• Title/Summary/Keyword: 접속형태

Search Result 488, Processing Time 0.031 seconds

An Application-Independent Multimedia Adaptation framework for the Mobile Web (모바일 웹을 지원하는 응용 독립적 멀티미디어 적응 프레임워크)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.139-148
    • /
    • 2005
  • The desired level for multimedia services in the mobile web environment, the next generation web environment, is expected to be of PC level quality. And great efforts have been made in the development of hadware technology, communication technology, various kinds of services and standardization to support these services, In the mobile web environment, multimedia contents adaptation services should be available through supporting various kinds of devices, network abilities and users' preferences. It means that due to the variety of both desired devices' hardware specifications, called destinations, and desired QoSes, the QoSes in the destinations are not fixed or defined. If a new user wants to stream multimedia contents in a server through a new kind of terminal device, it should be considered whether the existing transcoders are able to adapt the multimedia contents. However, the existing libraries for multimedia adaptation have heavy transcoder figures which include all adaptive functions in one library, The challenge of universal access is too complex to be solved with these all in one solutions. Therefore, in this paper we propose an application independent multimedia adaptation framework which meets the QoS of new and varied mobile devices. This framework is composed of a group of unit transcoders having only one transcoding function respectively, Instead of heavy transcoders. Also, It includes the transcoder manager supporting the dynamic connections of the unit transcoders in order to satisfy end to end QoS.

  • PDF

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

A Study on the Optimal Message Length of File Transfer Protocol via Satellite and Terrestrial Links (위성과 지상 회선에서 파일 전송 프로토콜의 최적 메세지 길이에 대한 연구)

  • Park, Jin-Yang;Lee, Yong-Hun;Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.215-223
    • /
    • 1997
  • The advantages of service in satellite links are representatively a long distance and large capacity transfer and simultaneous communication. And terrestrial links are of high speed and high quality data transfer Therefore a combined form of characteristics of satellite and terrestrial links is desirable to furnish a good quality service to subscribers. And in satellite links an analysis method and a simulation method of file transfer are conducted to evaluate the efficiency of file transfer. The parameters are used the message length and transmission time, and the number of chain record and transmission time. From the results of evaluation, in satellite links, it is found that when the message length is shorter than 512 bytes, the file transmission time becomes extremely long and when the message length is set at 1024 bytes, the file transmission time abruptly increase from 2048 bytes. Also it is confirmed that when the number of chain record is under 15, the file transmission time becomes extremely long and if the number increase up to 90,the time becomes gradually short and over 90,it becomes constant.Therefore,from the result of file transmission in th case of utilizing satelite links,it is confirmed that the optimum message length in the minmum transmission time is present closely at 1024 bytes.Also it is confirmed that when the satelite transmission sped becoms smaller from 24kbps to2400bps,the optimum message length also becomes smaller from 640 bytes to 256bytes.

  • PDF

Construction of the Scientific Effective Learning System on Web-Based Instruction (웹을 이용한 효과적인 과학학습체제의 구축 및 태도 변화 -중학교 지구과학 내용을 중심으로 -)

  • Choi, Young-Hee;Yoon, Ill-Hee
    • Journal of the Korean earth science society
    • /
    • v.21 no.3
    • /
    • pp.208-218
    • /
    • 2000
  • The popularization and the common use of internet are realizing these days thanks to the development of web. Using the web as a teaching instrument is the Web Based Instruction(WBI). WBI, along with constructivism, has a great influence on the present educational society. However, many problems were found in learners' using the numerous WBI programs in cyber space. Above all, the interaction between teachers and learners is not enough, and searching for the materials on web is not easy. It's very difficult for a teacher to design and construct a WBI program in school teaching. But It is not so difficult to design and construct a WBI program based on interaction. Therefore, if a teacher familiar to students in school makes a web page and provides a cyberspace, the students will interact very easily them in the cyberspace. They can use the e-mail, bulletin board or discuss and chat. The cyberspace will make up for the insufficient interaction in school life. But because this program needs all students have proper material condition, there will be another kind of estranged learners. Thus, this problem can be solved by the cheap-popular PC offering movement backed by the government, and other types of projects systematically.

