrastructure rather than charging infrastructure for electric vehicle charging. In addition, research on charging infrastructure is still lacking, and research using a systematic methodology such as threat modeling is not yet under way. Therefore, it is necessary to apply threat modeling to identify security threats and systematically analyze security requirements to build a secure electric vehicle charging infrastructure. In this paper, we analyze the electric vehicle charging infrastructure by accurately identifying possible threats and deriving objective security requirements using threat modeling including Data Flow Diagram, STRIDE, and Attack Tree.

Institutional Commitment to Accomplishing the Cause of the "Candle Revolution" ("촛불혁명"의 희망은 무엇이었으며 그것은 어떻게 실현할 수 있는가?)

  • Kang, Miong-Sei
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.2
    • /
    • pp.5-36
    • /
    • 2017
  • "The Candle Revolution" impeached the Park government and elected the Moon government. The candlelight protesters demonstrated public anger associated with accumulated corruption and deep-rooted irregularities. Complete political reform is required to perform deep fundamental reform. It aims to transform democracy in a way that is more inclusive. Inclusive democracy contributes to making welfare state stronger. Inclusive democracy is made possible by proportional representation that allows progressive parties more seats and leverages. Proportional representation systems are characterized by higher degrees of redistribution and larger welfare state. Constitutional reform has to be focused on introducing parliamentary government. "Imperialistic" presidential system in Korea has no mechanism of checks and balances which are key characteristics of presidential systems. It has failed to attend the poverty and social inequality arising from globalization and neoliberal change since 2000s. Parliamentary government is supposed to deliver social policy when parties are more disciplined than in presidential system where political parties remain weak.

Information Needs and Behavior of North Korean Refugees (북한이탈주민의 정보요구와 정보행태에 관한 연구 - 부산지역 거주자를 중심으로 -)

  • Cho Yong-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.121-149
    • /
    • 2006
  • In recent days North Korean refugees. who hope to move into and settle in South Korea, have been rapidly increasing. However their adaptation to South Korea is reported to have not been so much successful as they expected. Considering such situations, this study attempts to investigate their information needs and behavior. North Korean refugees have various and strong information needs for settlement and daily life. The strongest were information needs related to economic Problem, specifically job and business related information needs. It was followed by information needs related to social welfare, health and security child care and education, and North Korean situation In order to meet their information needs. North Korean refugees were heavily dependent on informal interpersonal information sources such as their family members. friends. and their own neighborhoods. as compared to such formal interpersonal information sources as Public officers. social welfare agents, and NGOs members. Meanwhile. their usage of mass media such as TV. newspapers, and internet as information sources was also heavy However the overall information environment surrounding them appeared to be relatively inferior to that of average South Koreans.

Training Needs Assessment Based on the CEO Competency Model of Vocational Training Institutes (역량모델에 기초한 직업훈련기관장의 훈련요구분석)

  • Rim, Kyung-Hwa;Kim, Jeong-ll;Lee, Moon-Su;Kwon, Oh-Young
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.2
    • /
    • pp.158-165
    • /
    • 2011
  • The purpose of this study is to develop competency model in preparation for training programs for CEO of vocational training institutes in terms of needs assessment. This study collected data from 230 public and designated vocational training institutes including commercial learning facilities and life-long training centers using questionnaire by web mail. The frame of assessing training needs of competency applied to this study was based on the model with three components, namely importance, proficiency and learning desires of job skill and task needed to CEO of vocational training institutes. The methodologies of this study used were survey, FGI and case study. The major results proved that the higher priorities of training needs for vocational training institute CEO competency were as followings: (1) Competency for attaining talent of training teachers (2) Needs assessing competency for labor market change and trainee (3) Problem solving competency (4) Leadership skills and so on.

  • PDF

An Analysis on Differences between Freshmen and The Other Students' Career Development Competencies and Educational Needs (대학 신입생과 재학생의 진로개발역량 수준 및 교육요구도 차이 분석)

  • Kim, Hyun-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.509-520
    • /
    • 2017
  • The purpose of this study is to investigate the differences between freshmen and the other students' career development competencies and educational needs. To achieve this, the survey was carried out and 362 undergraduates participated. The findings of the survey were shown as follows: First, the students perceived that effective interpersonal relationships and positive self-concept formation were more needed. Second, only the positive self-concept formation showed statistically significant differences. Third, the rating of the educational needs was identical from the first place to the forth, but different from the fifth to the sixth. Fourth, by the Locus for Focus model, more information was identified about educational needs of students. These results will contribute to develop the career education programs.