• Title/Summary/Keyword: network service

Search Result 8,356, Processing Time 0.033 seconds

Analysis of Space Use Patterns of Public Library Users through AI Cameras (AI 카메라를 활용한 공공도서관 이용자의 공간이용행태 분석 연구)

  • Gyuhwan Kim;Do-Heon Jeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.4
    • /
    • pp.333-351
    • /
    • 2023
  • This study investigates user behavior in library spaces through the lens of AI camera analytics. By leveraging the face recognition and tracking capabilities of AI cameras, we accurately identified the gender and age of visitors and meticulously collected video data to track their movements. Our findings revealed that female users slightly outnumbered male users and the dominant age group was individuals in their 30s. User visits peaked between Tuesday to Friday, with the highest footfall recorded between 14:00 and 15:00 pm, while visits decreased over the weekend. Most visitors utilized one or two specific spaces, frequently consulting the information desk for inquiries, checking out/returning items, or using the rest area for relaxation. The library stacks were used approximately twice as much as they were avoided. The most frequented subject areas were Philosophy(100), Religion(200), Social Sciences(300), Science(400), Technology(500), and Literature(800), with Literature(800) and Religion(200) displaying the most intersections with other areas. By categorizing users into five clusters based on space utilization patterns, we discerned varying objectives and subject interests, providing insights for future library service enhancements. Moreover, the study underscores the need to address the associated costs and privacy concerns when considering the broader application of AI camera analytics in library settings.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

A Study on the Critical Factors Affecting Investment Decision on TIPS (민간주도형 기술창업지원 팁스(TIPS) 투자의사 결정요인에 관한 연구)

  • Goh, Byeong Ki;Park, Sol Ip;Kim, Da Hye;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.5
    • /
    • pp.31-47
    • /
    • 2022
  • The TIPS, a representative public-private cooperative project to revitalize the start-up ecosystem, is a government supported policy that promotes successful commercialization through various start-up support for technology-based startups. The purpose of this study is to analyze the investment decision factors of the TIPS program and to derive priorities. In order to achieve the research purpose, first, the investment decision factors were derived through literature analysis, a Delphi surveys were conducted on investors and experts participating in the evaluation of the TIPS program, and an AHP analysis was conducted on 20 VCs to empirically analyze the priority of factors on investment decisions. As a result of the analysis, the importance of critical factors was confirmed in the order of entrepreneurs(team) > market > product/service > finance > network. The importance of detailed factors was found in the order of entrepreneur's reliability and authenticity > market growth and scalability > team members' expertise and capabilities > adequacy of current market size > new market creation. This study presented the capabilities of technology-based startups preparing to participate in the TIPS program by deriving factors that influence investment decisions from an investor's perspective and comparing and analyzing the importance. It is also meaningful that basic data on determinants of private-led investment decision-making were presented to stake-holders such as venture capital, accelerator, and start-up support institutions.

Investigating Key Security Factors in Smart Factory: Focusing on Priority Analysis Using AHP Method (스마트팩토리의 주요 보안요인 연구: AHP를 활용한 우선순위 분석을 중심으로)

  • Jin Hoh;Ae Ri Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.185-203
    • /
    • 2020
  • With the advent of 4th industrial revolution, the manufacturing industry is converging with ICT and changing into the era of smart manufacturing. In the smart factory, all machines and facilities are connected based on ICT, and thus security should be further strengthened as it is exposed to complex security threats that were not previously recognized. To reduce the risk of security incidents and successfully implement smart factories, it is necessary to identify key security factors to be applied, taking into account the characteristics of the industrial environment of smart factories utilizing ICT. In this study, we propose a 'hierarchical classification model of security factors in smart factory' that includes terminal, network, platform/service categories and analyze the importance of security factors to be applied when developing smart factories. We conducted an assessment of importance of security factors to the groups of smart factories and security experts. In this study, the relative importance of security factors of smart factory was derived by using AHP technique, and the priority among the security factors is presented. Based on the results of this research, it contributes to building the smart factory more securely and establishing information security required in the era of smart manufacturing.

A Study on Determinants of VR Video Content Popularity (VR 영상 조회수 결정요인 연구)

  • Soojeong Kim;Chanhee Kwak;Minhyung Lee;Junyeong Lee;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.25-41
    • /
    • 2020
  • Along with the expectation about 5G network commercialization, interests in realistic and immersive media industries such as virtual reality (VR) are increasing. However, most of studies on VR still focus on video technologies instead of factors for popularity and consumption. Thus, the main objective of this research is to identify meaningful factors, which affect the view counts of VR videos and to provide business implications of the content strategies for VR video creators and service providers. Using a regression analysis with 700 VR videos, this study tries to find major factors that affect the view counts of VR videos. As a result, user assessment factors such as number of likes and sicknesses have a strong influence on the view counts. In addition, the result shows that both general information factors (video length and age) and content characteristic factors (series, one source multi use (OSMU), and category) are all influential factors. The findings suggest that it is necessary to support recommendation and curation based on user assessments for increasing popularity and diffusion of VR video streaming.

