• Title/Summary/Keyword: International protocol

Search Result 639, Processing Time 0.029 seconds

A Study on the User Welfare in the IPTV (IPTV 이용자 복지 증진을 위한 정책방안 연구)

  • Yu, Sae-Kyung;Kim, Mi-Sun;Kim, Suk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1342-1350
    • /
    • 2009
  • In accordance with the development of broadcasting, the style of using medium by users has been personalized in the propensity to consume. Recent advent of media convergence allowed users of medium to decide the received environment for their needs, thereby the position of users has become more important in the medium consumption. IPTV has the most advanced form of personalized information media. However, IPTV was made by media convergence, which has relation with a variety of interested parties, so there are a few troubles among them in the way of commercializing IPTV. As a matter of fact, although users play a leading role in the IPTV industry, there are still few discussions on the welfare of users. IPTV should be remained the characteristic of the medium of personalized information, and it should include the welfare of users in various fields of media convergence. That is Universal Service. It is necessary to be guaranteed the access right and the variety of contents in using IPTV. Moreover, in terms of telecommunication, IPTV should insure the reasonable fare system as a pay-services. On the basis of the analysis in local and international IPTV circumstances, in terms of content as a medium of personalized information, in terms of fares as a pay-services, and in terms of digital literacy as a new medium of digital access, policies for welfare of users are suggested.

  • PDF

Container BIC-code region extraction and recognition method using multiple thresholding (다중 이진화를 이용한 컨테이너 BIC 부호 영역 추출 및 인식 방법)

  • Song, Jae-wook;Jung, Na-ra;Kang, Hyun-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1462-1470
    • /
    • 2015
  • The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

A Study of Warm-Mix Asphalt's Bonding Properties on the Change of Asphalt Film Thicknesses (아스팔트 피막두께 변화에 따른 중온 아스팔트의 접착성질에 관한 연구)

  • Yoo, In-Sang;Cho, Dong-Woo;Hwang, Sung-Do;Rhee, Suk-Keun
    • International Journal of Highway Engineering
    • /
    • v.13 no.4
    • /
    • pp.29-40
    • /
    • 2011
  • Warm-Mix Asphalt(WMA) technologies have been developed since 15 years ago, which are internationally and domestically concerned with energy-saving and environmental-friendly technologies in public and private sectors of highway engineering. The performance of asphalt mass is traditionally evaluated by the penetration, viscosity, or Superpave tests. This research, however, is focused more on the properties depending on asphalt film thicknesses instead of evaluating asphalt mass behaviors by those tests. For this approach, a new testing protocol and analysis method are described by the bonding properties on each film thickness. This testing method and analysis tool are borrowed from those of DSR Moisture Damage test and applied by using ARES. The analysis results indicate that there is a limit film thickness between $200{\mu}m$ and $400{\mu}m$, which causes significant changes of the properties. In addition, the results show that the property changes of Hot-Mix Asphalt(HMA) and WMA on the limit film thickness are also different. Therefore, it is suggested that the properties on thin film thicknesses between $200{\mu}m$ and $400{\mu}m$ should be considered in order to evaluate WMA properly.

Study of Biomass Estimation in Forest by Aerial Photograph and LiDAR Data (항공사진과 Lidar 데이터를 이용한 산림지역의 바이오매스 추정에 관한 연구)

  • Chang, An-Jin;Kim, Hyung-Tae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.166-173
    • /
    • 2008
  • Recently, problem of earth environment being attended with international issue, people are concerned about the environmentally-friendly and renewable biomass energy. Especially, the forest biomass is more important because Korea have to control carbon footprint for Kyoto Protocol and Convention on Climate Change. In case of Korea, forest area covers the land about 2/3 of all country. It is needed that more economical and efficient method to estimate the biomass by remote sensing data which include wide coverage and is progressed by one-step. In this study, we estimate forest biomass with LiDAR data and aerial photograph. Three biomass equation is used and estimate mean biomass of single tree and entire biomass in plots. The results are compared with field data. $R^2$ of the mean biomass of single tree is greater than 0.8 and that of entire biomass in plots is greater than 0.65. In conclusion, the method using remote sensing data is verified more economical and efficient than previous field data method.

  • PDF

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

A Study on the Introduction of Green IT Based on the Cases of Implementing Green Internet Data Center (그린 데이터센터 구축 사례에 기반한 그린 IT 도입 방안에 관한 연구)

