• Title/Summary/Keyword: 서비스 제공량

Search Result 1,148, Processing Time 0.029 seconds

A Study on Content Marketing for Travel Brand Focus on Youtube Vlog Formed Travel Video - (여행 브랜드를 위한 콘텐츠 마케팅 연구 -여행 영상 형태의 유튜브 Vlog를 중심으로-)

  • Jo, Jang-Hwan;Park, Bo-ram
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.445-450
    • /
    • 2019
  • lock in effect This study aims to examine the viewing pattern of travel vlog on video-sharing platform YouTube. Preliminary survey was conducted with in-depth interviews on the usability and sensibility aspects of creating pleasurable interfaces model. As a result, first, viewers obtains general information on travel using travel vlog. Second, there were difficulties from the informational quantity. Third, the contents marketing using travel vlog could have limitation when it comes to the consistency of product's exposure which common mass media advertisement format have. Improvements driven from this study may provide insight in contents marketing strategy to travel-related companies and provide practical help to creators in contents production.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

DEA를 이용한 금융기관(金融機關)의 운영효율성(運營效率性) 평가(評價)

  • Choi, Tae-Seong;Jang, Ik-Hwan
    • The Korean Journal of Financial Management
    • /
    • v.9 no.2
    • /
    • pp.77-100
    • /
    • 1992
  • 경영성과(經營成果)의 평가지표(評價指漂)는 개별조직의 목표와 제약환경, 즉 이용가능한 자원량과 개별적 특수요인 등을 고려하여 설정하여야 하며, 산업내의 특성과 동질적 비교집단을 이해함으로써 조직의 성과와 직접적으로 연결될 수 있어야 한다. 또한 조직의 평가는 부분적(部分的)인 효율성(效率性)에 편중되지 않고 투입과 산출간의 유기적인 관계를 총체적인 관점에서 분석함으로써 종합적(綜合的) 효율성(效率性)에 그 촛점이 두어져야 한다. 이러한 문제의 인식에 바탕을 두어 본 연구에서는 Charnes, Cooper와 Rhodes(1978)에 의해 처음 개발되어 주로 비영리기관의 경영성과의 평가에 많이 사용하여 온 DEA(Data Envelopment Analysis)기법을 이용하여 금융기관(金融機關)의 효율성(效率性)을 평가(評價)한다. 금융기관은 다양한 투입요소를 사용하여 다양한 서비스 상품을 제공하는 조직이기 때문에, 또 재무비율을 이용한 기존의 평가나 통계적 생산함수의 추정에 의한 평가방법은 단순히 과거의 실적을 평가하는 데 그치게 되고 객관성이 결여되기 쉽기 때문에 조직의 미래운영방향의 설정에 도움이 되지 못한다는 단점을 가지고 있다. 그러나, DEA은 다수의 투입과 산출요소를 요구하는 경우에 적합하게 설계된 분석방법이므로 금융기관의 성과분석에 적절하게 이용될 수 있다. 본 연구에서는 먼저 금융기관(金融機關)의 효율성(效率性)을 평가(評價)하는 기존의 방법을 간략하게 검토한 다음, DEA에 관한 이론적 기초와 그 특성을 검토한다. 실증분석에서는 여 수신업무(與 受信業務)를 수행하고 있는 국내금융기관들 중에서 자료의 동질성과 표본대상 기업의 수를 고려하여 은행업(銀行業)과 투자금융업(投資金融業)을 선정하고 이들 업종에 속한 37개 회사들에 대한 운영효율성(運營效率性)을 측정한다. 투입요소로 직원의 수와 영업비용을, 그리고 산출요소로 영업수익과 경상이 익을 선정하고, 3년간의 자료를 사용하여 실증분석을 한다. 분석의 결과에 의하면, 18개 전체 은행의 평균적인 효율성의 정도는 가장 효율적인 은행을 기준으로 할 때, 약 85% 수준에 그치고 있어서, 나머지 대부분의 은행들 특히 대규모 시중은행들의 경영상의 개선의 여지가 매우 크다고 할 수 있다. 5대 시중은행들간에는 효율성의 차이가 거의 없는 반면, 지방은행들간에는 매우 큰 차이가 있는 것으로 나타난다. 이는 영업지역의 제한으로 인하여 지역경제 규모가 은행의 수지상황에 결정적인 영향을 미치고 있다는 것을 반영하고 있다. 29개 단자회사를 대상으로 한 투자금융업의 경우에도 은행업의 경우와 동일하게 낮은 효율성과 지역간 격차현상이 나타나고 있다.

  • PDF

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.

Frame Bit-rate Control Method for Low Delay Video Communication (저지연 영상 통신을 위한 화면 비트율 제어 기법)

  • Jin, En-Ji;Park, Min-Cheol;Moon, Joo-Hee;Kwon, Jae-Cheol
    • Journal of Broadcast Engineering
    • /
    • v.12 no.6
    • /
    • pp.574-584
    • /
    • 2007
  • As the real time multimedia service become more popular, the needs of transmission with low delay and high quality are getting more stronger. Among those video compression technologies, the rate control method dose an important role in getting the effective data transmitting and the high image quality. In this paper, we combined the feature of CBR and VBR coding methods to propose a new bit-rate control method witch allows each frame to generates bits in the defined fluctuation range and applies a scene change detection at a part of frame and also can maintain low-delay and high quality even if the perfect VBR transmission environment is not guaranteed. The experiment result shows the proposed algorithm provides more effective method than TMN8 in real time application.