Performance of Passive UHF RFID System in Impulsive Noise Channel Based on Statistical Modeling (통계적 모델링 기반의 임펄스 잡음 채널에서 수동형 UHF RFID 시스템의 성능)

  • Jae-sung Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.835-840
    • /
    • 2023
  • RFID(Radio Frequency Identification) systems are attracting attention as a key component of Internet of Things technology due to the cost and energy efficiency of application services. In order to use RFID technology in the IoT application service field, it is necessary to be able to store and manage various information for a long period of time as well as simple recognition between the reader and tag of the RFID system. And in order to read and write information to tags, a performance improvement technology that is strong and reliable in poor wireless channels is needed. In particular, in the UHF(Ultra High Frequency) RFID system, since multiple tags communicate passively in a crowded environment, it is essential to improve the recognition rate and transmission speed of individual tags. In this paper, Middleton's Class A impulsive noise model was selected to analyze the performance of the RFID system in an impulsive noise environment, and FM0 encoding and Miller encoding were applied to the tag to analyze the error rate performance of the RFID system. As a result of analyzing the performance of the RFID system in Middleton's Class A impulsive noise channel, it was found that the larger the Gaussian noise to impulsive noise power ratio and the impulsive noise index, the more similar the characteristics to the Gaussian noise channel.

Patent Application Research Analysis on Domestic Smart Factory Technology Through SNA (SNA를 통한 국내 스마트공장 기술에 관한 특허 출원 조사 분석)

  • Jae-Hyo Hwang;Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.267-274
    • /
    • 2024
  • In this paper, we investigated the number of domestic patent applications by year, the number of domestic patent disclosures by year, and the number of domestic registrations by year regarding smart factories. The number of patent applications by applicant type was investigated. Based on the patents studied, it was found that the IPC appearing in the most patents was G05B 19/418. In addition, through social network analysis of smart factory patented IPCs, it was found that G05B 19/418 was the IPC with the highest degree of centrality. From the above, if the IPC of the core technology of the patent submitted for smart factory is G05B 19/418, the technology combined with G05B 23/02, that is, the technology combining "factory control" and "monitoring" is the most patented. When the IPC of the core technology was G06Q 50/04, it was confirmed that the technology combined with G06Q 50/10, that is, the technology combining "manufacturing" and "service" was the most applied for patents. Through this, it was found that in order to apply for a patent for a smart factory, it would be necessary to file a patent application that takes into account the connectivity between IPCs.

A Study on the Extraction of Psychological Distance Embedded in Company's SNS Messages Using Machine Learning (머신 러닝을 활용한 회사 SNS 메시지에 내포된 심리적 거리 추출 연구)

  • Seongwon Lee;Jin Hyuk Kim
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.23-38
    • /
    • 2019
  • The social network service (SNS) is one of the important marketing channels, so many companies actively exploit SNSs by posting SNS messages with appropriate content and style for their customers. In this paper, we focused on the psychological distances embedded in the SNS messages and developed a method to measure the psychological distance in SNS message by mixing a traditional content analysis, natural language processing (NLP), and machine learning. Through a traditional content analysis by human coding, the psychological distance was extracted from the SNS message, and these coding results were used for input data for NLP and machine learning. With NLP, word embedding was executed and Bag of Word was created. The Support Vector Machine, one of machine learning techniques was performed to train and test the psychological distance in SNS message. As a result, sensitivity and precision of SVM prediction were significantly low because of the extreme skewness of dataset. We improved the performance of SVM by balancing the ratio of data by upsampling technique and using data coded with the same value in first content analysis. All performance index was more than 70%, which showed that psychological distance can be measured well.

A Study on the Perception and Experience of Daejeon Public Library Users Using Text Mining: Focusing on SNS and Online News Articles (텍스트마이닝을 활용한 대전시 공공도서관 이용자의 인식과 경험 연구 - SNS와 온라인 뉴스 기사를 중심으로 -)

  • Jiwon Choi;Seung-Jin Kwak
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.363-384
    • /
    • 2024
  • This study was conducted to examine the user's experiences with the public library in Daejeon using big data analysis, focusing on the text mining technique. To know this, first, the overall evaluation and perception of users about the public library in Daejeon were explored by collecting data on social media. Second, through analysis using online news articles, the pending issues that are being discussed socially were identified. As a result of the analysis, the proportion of users with children was first high. Next, it was found that topics through LDA analysis appeared in four categories: 'cultural event/program', 'data use', 'physical environment and facilities', and 'library service'. Finally, it was confirmed that keywords for the additional construction of libraries and complex cultural spaces and the establishment of a library cooperation system appeared at the core in the news article data. Based on this, it was proposed to build a library in consideration of regional balance and to create a social parenting community network through business agreements with childcare and childcare institutions. This will contribute to identifying the policy and social trends of public libraries in Daejeon and implementing data-based public library operations that reflect local community demands.

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).