• Title/Summary/Keyword: 개인방송

Search Result 699, Processing Time 0.03 seconds

The study on efficient conversion Radio media into digital - Focusing on the analysis results of radio audience's attitude - (국내 라디오방송의 효율적인 디지털전환 방안에 관한 연구 - 라디오 방송 청취행태 분석을 중심으로 -)

  • Kang, Dong-Gu;Park, Jun-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.137-148
    • /
    • 2007
  • Due to the advance of technology, the technology of various media is rapidly converged into digital technology. However, the conversion into digital radio is not achieved in korea yet. This paper is to suggest the best method of digital conversion of radio in korea by examining some conversion examples in foreign countries. In addition, the survey results on radio audience attitude is analysed by 2,000 audience samples in Korea based on the literature analysis. Radio is the unique media which have the strengths such as mobility, individuality, presence, broad coverage and instant. Most of all, radio cannot help keeping continuously the public broadcasting service in the future. So, the conversion into digital radio is crucial to sustain the competitiveness in digital media environment. This paper suggested that the digital conversion of radio broadcasting needs DRM transmission and should pursuit the policy which is distinguished between a AM and a standard FM, and between domestic broadcast and an international broadcast. Additionally, this paper proposed that we need to develop the multiple device for receiving of signal and the setting of standard technology.

  • PDF

Design and Implementation of a Personalized Broadcasting System based on TV-Anytime (TV-Anytime 기반 맞춤형 방송 전송 시스템 설계 및 구현)

  • Yang Seung-Jun;Lee HeeKyung;Kim Jae-Gon;Hong Jinwoo
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.345-356
    • /
    • 2004
  • In this paper, we present a design and implementation of a personalized broadcasting system using TV-Anytime metadata for providing personalized services. The TV-Anytime specifies metadata schema, metadata coding and delivery, and provides service models to provide personalized broadcasting content services at anytime when users want to consume using metadata, which includes ECG (Electronic Content Guide) and content descriptive information in a PDR (Personal Digital Recorder)-centric environment. The proposed personalized broadcasting system consists of a server that provides metadata binary-coding, encapsulation and multiplexing, and a client terminal that takes charge of de-multiplexing, metadata decoding, and metadata processing for personalized content accessing and consumption. This paper presents the details of the design of each functional module, and the evaluation results with a set of service scenarios in an end-to-end broadcasting test-bed.

A Study on the Improvements of the Big Data Guideline in Korea (빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구)

  • Kim, Sunnam;Lee, Hwansoo
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.20-39
    • /
    • 2014
  • The age of big data has not only opened new opportunities for economic growth in various industries, but it has also created new problems related to personal information protection and privacy invasion. Given this situation, Korea's communications commission has proposed a big data guideline that specifies how companies should collect and utilize personal information in the big data environment. However, this guideline is more focused on industrial development than personal information protection, and it contains many features that conflict with personal information protection law as it currently exists. As a result, civic groups strongly oppose the guideline, as it may create serious privacy issues for subjects of information gathering. Thus, this paper analyses the limitations of the guideline by comparing it with domestic and foreign laws about personal information protection and privacy. We also discuss the direction of legalization and institutionalization with respect to the secure use of big data.

Mobile Application UI Design for TV Broadcasting Content Recommendation (TV 방송콘텐츠 추천용 모바일 어플리케이션 UI 제안)

  • Son, Hee-Jeong;Choe, Jong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.86-93
    • /
    • 2012
  • The emergence of cable TV, satellite broadcasting and IPTV provides viewers with a variety of TV programs. However, viewers' desire for watching their favorite TV program at convenient time has increased because of insufficient spare time. As an increase in smart phone market has accelerated an entry into "the age of smart network media" since 2009, mobile media suggests services connected to other digital devices. Recently, there has been growing interest in TV controling system of smart phone. Therefore, the present study aims to provide an concept of the smart phone application which recommends contents of TV program by analyzing personal watching pattern. To suggest detailed direction of the interaction and UI design, we analyzed previous research and examples of TV controlling applications and products. In addition, public opinion survey was carried out to rationalize this study and suggest suitable UI structure.