A Study on a Performance Analysis of Direct-Conversion Receiver In Additive White Gaussian Noise Channel (AWGN 채널환경에서 Direct-Conversion 수신기의 성능분석에 관한 연구)

  • 조형래;김철성;박성진
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.668-675
    • /
    • 2001
  • Recently, the performance of the commercial PCS(Personal Communication Service) system has been improved to the uppermost limit and ultimately the next generation mobile communication is to be realized by IMT-2000 (International Mobile Communication-2000) to provide multimedia services. Therefore, the new type receiving system is researched actively and one of the most important part in a receiver is direct conversion method. The direct conversion method is suitable for low power consumption, small size, MMIC, and low price, which is to be adopted to the next generation mobile communication systems. In this case, however, several problems occur due to DC-offset. The DC-offset suppresses amplification of the required signal because of the leakage signal of frequency synthesizer in the system. In this thesis, the removing method of DC-offset was considered. There are four removing techniques of DC-offset, which are AC-coupling, large capacitor, DC-feedback loop, and DC-free coding. Among these, the AC-coupling method is the most simplest method and the DC-feedback loop method has the best performance. Then, the performance of the AC-coupling method and DC-feedback loop method are evaluated by HP's ADS simulation tool. As a result, the AC-coupling method cannot be used to the digital communication systems due to data loss. On the other hand, it was confirmed that the DC-feedback loop method is suitable for the direct conversion receiver.

  • PDF

Resource Allocation Algorithm for IoT Distributed Processing (IoT 분산 처리를 위한 자원 할당 알고리즘)

  • Yu, Donggyun;Jeong, Dohyeong;Choi, Hyungwook;Lim, Jaedon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.723-724
    • /
    • 2017
  • Recently, researches are being conducted to build a smart environment using various sensors and devices and to provide customized services to users through inter object communication. However, the existing system utilizes a centralized method of transmitting measured sensor data in real time to the server and processing it in batches and As the system is expanded, there is a problem that a high-end server must be configured. In this paper, we design a Resource Allocation Algorithm for IoT distributed processing environment to solve these problems. The resources required for the device to operate are transferred to the server and the server allocates resources in comparison to the task in progress. Therefore, it is expected that the data throughput of the server will be reduced and various devices can be configured in a server having a low specification.

  • PDF

A Meta Analysis of Innovation Diffusion Theory based on Behavioral Intention of Consumer (혁신확산이론 기반 소비자 행위의도에 관한 메타분석)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.140-141
    • /
    • 2017
  • Big data analysis, in the large amount of data stored as the data warehouse which it refers the process of discovering meaningful new correlations, patterns, trends and creating new values. Thus, Big data analysis is an effective analysis of various big data that exist all over the world such as social big data, machine to machine (M2M) sensor data, and corporate customer relationship management data. In the big data era, it has become more important to effectively analyze not only structured data that is well organized in the database, but also unstructured big data such as the internet, social network services, and explosively generated web documents, e-mails, and social data in mobile environments. By the way, a meta analysis refers to a statistical literature synthesis method from the quantitative results of many known empirical studies. We reviewed a total of 750 samples among 50 studies published on the topic related as IDT between 2000 and 2017 in Korea.

  • PDF

A Study on the Disk Array Parameters for VOD Servers (VOD 서버를 위한 디스크 배열 파라미터에 관한 연구)

  • Park, Jung-Yeon;Ahn, Byoung-Chul;Kim, Jung-Doo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2662-2670
    • /
    • 1997
  • High speed network makes possible to transfer not only the test data but also multimedia data such as audio, image, and moving pictures and etc. In a multimedia applications, as a multimedia storage system, it is necessary to use a disk array to store and retrieve data by real time. It is important feature to various disk array parameters as a storage system on a real VOD system, such as configuration method of each disks and allocation method of multimedia data. In this paper, various parameters for the disk array are decided to be used for the video-on-demand system application by simulations in two ways. The real and simulation measurement are compared and analyzed on the performance. Simulation results shows that RAID level 5 and 256KB as striping unit and 185KB as data requests size per seconds are suitable parameter for the disk array architecture which provides MPEG-1 files with a rate of 1.5Mbps in two measurements of real and simulation.

  • PDF

A Priority-Based Bandwidth Management Method in Public Safety Networks (재난 안전 통신망에서 우선순위를 고려한 대역폭 관리 방법)

  • Lee, Sang-Hoon;Kim, Hyun-Woo;Yoon, Hyun-Goo;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.102-110
    • /
    • 2016
  • After Sewol ferry disaster occurred in April 2014, Korean government began investing to deploy LTE-based public safety network until the year of 2017. In order to reduce the operating and capital costs, resource sharing scheme among public safety network and commercial LTE networks is considered as one of the viable approaches. This thesis proposes a method of allocating bandwidth of public safety network based on various priorities required for disaster scenarios and stages in a resource sharing environment. In order to obtain the highest efficiency, we formulate the bandwidth allocation problem as a Fractional Knapsack Problem. Greedy algorithm was applied to solve the problem. For performance evaluation, we created several disaster scenarios and set suitable parameters for each scenario based on a disaster manual. The proposed method is compared with two typical methods, which are Class-based bandwidth allocation and Uniform bandwidth allocation. The results showed that the better performance in terms of the sum of the values and the amount of lost bytes.