• Title/Summary/Keyword: 개인방송

Search Result 699, Processing Time 0.023 seconds

Personal Broadcasting System Using mOBCP-based Overlay Multicast Tree Construction Method (개인 방송 시스템을 위한 mOBCP 기반의 오버레이 멀티캐스트 트리 구성 방안)

  • Nam, Ji-Seung;Kang, Mi-Young;Jeon, Jin-Han;Son, Seung-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.539-546
    • /
    • 2007
  • For better performance and to avoid member service annoyance that results due to joining-clients' waiting durations and time-outs when there are more than one client wanting to join concurrently for Personal Broadcasting System service, there is a need for improving concurrent member joining mechanism. For a more efficient and better performing, this paper apply Overlay Multicast based mini-Overlay Broadcasting Control Protocol(mOBCP) Algorithm on Personal Broadcasting System. mOBCP proposed is performance-effective mechanism, since it considers the case of how fast will children, concurrently, find and join new parents when paths to existing parents are in Failure. The performance comparison, in terms of tree construction time variation and Latency are done through simulations and the results conclude in favour of the Proposed mOBCP.

Research of the human factors required to the stereoscopic camera system in cellular phone (핸드폰용 스테레오 카메라에서의 입체시 인지 요소에 대한 연구)

  • Lee, K.H.;Son, J.Y.;Kim, S.H.;Yoon, Y.S.;Kim, S.K.
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.60-63
    • /
    • 2007
  • 최근, 핸드폰은 일상생활의 필수품이 되었다. 특히 카메라가 장착된 핸드폰은 개인홍보와 오락요소로의 대표적인 도구로 사용된다. 나아가 양안카메라가 적용된 핸드폰은 사용자에게 입체감을 전달할 것이며, 입체감은 보다 효과적인 개인홍보 및 오락성을 제공할 것이다. 핸드폰은 휴대가 용이하지만 제한된 표시소자의 크기 및 해상도로 인하여 입체시 구현 시 사용자에게 손실된 정보 및 낮은 임장감을 제공한다. 이에 본 연구는 기존의 입체시 구현에 대한 구속조건들을 분석하고 핵심 요인을 산출하여, 핸드폰 환경에서의 최적의 입체시 구현을 위한 새로운 구속조건의 범위를 정량화하였다. 대표적인 구속조건으로는 수평, 수직 시차량이 고려되었다. 본 연구의 결과는 핸드폰용 양안카메라의 제작공차 및 효과적인 시차영상 제작을 위한 기준을 제시한다. 연구에 사용된 제품으로는 QVGA해상도(320*240) 및 2.8' 크기의 표시소자인 PDA폰이며, 입체시에 대한 구속조건을 정량화하기 위하여 수직, 수평이동이 가능한 지그를 사용하여 실험의 정확성을 높였다. 피실험자는 10명이며 남자 7명, 여자 3명으로 구성되었다.

  • PDF

A Study on Effective Countermeasures against E-mail Propagation of Intelligent Malware (지능형 악성코드의 이메일 전파에 대한 효과적인 대응 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Most cyber breaches are caused by APT attacks using malware. Hackers use the email system as a medium to penetrate the target. It uses e-mail as a method to access internally, destroys databases using long-term collected vulnerabilities, and illegally acquires personal information through system operation and ransomware. As such, the e-mail system is the most friendly and convenient, but at the same time operates in a blind spot of security. As a result, personal information leakage accidents can cause great damage to the company and society as a whole. This study intends to suggest an effective methodology to securely manage the APT attack by strengthening the security configuration of the e-mail system operating in the enterprise.

The Study for Privacy Trust Zone of Smart Monitoring in Mobile Environment (모바일 환경에서 스마트한 모니터링이 가능한 프라이버시 신뢰 존 정보 제공 시스템에 관한 연구)

  • Kang, Jang-Mook;Lee, Woo-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Mobile devices like iphone, ipad, kindle, and PDA are used as everyday tool. In the mobile environment, smart phones and other mobile units are also used as a tool for protection or infringement of personal information. Therefore, smart monitoring technology is required to protect personal information and privacy. On the other hand, with smart phones and the mobile environment, diverse application technologies are realized on hardware and software platforms. Therefore, this paper designs the network structure that forms privacy trust zone, and based on this, deals with the monitoring and monitoring prevention system with a focus on CCTV, through which this paper proposes a system that provides privacy trust zone information and its utilization which is capable of smart monitoring.

