• Title/Summary/Keyword: Internet Applications

Search Result 2,462, Processing Time 0.029 seconds

Management of Electronic Navigational Charts Using XML Database (XML 데이터베이스를 이용한 전자해도의 관리)

  • Lee, Seong-Dae;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.87-98
    • /
    • 2008
  • Electronic Navigational Charts (ENCs) are digital charts encoded in S-57 format, which contain navigational informations such as coastlines, depth areas, and nautical marks. Although they have been successfully used for the safe navigation of ships, they have limited usages and applications because of their specialized data format and access systems. To cope with such drawbacks, S-57 ENCs need to be transformed into more generalized format such as Geography Markup Language (GML). The transformed GML ENCs can be kept in a database for efficiency, and can be accessed through Internet for usability. This paper proposes a new method for transforming and managing ENCs with XML database. S-57 ENCs are lust transformed into GML format, and then stored in a XML database. On the database, users can query for their needs. To validate the feasibility of the proposed method, we developed a protype system, and then conducted several test runs. The system can provide users with easy access to the marine information contained in ENCs. It also provides compatibility and efficiency by virtue of GML and XML database, respectively.

A Study on the Windows Application Control Model Based on Leap Motion (립모션 기반의 윈도우즈 애플리케이션 제어 모델에 관한 연구)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.111-116
    • /
    • 2019
  • With recent rapid development of computer capabilities, various technologies that can facilitate the interaction between humans and computers are being studied. The paradigm tends to change to NUI using the body such as 3D motion, haptics, and multi-touch with GUI using traditional input devices. Various studies have been conducted on transferring human movements to computers using sensors. In addition to the development of optical sensors that can acquire 3D objects, the range of applications in the industrial, medical, and user interface fields has been expanded. In this paper, I provide a model that can execute other programs through gestures instead of the mouse, which is the default input device, and control Windows based on the lip motion. To propose a model which converges with an Android application and can be controlled by various media and voice instruction functions using voice recognition and buttons through connection with a main client. It is expected that Internet media such as video and music can be controlled not only by a client computer but also by an application at a long distance and that convenient media viewing can be performed through the proposal model.

Correspondence Strategy for Big Data's New Customer Value and Creation of Business (빅 데이터의 새로운 고객 가치와 비즈니스 창출을 위한 대응 전략)

  • Koh, Joon-Cheol;Lee, Hae-Uk;Jeong, Jee-Youn;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.229-238
    • /
    • 2012
  • Within last 10 years, internet has become a daily activity, and humankind had to face the Data Deluge, a dramatic increase of digital data (Economist 2012). Due to exponential increase in amount of digital data, large scale data has become a big issue and hence the term 'big data' appeared. There is no official agreement in quantitative and detailed definition of the 'big data', but the meaning is expanding to its value and efficacy. Big data not only has the standardized personal information (internal) like customer information, but also has complex data of external, atypical, social, and real time data. Big data's technology has the concept that covers wide range technology, including 'data achievement, save/manage, analysis, and application'. To define the connected technology of 'big data', there are Big Table, Cassandra, Hadoop, MapReduce, Hbase, and NoSQL, and for the sub-techniques, Text Mining, Opinion Mining, Social Network Analysis, Cluster Analysis are gaining attention. The three features that 'bid data' needs to have is about creating large amounts of individual elements (high-resolution) to variety of high-frequency data. Big data has three defining features of volume, variety, and velocity, which is called the '3V'. There is increase in complexity as the 4th feature, and as all 4features are satisfied, it becomes more suitable to a 'big data'. In this study, we have looked at various reasons why companies need to impose 'big data', ways of application, and advanced cases of domestic and foreign applications. To correspond effectively to 'big data' revolution, paradigm shift in areas of data production, distribution, and consumption is needed, and insight of unfolding and preparing future business by considering the unpredictable market of technology, industry environment, and flow of social demand is desperately needed.

Issues on Infotainment Application in Vehicular NDN (VNDN 환경하에서 인포테인먼트 응용 이슈)

  • Lee, Heejin;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.993-999
    • /
    • 2021
  • Recently, many studies on VNDN technology have been conducted to graft Named Data Networking (NDN) into VANET as a core network technology. VNDN can use the content name to deliver various infotainment application content data through name-based forwarding. When VNDN is used as a communication technology for infotainment applications in connected vehicles, it is possible to realize data-centric networking technology in which data is the subject of communication. It can overcome the limitations of connected vehicle infotainment application service technology based on the host-centric current Internet, such as security attack/hacking, performance degradation in long-distance data transmission, frequent data cut-off. In this paper, we present the main functions provided by VNDN technology, and systematically analyze and organize the issues necessary to realize infotainment application services for connected vehicles in the VNDN environment. Based on this, it can be utilized as basic information necessary to establish infotainment application requirements in VNDN environment.

