• Title/Summary/Keyword: Web based network management

Search Result 388, Processing Time 0.027 seconds

Manipulation of 3D Surface Data within Web-based 3D Geo-Processing

  • Choe, Seung-Keol;Kim, Kyong-Ho;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.80-83
    • /
    • 1999
  • An efficient modeling and management of a large amount of surface data for a wide rage of geographic information play an important role in determining the functionality of 3D geographic information system. It has been put many efforts to design and manage an effective way to enhence the manipulation of the data by considering geometry type and data structures. Recently, DEM(Data Elevation Model) and TIN(Triangulated Irregular Network) are used for representing surface data. In this paper, we propose a 3D data processing method. The method utilizes the major properties of DEM and TIN, respectively. Furthermore, by approximating DEM with a TIN of an appropriate resolution, we can support a fast and realistic surface modeling. We implement the structure with the following 4 level stages. The first is an optimal resolution of DEM which represent all of wide range of geographic data. The second is the full resolution DEM which is a subarea of original data generated by user's selection in our implemeatation. The third is the TIN approximation of this data with a proper resolution determined by the relative position with the camera. And the last step is multi-resolution TIN data whose resolution is dynamically decided by considering which direction user take notice currently. Specially, the TIN of the last step is designed for realtime camera navigation. By using the structure we implemented realtime surface clipping, efficient approximation of height field and the locally detailed surface LOD(Level of Detail). We used the initial 10-meter sampling DEM data of Seoul, KOREA and implement the structure to the 3D Virtual GIS based on the Internet.

  • PDF

Investigation of Potential Fire Hazard Resources of Bridges on National Routes by Field and Web-based Satellite (현장 및 실내조사를 통한 일반국도교량의 화재위험요소 분석)

  • Kim, Yongjae;Kim, Seungwon;Ann, Hojune;Kong, Jungsik;Park, Cheolwoo
    • International Journal of Highway Engineering
    • /
    • v.19 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • PURPOSES : The occurrence of unexpected disasters, including fire events, increases as the road network becomes complicated and traffic volume increases. When a fire event occurs on and under bridges, the damage extensively influences direct damage to structures, vehicles, and human life and secondary socioeconomic issues owing to traffic blockage. This study investigated potential fire-hazard risks on bridges of the Korean national route road. METHODS : The investigation was conducted using field investigation and analysis with satellite pictures and road views from commercial websites and the Bridge Management System (BMS). From the filed investigation, various potential fire resources were identified. The satellite pictures and road views were helpful in measuring and recognizing conditions underneath bridges, stowage areas, etc. RESULTS : There are various potential fire resources underneath bridges such as piled agricultural products, parked petroleum tanks, construction equipment, and attached high-voltage cables. A total of 94.6% of bridges have underneath clearances of less than 15 m. A bridge underneath volume that can stow a potential fire hazard resource was $7,332m^3$ on average, and most bridges have about $4,000m^3$ of space. Based on the BMS data, the amounts of PSC and steel girders were 29% and 25%, respectively. CONCLUSIONS : It was found that the amount of stowed potential fire hazard resources was proportional to the underneath space of bridges. Most bridges have less than 15 m of vertical clearance that can be considered as a critical value for a bridge fire. The fire risk investigation results should be helpful for developing bridge fire-protection tools.

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.

A Study on the Acquisiton Methods of Theater Collections (연극기록물의 수집방안 연구)

  • Jung, Eun Jin
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.35-78
    • /
    • 2011
  • This study is intended to recommend for acquisition methods of the theatre collection. Theatre activities is representative of the performing arts, and the Korea theatre history start from the modern history of Korea. In the meantime, theatre collections has already been lost by a lack of effort and management, and scattered most of the collections. In particular, a one-off nature and volatility of theatrical performances make future generations to enjoy the performances and to study should consult the relevant records. Therefore, collecting records can be very serious mission. In this study, theatre collections of the country which aims to collect and analyze the characteristics and type of theatre collections. Based on this information, collection scope, targets, priorities, acquisition level, method of collecting are proposed the following. First, collection scope is defined for the theatre related collections which was performed nationwide in the 1900s, the times that modern theatre was begun. The object includes related information of planning, administration, drama (script), directing, stage design, public relations, production, evaluation, personal records, biographical data, group data and space data. Second, the theatre collections are divided into records and historical records. Priority of collections object is determined by the historical value and the theatre performed by the support of public organization. Third, the acquisition level is divided into archived, mirrored, web linked and database, which is proposed by the determined levels of mandatory, recommend and discretion according to the characteristic of performance. Fourth, acquisition methods are suggested by the general acquisition methods of transfer, donation and purchase as well as the methods of copy, production, legal deposit, entry and web link etc. The acquisition of theatre collections is executed on digital-based environment, and a centralized authority control should be establishmented. And through the development of network with theatre's stakeholders and the cooperation of related organizations, theatre collections acquisition is feasible.

