• Title/Summary/Keyword: location-based-Service

Search Result 1,646, Processing Time 0.028 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Extraction of Landmarks Using Building Attribute Data for Pedestrian Navigation Service (보행자 내비게이션 서비스를 위한 건물 속성정보를 이용한 랜드마크 추출)

  • Kim, Jinhyeong;Kim, Jiyoung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.1
    • /
    • pp.203-215
    • /
    • 2017
  • Recently, interest in Pedestrian Navigation Service (PNS) is being increased due to the diffusion of smart phone and the improvement of location determination technology and it is efficient to use landmarks in route guidance for pedestrians due to the characteristics of pedestrians' movement and success rate of path finding. Accordingly, researches on extracting landmarks have been progressed. However, preceding researches have a limit that they only considered the difference between buildings and did not consider visual attention of maps in display of PNS. This study improves this problem by defining building attributes as local variable and global variable. Local variables reflect the saliency of buildings by representing the difference between buildings and global variables reflects the visual attention by representing the inherent characteristics of buildings. Also, this study considers the connectivity of network and solves the overlapping problem of landmark candidate groups by network voronoi diagram. To extract landmarks, we defined building attribute data based on preceding researches. Next, we selected a choice point for pedestrians in pedestrian network data, and determined landmark candidate groups at each choice point. Building attribute data were calculated in the extracted landmark candidate groups and finally landmarks were extracted by principal component analysis. We applied the proposed method to a part of Gwanak-gu, Seoul and this study evaluated the extracted landmarks by making a comparison with labels and landmarks used by portal sites such as the NAVER and the DAUM. In conclusion, 132 landmarks (60.3%) among 219 landmarks of the NAVER and the DAUM were extracted by the proposed method and we confirmed that 228 landmarks which there are not labels or landmarks in the NAVER and the DAUM were helpful to determine a change of direction in path finding of local level.

A study on animal SHUNJANG in tombs 39 and 63 in Gyo-dong, Changnyeong (창녕 교동 39·63호분 동물순장 연구)

  • KWON Jooyoung;KIM Bosang
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.56-70
    • /
    • 2022
  • Tombs No. 39 and No. 63 in Gyo-dong, Changnyeong, are unique in the Changnyeong area in that they do not have additional burials because they are hoenggu-style tombs with an entrance on the north side. This study tried to understand the nature and meaning of the two separate stone walls at the entrance of the tomb along with the burial process of the tomb. These two stone walls mark small tombs built independently within a large tomb, with stone wall No. 39 stone wall No. 3 (No.39-3) and No. 63 stone wall No. 3 (No. 63-3). Both units are located in the middle of the northern wall of the burial body part and share one wall with the burial body part wall stone. All animal fluids inside the stone wall were identified. In particular, it was estimated that at least three dogs were buried as a result of identification of animal fluids No. 63-3. Above all, these animals have their heads facing outward with their backs to the main occupants, and do not overlap in a limited space and are placed side by side. Changnyeong Gyo-dong No. 39-3 and 63-3 were created in the process of building the burial body, and although they are independent relics, they form a subordinate relationship in that they were built along the main burial within one tomb. In addition, it is coercive in that it is placed in an orderly manner according to a certain direction in a state that has not been dismantled after killing an animal. Therefore, It is understood to be the SHUNJANG of dogs. Studies on animal fluids excavated from tombs in the Three Kingdoms period are interpreted as animal stewardship, sacrificial collection, and animal sacrifice depending on their location, and this is known as a series of animal sacrifice rites, namely, animal stewardship and sacrifice. This recognition is based on material objectification of animals, such as food or sacrifices. However, Changnyeong Gyo-dong No. 39-3 and 63-3 are different in that they recognize animals as spiritual beings in the process of funeral rites and are closely related to the ideology that there is life after death. In addition, analysis of the location and directionality of the remains is also required from multiple angles. These two SHUNJANG correspond to the entrance to the tomb, and the location is the most open space at the entrance. The appearance of a dog looking outward, etc., can also be interpreted as the meaning of protecting the tombs and byeoksa. This appearance can be compared with the dog depicted in a mural in a Goguryeo tomb that reflects the ancient world's thought and stone figures excavated from the tomb of King Muryeong of Baekje, and it is also consistent with the meaning of the JINMYOSU protecting the ancient tombs. This suggests that a multifaceted study on animal fluid burial remains is needed in the future.