A Blocking Algorithm of a Target Object with Exposed Privacy Information (개인 정보가 노출된 목표 객체의 블로킹 알고리즘)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.43-49
    • /
    • 2019
  • The wired and wireless Internet is a useful window to easily acquire various types of media data. On the other hand, the public can easily get the media data including the object to which the personal information is exposed, which is a social problem. In this paper, we propose a method to robustly detect a target object that has exposed personal information using a learning algorithm and effectively block the detected target object area. In the proposed method, only the target object containing the personal information is detected using a neural network-based learning algorithm. Then, a grid-like mosaic is created and overlapped on the target object area detected in the previous step, thereby effectively blocking the object area containing the personal information. Experimental results show that the proposed algorithm robustly detects the object area in which personal information is exposed and effectively blocks the detected area through mosaic processing. The object blocking method presented in this paper is expected to be useful in many applications related to computer vision.

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Need Assessment for Smartphone-Based Cardiac Telerehabilitation

  • Kim, Ji-Su;Yun, Doeun;Kim, Hyun Joo;Ryu, Ho-Youl;Oh, Jaewon;Kang, Seok-Min
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.283-291
    • /
    • 2018
  • Objectives: To identify the current status of smartphone usage and to describe the needs for smartphone-based cardiac telerehabilitation of cardiac patients. Methods: In 2016, a questionnaire survey was conducted in a supervised ambulatory cardiac rehabilitation (CR) program in a university affiliated hospital with the participation of heart failure or heart transplantation patients who were smartphone users. The questionnaire included questions regarding smartphone usage, demands for smartphone-based disease education, and home health monitoring systems. Results were described and analyzed according to principal diagnosis. Results: Ninety-six patients (66% male; mean age, $5{\pm}11$ years), including 56 heart failure and 40 heart transplantation patients, completed the survey (completion rate, 95%). The median daily smartphone usage time was 120 minutes (interquartile range, 60-300), and the most frequently used smartphone function was text messaging (61.5%). Of the patients, 26% stated that they searched for health-related information using their smartphones more than 1 time per week. The major source of health-related information was Internet browsing (50.0%), and the least sought source was the hospital's website (3.1%). Patients with heart failure expressed significantly higher needs for disease education on treatment plan, home health monitoring of blood pressure, and body weight (${\chi}^2=5.79$, 6.27, 4.50, p < 0.05). Heart transplantation patients expressed a significant need for home health monitoring of body temperature (${\chi}^2=5.25$, p < 0.05). Conclusions: Heart failure and heart transplantation patients show high usage of and interest in mobile health technology. A smartphone-based cardiac telerehabilitation program should be developed based on high demand areas and modified to suit to each principal diagnosis.

Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items (평가항목 제안 및 분석을 통한 블록체인 분산합의 알고리즘 성능 개선)

  • Kim, Do Gyun;Choi, Jin Young;Kim, Kiyoung;Oh, Jintae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.179-188
    • /
    • 2018
  • Recently, blockchain technology has been recognized as one of the most important issues for the 4th Industrial Revolution which can be represented by Artificial Intelligence and Internet of Things. Cryptocurrency, named Bitcoin, was the first successful implementation of blockchain, and it triggered the emergence of various cryptocurrencies. In addition, blockchain technology has been applied to various applications such as finance, healthcare, manufacturing, logistics as well as public services. Distributed consensus algorithm is an essential component in blockchain, and it enables all nodes belonging to blockchain network to make an agreement, which means all nodes have the same information. For example, Bitcoin uses a consensus algorithm called Proof-of-Work (PoW) that gives possession of block generation based on the computational volume committed by nodes. However, energy consumption for block generation in PoW has drastically increased due to the growth of computational performance to prove the possession of block. Although many other distributed consensus algorithms including Proof-of-Stake are suggested, they have their own advantages and limitations, and new research works should be proposed to overcome these limitations. For doing this, above all things, we need to establish an evaluation method existing distributed consensus algorithms. Based on this motivation, in this work, we suggest and analyze assessment items by classifying them as efficiency and safety perspectives for investigating existing distributed consensus algorithms. Furthermore, we suggest new assessment criteria and their implementation methods, which can be used for a baseline for improving performance of existing distributed consensus algorithms and designing new consensus algorithm in future.

3GPP Standardization Activity for Small Cell Enhancement (3GPP 소형셀 향상 표준화 기술 동향)

  • Baek, SeungKwon;Chang, SungCheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.628-631
    • /
    • 2014
  • Recently, the proliferation of new applications, e.g., mobile TV, Internet gaming, large file transfer, and the various of user terminals, e.g., smart phones and notebooks, has dramatically increased user traffic and network load. In order to meet this traffic growth, vendors and cellular operators are working on the development of new technologies and cellular standards. Within them, small cell deployment has been heralded as one of most promising way to increase both coverage and capacity of future cellular network. Small cell technology enables to improve capacity of cellular radio network by tight cooperation between small cell and macro cell in multi-tier network where small cells are densely deployed within macro cell coverage. In this paper, we describe the deployment scenarios for cooperation between macro cell and small cells and state-of-the-art technologies related to dense small cell deployment. Then, we also provide design principles and standardization trends for small cell enhancement in 3GPP.

  • PDF