Implement of Web-based Remote Monitoring System of Smart Greenhouse (스마트 온실 통합 모니터링 시스템 구축)

  • Dong Eok, Kim;Nou Bog, Park;Sun Jung, Hong;Dong Hyeon, Kang;Young Hoe, Woo;Jong Won, Lee;Yul Kyun, Ahn;Shin Hee, Han
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.24 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • Growing agricultural products in greenhouses controlled by creating suitable climatic conditions and root zone of crop has been an important research and application subject. Appropriate environmental conditions in greenhouse are necessary for optimum plant growth improved crop yields. This study aimed to establish web-based remote monitoring system which monitors crops growth environment and status of crop on a real-time basis by applying to greenhouses IT technology connecting greenhouse equipment such as temperature sensors, soil sensors, crop sensors and camera. The measuring items were air temperature, relative humidity, solar radiation, CO2 concentration, EC and pH of nutrient solution, medium temperature, EC of medium, water content of medium, leaf temperature, sap flow, stem diameter, fruit diameter, etc. The developed greenhouse monitoring system was composed of the network system, the data collecting device with sensors, and cameras. Remote monitoring system was implemented in a server/client environment. Information on greenhouse environment and crops is stored in a database. Items on growth and environment is extracted from stored information, could be compared and analyzed. So, A integrated monitoring system for smart greenhouse would be use in application practice and understanding the environment and crop growth for smart greenhouse management. sap flow, stem diameter and pant-water relations

Development of Web-based Construction-Site-Safety-Management Platform Using Artificial Intelligence (인공지능을 이용한 웹기반 건축현장 안전관리 플랫폼 개발)

  • Siuk Kim;Eunseok Kim;Cheekyeong Kim
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • In the fourth industrial-revolution era, the construction industry is transitioning from traditional methods to digital processes. This shift has been challenging owing to the industry's employment of diverse processes and extensive human resources, leading to a gradual adoption of digital technologies through trial and error. One critical area of focus is the safety management at construction sites, which is undergoing significant research and efforts towards digitization and automation. Despite these initiatives, recent statistics indicate a persistent occurrence of accidents and fatalities in construction sites. To address this issue, this study utilizes large-scale language-model artificial intelligence to analyze big data from a construction safety-management information network. The findings are integrated into on-site models, which incorporate real-time updates from detailed design models and are enriched with location information and spatial characteristics, for enhanced safety management. This research aims to develop a big-data-driven safety-management platform to bolster facility and worker safety by digitizing construction-site safety data. This platform can help prevent construction accidents and provide effective education for safety practices.

The Effect of Herding Behavior and Perceived Usefulness on Intention to Purchase e-Learning Content: Comparison Analysis by Purchase Experience (무리행동과 지각된 유용성이 이러닝 컨텐츠 구매의도에 미치는 영향: 구매경험에 의한 비교분석)

