• Title/Summary/Keyword: Security efficiency

Search Result 1,621, Processing Time 0.027 seconds

Current Statues of Phenomics and its Application for Crop Improvement: Imaging Systems for High-throughput Screening (작물육종 효율 극대화를 위한 피노믹스(phenomics) 연구동향: 화상기술을 이용한 식물 표현형 분석을 중심으로)

  • Lee, Seong-Kon;Kwon, Tack-Ryoun;Suh, Eun-Jung;Bae, Shin-Chul
    • Korean Journal of Breeding Science
    • /
    • v.43 no.4
    • /
    • pp.233-240
    • /
    • 2011
  • Food security has been a main global issue due to climate changes and growing world population expected to 9 billion by 2050. While biodiversity is becoming more highlight, breeders are confronting shortage of various genetic materials needed for new variety to tackle food shortage challenge. Though biotechnology is still under debate on potential risk to human and environment, it is considered as one of alternative tools to address food supply issue for its potential to create a number of variations in genetic resource. The new technology, phenomics, is developing to improve efficiency of crop improvement. Phenomics is concerned with the measurement of phenomes which are the physical, morphological, physiological and/or biochemical traits of organisms as they change in response to genetic mutation and environmental influences. It can be served to provide better understanding of phenotypes at whole plant. For last decades, high-throughput screening (HTS) systems have been developed to measure phenomes, rapidly and quantitatively. Imaging technology such as thermal and chlorophyll fluorescence imaging systems is an area of HTS which has been used in agriculture. In this article, we review the current statues of high-throughput screening system in phenomics and its application for crop improvement.

A Study on the Development Direction of Medical Image Information System Using Big Data and AI (빅데이터와 AI를 활용한 의료영상 정보 시스템 발전 방향에 대한 연구)

  • Yoo, Se Jong;Han, Seong Soo;Jeon, Mi-Hyang;Han, Man Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.317-322
    • /
    • 2022
  • The rapid development of information technology is also bringing about many changes in the medical environment. In particular, it is leading the rapid change of medical image information systems using big data and artificial intelligence (AI). The prescription delivery system (OCS), which consists of an electronic medical record (EMR) and a medical image storage and transmission system (PACS), has rapidly changed the medical environment from analog to digital. When combined with multiple solutions, PACS represents a new direction for advancement in security, interoperability, efficiency and automation. Among them, the combination with artificial intelligence (AI) using big data that can improve the quality of images is actively progressing. In particular, AI PACS, a system that can assist in reading medical images using deep learning technology, was developed in cooperation with universities and industries and is being used in hospitals. As such, in line with the rapid changes in the medical image information system in the medical environment, structural changes in the medical market and changes in medical policies to cope with them are also necessary. On the other hand, medical image information is based on a digital medical image transmission device (DICOM) format method, and is divided into a tomographic volume image, a volume image, and a cross-sectional image, a two-dimensional image, according to a generation method. In addition, recently, many medical institutions are rushing to introduce the next-generation integrated medical information system by promoting smart hospital services. The next-generation integrated medical information system is built as a solution that integrates EMR, electronic consent, big data, AI, precision medicine, and interworking with external institutions. It aims to realize research. Korea's medical image information system is at a world-class level thanks to advanced IT technology and government policies. In particular, the PACS solution is the only field exporting medical information technology to the world. In this study, along with the analysis of the medical image information system using big data, the current trend was grasped based on the historical background of the introduction of the medical image information system in Korea, and the future development direction was predicted. In the future, based on DICOM big data accumulated over 20 years, we plan to conduct research that can increase the image read rate by using AI and deep learning algorithms.

Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method (다중 SL-AVS 동기화 유지기법)

  • Park, Hyun-Moon;Park, Soo-Huyn;Seo, Hae-Moon;Park, Woo-Chool
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.

Traffic Operation Strategy for the Mixed Traffic Flow on Autonomous Vehicle Pilot Zone: Focusing on Pangyo Zero City (자율주행차 혼재 시 시범운행지구 교통운영전략 수립: 판교제로시티를 중심으로)

