• Title/Summary/Keyword: Library Information Services

Search Result 1,640, Processing Time 0.032 seconds

MPEG-H 3D Audio Decoder Structure and Complexity Analysis (MPEG-H 3D 오디오 표준 복호화기 구조 및 연산량 분석)

  • Moon, Hyeongi;Park, Young-cheol;Lee, Yong Ju;Whang, Young-soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.432-443
    • /
    • 2017
  • The primary goal of the MPEG-H 3D Audio standard is to provide immersive audio environments for high-resolution broadcasting services such as UHDTV. This standard incorporates a wide range of technologies such as encoding/decoding technology for multi-channel/object/scene-based signal, rendering technology for providing 3D audio in various playback environments, and post-processing technology. The reference software decoder of this standard is a structure combining several modules and can operate in various modes. Each module is composed of independent executable files and executed sequentially, real time decoding is impossible. In this paper, we make DLL library of the core decoder, format converter, object renderer, and binaural renderer of the standard and integrate them to enable frame-based decoding. In addition, by measuring the computation complexity of each mode of the MPEG-H 3D-Audio decoder, this paper also provides a reference for selecting the appropriate decoding mode for various hardware platforms. As a result of the computational complexity measurement, the low complexity profiles included in Korean broadcasting standard has a computation complexity of 2.8 times to 12.4 times that of the QMF synthesis operation in case of rendering as a channel signals, and it has a computation complexity of 4.1 times to 15.3 times of the QMF synthesis operation in case of rendering as a binaural signals.

The Impact of Service Level Management(SLM) Process Maturity on Information Systems Success in Total Outsourcing: An Analytical Case Study (토털 아웃소싱 환경 하에서 IT서비스 수준관리(Service Level Management) 프로세스 성숙도가 정보시스템 성공에 미치는 영향에 관한 분석적 사례연구)

  • Cho, Geun Su;An, Joon Mo;Min, Hyoung Jin
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.21-39
    • /
    • 2013
  • As the utilization of information technology and the turbulence of technological change increase in organizations, the adoption of IT outsourcing also grows to manage IT resource more effectively and efficiently. In this new way of IT management technique, service level management(SLM) process becomes critical to derive success from the outsourcing in the view of end users in organization. Even though much of the research on service level management or agreement have been done during last decades, the performance of the service level management process have not been evaluated in terms of final objectives of the management efforts or success from the view of end-users. This study explores the relationship between SLM maturity and IT outsourcing success from the users' point of view by a analytical case study in four client organizations under an IT outsourcing vendor, which is a member company of a major Korean conglomerate. For setting up a model for the analysis, previous researches on service level management process maturity and information systems success are reviewed. In particular, information systems success from users' point of view are reviewed based the DeLone and McLean's study, which is argued and accepted as a comprehensively tested model of information systems success currently. The model proposed in this study argues that SLM process maturity influences information systems success, which is evaluated in terms of information quality, systems quality, service quality, and net effect proposed by DeLone and McLean. SLM process maturity can be measured in planning process, implementation process and operation and evaluation process. Instruments for measuring the factors in the proposed constructs of information systems success and SL management process maturity were collected from previous researches and evaluated for securing reliability and validity, utilizing appropriate statistical methods and pilot tests before exploring the case study. Four cases from four different companies under one vendor company were utilized for the analysis. All of the cases had been contracted in SLA(Service Level Agreement) and had implemented ITIL(IT Infrastructure Library), Six Sigma and BSC(Balanced Scored Card) methods since last several years, which means that all the client organizations pursued concerted efforts to acquire quality services from IT outsourcing from the organization and users' point of view. For comparing the differences among the four organizations in IT out-sourcing sucess, T-test and non-parametric analysis have been applied on the data set collected from the organization using survey instruments. The process maturities of planning and implementation phases of SLM are found not to influence on any dimensions of information systems success from users' point of view. It was found that the SLM maturity in the phase of operations and evaluation could influence systems quality only from users' view. This result seems to be quite against the arguments in IT outsourcing practices in the fields, which emphasize usually the importance of planning and implementation processes upfront in IT outsourcing projects. According to after-the-fact observation by an expert in an organization participating in the study, their needs and motivations for outsourcing contracts had been quite familiar already to the vendors as long-term partners under a same conglomerate, so that the maturity in the phases of planning and implementation seems not to be differentiating factors for the success of IT outsourcing. This study will be the foundation for the future research in the area of IT outsourcing management and success, in particular in the service level management. And also, it could guide managers in practice in IT outsourcing management to focus on service level management process in operation and evaluation stage especially for long-term outsourcing contracts under very unique context like Korean IT outsourcing projects. This study has some limitations in generalization because the sample size is small and the context itself is confined in an unique environment. For future exploration, survey based research could be designed and implemented.

