• Title/Summary/Keyword: 정보중개인

Search Result 259, Processing Time 0.035 seconds

Cultural Intermediaries Reconsidered: From Mass Media to On-line Media (문화매개자 개념의 비판적 재검토: 매스 미디어에서 온라인 미디어까지)

  • Lee, Sang-Gil
    • Korean journal of communication and information
    • /
    • v.52
    • /
    • pp.154-176
    • /
    • 2010
  • Rooted in the work of Pierre Bourdieu, the cultural intermediaries have recently developed as a focus of attention for the Anglo-saxon sociology of culture and cultural studies. This paper tries to critically examine the debate around the definition and role of cultural intermediaries. It also explores the applicability of the notion ‘cultural intermediaries’ to a changing digital mediascape. In the first part of the paper, I clarify the critical problematics inherent in the Bourdieusian conception which focuses on the function of cultural intermediaries for the ‘production of the belief’ in cultural goods. Consequently, I draw attention to the mediation and transformation process of ‘legitimate culture’ by critics in mass media as ‘new cultural intermediaries’. In the second part, I attempt to constitute a typology of cultural intermediaries, proposing the notion of ‘on-line cultural mediation’ and ‘on-line cultural intermediaries’. I also outline the characteristics of three different types (‘traditional’, ‘new' and 'on-line') of cultural intermediaries. I argue this new conception of cultural intermediaries can help to understand the complex power relations and their transmutation in various cultural fields under digital environment.

  • PDF

An ORB Extension for support of Fault-Tolerant CORBA (고장감내 CORBA를 지원하기 위한 객체중개자의 확장)

  • Shin, Bum-Joo;Son, Duk-Joo;Kim, Myung-Joon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.121-131
    • /
    • 2001
  • The failure of network and/or node on which server object is executed is a single point of system failure in the CORBA application. One of the possible ways to overcome such problem is to replicate server objects to several independent nodes. The replicated objects executing same tasks are called object group. In order to provide fault tolerance of server object, this paper proposes and implements new CORBA model that supports the object group based on active replication. The proposed model not only provides interoperability with existing CORBA application but also minimizes additional application interface required to support object group because it uses nop to exchange messages between client and server. And this paper extends IDL structure. Depending to application logic, it makes possible to prevent performance degradation caused by consistency maintenance. At present, this paper supports only active replication. But it can be easily extended to provide warm ancVor cold passive replication without modification of architecture required for active replication.

  • PDF

The Method for Cloud Service Recommendation Based on Requirements of Tenant (테넌트 요구사항 기반의 클라우드 서비스 추천 방법)

  • An, Young Min;Kang, Tae Jun;Park, Joon Seok;Yeom, Keun Hyuk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.161-168
    • /
    • 2015
  • It is difficult to provide proper cloud services for cloud users, because the number of cloud services are increasing and the type of cloud services are diversifying. To overcome this problem, the concept of cloud service broker is presented to mediate cloud services between cloud providers and tenant. The most important role of cloud service broker is to finding cloud services that fulfill requirements of tenant. However, current existing cloud service broker conduct passive requirements analysis process with cloud service expert's assistance. In addition, the systematic functional and non-functional requirement analysis is insufficient. Therefore, we need the new methods for requirement analysis to find nearest service that matches with requirement of tenant. In this paper, we apply pairwise comparison from AHP method to analyze requirement automatically and systematically. It calculates score of service by comparing requirement with service specification, calculating importance rate, and so on.

SOA-based Video Service Platform Model Design for Military e-Learning Service (군 원격교육체계를 위한 SOA기반 동영상서비스 플랫폼모델 설계)

  • Kim, Kyung-Rog;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.24-32
    • /
    • 2011
  • According to accelerate the convergence of defense and information technology, there is a need for innovative change in Military e-Learning service system. In other words, It has increased the need for system integration based on standards and interoperability to develop into a network-centric information and knowledge. In this study, It would like to introduce an integrated direction Military e-Learning service system on the SOA-based video content services in the operating system for the operating model. SOA is taking advantage in integration and expansion of the unit with a process. Using it, define of video services platform architecture and define of business model based on the Imprimatur model. Based on this, it define the role of actors for video content service in each step of the operating model, that is Production model, Brokerage model and consumption model. In the operating system, it define the functions and data to control and handle the needed functionality for video content services based on the operational model.

