• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.036 seconds

A Study on the Smart Tourism Awareness through Bigdata Analysis

  • LEE, Song-Yi;LEE, Hwan-Soo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.5
    • /
    • pp.45-52
    • /
    • 2020
  • Purpose: In the 4th industrial revolution, services that incorporate various smart technologies in the tourism sector have begun to gain popularity. Accordingly, academic discussions on smart tourism have also started to become active in various fields. Despite recent research, the definition of smart tourism is still ambiguous, and it is not easy to differentiate its scope or characteristics from traditional tourism concepts. Thus, this study aims to analyze the perception of smart tourism exposed online to identify the current point of smart tourism in Korea and present the research direction for conceptualizing smart tourism suitable for the domestic situation. Research design, data, and methodology: This study analyzes the perception of smart tourism exposed online based on 20,198 news data from portal sites over the past six years. Data on words used with smart tourism were collected from the leading portal sites Naver, Daum, and Google. Text mining techniques were applied to identify the social awareness status of smart tourism. Network analysis was used to visualize the results between words related to smart tourism, and CONCOR analysis was conducted to derive clusters formed by words having similarity. Results: As a result of keyword analysis, the frequency of words related to the development and construction of smart tourism areas was high. The analysis of the centrality of the connection between words showed that the frequency of keywords was similar, and that the words "smartphones" and "China" had relatively high connection centrality. The results of network analysis and CONCOR indicated that words were formed into eight groups including related technologies, promotion, globalization, service introduction, innovation, regional society, activation, and utilization guide. The overall results of data analysis showed that the development of smart tourism cities was a noticeable issue. Conclusions: This study is meaningful in that it clearly reflects the differences in the perception of smart tourism between online and research trends despite various efforts to develop smart tourism in Korea. In addition, this study highlights the need to understand smart tourism concepts and enhance academic discussions. It is expected that such academic discussions will contribute to improving the competitiveness of smart tourism research in Korea.

A Design and Implementation of Web-based System for Real-Time Infographics of Airport Refueling Facilities (공항 급유 설비의 실시간 인포그래픽을 위한 웹 기반 시스템 설계 및 구현)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.305-310
    • /
    • 2015
  • A controlling system for airport refueling facilities is connected to sensors which collect various informations. Informations which are transmitted at a high speed in various sensors are processed by a dedicated software in the controlling system. The problems of system maintenance and network traffic caused by the use of dedicated software reduce the efficiency of the system operation. Therefore, a web-based system that can be accessed using the Internet environment is required. In this paper, we propose a system showing web-based real-time informations. To do this, we change the function of the communication by each sensor to a facade structure, and design a system for transferring web-based real-time informations. Also we propose data-driven infographics for displaying the real-time big data information at a high speed on the web. Finally, we compare and analyse the proposed system between the existing system and show that our system can effectively display the real-time information on the web.

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.

The Implementation of Interconnection Modeling between Learning Management System(LMS) (학습관리시스템(LMS)간 상호 연동 모델 구현)

  • Nam, Yun-Seong;Yang, Dong-Il;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.640-645
    • /
    • 2011
  • The educational exchange through e-learning is working very well in such case as develop e-learning, development of various learning tools, cooperative practical use of e-learning contents, etc. However because there were no considerations of LMS(Learning Management System) interconnection when each systems were developed, the exchange through e-learning is starting to raise a problem. Hence in this thesis, this paper presents designed model about efficient LMS interconnection through analysis case of exchange through e-learning and deduce problem. In the first place essential part for is defied study such as lecture establishment data, lecture data, user data, class data, student learning tracking to interconnection data, then constituted data interconnection table used view by data interconnection process. By experiment result, the accessibility between students and professors was more convenience, and decreased work process by less data exchange. Henceforth there are researches in development of various essential parts for study, considered security of LMS interconnection.

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

A Study on 2D/3D Map Navigation System Based on Virtual Reality (VR 기반 2D/3D Map Navigation 시스템에 관한 연구)

  • Kwon Oh-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.928-933
    • /
    • 2006
  • This paper aims to build a 2D/3D map navigation that the user can efficiently operate in terms of feeding attribute information after securing 2D/3D space data. This system provides 2D/3D screen navigation that supports variety of operational visual effects and displays the location that the user is retrieving. Also it presents picture information of buildings with higher resolution and URL, name of store, phone number, other related information. Effectiveness of this system is as follows: first, development and distribution of a new technology of 2D/3D spatial database that changes the previous 2D/3D based system concept to the 2D/3D based one. Second, increase of developmental productivity by utilizing the integrated 2D/3D spatial database for developing various interfaces. Finally, it provides security of the preemptive technological position with world class domestic 2D/3D spatial database technologies.

A Study on Occupational Stress of the VTS Operators (해상교통관제사의 스트레스 수준 측정에 관한 연구)

  • Kim, Yu-Sun;Park, Young-Soo;Jo, So-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.38 no.6
    • /
    • pp.615-621
    • /
    • 2014
  • VTS operators may suffer from acute, chronic, or traumatic stress caused by their workload and working environments associated with task or combination of task. This study intended to measure the level of VTS operator' stress and find out factors influencing it by understanding their characteristics during carrying out their task. For this purpose, analyzed the data collected through conducting survey on VTS operators as the Korea Occupational Stress(KOSS) and Psychological Well-being Index(PWI). As a result, VTS operators are experiencing higher level of psychological stress than the national average. And the factors to cause VTS operators' occupational stress can be summarized as follows; working environment factors, shift work especially night duty, workload, etc. This study provides the fundamental information for understanding human factors of VTS operator' occupational stress.

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

Comparison of Meteorological Drought and Hydrological Drought Index (기상학적 가뭄지수와 수문학적 가뭄지수의 비교)

  • Lee, Bo-Ram;Sung, Jang Hyun;Chung, Eun-Sung
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • In this study, meteorological drought indices were examined to simulate hydrological drought. SPI (Standardized Precipitation Index) and SPEI (Standardized Precipitation Evapotranspiration Index) was applied to represent meteorological drought. Further, in order to evaluate the hydrological drought, monthly total inflow and SDI (Streamflow Drought Index) was computed. Finally, the correlation between meteorological and hydrological drought indices were analyzed. As a results, in monthly correlation comparison, the correlation between meteorological drought index and monthly total inflow was highest with 0.67 in duration of 270-day. In addition, a meteorological drought index were correlated 0.72 to 0.87 with SDI. In compared to the annual extremes, the relationship between meteorological drought index and minimum monthly inflow was hardly confirmed. But SDI and SPEI showed a slightly higher correlation. There are limitation that analyze extreme hydrological drought using meteorological drought index. For the evaluation of the hydrological drought, drought index which included inflow directly is required.