  • PDF

A Study on the Archives and Records Management in Korea - Overview and Future Direction - (한국의 기록관리 현황 및 발전방향에 관한 연구)

  • Han, Sang-Wan;Kim, Sung-Soo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.1-38
    • /
    • 2002
  • This study examines the status quo of Korean archives and records management from the Governmental as well as professional activities for the development of the field in relation to the new legislation on records management. Among many concerns, this study primarily explores the following four perspectives: 1) the Government Archives and Records Services; 2) the Korean Association of Archives; 3) the Korean Society of Archives and Records Management; 4) the Journal of Korean Society of Archives and Records Management. One of the primary tasks of the is to build the special depository within which the Presidential Library should be located. As a result, the position of the GARS can be elevated and directed by an official at the level of vice-minister right under a president as a governmental representative of managing the public records. In this manner, GARS can sustain its independency and take custody of public records across government agencies. made efforts in regard to the preservation of paper records, the preservation of digital resources in new media formats, facilities and equipments, education of archivists and continuing, training of practitioners, and policy-making of records preservation. For further development, academia and corporate should cooperate continuously to face with the current problems. has held three international conferences to date. The topics of conferences include respectively: 1) records management and archival education of Korea, Japan, and China; 2) knowledge management and metadata for the fulfillment of archives and information science; and 3) electronic records management and preservation with the understanding of ongoing archival research in the States, Europe, and Asia. The Society continues to play a leading role in both of theory and practice for the development of archival science in Korea. It should also suggest an educational model of archival curricula that fits into the Korean context. The Journals of Records Management & Archives Society of Korea have been published on the six major topics to date. Findings suggest that "Special Archives" on regional or topical collections are desirable because it can house subject holdings on specialty or particular figures in that region. In addition, archival education at the undergraduate level is more desirable for Korean situations where practitioners are strongly needed and professionals with master degrees go to manager positions. Departments of Library and Information Science in universities, therefore, are needed to open archival science major or track at the undergraduate level in order to meet current market demands. The qualification of professional archivists should be moderate as well.

Development of Local Animal BLAST Search System Using Bioinformatics Tools (생물정보시스템을 이용한 Local Animal BLAST Search System 구축)

  • Kim, Byeong-Woo;Lee, Geun-Woo;Kim, Hyo-Seon;No, Seung-Hui;Lee, Yun-Ho;Kim, Si-Dong;Jeon, Jin-Tae;Lee, Ji-Ung;Jo, Yong-Min;Jeong, Il-Jeong;Lee, Jeong-Gyu
    • Bioinformatics and Biosystems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2006
  • The Basic Local Alignment Search Tool (BLAST) is one of the most established software in bioinformatics research and it compares a query sequence against the libraries of known sequences in order to investigate sequence similarity. Expressed Sequence Tags (ESTs) are single-pass sequence reads from mRNA (or cDNA) and represent the expression for a given cDNA library and the snapshot of genes expressed in a given tissue and/or at a given developmental stage. Therefore, ESTs can be very valuable information for functional genomics and bioinformatics researches. Although major bio database (DB) websites including NCBI are providing BLAST services and EST data, local DB and search system is demanding for better performance and security issue. Here we present animal EST DBs and local BLAST search system. The animal ESTs DB in NCBI Genbank were divided by animal species using the Perl script we developed. and we also built the new extended DB search systems fur the new data (Local Animal BLAST Search System: http://bioinfo.kohost.net), which was constructed on the high-capacity PC Cluster system fur the best performance. The new local DB contains 650,046 sequences for Bos taurus(cattle), 368,120 sequences for Sus scrofa (pig), 693,005 sequences for Gallus gallus (fowl), respectively.

