RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보

        다목적 차량번호 인식 기술에 관한 연구

        변종문,정석화,신용태 한국IT정책경영학회 2015 한국IT정책경영학회 논문지 Vol.7 No.3

        In this study, we present the introduction proposal of vehicle number recognition technology that uses OCR (optical character reader) in order to increase the efficiency of the National Police Agency transportation business. Vehicle number recognition technology can be utilized for traffic laws violation vehicle and illegal delinquent vehicle crackdown. Moreover, by applying the movable terminal it is, is capable of real-time scanning, it is possible to efficiently improve the policing and uncovered business. Through this study, we present the structure of the automated system of license plate search of illegal delinquent car vehicle , to consider the law due to the application of the technology , the current state of the system

      • KCI등재후보

        공공기관 모바일 플랫폼의 구조와 방향성에 대한 연구

        변종문,윤석호,신용태 한국IT정책경영학회 2016 한국IT정책경영학회 논문지 Vol.8 No.3

        With the spread of development and smartphone communication technology , various mobile APP have been developed. Public institutions and companies , are used to develop mobile business APP of smartphone -based in the paradigm of smart work , is expected to be developed is also a lot of business for mobile APP future. Integrated mobile platform to effectively manage these mobile APP , the efficiency of development / operation on the application of the common module , expandability , can solve such standardization of security . In this study, we analyzed the current state of the mobile platform , presents a mobile platform in the direction required for the public institutions.

      • KCI등재후보

        증거 암호패킷 수집시 네트워크포렌식의 신뢰 방안

        정석화,변종문,전문석,도경화 한국IT정책경영학회 2015 한국IT정책경영학회 논문지 Vol.7 No.3

        The digital forensic is typically dependent on ‘system forensic’ among several fields. But, using system forensic skills to discover the truth is getting difficult due to improvement of anti-forensic techniques. Therefore, ‘Network forensic’ filed has been suggested gradually as a way to overcome the limits of system forensic. The network forensic is one of forensic fileds dealing with volatile digital packets that are transmitted in real-time. In network forensic methods, several problems are occurred that the copy of digital packets must be used during analysis not original packets. Also the decryption procedure is often necessary in the case of that digital packets are encrypted. This paper focuses on problems of existing network forensic filed, and methods to decrypt encrypted network packets. Also it suggestes how the real-time transmitted packets are reliable digital evidence, legally and procedurally.

      • KCI등재후보

        공공시설 입지갈등 해결 모델에 관한 사례 연구

        윤석호,심호성,변종문,오철호 한국IT정책경영학회 2016 한국IT정책경영학회 논문지 Vol.8 No.1

        This article proposes "a multilateral policy-mix conflict resolution model" as a method for settling conflicts over deciding location of public facilities through a case study on relocation of Anyang prison. In this new conflict resolution model, stakeholder including ministries, local governments, and the private sector cooperate in making policy-mix using various means such as urban development, financial aid, and improvement of educational environment to persuade the opponents. This model is expected to be applied to resolve conflicts over decision of public facilities location and widely utilized. the loss/theft of mobile devices or wiretapping/data leakage by malicious code infection. Furthermore, Mobile devices are often used as a channel for stealing critical business data of the enterprise. Even if the enterprise takes measures to prevent critical data leakage, such as enforcing entrance control, or attaching security stickers on visitors’ mobile devices, it is urgent to have more fundamental prevention measures. In this paper, a mobile device security control model is proposed, which includes location-base services using RFID or beacon, as well as a role-based access control model.

      • 사이버 교육 시스템의 설계에 관한 연구

        백신원,이준휘,기동,변종 한경대학교 2003 論文集 Vol.35 No.-

        The education based on the web (WBI) has need of the formation of a new educational paradigm which is different from the method of an existent traditional class as a model of a new teaching-learning. Also, a credit is recognized in case that the person concerned obtains a national certificate of qualification through establishment and promulgation by 【the law of the recognized credit etc.】 in the national educational reform. In such realities on-line learning-site of theory on the qualification of an information processing to use the web. However it is nearly difficult to find out the learning sites related to a subject for the information processing exercise revised in Aug, the year 2001. Thus, this thesis designed and embodied the educational system of the information processing exercise to reconstruct a Supervision Program for a scholastic examination test, a learning content of Visual Basic, a mock entrance examination, and a previous questions of practical in order to obtain the certificate of information processing qualification through a self-directed learning to use the web without limitation of time and space by the students-selves to apply 10 steps of a general design process with WBI to the method of development.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