A Study on the Information Effluence State and Measure by Peer-to-Peer Programs in Korea and Japan (P2P프로그램을 통한 한국과 일본의 정보유출 현황 및 대책 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.67-74
    • /
    • 2009
  • Information Effluence leaks are caused by the wide use of the P2P program in Japan and Korea lead by the increase of internet use and network infrastructure expansion. This research confirms the seriousness of the data collected from the P2P leaks of the two countries and furthers its study by researching how countermeasures are applied. The effectiveness is verified by collecting data according to countermeasure applied periods. Both countries had information leaks, but in the case of Japan, not only personal information leaks but corporation, administrative agency, military, and others in a wide range as well. As a countermeasure against information effluence, Korea is enforcing counter plans mainly against the P2P service businesses and for Japan, various plans are taken such as business guides for each agency, organization management, SW development and supply, HW supply, and ect. The leaks in Japan were more severe than the ones in Korea but they had well planned countermeasures that were applied. Therefore if the Japanese countermeasure on information effluence of P2P programs is taken as a lesson, Korea can prevent the problem of leaks beforehand.

  • PDF

A study on Model of Personal Information Protection based on Artificial Intelligence Technology or Service (인공지능 기술/서비스 기반의 개인정보 보호 모델에 대한 연구)

  • Lee, Won-Tae;Kang, JangMook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.1-6
    • /
    • 2016
  • A.I. has being developed from the technology for Big data analysis to the technology like a human being. The sensing technology of IOT will make A.I. have the more delicate sense than human's five senses. The computer resource is going to be able to support A.I. by clouding networking technology wherever and whenever. Like this A.I. is getting developed as a golden boy of the latest technologies At the same time, many experts have the anxiety and bleak outlook about A.I. Most of dystopian images of the future come out when the contemplative view is lost or it is not possible to view the phenomena objectively. Or it is because of the absence of confidence and ability to convert from the visions of technology development to the subject visions of human will. This study is not about the mass dismissal, unemployment or the end of mankind by machinery according to the development of A.I. technology and service, but more about the occurrent issue like the personal information invasion in daily life. Also the ethical and institutional models are considered to develop A.I. industry protecting the personal information.

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

Personalized TV Program Recommendation in VOD Service Platform Using Collaborative Filtering (VOD 서비스 플랫폼에서 협력 필터링을 이용한 TV 프로그램 개인화 추천)

  • Han, Sunghee;Oh, Yeonhee;Kim, Hee Jung
    • Journal of Broadcast Engineering
    • /
    • v.18 no.1
    • /
    • pp.88-97
    • /
    • 2013
  • Collaborative filtering(CF) for the personalized recommendation is a successful and popular method in recommender systems. But the mainly researched and implemented cases focus on dealing with independent items with explicit feedback by users. For the domain of TV program recommendation in VOD service platform, we need to consider the unique characteristic and constraints of the domain. In this paper, we studied on the way to convert the viewing history of each TV program episodes to the TV program preference by considering the series structure of TV program. The former is implicit for personalized preference, but the latter tells quite explicitly about the persistent preference. Collaborative filtering is done by the unit of series while data gathering and final recommendation is done by the unit of episodes. As a result, we modified CF to make it more suitable for the domain of TV program VOD recommendation. Our experimental study shows that it is more precise in performance, yet more compact in calculation compared to the plain CF approaches. It can be combined with other existing CF techniques as an algorithm module.

Needs and considerrations of corporate security assessment (Focusing on financial companies) (기업 보안평가 공시제도의 필요성 및 구현방안 (금융회사 중심으로))

  • Kim, Bo;Lim, Jong-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.273-279
    • /
    • 2014
  • Recently, it was occurred in the nation's largest Information spill about 140 million cases of credit card customers' personal and credit information. As such, it was rapidly to increase in consumer complaints about the privacy of personal information in accordance with outflow of financial companies increased accident. But it is still not clear precaution. Therefore, in financial customer position, it is possible to confirm and determine in advance whether or not superior to the security company. In addition, It is time to be required institutional device that can be a real effort to equip a good security company. This report is considered a model of "Disclosure of corporate security assessment " of these devices institutional study. And We study in realistic and objective stance about why do we need this policy.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.