  • PDF

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

Vision-based Low-cost Walking Spatial Recognition Algorithm for the Safety of Blind People (시각장애인 안전을 위한 영상 기반 저비용 보행 공간 인지 알고리즘)

  • Sunghyun Kang;Sehun Lee;Junho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.81-89
    • /
    • 2023
  • In modern society, blind people face difficulties in navigating common environments such as sidewalks, elevators, and crosswalks. Research has been conducted to alleviate these inconveniences for the visually impaired through the use of visual and audio aids. However, such research often encounters limitations when it comes to practical implementation due to the high cost of wearable devices, high-performance CCTV systems, and voice sensors. In this paper, we propose an artificial intelligence fusion algorithm that utilizes low-cost video sensors integrated into smartphones to help blind people safely navigate their surroundings during walking. The proposed algorithm combines motion capture and object detection algorithms to detect moving people and various obstacles encountered during walking. We employed the MediaPipe library for motion capture to model and detect surrounding pedestrians during motion. Additionally, we used object detection algorithms to model and detect various obstacles that can occur during walking on sidewalks. Through experimentation, we validated the performance of the artificial intelligence fusion algorithm, achieving accuracy of 0.92, precision of 0.91, recall of 0.99, and an F1 score of 0.95. This research can assist blind people in navigating through obstacles such as bollards, shared scooters, and vehicles encountered during walking, thereby enhancing their mobility and safety.

A study on the design of an efficient hardware and software mixed-mode image processing system for detecting patient movement (환자움직임 감지를 위한 효율적인 하드웨어 및 소프트웨어 혼성 모드 영상처리시스템설계에 관한 연구)

  • Seungmin Jung;Euisung Jung;Myeonghwan Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.29-37
    • /
    • 2024
  • In this paper, we propose an efficient image processing system to detect and track the movement of specific objects such as patients. The proposed system extracts the outline area of an object from a binarized difference image by applying a thinning algorithm that enables more precise detection compared to previous algorithms and is advantageous for mixed-mode design. The binarization and thinning steps, which require a lot of computation, are designed based on RTL (Register Transfer Level) and replaced with optimized hardware blocks through logic circuit synthesis. The designed binarization and thinning block was synthesized into a logic circuit using the standard 180n CMOS library and its operation was verified through simulation. To compare software-based performance, performance analysis of binary and thinning operations was also performed by applying sample images with 640 × 360 resolution in a 32-bit FPGA embedded system environment. As a result of verification, it was confirmed that the mixed-mode design can improve the processing speed by 93.8% in the binary and thinning stages compared to the previous software-only processing speed. The proposed mixed-mode system for object recognition is expected to be able to efficiently monitor patient movements even in an edge computing environment where artificial intelligence networks are not applied.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Corona Blue and Leisure Activities : Focusing on Korean Case (코로나 블루와 여가 활동 : 한국 사례를 중심으로)

  • Sa, Hye Ji;Lee, Won Sang;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.109-121
    • /
    • 2021
  • As the global COVID-19 pandemic is prolonged, the Corona Blue phenomenon, combined with COVID-19 and blue, is intensifying. The purpose of this study is to analyze the current trend of Corona Blue in consideration of the possibility of increasing mental illness and the need for countermeasures, especially after COVID-19. This study tried to find out the relationship between stress and leisure activities before and after COVID-19 by using Corona Blue news article analysis through the topic modeling method, and questionnaire find out the help of stress and leisure activities. This study was compared and analyzed using two research methods. First, a total of 363 news articles were analyzed through topic modeling based on newspaper articles from January 2020, when COVID- 19 was upgraded to the "border" stage, until September, where the social distancing stage was strengthened to stage 2.5 in Korea. As a result of the study, a total of 28 topics were extracted, and similar topics were grouped into 7 groups: mental-demic, generational spread, causes of depression acceleration, increased fatigue, attitude to coping with long-term wars, changes in consumption, and efforts to overcome depression. Second, the SPSS statistical program was used to analyze the level of stress change according to leisure activities before/after COVID-19 and the main help according to leisure activities. As a result of the study, it was confirmed that the average difference in stress reduction according to participation in leisure activities before COVID-19 was larger than after COVID-19. Also, leisure activities were found to be effective in stress relief even after COVID-19. In addition, if the main help from leisure activities before COVID-19 was the meaning of relaxation and recharging through physical and social activities. After COVID-19, psychological roles such as mood swings through nature, outdoor activities, or intellectual activities were found to play a large part. As such, in this study, it was confirmed that understanding the current status of Corona Blue and coping with leisure in extreme stress situations has a positive effect. It is expected that this research can serve as a basis for preparing realistic and desirable leisure policies and countermeasures to overcome Corona Blue.