  • PDF

Hierarchical Text Extraction and Localization on Images (이미지로부터 계층적 문자열 추출에 관한 연구)

  • Jun, Byoung-Min;Jun, Woogyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.609-614
    • /
    • 2018
  • This study was conducted to investigate the effects of turmeric powder on jeung-pyun. Turmeric jeung-pyun containing 0%, 0.5%, 1%, 1.5%, and 2% turmeric powder was prepared and the moisture, pH, sugar, color, texture, DPPH and sensory properties of the samples were measured. Moisture contents of jeung-pyun were 51.26~51.99% and there were significant differences among the samples(p<0.001). The L-values were significantly decreased with increasing turmeric powder content. The b-value was low in the control and there were significant differences among the samples(p<0.05). Texture profile analysis showed that there were no significant differences among the groups in hardness, adhesiveness, springiness, cohesiveness, gumminess, and chewiness. The hardness was the lowest in the control group and increased with increasing turmeric powder content. The antioxidant activities as measured by DPPH increased with increasing turmeric powder content (p<0.001). In the sensory evaluation, 1% addition of turmeric powder showed the highest preference in terms of color, taste, flavor, texture and overall preference(p<0.001). As determined by this study, the addition of 1% turmeric powder was the most favorable method for making use of turmeric powder in the production of jueng-pyun.

The study on the effectiveness of smart home network service for IT underprivileged people and growth service model (IT소외 계층을 위한 실질적 스마트홈네트워크서비스의 영향 및 성장형 서비스모델에 대한 연구)

  • Kim, Byoung-Soo;Ji, Yeong-Soo;Han, Kyeong-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1000-1007
    • /
    • 2011
  • Home Networking will be implementing the interactive network by home appliances over wireless/wireline network framwork. That is, Home appliances, which are being operated within home space configure the network through wireline/wireless network infrastructure for interworking and interacitive services by external internet access. Based on home networking, smarthome is home space where can use automatic telecommunication and interactive service by home appliances. we can call smarthome based on home networking infrastructure as the conceptual gateway for evolving future converged space like u-city. From simple home control service to home automation service over home networking infrastructure, smarthome service is evolving to up-to-date intelligent life environment in growth of IT technology. however, its service model development was based on supplier-centered based on advanced IT technology. because of this situation, smarthome service has not been acknowledged IT underprivileged people as well as IT early-adaptor. so, this research paper will consider and try to find out what will be the feasible factors to make the best service for IT underprivileged people.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Fine Grained Resource Scaling Approach for Virtualized Environment (가상화 환경에서 세밀한 자원 활용률 적용을 위한 스케일 기법)

  • Lee, Donhyuck;Oh, Sangyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.11-21
    • /
    • 2013
  • Recently operating a large scale computing resource like a data center becomes easier because of the virtualization technology that virtualize servers and enable flexible resource provision. The most of public cloud services provides automatic scaling in the form of scale-in or scale-out and these scaling approaches works well to satisfy the service level agreement (SLA) of users. However, a novel scaling approach is required to operate private clouds that has smaller amount of computing resources than vast resources of public clouds. In this paper, we propose a hybrid server scaling architecture and related algorithms using both scale-in and scale-out to achieve higher resource utilization rate for private clouds. We uses dynamic resource allocation and live migration to run our proposed algorithm. Our propose system aims to provide a fine-grain resource scaling by steps. Thus private cloud systems are able to keep stable service and to reduce server management cost by optimizing server utilization. The experiment results show that our proposed approach performs better in resource utilization than the scale-out approach based on the number of users.

User Profile Based Seamless Framework under HTTP Adaptive Streaming Environment (HTTP Streaming 환경에서 User Profile 기반 Seamless Framework 제공방법)

  • Kim, Jung-Han;Lee, Jang-Won;Kim, Kyu-Heon;Suh, Doug-Young
    • Journal of Broadcast Engineering
    • /
    • v.16 no.1
    • /
    • pp.155-173
    • /
    • 2011
  • Recently, with the digitalization of a broadcasting system and the development of a communication technology, the existing trend of consuming media contents throughout the fixed-displayer and the dedicated channel is being changed. The existing user only could consume media contents under limited time and places because of the fixed-displayer and the dedicated channel. However, with advent of the IP-based terminals and HTTP adaptive streaming which transfer the media sequence according to the user's transmission condition, users become possible to enjoy the media content anytime anywhere. As the result of the alteration of the broadcasting surrounding, users can enjoy the media content while changing his terminals according to their preferences and circumstances. However, in case that users try to consume consecutively the content from last view-point ended in the previous terminal under current HTTP adaptive streaming environment, a user has to remember the last view-point, and then has to apply the view-point to the changed terminal. Thus, for solving this problem, this paper defines "User Profile" for describing the metadata for the chained content consume environment between the terminals. Also, for proving the proposed method, this paper try to demonstrate the proposed method throughout the realization of the system based on Smooth Streaming from Microsoft.