• Title/Summary/Keyword: 네트워크 공유

Search Result 1,953, Processing Time 0.032 seconds

An Efficient Content Sharing Scheme in Structured P2P Systems (구조적 P2P 시스템에서 효율적 컨텐트 공유 기법)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.430-434
    • /
    • 2009
  • In this paper, we propose an efficient content sharing scheme for structured P2P overlay network. The main idea of this paper is to exploit the identified routing table instead of anonymous one using social relationships among nodes. The contribution of this paper is to present a means of mitigating the problem of 'free riding' and the threat of misrouting attack by malicious nodes.

The Development of UCC Production App for Sharing on the SNS (SNS 공유를 위한 UCC 제작 앱 개발)

  • Jang, Eun-Gyeom;Kim, Jung-Eun;Kim, Hyeong-Seok;Lee, Kyong-Min;Choi, Kyung-Hoon;Lee, Da-Hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.155-156
    • /
    • 2015
  • 대중화된 소셜 네트워크 환경에서 사용자가 제작한 콘텐츠를 빠르고 간편하게 공유할 수 있도록 하는 모바일 App을 개발하였다. 기존 사용자 영상 콘텐츠 제작 환경에서는 필요 이상의 소음과 잡음이 혼재하여 영상에서 풍기는 이미지의 감동을 저해하고 있다. 이러한 주의의 소음과 잡음으로부터 영상을 보호하도록 배경음악을 영상과 함께 재생하여 영상의 감동과 느낌을 사용자에게 전달하기 위한 App이다. 또한 소셜 네트워크 환경에 간편하게 업로드 할 수 있도록 페이스북을 통해 다른 사용자와 빠른 공유를 할 수 있다.

  • PDF

CTI Lifecycle for network attack prevention (네트워크 공격 방지를 위한 사이버 위협 인텔리전스 프로세스 연구)

  • Cha, Jeonghun;Jo, Jeong Hoon;Kang, Jungho;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.470-472
    • /
    • 2019
  • Cyber Threat Intelligence (CTI)는 성장하는 사이버 공격에 대응하는 새로운 보안체계 개념으로써 최근 많은 조직에서 보안성을 향상시키기 위해 도입하고 있다. 조직에서 CTI의 도입은 보안 조직간의 위협 정보와 그에 대응할 수 있는 방어 전략을 공유하여 다양한 선제공격을 방어하기 위해 필수적이다. 이에 따라 CTI 위협 정보를 공유하는 조직이 점차 늘어나고 있으며 정보의 양은 점차 많아지고 있다. 하지만 정보를 공유받는 대부분의 조직이 공격자가 악의적으로 잘못된 위협 정보를 수집한 경우 또 다른 사이버 공격으로 이어질 수 있다. 본 논문에서는 CTI 정보 공유에서 사이버 위협 대응 조치 전략을 조직에 적용하기 전에 가상의 네트워크 아키텍처에서 적용시킨 후 평가 및 검증을 통해 공격을 목적으로 한 악의적인 정보가 적용되지 않도록 사전에 방어한다.

A Study on Analysis and Utilization of Public Sharing Bike Data - By applying the data of Ouling, Public Sharing Bike System in Sejong City (공유자전거 데이터 분석 및 활용방안 연구 세종특별자치시 공유자전거 어울링의 데이터를 적용하여)

  • An, Se-Yun;Ju, Hannah;Kim, So-Yeon;Jo, Min-Jun;Kim, Sungwhan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.259-270
    • /
    • 2021
  • Recently, interests in the use of Sharing Bike is increasing in consideration of eco-friendly transportation and safety from viruses. As the technology for collecting and storing data is improved with the development of ICTs, research on mobility using the Sharing Bike Data is also actively progressing. Therefore, this paper analyzes the properties of Sharing Bike Data and cases of researches on it through literature review, and based on the results of the review, data of Eoulling, the Sharing Bike System of Sejong City is analyzed as a way to utilize Sharing Bike Data. Most of the selected literature used structured data, and analyzed it through statistical methods or data mining. Through data analysis, it identified the current status, found out problems of the Sharing Bike System, proposed a solution to solve them, developed plans to activate the use of Sharing Bike. This provides basic data for efficient management and operation plans for Sharing Bike System. Ultimately, it will be possible to explore ways to improve mobility in urban spaces by utilizing Sharing Bike Data.

Public Libraries and the Sharing Economy: From Tangible Sharing to Intangible Access (공공도서관과 공유경제 - 유형의 공유로부터 무형의 접근으로 -)

  • Lee, Seungmin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.151-173
    • /
    • 2022
  • The concept of the sharing economy, which has shifted the economic paradigm from possession to access to resources, is consistent with the traditional and current roles of public libraries. Thus, this research empirically analyzed the influence relationships between public library use and the sharing economy. Results showed that participation in public library programs serves as a motivational factor for satisfaction with and trust in the sharing economy, while the use of public library facilities and equipment is correlated with attitudes toward and participation in the sharing economy. The use of library collections positively influences sharing intangible resources such as knowledge, information, and personal experience. By contrast, checking out library resources negatively influences the recognition of economic benefits from sharing, which is contrary to claims of library communities. Based on these results, public libraries should aim to have a complementary effect on the sharing economy founded not only on information networks but also human networks grounded in social relationships.

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

Effect of Online Social Network to build virtual Human Capital (온라인 모임이 사회적 자원 형성에 미치는 영향)

  • Yun, Ho-Seong;Park, Jung-Hee;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.8 no.1
    • /
    • pp.71-79
    • /
    • 2010
  • Impact of online social network to cyber community has increased much attention recently. The biggest challenge in fostering a social network is to the extent whether it helps to build human capital network or social community. We propose what critical factors influence the formation of online capital network. The study uses three independent factors as motivation, self disclosure, and interactivity and two dependent factors as knowledge sharing and strengthening relationships to create virtual capital connection. Data collected from 256 university students to test the proposed model. The results of the study shows that all hypothesis are supported except one with strengthening relationship. Implications and limitations of this research are discussed.

  • PDF

Motivational Factors of Social Media Switching Behavior: Focusing on Social Network Stress (소셜 미디어 전환의도 동기요인: 소셜 네트워크 스트레스를 중심으로)

  • Kim, Hyo-Jun;Lim, Yeong-Woo;Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.41-70
    • /
    • 2021
  • The use of social media has many advantages such as knowledge sharing, social networking, and communicating with other people. However, it has given rise to various side effects including stress, Which is defined as social network stress in this study. This study aims to conceptualize social network stress and investigate its effect on switching behavior in social media. For this purpose, we present a research model that consists of the antecedents and consequences of social network stress and test it empirically using LISREL 8.7 based on the structural equation model. The empirical results showed that knowledge sharing and self-disclosure had positive impact on social network stress, which in turn positively influenced social media switching behaviors. In conclusion, we discussed both theoretical and practical implications of this research and suggested its limitations.

A Fault-Detection Agent for Distance Education on Home Network Environment (홈 네트워크 환경에서 원격 교육을 위한 결함 감지 에이전트)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.313-318
    • /
    • 2007
  • This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia distance education based on home network environment. This system consists of an ED, and ES. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment. ES is an agent that is an error sharing system for multimedia distance education based on home network environment. From the perspective of multimedia collaborative environment, an error application becomes another interactive presentation error is shared with participants engaged in a cooperative work. Performance analysis is done by Comparison of Hooking with Snatching Method.

  • PDF