• Title/Summary/Keyword: 인터넷 서비스

Search Result 8,736, Processing Time 0.1 seconds

A Study on Legislative Approaches for Introducing Coordinated Vulnerability Disclosure(CVD): Focusing on the Information and Communications Network Act (보안취약점 협력대응제도(CVD) 도입을 위한 법제화 방안 연구: 정보통신망법 중심으로)

  • Taeseung Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.781-799
    • /
    • 2024
  • Recently, the US and EU have been institutionally introducing and promoting Coordinated Vulnerability Disclosure(CVD) to strengthen the response to security vulnerabilities in ICT products and services, based on collaboration with white-hat hackers. In response to these changes in cybersecurity, we propose a three-step approach to introduce CVD through the Information and Communications Network Act(ICNA). In the first step, to comprehend the necessity and requirements for legislating CVD, we survey the current situation in Korea and the trends of CVD in the US, EU, and OECD. In the second step, we analyze the necessity for legislating CVD and derive the requirements for its legislation. In this paper, we analyze the necessity for legislating CVD from three perspectives: the need for introducing CVD, the need for institutionalization based on law, and the suitability of the ICNA as the legislation. The derived requirements for CVD legislation include the establishment and publication of Vulnerability Disclosure Policy(VDP), legal protection for white-hat hackers, and designation and role assignments of coordinator. In the third step, we introduce approaches to apply the requirements for CVD legislation to the ICNA, which is the law governing prevention and response to cybersecurity incidents in private sector.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Study on the Eco-friendly Housing in the Near future based on the Ecological Design (생태학적 디자인을 기반으로 한 근 미래형 친환경주택연구)

  • Choo, Jin;Yoo, Bo-Hyeon
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.105-118
    • /
    • 2005
  • Housing environment for human beings has been diversified and more convenient due to the development of high technology and civilization brought by industrialization in the 20th century. In the 21st century, how to overcome the ecological limit of biased development-centered advancement, that is, how to preserve and hand over a clean and healthy 'sustainable environment' to our next generations has been one of the most-talked about issues. Environmental symbiosis means a wider range of environmental harmony from micro-dimensional perspective to macro one. The three goals of a environmentally friendly house are to preserve global environment, to harmonize with the environment around, and to offer a healthy and comfortable living environment. From the point of view of environmental symbiosis, houses should be designed to save energy and natural resources for preservation of global environment, to collect such natural energy resources as solar heat and wind force, to recycle waste water, and recycle and reduce the amount of the waste matter. Now, the environmentally-friendly house became a new social mission that is difficult to not only challenge but also realize without conversion to a new paradigm, ecologism.

  • PDF

A Study on the Elements of Interior Design in Victorian Style (빅토리안 스타일 주택 실내 디자인에 관한 연구)

  • Kim, Jung-Keun
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.25-34
    • /
    • 2005
  • The purpose of the present study is to investigate the characteristics of the current Victorian-style interior by reviewing the basic Victorian-style house in the past. this research was analyzed various prior studies and literatures, and found the following results: First, the Victorian-style house and interior space showed various historical trends and adopted every style from Gothic to rococo, and sometimes more than one style influenced a single place. Its formality was applied depending on the function and standard of each room. Second, the interior had many decorative things with free, irregular or other patterns, influenced by Romanticism and Naturalism. The several environmental factors such as air pollution and hygienic matter were also related with its trend. the dramatic changes in the kitchen and sanitary facilities were appeared based on the technical development, and affluent design styles were also used. All these reflected the characteristics of the Victorian age. In conclusion, the characteristics of Victorian-style were influenced by many factors including: (a) the trend of Romanticism and Naturalism, (b) consideration of family convenience based on the technical development, (c) the Socio-Environmental factors like air pollution and the social norm, and (d) reflection of the individual value in accordance with frequent contacts with foreign cultures. In this respect, it is necessary to reevaluate the Victorian-style after paying due regard to such factors.

  • PDF

Development and Research for the Professional Brand of TV Broadcasting Program -By focusing the actually proved study for news program brand- (TV 방송 프로그램의 전문 브랜드 개발 연구 -뉴스 프로그램 브랜드의 실증연구를 중심으로-)

  • Jeong, Bong-Keum;Chang, Dong-Ryun
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.39-48
    • /
    • 2005
  • In the age of digital culture, TV broadcasting is exercising more influence as a information and communication medium compared to past. With the appearance of satellite broadcasting service in 2002, the broadcasting environment became a diversified field of local TV, cable TV, satellite, internet, etc. and created the time of multi-media and multi-channel. This ongoing change of broadcasting environment made the passive audience of the past, active image makers and new accepters, participants and users of communications, who know how to choose and use media as the active centerpiece, The active acceptor as the centerpiece of channel selections has become the center of the broadcasting, whereby they pick up and enjoy their favorite TV programs and came to remember the list of their favorite channels and zap them finally. In this point of spotting their favorite channels and improving the degree of recognition for the channels, the development of the noticeable brand for a particular program has made a great contribution. The aim of this study, therefore, is to recognize the factors, which are important in the habits of watching TV and to develop professional brands for TV broadcasting programs. The range of the survey for this study was home news programs and broadcasting stations abroad, which were on air from March to May in 2004. The focus of the survey was universal and professional news programs. Through this study, it was ascertained that, in the case of news, developing a brand for an anchor as well as for a professional brand of TV program could be an important element.