  • Yoo, Chul-Woo;Kim, Yang-Jin;Moon, Jung-Hoon;Choe, Young-Chan
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.105-130
    • /
    • 2008
  • Consumers of e-learning market differ from those of other markets in that they are replaced in a specific time scale. For example, e-learning contents aimed at highschool senior students cannot be consumed by a specific consumer over the designated period of time. Hence e-learning service providers need to attract new groups of students every year. Due to lack of information on products designed for continuously emerging consumers, the consumers face difficulties in making rational decisions in a short time period. Increased uncertainty of product purchase leads customers to herding behaviors to obtain information of the product from others and imitate them. Taking into consideration of these features of e-learning market, this study will focus on the online herding behavior in purchasing e-learning contents. There is no definite concept for e-learning. However, it is being discussed in a wide range of perspectives from educational engineering to management to e-business etc. Based upon the existing studies, we identify two main view-points regarding e-learning. The first defines e-learning as a concept that includes existing terminologies, such as CBT (Computer Based Training), WBT (Web Based Training), and IBT (Internet Based Training). In this view, e-learning utilizes IT in order to support professors and a part of or entire education systems. In the second perspective, e-learning is defined as the usage of Internet technology to deliver diverse intelligence and achievement enhancing solutions. In other words, only the educations that are done through the Internet and network can be classified as e-learning. We take the second definition of e-learning for our working definition. The main goal of this study is to investigate what factors affect consumer intention to purchase e-learning contents and to identify the differential impact of the factors between consumers with purchase experience and those without the experience. To accomplish the goal of this study, it focuses on herding behavior and perceived usefulness as antecedents to behavioral intention. The proposed research model in the study extends the Technology Acceptance Model by adding herding behavior and usability to take into account the unique characteristics of e-learning content market and e-learning systems use, respectively. The current study also includes consumer experience with e-learning content purchase because the previous experience is believed to affect purchasing intention when consumers buy experience goods or services. Previous studies on e-learning did not consider the characteristics of e-learning contents market and the differential impact of consumer experience on the relationship between the antecedents and behavioral intention, which is the target of this study. This study employs a survey method to empirically test the proposed research model. A survey questionnaire was developed and distributed to 629 informants. 528 responses were collected, which consist of potential customer group (n = 133) and experienced customer group (n = 395). The data were analyzed using PLS method, a structural equation modeling method. Overall, both herding behavior and perceived usefulness influence consumer intention to purchase e-learning contents. In detail, in the case of potential customer group, herding behavior has stronger effect on purchase intention than does perceived usefulness. However, in the case of shopping-experienced customer group, perceived usefulness has stronger effect than does herding behavior. In sum, the results of the analysis show that with regard to purchasing experience, perceived usefulness and herding behavior had differential effects upon the purchase of e-learning contents. As a follow-up analysis, the interaction effects of the number of purchase transaction and herding behavior/perceived usefulness on purchase intention were investigated. The results show that there are no interaction effects. This study contributes to the literature in a couple of ways. From a theoretical perspective, this study examined and showed evidence that the characteristics of e-learning market such as continuous renewal of consumers and thus high uncertainty and individual experiences are important factors to be considered when the purchase intention of e-learning content is studied. This study can be used as a basis for future studies on e-learning success. From a practical perspective, this study provides several important implications on what types of marketing strategies e-learning companies need to build. The bottom lines of these strategies include target group attraction, word-of-mouth management, enhancement of web site usability quality, etc. The limitations of this study are also discussed for future studies.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

An Analysis for Deriving New Convergent Service of Mobile Learning: The Case of Social Network Analysis and Association Rule (모바일 러닝에서의 신규 융합서비스 도출을 위한 분석: 사회연결망 분석과 연관성 분석 사례)

  • Baek, Heon;Kim, Jin Hwa;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.1-37
    • /
    • 2013
  • This study is conducted to explore the possibility of service convergence to promote mobile learning. This study has attempted to identify how mobile learning service is provided, which services among them are considered most popular, and which services are highly demanded by users. This study has also investigated the potential opportunities for service convergence of mobile service and e-learning. This research is then extended to examine the possibility of active convergence of common services in mobile services and e-learning. Important variables have been identified from related web pages of portal sites using social network analysis (SNA) and association rules. Due to the differences in number and type of variables on different web pages, SNA was used to deal with the difficulties of identifying the degree of complex connection. Association analysis has been used to identify association rules among variables. The study has revealed that most frequent services among common services of mobile services and e-learning were Games and SNS followed by Payment, Advertising, Mail, Event, Animation, Cloud, e-Book, Augmented Reality and Jobs. This study has also found that Search, News, GPS in mobile services were turned out to be very highly demanded while Simulation, Culture, Public Education were highly demanded in e-learning. In addition, It has been found that variables involving with high service convergence based on common variables of mobile and e-learning services were Games and SNS, Games and Sports, SNS and Advertising, Games and Event, SNS and e-Book, Games and Community in mobile services while Games, Animation, Counseling, e-Book, being preceding services Simulation, Speaking, Public Education, Attendance Management were turned out be highly convergent in e-learning services. Finally, this study has attempted to predict possibility of active service convergence focusing on Games, SNS, e-Book which were highly demanded common services in mobile and e-learning services. It is expected that this study can be used to suggest a strategic direction to promote mobile learning by converging mobile services and e-learning.

  • PDF