  • Song, Gil-Heon;Shin, Taek-Soo
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.147-167
    • /
    • 2009
  • As global climate changes, the interest in environmental crisis is increasing and a number of international agreements and regulations against this crisis are being established. Global information technology(IT) corporations are building their own pro-environmental green IT strategies to cope with the regulatory measures. Green IT broadly refers to pro-environmental technologies designed to replace hazardous materials, maximize energy effectivity, and find alternative energies. In the current stage of the IT industry development, Green IT specifically refers to the technologies that deal with the server heat generation and the energy reduction in data center. This study defines the concept of Green IT and reviews its origin and necessity. Then, it examines the issues regarding Green IT industry in Korea as well as other countries and compares the Green IT strategies developed in each country. Reviewing the recent development of IT and data center market enables us to see that overall Green IT strategies focus on the establishment of Green Internet Data Centers. Therefore, this study analyzes the cases in which some domestic and foreign corporations introduced Green Data Centers in order to examine the protocol and legal requirements for building Green IT, the aspects of environmental evaluation and design, and specific strategies for launching Green IT strategies and its future assignments. The conclusions of this study are as follows. First, to introduce Green Data Center as a strategy to build Green IT, the government and corporations should cooperate with each other. Partial introduction at the initial stage is desirable because, through the process, mutual trust between the two parties can be built more smoothly. Second, CEO's determination to build Green IT and continue its operation is indispensable. CEO's are required to have clear understanding as to why Green IT needs to be built and how it should be constructed. Those who initiate the construction of Green Data Center for Green IT need to know the definition and necessity of Green IT while at the same time understanding the implicit meanings of Green IT. They also need to be aware of future-oriented values of Green Data Center and readjust their corporate business activities in the pro-environmental direction. Finally, not only the CEOs' pro-environmental activities but also the change of mind on the part of all corporate employees is required to realize Green IT. It should be remembered that pro-environmental Green IT starts with minor activities.

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

Review on asbestos analysis (석면 분석방법에 대한 고찰)

  • Ham, Seung hon;Hwang, Sung Ho;Yoon, Chungsik;Park, Donguk
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.19 no.3
    • /
    • pp.213-232
    • /
    • 2009
  • This document was prepared to review and summarize the analytical methods for airborne and bulk asbestos. Basic principles, shortcomings and advantages for asbestos analytical instruments using phase contrast microscopy(PCM), polarized light microscopy(PLM), X-ray diffractometer (XRD), transmission electron microscopy(TEM), scanning electron microscopy(SEM) were reviewed. Both PCM and PLM are principal instrument for airborne and bulk asbestos analysis, respectively. If needed, analytical electron microscopy is employed to confirm asbestos identification. PCM is used originally for workplace airborne asbestos fiber and its application has been expanded to measure airborne fiber. Shortcoming of PCM is that it cannot differentiate true asbestos from non asbestos fiber form and its low resolution limit ($0.2{\sim}0.25{\mu}m$). The measurement of airborne asbestos fiber can be performed by EPA's Asbestos Hazard Emergency Response Act (AHERA) method, World Health Organization (WHO) method, International Standard Organization (ISO) 10312 method, Japan's Environmental Asbestos Monitoring method, and Standard method of Indoor Air Quality of Korea. The measurement of airborne asbestos fiber in workplace can be performed by National Institute for Occupational Safety and Health (NIOSH) 7400 method, NIOSH 7402 method, Occupational Safety and Health Administration (OSHA) ID-160 method, UK's Health and Safety Executive(HSE) Methods for the determination of hazardous substances (MDHS) 39/4 method and Korea Occupational Safety and Health Agency (KOSHA) CODE-A-1-2004 method of Korea. To analyze the bulk asbestos, stereo microscope (SM) and PLM is required by EPA -600/R-93/116 method. Most bulk asbestos can be identified by SM and PLM but one limitation of PLM is that it can not see very thin fiber (i.e., < $0.25{\mu}m$). Bulk asbestos analytical methods, including EPA-600/M4-82-020, EPA-600/R-93/116, OSHA ID-191, Laboratory approval program of New York were reviewed. Also, analytical methods for asbestos in soil, dust, water were briefly discussed. Analytical electron microscope, a transmission electron microscope equipped with selected area electron diffraction (SAED) and energy dispersive X-ray analyser(EDXA), has been known to be better to identify asbestiform than scanning electron microscope(SEM). Though there is no standard SEM procedures, SEM is known to be more suitable to analyze long, thin fiber and more cost-effective. Field emission scanning electron microscope (FE-SEM) imaging protocol was developed to identify asbestos fiber. Although many asbestos analytical methods are available, there is no method that can be applied to all type of samples. In order to detect asbestos with confidence, all advantages and disadvantages of each instrument and method for given sample should be considered.

A Study on change from an RTU-based substation to IEC 6 1850-based SA substation (RTU 기반 변전소의 IEC 61850 기반 SA 변전소로의 전환에 대한 실증 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.436-444
    • /
    • 2018
  • Currently, the new substation automation uses the international standard IEC 61850 communication protocol. KEPCO is also constructing a new substation based on IEC 61850 from 2013 through the pilot application and research and development starting from 2007. However, there are few cases where existing substations(Transformer, T/L GIS, D/L GIS, etc.) have been used, and RTU based substations operating systems have been changed to SA substations based on IEC 61850. Therefore, the introduction of IEC 61850 in existing substation facilities has the advantage of enhancing the substantiality of the substation by reusing existing facilities, improving the interoperability with the latest substations introduced, and converting existing substations into systems suitable for unmanned operation. In this paper, we introduce a case of changing the existing RTU based substation operation system to digital substation using IEC 61850 field information processor, Ethernet switch and SA operation system. Also, IEC 61850 client authentication program and Wireshark, which is a packet analysis tool, verify IEC 61850 conformance and its feasibility.