• Title/Summary/Keyword: Security visualization

Search Result 138, Processing Time 0.023 seconds

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

A New Method of Registering the XML-based Clinical Document Architecture Supporting Pseudonymization in Clinical Document Registry Framework (익명화 방법을 적용한 임상진료문서 등록 기법 연구)

  • Kim, Il-Kwang;Lee, Jae-Young;Kim, Il-Kon;Kwak, Yun-Sik
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.10
    • /
    • pp.918-928
    • /
    • 2007
  • The goal of this paper is to propose a new way to register CDA documents in CDR (Clinical Document Repository) that is proposed by the author earlier. One of the methods is to use a manifest archiving for seamless references and visualization of CDA related files. Another method is to enhance the CDA security level for supporting pseudonymization of CDA. The former is a useful method to support the bundled registration of CDA related files as a set. And it also can provide a seamless presentation view to end-users, once downloaded, without each HTTP connection. The latter is a new method of CDA registration which can supports a do-identification of a patient. Usually, CDA header can be used for containing patient identification information, and CDA body can be used for diagnosis or treatment data. So, if we detach each other, we can get good advantages for privacy protection. Because even if someone succeeded to get separated CDA body, he/she never knows whose clinical data that is. The other way, even if someone succeeded to get separated CDA header; he/she doesn't know what kind of treatment has been done. This is the way to achieve protecting privacy by disconnecting association of relative information and reducing possibility of leaking private information. In order to achieve this goal, the method we propose is to separate CDA into two parts and to store them in different repositories.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

The research of Correspondence Analysis centered on the Failure Period to improve the reliability of Weapon Systems (무기체계의 신뢰성 향상을 위한 고장발생기간 중심의 대응분석 연구)

  • Song, Bong-Geun;Kim, Geun-Hyung;Kim, Young-Kuk;Park, Seung Hwan;Baek, Jun-Geol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.289-299
    • /
    • 2016
  • Weapon systems require reliability in the development phase for efficient combat readiness. Improved reliability in various manufacturing processes have been achieved using data analysis. However, data analysis in the development phase is difficult due to problems such as the lack of data, high cost, and the importance of security. Therefore, Post Logistics Support (PLS) data collected following integration is analyzed for long-term quality improvement of weapon systems. In this study, we propose a methodology for examining the correlation between the failure rate and PLS data as follows: First, key variables affecting reliability were identified the correlation between variables on the failure rate examined. Second, corresponding analysis was conducted for determining the correlation between patterns of categorical data. Third, extract categories with the higher contribution and quality of representation, and find the highest variable correlated with failure period through visualization. Then, after selecting patterns which have shorter failure period, the cause of decreased reliability was confirmed through frequency analysis. This study will contribute to improving reliability when developing new weapon systems and will help to strengthen the combat readiness of military.

Degree Programs in Data Science at the School of Information in the States (미국 정보 대학의 데이터사이언스 학위 현황 연구)

  • Park, Hyoungjoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.305-332
    • /
    • 2022
  • This preliminary study examined the degree programs in data science at the School of Information in the States. The focus of this study was the data science degrees offered at the School of Information awarded by the 64 Library and Information Science (LIS) programs accredited by the American Library Association (ALA) in 2022. In addition, this study examined the degrees, majors, minors, specialized tracks, and certificates in data science, as well as the potential careers after earning a data science degree. Overall, eight Schools of Information (iSchools) offered 12 data science degrees. Data science courses at the School of Information focus on topics such as introduction to data science, information retrieval, data mining, database, data and humanities, machine learning, metadata, research methods, data analysis and visualization, internship/capstone, ethics and security, user, policy, and curation and management. Most schools did not offer traditional LIS courses. After earning the data science degree in the School of Information, the potential careers included data scientists, data engineers and data analysts. The researcher hopes the findings of this study can be used as a starting point to discuss the directions of data science programs from the perspectives of the information field, specifically the degrees, majors, minors, specialized tracks and certificates in data science.

Study on Customer Satisfaction Performance Evaluation through e-SCM-based OMS Implementation (e-SCM 기반 OMS 구현을 통한 고객 만족 성과평가에 관한 연구)

  • Hyungdo Zun;ChiGon Kim;KyungBae Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.891-899
    • /
    • 2024
  • The Fourth Industrial Revolution is centered on a personalized demand fulfillment economy and is all about transformation and flexible processing that can deliver what customers want in real time across space and time. This paper implements the construction and operation of a packaging platform that can instantly procure the required packaging products based on real-time orders and evaluates its performance. The components of customer satisfaction are flexible and dependent on the situation which requires efficient management of enterprise operational processes based on an e-SCM platform. An OMS optimized for these conditions plays an important role in maximizing and differentiating the efficiency of a company's operations and improving its cost advantage. OMS is a system of mass customization that provides efficient MOT(Moment of Truth) logistics services to meet the eco-friendly issues of many individual customers and achieve optimized logistics operation goals to enhance repurchase intentions and sustainable business. OMS precisely analyzes the collected data to support information and decision-making related to efficiency, productivity, cost and provide accurate reports. It uses data visualization tools to express data visually and suggests directions for improvement of the operational process through statistics and prediction analysis.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

A Comparative Study about Industrial Structure Feature between TL Carriers and LTL Carriers (구역화물운송업과 노선화물운송업의 산업구조 특성 비교)

  • 민승기
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.1
    • /
    • pp.101-114
    • /
    • 2001
  • Transportation enterprises should maintain constant and qualitative operation. Thus, in short period, transportation enterprises don't change supply in accordance with demand. In the result, transportation enterprises don't reduce operation in spite of management deficit at will. In freight transportation type, less-than-truckload(LTL) has more relation with above transportation feature than truckload(TL) does. Because freight transportation supply of TL is more flexible than that of LTL in correspondence of freight transportation demand. Relating to above mention, it appears that shortage of road and freight terminal of LTL is larger than that of TL. Especially in road and freight terminal comparison, shortage of freight terminal is larger than that of road. Shortage of road is the largest in 1990, and improved after-ward. But shortage of freight terminal is serious lately. So freight terminal needs more expansion than road, and shows better investment condition than road. Freight terminal expansion brings road expansion in LTL, on the contrary, freight terminal expansion substitutes freight terminal for road in TL. In transportation revenue, freight terminal's contribution to LTL is larger than that to TL. However, when we adjust quasi-fixed factor - road and freight terminal - to optimal level in the long run, in TL, diseconomies of scale becomes large, but in LTL, economies of scale becomes large. Consequently, it is necessary for TL to make counterplans to activate management of small size enterprises and owner drivers. And LTL should make use of economies of scale by solving the problem, such as nonprofit route, excess of rental freight handling of office, insufficiency of freight terminal, shortage of driver, and unpreparedness of freight insurance.

  • PDF