Real-Time Traffic Information and Road Sign Recognitions of Circumstance on Expressway for Vehicles in C-ITS Environments (C-ITS 환경에서 차량의 고속도로 주행 시 주변 환경 인지를 위한 실시간 교통정보 및 안내 표지판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.55-69
    • /
    • 2017
  • Recently, the IoT (Internet of Things) environment is being developed rapidly through network which is linked to intellectual objects. Through the IoT, it is possible for human to intercommunicate with objects and objects to objects. Also, the IoT provides artificial intelligent service mixed with knowledge of situational awareness. One of the industries based on the IoT is a car industry. Nowadays, a self-driving vehicle which is not only fuel-efficient, smooth for traffic, but also puts top priority on eventual safety for humans became the most important conversation topic. Since several years ago, a research on the recognition of the surrounding environment for self-driving vehicles using sensors, lidar, camera, and radar techniques has been progressed actively. Currently, based on the WAVE (Wireless Access in Vehicular Environment), the research is being boosted by forming networking between vehicles, vehicle and infrastructures. In this paper, a research on the recognition of a traffic signs on highway was processed as a part of the awareness of the surrounding environment for self-driving vehicles. Through the traffic signs which have features of fixed standard and installation location, we provided a learning theory and a corresponding results of experiment about the way that a vehicle is aware of traffic signs and additional informations on it.

Design and Implementation of Place Recommendation System based on Collaborative Filtering using Living Index (생활지수를 이용한 협업 필터링 기반 장소 추천 시스템의 설계 및 구현)

  • Lee, Ju-Oh;Lee, Hyung-Geol;Kim, Ah-Yeon;Heo, Seung-Yeon;Park, Woo-Jin;Ahn, Yong-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.23-31
    • /
    • 2020
  • The need for personalized recommendation is growing due to convenient access and various types of items due to the development of information communication and smartphones. Weather and weather conditions have a great influence on the decision-making of users' places and activities. This weather information can increase users' satisfaction with recommendations. In this paper, we propose a collaborative filtering-based place recommendation system using living index by utilizing living index of users' location information on mobile platform to find users with similar propensity and to recommend places by predicting preferences for places. The proposed system consists of a weather module for analyzing and classifying users' weather, a recommendation module using collaborative filtering for place recommendations, and a management module for user preferences and post-management. Experiments have shown that the proposed system is valid in terms of the convergence of collaborative filtering algorithms and living indices and reflecting individual propensity.

Uniformity Evaluation of Elderly Hospital Outpatients' Waiting Space using Discrete Event Simulation (이산사건 시뮬레이션을 이용한 요양병원 외래부 대기공간 균일성 평가)

  • Yoon, So-Hee;Kim, Suk-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.490-499
    • /
    • 2017
  • In recent years, the introduction of complex systems analysis based on various variables has become more active in order to identify and analyze complex problems of Modern Society. Prediction of patients' spatial perception and usability according to the spatial arrangement of the outpatient department is a very important factor for providing high quality hospital service. For objective analysis, the standard program procedure and analysis index for the diseases of the elderly were prepared and the uniformity of the atmospheric space was evaluated through heat map analysis and quantitative analysis. In this study, 73 cells were installed and simulated to analyze the uniformity of the four alternatives according to the change of the arrangement of the medical care space, receiving space, and consultation space using the complex system analysis method for the nursing hospitals. The resulting density was derived. The results are as follows. 1)The layout of the reception space has the greatest influence on the total spatial density of the waiting space. 2) The uniformity of the waiting space can be increased by separating the examination space and the examination space. 3)The closer the location of the receiving space is from the entrance, the greater the density of the waiting space. Finally, this study applied discrete event simulation to the evaluation of uniformity of atmosphere space, and proved that the actor - based model can be utilized for utilization and evaluation as spatial analysis methodology.

A Study on Developing GIS-based Marine Exploration Data Management System using XML (GIS 기반의 XML을 이용한 해양탐사 데이터 관리 시스템 개발에 관한 연구)

  • Song, Hyun-Oh;Kim, Kye-Hyun;Kim, Mu-Jun
    • Spatial Information Research
    • /
    • v.18 no.4
    • /
    • pp.65-73
    • /
    • 2010
  • Recently, the importance of the ocean has been increasing internationally as the new source for mineral resources following the exhausted land resources that arc becoming scarce. On a long-term aspect, growth of nations by gaining competitiveness on marine resources was considered a paradigm. Because dominating the development right of marine resources came up as the main concern. South Korea has also been interested in marine resources and this is the reason why massive amounts of marine exploration data arc annually created through surveying and drilling around the Korean Peninsula. but the data has not been systematically managed very well because of its economic costs. Therefore, this research is mainly focused on systematical data managing methods. For Systematical data management. the exploration data is integrated and organized by using XML tables. This can be a systematical data management. because the methods release dependency between data and system, and it also enables to update existing data and renew the data. In the future, the constructed database from this study could definitely contribute to enhancing data management. As well, the developed system in this research can provide various spatial analysis and searching techniques to enable easier data provision of various exploration areas. Furthermore. this will be very useful to extend functions of the system and to adopt other types of DBMS. In addition, the spatial analysis and search function of location based service can be utilized through GIS. and it can support sustainable and systematic management in a long term.