  • PDF

A Study on the establishment of IoT management process in terms of business according to Paradigm Shift (패러다임 전환에 의한 기업 측면의 IoT 경영 프로세스 구축방안 연구)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • This study examined the concepts of the Internet of Things(IoT), the major issue and IoT trend in the domestic and international market. also reviewed the advent of IoT era which caused a 'Paradigm Shift'. This study proposed a solution for the appropriate corresponding strategy in terms of Enterprise. Global competition began in the IoT market. So, Businesses to be competitive and responsive, the government's efforts, as well as the efforts of companies themselves is needed. In particular, in order to cope with the dynamic environment appropriately, faster and more efficient strategy is required. In other words, proposed a management strategy that can respond the IoT competitive era on tipping point through the vision of paradigm shift. We forecasted and proposed the emergence of paradigm shift through a comparative analysis of past management paradigm and IoT management paradigm as follow; I) Knowledge & learning oriented management, II) Technology & innovation oriented management, III) Demand driven management, IV) Global collaboration management. The Knowledge & learning oriented management paradigm is expected to be a new management paradigm due to the development of IT technology development and information processing technology. In addition to the rapid development such as IT infrastructure and processing of data, storage, knowledge sharing and learning has become more important. Currently Hardware-oriented management paradigm will be changed to the software-oriented paradigm. In particular, the software and platform market is a key component of the IoT ecosystem, has been estimated to be led by Technology & innovation oriented management. In 2011, Gartner announced the concept of "Demand-Driven Value Networks(DDVN)", DDVN emphasizes value of the whole of the network. Therefore, Demand driven management paradigm is creating demand for advanced process, not the process corresponding to the demand simply. Global collaboration management paradigm create the value creation through the fusion between technology, between countries, between industries. In particular, cooperation between enterprises that has financial resources and brand power and venture companies with creative ideas and technical will generate positive synergies. Through this, The large enterprises and small companies that can be win-win environment would be built. Cope with the a paradigm shift and to establish a management strategy of Enterprise process, this study utilized the 'RTE cyclone model' which proposed by Gartner. RTE concept consists of three stages, Lead, Operate, Manage. The Lead stage is utilizing capital to strengthen the business competitiveness. This stages has the goal of linking to external stimuli strategy development, also Execute the business strategy of the company for capital and investment activities and environmental changes. Manege stage is to respond appropriately to threats and internalize the goals of the enterprise. Operate stage proceeds to action for increasing the efficiency of the services across the enterprise, also achieve the integration and simplification of the process, with real-time data capture. RTE(Real Time Enterprise) concept has the value for practical use with the management strategy. Appropriately applied in this study, we propose a 'IoT-RTE Cyclone model' which emphasizes the agility of the enterprise. In addition, based on the real-time monitoring, analysis, act through IT and IoT technology. 'IoT-RTE Cyclone model' that could integrate the business processes of the enterprise each sector and support the overall service. therefore the model be used as an effective response strategy for Enterprise. In particular, IoT-RTE Cyclone Model is to respond to external events, waste elements are removed according to the process is repeated. Therefore, it is possible to model the operation of the process more efficient and agile. This IoT-RTE Cyclone Model can be used as an effective response strategy of the enterprise in terms of IoT era of rapidly changing because it supports the overall service of the enterprise. When this model leverages a collaborative system among enterprises it expects breakthrough cost savings through competitiveness, global lead time, minimizing duplication.

Effect of Dietary Mogchotan Supplementation on Fattening Performance, Fatty acid Composition and Meat Quality in Pigs (사료내 목초탄 첨가가 비육돈의 비육능력, 지방산 조성 및 육질에 미치는 영향)

