• Title/Summary/Keyword: Survey Information

Search Result 12,960, Processing Time 0.036 seconds

Accuracy Analysis of Target TS Surveying and Non-target TS Surveying for Building Registration of Cadastral Map (지적도 건물등록을 위한 타켓 TS 측량과 무타켓 TS 측량의 정확도 분석)

  • Hong, Sung-Eon
    • Spatial Information Research
    • /
    • v.15 no.2
    • /
    • pp.123-134
    • /
    • 2007
  • The building boundary should be registered in the cadastral map for the protection of property using the expansion of the registration items in the cadastral record and the construction of 3D-cadastral information system. In this study, the efficiency of registering the building boundary was suggested by non-target TS survey through the comparison between target TS and non-target TS survey about an accuracy and efficiency. At the result of this research, the RMSE of target TS and non-target TS survey is the X; ${\pm}0.056m$ and Y; ${\pm}0.043m$. Therefore, non-target TS survey shows the high accuracy. Also, the non-target TS survey is more efficient cost on time and personnel than target TS.

  • PDF

Web based Online Outage Cost Assessment and Information System of Electrical Energy (웹기반 온라인 전기에너지 공급지장비 추정 및 정보 시스템의 개발)

  • Lim, Jin-Taek;Choi, Jae-Seok;Jeon, Dong-Hoon;Seo, Chul-Soo;Lee, Jae-Gul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.9
    • /
    • pp.1249-1259
    • /
    • 2012
  • This paper proposes a Web Based Online Outage Cost Assessment and Information System(WOOCAIS) for power system outage cost assessment. The proposed WOOCAIS is a kind of web based survey method for outage cost assessment. While conventional survey methods have done outage cost assessment based on survey paper lists collected by post mail or visiting customers, the proposed WOOCAIS is a web based online survey operation and assessment system. Therefore, it can curtail expenditure for survey and also is more convenient than conventional method. It will be set up for actual outage cost assessment system of KEPCO in South Korea in the near future. The WOOCAIS will be applied in various research and actual planning and operation areas. First of all, the assessed results may be not only applied as one of objective function for generation system and grid expansion but also operational planning problems in power system.

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun;Chiang, Hua-Pei;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.56-78
    • /
    • 2018
  • Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

Demand Survey Method for Commercialization of Police Science Technology and Equipment

  • Myeonggi, Hong;Junho, Park;JeongHyeon, Chang;Seongju, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.609-625
    • /
    • 2023
  • This study is a demand research for the selection of public safety science and technology equipment and suggests an empirical research method. The technology demand survey is the beginning of the selection of innovative technology. And it is the basis of collecting information required for the technology required in the market and helping to apply it to the field. The demand survey for police science and technology can reduce the uncertainty of crime prevention and help the smooth implementation of security policies. However, in Korea, adoption of security science and technology equipment was centered on social issues or researchers' opinions rather than the demands of field users. Until, there was no research has been conducted on the demands of field police officers for selection of security science and technology equipment in Korea. Also, there was no preferential study for the demand for security science and technology equipment. Therefore, this study proposes a methodology that can systematically identify the needs for the technology and equipment of field experts suitable for the public security situation for the selection of security science and technology equipment. Specifically, we propose a sample design for a technology classification system and a survey tool for technology awareness and satisfaction. It is expected that this tool will provide a classification system for security science and technology equipment selected for the Korean police and will help determine the priority of equipment suitable for the field.

A Study on the Evaluation of Airborne Lidar Height Accuracy for Application of 3D Cadastral (3차원지적 적용을 위한 항공라이다의 수직 정확도 평가에 관한 연구)

  • Choi, Byoung Gil;Na, Young Woo;Lee, Kyung Sub;Lee, Jung Il
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.2
    • /
    • pp.33-40
    • /
    • 2014
  • At present, Cadastral map of 2 dimensional is in the stream of changing it to 3 dimensional type supported by GPS and laser techniques. In addition, this steam can be explained at the same time with improvement of equipment of storing much information, support of equipment for imaginative 3D spatial information, and support of equipment of expressing land in 3D Cadastral. This study suggest to apply airborne lidar survey technique on cadastral map to acquire comparably and quickly detailed height of ground. For doing this, this study checked out credibility regarding accuracy of airborne lider survey. After choosing research area, this study has done the airborne lidar survey and acquire the result after surveying Cadastral Comparison Point to check out the accuracy of acquired results. In addition, this study check out the result of Cadastral Comparison Point and airborne lidar survey applied by paired sample t-test based on actual results. The result is that test statistics is 0.322 which is 5 % similar level and null hypothesis cannot be rejected, so this study found out that result of both survey ways are the same. Therefore, the result of airborne lidar survey can be utilized to build up 3D Cadastral information hereafter.