Design and Implementation of the Spatio-Temporal DSMS for Moving Object Data Streams (이동체 데이타 스트림을 위한 시공간 DSMS의 설계 및 구현)

  • Lee, Ki-Young;Kim, Joung-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.159-166
    • /
    • 2008
  • Recently, according to the rapid development of location positioning technology and wireless communications technology and increasement of usage of moving object data, many researches and developments on the real-time locating systems which provides real time service of moving object data stream are under proceeding. However, MO (Moving Object) DBMS used based system in the in these systems is the inefficient management of moving object data streams, and the existing DSMS (Data Stream Management System) has problems that spatio-temporal data are not handled efficiently. Therefore, in this thesis, we designed and implemented spatio-temporal DSMS for efficient real-time management of moving object data stream. This thesis implemented spatio-temporal DSMS based STREAM (STanford stREam dAta Manager) of Stanford University is supporting real-time management of moving object data stream and spatio-temproal query processing and filtering for reduce the input loading. Specifically, spatio-temporal operators of the spatio-temporal DSMS support standard interface of SQL form which extended "Simple Feature Specification for SQL" standard specifications presented by OGC for compatibility. Finally, implemented spatio-temporal DSMS in this thesis, proved the effectiveness of the system that as applied real-time monitoring areas that require real-time locating of object data stream DSMS.

  • PDF

Smartphone-User Interactive based Self Developing Place-Time-Activity Coupled Prediction Method for Daily Routine Planning System (일상생활 계획을 위한 스마트폰-사용자 상호작용 기반 지속 발전 가능한 사용자 맞춤 위치-시간-행동 추론 방법)

  • Lee, Beom-Jin;Kim, Jiseob;Ryu, Je-Hwan;Heo, Min-Oh;Kim, Joo-Seuk;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.154-159
    • /
    • 2015
  • Over the past few years, user needs in the smartphone application market have been shifted from diversity toward intelligence. Here, we propose a novel cognitive agent that plans the daily routines of users using the lifelog data collected by the smart phones of individuals. The proposed method first employs DPGMM (Dirichlet Process Gaussian Mixture Model) to automatically extract the users' POI (Point of Interest) from the lifelog data. After extraction, the POI and other meaningful features such as GPS, the user's activity label extracted from the log data is then used to learn the patterns of the user's daily routine by POMDP (Partially Observable Markov Decision Process). To determine the significant patterns within the user's time dependent patterns, collaboration was made with the SNS application Foursquare to record the locations visited by the user and the activities that the user had performed. The method was evaluated by predicting the daily routine of seven users with 3300 feedback data. Experimental results showed that daily routine scheduling can be established after seven days of lifelogged data and feedback data have been collected, demonstrating the potential of the new method of place-time-activity coupled daily routine planning systems in the intelligence application market.

A Study on the Efficiency & Limitation of 3D Animation Production Management Using Production Management Tool - Focusing on Shotgun Software & Ftrack (3D 애니메이션 제작 관리를 위한 제작관리도구(Tool)의 효율성 및 한계 - 샷건(Shotgun)과 Ftrack(에프트랙)을 중심으로)

  • Lee, Esther Kkotsongyi
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.1-23
    • /
    • 2017
  • 3D animation production has had a pivotal position in current animation industry and the necessity of professional management tool for 3D animation production has claimed due to its sophisticated pipeline from advance of technology and global production partnership trend. Shotgun and Ftrack are providing the most appropriate management toolset for 3D animation management among the extant management tools and the efficiency of Shotgun & Ftrack is identified compared with the traditional document oriented management style. The biggest strength of production management using Shotgun is that all of the production staff can directly participate in the communication on the tools therefore they can share the information on Shotgun & Ftrack in real time without constraint of time and location. Moreover, all the process of the production and the history of the discussion on certain production issues are systematically accrue on the tool so that the production history can be easily tracked. Finally, the production management using tools contributes collecting and analysing the production information for the production management team in studios. However, Shotgun & Ftrack has metadata based retrieval method which cost huge amount of effort by human's manual annotation and it also has the limitation of accuracy. In addition, the fact that studios has to have technical professionals first in order to institute the tools into their studios is the actual difficulty of Korean studios when they want to use management tools for their project. Thus, this paper suggests adopting the content-based retrieval system on the tools and tools' expanded technical service for the studios as the solution of the identified issues.