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

Development of e-Receipt System Using Embedded Software Engineering Techniques (임베디드 소프트웨어 공학기법을 사용한 전자영수증 체계의 개발)

  • Lim, Joon-Suk;Oh, Young-Seok;Um, Sung-Sik;Joo, Bok-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.117-122
    • /
    • 2009
  • In these days, world economic crisis is getting worse and most of us are having difficulties in handling financial balance. By noticing that credit card is the most important payment method of individuals, we developed e-receipt system, which helps a person easily keep track of credit card spendings by showing purchase and transaction details in real-time. We've used embedded software engineering techniques in developing the e-receipt system. The system we developed here will benefit most of us by preventing over-spending of credit cards and will lead to healthy spending habits.

  • PDF

OWL Modeling using Ontology for Context Aware Recommendation Service (상황 인식 추천 서비스를 위한 온톨로지 이용 OWL 모델링)

  • Chang, Chang-Bok;Kim, Manj-Jae;Choi, Eui-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.265-273
    • /
    • 2012
  • It is essential to have Context-aware technology for personalization recommendation services and the appropriate representation and definition of Context information for context-aware. Ontology is possible to represent knowledge freely and knowledge can be extended by inferring. In addition, design of the ontology model is needed according to the purposes of utilization. This paper used context-aware technologies to implement a user personalization recommendation service. It also proposed the context through OWL modeling for user personalization recommendation service and used inference rules and inference engine for context reasoning.

Design of Metadata Retrieval Structure for Efficient Browsing of Personalized Broadcasting Contents (개인화된 방송 컨텐츠의 효율적 검색을 위한 메타데이터 검색 구조 설계)

  • Lee, Hye-Gyu;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.100-105
    • /
    • 2009
  • In this paper, we Propose a browsing system to reduce the contents retrieval time in the personalized broadcasting system. For this purpose, we add a subgenre table between Classification DS and Summarization DS of MPEG-7 MDS. The subgenre includes a subgenre list to shorten the searching time of contents which we want to find. In addition we divide metadata into event and object using Summarization DS of the MPEG-7 MDS. In this way, the hierarchical browsing of broadcasting contents is made possible. This structure may reduce the complexity of search by storing event and object separately. Our simulation results show that the search time of the proposed system is shorter than that of the previous works.

A Study on Disaster Prevention Improved Performance by Utilizing Directional Speakers (지향성스피커를 활용한 방재성능 향상에 관한 연구)

  • Kang, Shinwook;Jeon, Gaehyun;Kim, Teahwan
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.3
    • /
    • pp.235-241
    • /
    • 2016
  • Recently our country was entering a high-tech society with social and economic development. However, the individual's ability to respond to disasters is lowered by the increase in complexity society. Accurate situation assessment and disaster response by a margin of personal information that can identify when a disaster has been difficult. Until now, by leveraging Standard speaker was the emergency alert broadcast. However, it was difficult to have regular speakers reverberation, a distinct attenuation of sound by listening to the sound, etc. due to the reflection of sound. By using a directional speaker that is characteristic of the sound attenuation of sound is straight to solve this problem and obtain feedback on measures that can effectively provide the oocytes to a valid information on a disaster situation and the evacuation.

Music Source and Signature Storage Method using Blockchain and Distributed Storage System (블록체인 및 분산저장시스템을 활용한 음원 및 시그니쳐 저장 방법)

  • Lee, Kyoung-Sik;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.956-964
    • /
    • 2019
  • In the age of personal media such as YouTube and Twitch, individual media content creation and consumption have become simpler. A huge amount of media content is created and consumed through platform services. In this regard, interest in copyright of media contents is increasing. In particular, the sound source is an indispensable element in almost all media contents production. In this paper, we propose a method to store the sound source and its signature using blockchain and distributed storage system to verify the copyright of music contents. We Identify the possibility of including the audio signature extraction result of the sound source as blockchain transaction data. Through experiments, we compare the input and output speed when the sound source and its signature are stored in the distributed storage system.