  • Kim, Jong-Min;Ahn, Byoung-Jun;Jo, Tae-Su;Cho, Sung-Taek;Choi, Don-Ha;Hwang, Sung-Gu
    • Korean Journal of Organic Agriculture
    • /
    • v.13 no.4
    • /
    • pp.401-412
    • /
    • 2005
  • This study was conducted to examine the effects of dietary Mogchotan(the mixture of charcoal and pyroligneous acid, 80:20, w/w) supplementation on fattening performance, fatty acid composition and the physico-chemical characteristics of meat in pigs. The present study was also stressed to investigate the possibility of industrial utilization of charcoal and pyroligneous acid as a livestock feed additive. Weight gain and feed conversion in pigs fed the Mogchotan supplemented diet were higher than those of the control group. In fatty acids composition, palmitic acid(C16:0) contents of Mogchotan treatment groups were lower than that of control group. However, Mogchotan supplementation increased C16:1, C18:0, C18:1, C18:2 and C18:3 contents when compared with control group pigs. Also, Mogchotan supplementation groups decreased saturated fatty acids level than control group. On the other hand, Mogchotan supplementation showed higher unsaturated fatty acids value, especially polyunsaturated fatty acids value compared to control group. The carcass pH of pigs fed the Mogchotan tended to be higher than control, but was not significantly different. The water holding capacity was significantly higher in pigs fed the 3.0% Mogchotan-supplemented diet than those of other treatment groups(p<0.05). Altogether, it has been suggested that dietary $1{\sim}3%$ of Mogchotan supplementation improved the fattening performance and meat quality in pigs.

  • PDF

Design and Implementation of an Execution-Provenance Based Simulation Data Management Framework for Computational Science Engineering Simulation Platform (계산과학공학 플랫폼을 위한 실행-이력 기반의 시뮬레이션 데이터 관리 프레임워크 설계 및 구현)

  • Ma, Jin;Lee, Sik;Cho, Kum-won;Suh, Young-kyoon
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.77-86
    • /
    • 2018
  • For the past few years, KISTI has been servicing an online simulation execution platform, called EDISON, allowing users to conduct simulations on various scientific applications supplied by diverse computational science and engineering disciplines. Typically, these simulations accompany large-scale computation and accordingly produce a huge volume of output data. One critical issue arising when conducting those simulations on an online platform stems from the fact that a number of users simultaneously submit to the platform their simulation requests (or jobs) with the same (or almost unchanging) input parameters or files, resulting in charging a significant burden on the platform. In other words, the same computing jobs lead to duplicate consumption computing and storage resources at an undesirably fast pace. To overcome excessive resource usage by such identical simulation requests, in this paper we introduce a novel framework, called IceSheet, to efficiently manage simulation data based on execution metadata, that is, provenance. The IceSheet framework captures and stores each provenance associated with a conducted simulation. The collected provenance records are utilized for not only inspecting duplicate simulation requests but also performing search on existing simulation results via an open-source search engine, ElasticSearch. In particular, this paper elaborates on the core components in the IceSheet framework to support the search and reuse on the stored simulation results. We implemented as prototype the proposed framework using the engine in conjunction with the online simulation execution platform. Our evaluation of the framework was performed on the real simulation execution-provenance records collected on the platform. Once the prototyped IceSheet framework fully functions with the platform, users can quickly search for past parameter values entered into desired simulation software and receive existing results on the same input parameter values on the software if any. Therefore, we expect that the proposed framework contributes to eliminating duplicate resource consumption and significantly reducing execution time on the same requests as previously-executed simulations.

Market Segmentation of Converging New Media Advertising: The Interpretative Approach Based on Consumer Subjectivity (융합형 뉴미디어 광고의 시장세분화 연구: 소비자 주관성에 근거한 해석적 관점에서)

  • Seo, Kyoung-Jin;Hwang, Jin-Ha;Jeung, Jang-Hun;Kim, Ki-Youn
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.91-102
    • /
    • 2014
  • The purpose of this research is to perform the consumer typological study of integrated emerging digital advertisement, where IT and advertisement industry were fused, and to propose the theoretical definition about consumer characteristic which is in need for collection of related market subdivision strategy in perspective of business marketing. For this, the Q methodology, the 'subjectivity' research of qualitative perspective, which discovers new theory by interpreting subjective system of thinking, preference, opinion, and recognition of inner side of respondents, was applied and analyzed. Compared to previous quantitative research that pursues hypothesis verification, this Q methodology is not dependent on operational definition proposed by researcher but pursues for analytic study completely reflecting objective testimony of respondents. For this reason, Q study analyzes in-depth the actual consumer type, which can be found at the initial market formation stage of new service, therefore this study is applicable for theorizing the consumer character as a mean of advanced research. This study extracted thirty 'IT integrated digital advertisement type (Q sample)' from thorough literature research and interviews, and eventually discovered a total four consumer types from analyzing each Q sorting research data of 40 respondents (P sample). Moreover, by interpreting subdivided intrinsic characteristic of each group, the four types were named as 'multi-channel digital advertisement pursuit type', 'emotional advertisement pursuit type', 'new media advertisement pursuit type', and Web 2.0 advertisement pursuit type'. The analysis result of this study is being expected for its value of usage as advanced research of academic and industrial research with the emerging digital advertisement industry as a subject, and as basic research in the field of R&D, Marketing program and the field of designing the advertisement creative strategy and related policy.