A Study on college student's cognition survey about CCTV in education facilities (교육시설내 CCTV에 대한 대학생의 인식조사 연구)

  • Lee, Yong-Whan;Hong, Myoung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.23-30
    • /
    • 2012
  • The purpose of this paper is to analyze various categories such as the recognition, expectation and acceptability of CCTV use in educational facilities by doing a survey on how college students think about the CCTV installed in educational facilities. For this research, diverse existing surveys regarding CCTV were examined, and the appropriate elements of survey questions were extracted and developed. Based on this method, we intend to complete a survey study hereafter on the change in perception regarding CCTV inspection. We made four hypotheses before the survey and the results of the survey are as follows: First, the expectations for CCTV's ability to reduce crime were high. Second, the fears about being a victim of theft or violence crime were decreased. Third, there were a number of respondents who would weigh more on increased safety by installing a CCTV rather than be concerned that CCTV may lead to the violation of students' human rights. Fourth, there showed a difference in recognizing CCTV among three groups. Also, for the questions regarding the places where CCTV is installed, there were many negative opinions on its installation in the student convenient facilities. What we have achieved was not a simple survey which investigates the pros and cons about CCTV use, but a newly suggested way of survey, which enables us to test various hypotheses and figure out the changing perceptions on CCTV effectiveness in educational facilities with more efficiency.

A Brief Survey of Zero Knowledge Proofs

  • Shin, Hyunyong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.25-40
    • /
    • 1992
  • In cryptography, the notion of zero-knowledge is important. It is also related to complexity theory. In this paper we briefly survey the zero-knowledge proofs in the literature.

  • PDF

Study of Contents Development of Information Literacy with Delphi Survey (델파이 조사를 이용한 정보활용능력 교육 항목 개발 연구)

  • Lee, Hyun-Sil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.1
    • /
    • pp.303-322
    • /
    • 2004
  • In this study, I worked on necessary contents for Information Literacy of Korean universities by Delphi Method. The survey resulted in 100 necessary contents in five categories and each category presents average points and ranks of importance. Contents of high rank in each category should be valued highly when educational programs are to be designed. One remarkable difference in comparison with ACRL standards is that there are a lot of contents involved with basic understanding about Scientific Information System and Information Technology and knowledge application in this study, and another is that there is a lack of contents which require analytic judgements. The significance of this study lies in presenting directions and discussion points in designing of Information Literacy of Korean universities.

기술협력과 정보관리정책의 상관관계에 관한 고찰 -한.러 및 한.중 과학기술협력을 중심으로-

  • 곽동철
    • Journal of Korean Library and Information Science Society
    • /
    • v.27
    • /
    • pp.97-136
    • /
    • 1997
  • Korea has good mutual relations with Russia and China in many fields, not just in science and technology, but also in trade. That is, it stands on a point of time in which an epoch-making turning point for mutual interests could be realized depending on how to join Russia's high technology with Korea's industrial technology with capital, or how to connect Korean -Chinese mutual concern and each other's advanced technology. The purpose of this study is to present scientific and technical information management policy for efficient su n.0, pport for technical cooperation with Russia and China. Bearing this purpose in mind, the concept of technical cooperation along with scientific and technical information management policy was closely examined. The correlation between the progress of technology and the type of scientific and technical information was examined, while the flow of scientific and technical information accompanying technical cooperation was studied. The methodology adopted for this study includes document research, empirical analysis and fact-finding survey. For document research, the writer analyzed the contents of scientific and technical information managing operations and the types of information to be utilized in the course of technical cooperation by examining domestic and foreign documents on international technical cooperation. For empirical analysis, the contents of actual results of scientific and technical information managing operations for technical cooperation with Russia and China were put in order and analyzed, while contents of survey conducted by organizations related to these countries for technical cooperation were synthesized and examined for fact -finding survey.

  • PDF

A Study on the Privacy Concern of e-commerce Users: Focused on Information Boundary Theory (전자상거래 이용자의 프라이버시 염려에 관한 연구 : 정보경계이론을 중심으로)

  • Kim, Jong-Ki;Oh, Da-Woon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-62
    • /
    • 2017
  • Purpose This study provided empirical support for the model that explain the formation of privacy concerns in the perspective of Information Boundary Theory. This study investigated an integrated model suggesting that privacy concerns are formed by the individual's disposition to value privacy, privacy awareness, awareness of privacy policy, and government legislation. The Information Boundary Theory suggests that the boundaries of information space dependends on the individual's personal characteristics and environmental factors of e-commerce. When receiving a request for personal information from e-commerce websites, an individual assesses the risk depending on the risk-control assessment, the perception of intrusion give rise to privacy concerns. Design/methodology/approach This study empirically tested the hypotheses with the data collected in a survey that included the items measuring the constructs in the model. The survey was aimed at university students. and a causal modeling statistical technique(PLS) is used for data analysis in this research. Findings The results of the survey indicated significant relationships among environmental factors of e-commerce websites, individual's personal privacy characteristics and privacy concerns. Both individual's awareness of institutional privacy assurance on e-commerce and the privacy characteristics affect the risk-control assessment towards information disclosure, which becomes an essential components of privacy concerns.