• Title/Summary/Keyword: internet map

Search Result 594, Processing Time 0.026 seconds

A Study on Web Design Development for Consumer-Oriented Information for Food Safety (소비자 맞춤형 식품안전 정보 제공 웹 디자인 개발에 관한 연구)

  • Lee, Sim Yeol;Park, Myung Hee;Cho, You Hyun
    • Korean Journal of Human Ecology
    • /
    • v.21 no.6
    • /
    • pp.1129-1144
    • /
    • 2012
  • The purpose of this study was to investigate the gender difference in adolescent's problem behavior and depression, and The main aim of this study was to develop a fundamental web design to provide information content that would be easy for average consumers to understand based on the classification of information related to food safety. Based on the information obtained through in-depth interviews, the researchers developed an information classification system that meets the needs of consumers, and which serve as a basic framework for a homepage for a food safety information center. A total of 62 food items in 6 areas were selected based on reports of food safety related events occurring between 1998-2009 (KFDA 2008). The classification system of risk factors such as chemical risk factors and biological risk factors were categorized. The specific features of the information content for individual food items provided for classification based on evaluation by professional food scientists and the importance of risk factors. By providing a consumer participation section and company participation section, it was anticipated that the food safety information center would be able to act as a moderator for food safety information communication among consumers, the food industry, and the government. Based on the development of a classification system and framework, a design plan and tree-map for the internet site was developed.

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

Construction and Application of 3D Image Model for GIS Spatial Analysis (GIS 공간분석을 위한 3D 영상모형의 구축과 활용)

  • Jung, Sung-Heuk;Lee, Kae-Dong;Lee, Jae-Kee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.6
    • /
    • pp.561-569
    • /
    • 2008
  • Currently, satellite image, aerial image and airborne laser scanning data are mostly used to build 3D image models. However, we are in need of quality 3D image models as current models cannot express topographic and features most elaborately and realistically. When making 3D image models, the model is first built and textures from terrestrial photos are applied to add realistic features to the model. This study analyzed techniques to use photogrammetry and laser scanning data to create a 3D image models with topography, building and statue that emphasize spatial accuracy, delicate depiction and photo-realistic imaging. 3D image models with spatial accuracy and photographic texture were built to be served via 3D image map services systems on the internet. The 3D image models can be used for various purposes, such as daylight and view right analysis, landscape analysis, facility management system.

A development of interactive manual system guideline for mobile service. (인터액티브 사용자 매뉴얼 가이드라인 개발에 관한 연구 - 모바일 서비스를 중심으로 -)

  • 이종호
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.29-38
    • /
    • 2002
  • Recently, types of mobile services are ever-growing with technological advances, such as CDMA 2000, 256 Color LCD, 16 channel sound chip set and easy internet access. However, manual system that is supposed to support users for finding features and functions doesn't help users most of the cases since users are moving. Therefore, mobile sonics needs new concept for manual system that can support users while they are in use In this research report, new concept for interactive manual system is suggested. Then a guideline for interactive manual system is developed as a result from three empirical studies. First, ten information visualization methods used for describing functions are positioned on user's perception map. Secondly, user behavior pattern of getting required information from written manual was analyzed. Finally, visual cue system was selected as one of options for developing interactive manual system and a guideline was developed based on these research results.

  • PDF

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

A Study on The Marine Geographical Framework Data in Korea (해양기본지리정보 구축에 관한 기초연구)

  • 최윤수;오순복;박병문;김정현;서상현
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.20 no.3
    • /
    • pp.293-301
    • /
    • 2002
  • MGF(Marine Geographical Framework) data are the essential data sets concerning graphical and attribute information on coast and ocean among various marine-related data, which consist of framework data of the National Spatial Data Infrastructure(NSDI). This study did research and analyzed the development of current data, the situation of its usage, related technical environment and case study of foreign countries through the survey on the users and experts. Then the item of marine geographical framework data was selected in accordance with the measures for usage and management of possible MGF data. A map was pilot producted based on selected items and MGF data was presented through making up some problems shown ill the process. The importance of GIS will be growing continuously which can develop, deal with and provide the various data to efficiently manage coast and ocean. Accordingly, the MGF data will be applied to various areas such as Internet or raw data for marine information system.

TOSS: Telecom Operations Support Systems for Broadband Services

  • Chen, Yuan-Kai;Hsu, Chang-Ping;Hu, Chung-Hua;Lin, Rong-Syh;Lin, Yi-Bing;Lyu, Jian-Zhi;Wu, Wudy;Young, Hey-Chyi
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.1-20
    • /
    • 2010
  • Due to the convergence of voice, data, and video, today's telecom operators are facing the complexity of service and network management to offer differentiated value-added services that meet customer expectations. Without the operations support of well-developed Business Support System/Operations Support System (BSS/OSS), it is difficult to timely and effectively provide competitive services upon customer request. In this paper, a suite of NGOSS-based Telecom OSS (TOSS) is developed for the support of fulfillment and assurance operations of telecom services and IT services. Four OSS groups, TOSS-P (intelligent service provisioning), TOSS-N (integrated large-scale network management), TOSS-T (trouble handling and resolution), and TOSS-Q (end-to-end service quality management), are organized and integrated following the standard telecom operation processes (i.e., eTOM). We use IPTV and IP-VPN operation scenarios to show how these OSS groups co-work to support daily business operations with the benefits of cost reduction and revenue acceleration.

Development Migration Agent Server for Seamless Virtual Environment (Seamless 가상 환경을 위한 Migration Agent 서버 개발)

  • Won, Donghyun;An, Dongun;Chung, Seungjong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.223-228
    • /
    • 2016
  • Nowadays users of Virtual Environment are want to play with thousands of players in an evolving virtual world at the same time over the internet. So, the load of this kind of Virtual Environments is heavier than that of any other precedents. One of load balancing methods is map-partition to divide the load of entire system which is vulnerable to delay message between clients and servers. In this paper, we propose a Migration Agent application server architecture using to help migration of player character between field servers and to reduce response time between clients and field servers. Migration Agent is reduce Player Character's responds time as Cache Server, if Player Character move to another Field Server, Player Character need the synchronization process in the DBMS approach, to minimize response time by reducing the period for cross - Player Character Field Server to perform the role. Field Server by placing them in form of a stack existing form of grid, for load concentrated on a specific server.

A Web-GIS based on Object Location Information Monitoring System for Ubiquitous Environment (유비쿼터스 환경을 위한 Web-GIS 기반의 객체위치정보 모니터링 시스템)

  • Kim, Taek-Cheon;Kim, Seok-Hun;Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1755-1763
    • /
    • 2007
  • Specially, location information can say that is important information in this ubiquitous environment and solutions of new GIS system to utilize this are required. Examine method to improve web geography information service system because this paper uses XML and presented specific implementation result. Through internet. it planed various geography information that offer in form of service that do not receive restriction of heterogeneous system environment. Also, did thing that is easy when request service about geography information that user need and deliver fast by purpose. Supplement and to improve open-ended and XML of form normalized use and developed existent web geography information service. So that can use map service in web browser without setup of application program that buy expensive GIS software or offer in each company design and implement.

A More Storage-Efficient Order-Revealing Encryption Scheme (우수한 공간 효율성을 제공하는 순서노출암호 기법)

  • Kim, Kee Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.503-509
    • /
    • 2019
  • Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.