  • Donghyun Lim;Woosuk Kim;Jongho Kim;Hyungjoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.172-191
    • /
    • 2023
  • This study was undertaken to strategize the mixed traffic operation of autonomous vehicles in the pilot zone. This was achieved by analyzing the changes expected when autonomous vehicles are mixed in the autonomous vehicle pilot zone. Although finding a safe and efficient traffic operation strategy is required for the pilot zone to serve as a test bed for autonomous vehicles, there is no available operation strategy based on the mixture of autonomous vehicles. In order to presents a traffic operation strategies for each period of autonomous vehicle introduction, traffic efficiency and safety analysis was performed according to the autonomous vehicle market percentage rate. Based on the analysis results, the introduction stage was divided into introductory stage, transition period, and stable period based on the autonomous vehicle market share of 30% and 70%. This study presents the following traffic operation strategies. Considering the traffic flow operation strategy, we suggest the advancement of the existing road infrastructure at the introductory stage, and operating an autonomous driving lane and the mileage system during the transition period. We also propose expanding the operation of autonomous driving lanes and easing the speed limit during the stable period. In the traffic safety strategy, we present a manual and legal system for responding to autonomous vehicle accidents in the introductory stage, an analysis of the causes of autonomous vehicle accidents and the implementation of preventive policies in the transition period, and the advancement of the autonomous system and the reinforcement of the security system during the stable period. Through the traffic operation strategy presented in this study, we foresee the possibility of preemptively responding to the changes of traffic flow and traffic safety expected due to the mixture of autonomous vehicles in the autonomous vehicle pilot zone in the future.

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

A Study on the Influence of IT Education Service Quality on Educational Satisfaction, Work Application Intention, and Recommendation Intention: Focusing on the Moderating Effects of Learner Position and Participation Motivation (IT교육 서비스품질이 교육만족도, 현업적용의도 및 추천의도에 미치는 영향에 관한 연구: 학습자 직위 및 참여동기의 조절효과를 중심으로)

  • Kang, Ryeo-Eun;Yang, Sung-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2017
  • The fourth industrial revolution represents a revolutionary change in the business environment and its ecosystem, which is a fusion of Information Technology (IT) and other industries. In line with these recent changes, the Ministry of Employment and Labor of South Korea announced 'the Fourth Industrial Revolution Leader Training Program,' which includes five key support areas such as (1) smart manufacturing, (2) Internet of Things (IoT), (3) big data including Artificial Intelligence (AI), (4) information security, and (5) bio innovation. Based on this program, we can get a glimpse of the South Korean government's efforts and willingness to emit leading human resource with advanced IT knowledge in various fusion technology-related and newly emerging industries. On the other hand, in order to nurture excellent IT manpower in preparation for the fourth industrial revolution, the role of educational institutions capable of providing high quality IT education services is most of importance. However, these days, most IT educational institutions have had difficulties in providing customized IT education services that meet the needs of consumers (i.e., learners), without breaking away from the traditional framework of providing supplier-oriented education services. From previous studies, it has been found that the provision of customized education services centered on learners leads to high satisfaction of learners, and that higher satisfaction increases not only task performance and the possibility of business application but also learners' recommendation intention. However, since research has not yet been conducted in a comprehensive way that consider both antecedent and consequent factors of the learner's satisfaction, more empirical research on this is highly desirable. With the advent of the fourth industrial revolution, a rising interest in various convergence technologies utilizing information technology (IT) has brought with the growing realization of the important role played by IT-related education services. However, research on the role of IT education service quality in the context of IT education is relatively scarce in spite of the fact that research on general education service quality and satisfaction has been actively conducted in various contexts. In this study, therefore, the five dimensions of IT education service quality (i.e., tangibles, reliability, responsiveness, assurance, and empathy) are derived from the context of IT education, based on the SERVPERF model and related previous studies. In addition, the effects of these detailed IT education service quality factors on learners' educational satisfaction and their work application/recommendation intentions are examined. Furthermore, the moderating roles of learner position (i.e., practitioner group vs. manager group) and participation motivation (i.e., voluntary participation vs. involuntary participation) in relationships between IT education service quality factors and learners' educational satisfaction, work application intention, and recommendation intention are also investigated. In an analysis using the structural equation model (SEM) technique based on a questionnaire given to 203 participants of IT education programs in an 'M' IT educational institution in Seoul, South Korea, tangibles, reliability, and assurance were found to have a significant effect on educational satisfaction. This educational satisfaction was found to have a significant effect on both work application intention and recommendation intention. Moreover, it was discovered that learner position and participation motivation have a partial moderating impact on the relationship between IT education service quality factors and educational satisfaction. This study holds academic implications in that it is one of the first studies to apply the SERVPERF model (rather than the SERVQUAL model, which has been widely adopted by prior studies) is to demonstrate the influence of IT education service quality on learners' educational satisfaction, work application intention, and recommendation intention in an IT education environment. The results of this study are expected to provide practical guidance for IT education service providers who wish to enhance learners' educational satisfaction and service management efficiency.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.