• Title/Summary/Keyword: Users' IT Capabilities

Search Result 116, Processing Time 0.023 seconds

Suggestion of Customized Professional Guide Services through Domestic and Foreign Travel Platforms (국내외 여행 플랫폼을 통한 맞춤형 전문 가이드 서비스 제안)

  • Kim, Seung-In;Lee, Kaha
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.421-428
    • /
    • 2019
  • This study includes services that require six professional guides - health care, exhibition performance, restaurant, shopping, business and daily life - as well as a trip-based tour, along with solving existing problems that may occur on domestic and overseas trips, and proposes services that connect users with proven professional guides. As a result of previous research, the most needed services among overseas travel were air tickets, accommodation, transportation, and guides, but as Korea enters an aging society, professional guide services are expected to increase daily demand. Based on this, the service technology, user scenarios and brand development were presented. This Service Proposal provides users with a personalized guide to knowledge or experience that they have not previously known, providing them with a wealth of experience. In addition, guides can help develop new fields of expertise and help improve professional guides' capabilities. Finally, the platform service is meaningful in that it enables the creation of jobs by enabling everyone to engage in economic activities, as it allows users to provide services through their own capabilities while at the same time being convenient for them.

A Trust Management Model for PACS-Grid

  • Cho, Hyun-Sook;Lee, Bong-Hwan;Lee, Kyu-Won;Lee, Hyoung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.144-149
    • /
    • 2007
  • Grid technologies make it possible for IT resources to be shared across organizational and security domains. The traditional identity-based access control mechanisms are unscalable and difficult to manage. Thus, we propose the FAS (Federation Agent Server) model which is composed of three modules: Certificate Conversion Module (CCM), Role Decision Module (RDM), and Authorization Decision Module (ADM). The proposed FAS model is an extended Role-Based Access Control (RBAC) model which provides resource access capabilities based on roles assigned to the users. FAS can solve the problem of assigning multiple identities to a shared local name in grid-map file and mapping the remote entity's identity to a local name manually.

Application possibility Consideration of Visualizations of Digital Device through Sensitivity Psychology of an Adjective (형용사의 감성심리를 통한 디지털기기의 비쥬얼라이제이션 적용 가능성 고찰)

  • Cheon, Sang-Hyeon
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2007.05a
    • /
    • pp.27-30
    • /
    • 2007
  • With lots of portable convergence mobile device coming out into the market, companies are now facing to take up consumers' needs. The products are popularized by 'skin function' in the field of hardware, whereas software wise, it's still a long way to follow up the needs. It's been hypothetically known that the Image of Sensitivity Adjective chosen by the users can increase the brand image and value creating capabilities through visualization. We collect the 'adjective' of images of recent products first and on that base, we sort out the most popular 'adjective' through grouping, then we actualize the image with that sample collective body. Then through analyses of the image, we find how they are correlated and what their elements are with the result.

  • PDF

Study on the Job Execution Time of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 작업 실행 시간에 대한 연구)

  • Jung, Sung Min;Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.99-105
    • /
    • 2012
  • Given the numbers of smartphones, tablets and other mobile devices shipped every day, more and more users are relying on the cloud as the main driver for satisfying their computing needs, whether it is data storage, applications or infrastructure. Mobile cloud computing is simply cloud computing in which at least some of the devices involved are mobile. Each node is owned by a different user and is likely to be mobile. Using mobile hardware for cloud computing has advantages over using traditional hardware. These advantage include computational access to multimedia and sensor data without the need for large network transfer, more efficient access to data stored on other mobile devices and distributed ownership and maintenance of hardware. It is important to predict job execution time in mobile cloud computing because there are many mobile nodes with different capabilities. This paper analyzes the job execution time for mobile cloud computing in terms of network environment and heterogeneous mobile nodes using a mathematical model.

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

Implementation of Global Position Location System using X.400 Protocol (X.400을 이용한 글로벌 위치확인 시스템 구현)

  • Lee, Myung-Eui
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.2
    • /
    • pp.178-182
    • /
    • 2005
  • The proposed system in this paper is designed to provide users with a means of global location information using Orbcomm satellite communication and X.400 protocol. The system's two-way data transmission capabilities allow users to track mobile or fixed objects anywhere in the world via Internet. This study utilizes the X.400 protocol, and the SIP(Serial Interface Protocol) and self defined control protocol to implement data communication link in this paper. Data processor board connected to SC(Subscriber Communicator) is also designed and implemented to interface with GPS receiver. The experimental results of the proposed global position location system is evaluated through real-time experiments, and we have confirmed it works well according to the protocol designed in this paper.

  • PDF

Car detection area segmentation using deep learning system

  • Dong-Jin Kwon;Sang-hoon Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.182-189
    • /
    • 2023
  • A recently research, object detection and segmentation have emerged as crucial technologies widely utilized in various fields such as autonomous driving systems, surveillance and image editing. This paper proposes a program that utilizes the QT framework to perform real-time object detection and precise instance segmentation by integrating YOLO(You Only Look Once) and Mask R CNN. This system provides users with a diverse image editing environment, offering features such as selecting specific modes, drawing masks, inspecting detailed image information and employing various image processing techniques, including those based on deep learning. The program advantage the efficiency of YOLO to enable fast and accurate object detection, providing information about bounding boxes. Additionally, it performs precise segmentation using the functionalities of Mask R CNN, allowing users to accurately distinguish and edit objects within images. The QT interface ensures an intuitive and user-friendly environment for program control and enhancing accessibility. Through experiments and evaluations, our proposed system has been demonstrated to be effective in various scenarios. This program provides convenience and powerful image processing and editing capabilities to both beginners and experts, smoothly integrating computer vision technology. This paper contributes to the growth of the computer vision application field and showing the potential to integrate various image processing algorithms on a user-friendly platform

Design and Realization of the Sailing System for Mille and Small Leisure Ships (중소형 레저선박용 운항시스템 설계 및 구현)

  • Oh, Hong-Geun;Park, Jung-Min;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.3
    • /
    • pp.411-418
    • /
    • 2017
  • In the domestic case, although technological capabilities are recognized globally in the IT field, it is actually that the technical capabilities of the domestic leisure ship market which is formed mainly by fishing vessels are not beyond their technical capabilities At the point where the GNP of our country already goes over 22,000 dollars, the demand for the products related to the middle and small leisure boats is gradually increasing, but most of the high added value products depend on the imports from U.S.A. and Europe. And in case of the cars, with the Car Navigation as the start, products which satisfies various demands of the users are coming out in large quantity and now the IT technology is the necessity which can not be lived without in the car industry. Thus, if the digital ship navigator which jointed the recent ICT technology which was applied to the land for the domestic middle and small leisure ships by utilizing the embedded hardware technology and mapping technology which are credible is developed and distributed, it will become not only the opportunity to improve the industry related to middle and small ship IT, but also, the export about overseas market can be expected.