A Target Manager for Remote Developments of Q+ Embedded Applications (내장형 소프트웨어의 원격 개발을 위한 Q+용 타겟관리자의 개발)

  • Lim, Chae-Deok;Lee, Woo-Jin;Son, Seung-Woo;Kim, Heung-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.835-841
    • /
    • 2000
  • 호스트와 타겟 간의 통신 부담과 타겟 자원이 제한적이라는 문제를 해결하기 위해서, 호스트 중심 원격 개발 환경(Remote Development Environment: RDE)을 구성하였다. 이 원격 개발 환경은 여러 개발 도구로 구성되어 있는데, 이들 도구가 타겟시스템에 접속하여 내장형 응용를 개발하는데 있어서 공통 기능, 공통 데이터가 존재한다. 그런데 이들을 각각 유지시키는 것은 타겟시스템에 부담을 줄 뿐만 아니라, 개발 도구를 추가/구현하는 것도 매우 어렵게 한다. 이 문제를 해결하기 위해 원격 개발 도구들의 공통 요소들을 모아 도구와 타겟시스템 사이에 중개자 역할을 하는 타겟관리자를 둔다. 타겟관리자는 미들웨어로서 호스트와 타겟 간의 통신 채널을 하나로 유지하면서 도구와 타겟 간의 통신을 중재하고, 도구들이 심볼 테이블을 공유할 수 있도록 심볼 테이블을 관리한다. 또한, 타겟에 있는 도구 전용 메모리를 관리하며, 호스트 상에서 개발한 내장형 소프트웨어를 타겟에 로딩하는 일을 처리한다. 이러한 타겟관리자를 사용하는 원격 개발 환경은 도구들에게 공통 인터페이스를 제공하여, 통신 방식 등의 하부 구조에 상관없이 서비스를 받을 수 있고, 새로운 도구를 추가하는 것도 용이하게 할 수 있다는 장점을 갖게 된다. 본 논문에서는 ETRI 에서 개발 중인 실시간 운영 체제인 Q+용 타겟관리자를 설계하고 구현한다. 또한, 타겟관리자가 동작하게 될 내장형 실시간 응용 개발 환경에 대하여 소개하고, 구현 결과를 도구들과 연계하여 보여주며, 타겟 관리자를 둔 원격 개발 환경이 타겟 관리자를 두지 않은 경우에 비해 호스트와 타겟 간의 통신 횟수가 얼마나 감소하는지 시험 결과를 통해 보여준다. 현재 타겟 관리자의 프로토타입을 개발하여 도구들과 통합 시험을 하였는데 기본 기능들이 성공적으로 수행됨을 확인하였다.

  • PDF

Design and Implementation of DRM Proxy for DRM Cloud Service (DRM 클라우드 서비스를 위한 DRM Proxy 설계 및 구현)

  • Lee, Hyejoo;Heo, Changsoo;Seo, Changho;Shin, Sang Uk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.553-560
    • /
    • 2013
  • The development of cloud computing technology and smart devices have increasingly been expanding the influence in various fields. Although DRM(Digital Rights Management) is a very important technology for secure content services, interoperability among DRM technologies must be addressed in order to provide the service without the constraints of time and place on various smart devices. In this paper, we study DRM Cloud which provides DRM functions as a service in cloud computing environment, and address interoperability problem by providing different DRM technologies as a cloud service. That is, when a user wants to play contents with the different DRM technologies on a smart device, the usage of the content is controlled by providing the corresponding DRM module and function as SaaS from DRM cloud. To do this, we define the functions and structure of DRM Proxy which performs smooth service call and provision between DRM cloud user and DRM cloud, and finally we describe the experimental implementation result.

A Study on the Analysis and Solutions of the Blockchain Security Issues (블록체인 보안 이슈에 대한 분석과 해결 방안에 대한 연구)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.1-11
    • /
    • 2019
  • A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.

A Survey of Decentralized Finance(DeFi) based on Blockchain

  • Kim, Junsang;Kim, Seyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.59-67
    • /
    • 2021
  • Blockchain technology began in 2008 when an unidentified person named Satoshi Nakamoto proposed a cryptocurrency called Bitcoin. Satoshi Nakamoto had distrust of the existing financial system and wanted to implement a financial system that is robust against hacking or mannipulation without a middleman such as a bank through blockchain technology. Satoshi proposed a blockchain as a technology to prevent the creation of the bitcoin and forging of transactions, and through this, the functions of issuance, transaction, and verification of currency were implemented. Since then, Ethereum, a cryptocurrency that can implement the smart contract on the blockchain, has been developed, allowing financial products that require complex contracts such as deposits, loans, insurance, and derivatives to be brought into the area of cryptocurrency. In addition, it is expanding the possibility of substituting products provided by financial institutions through combination with real assets. These applications are defined as Decentralized Finance (DeFi). This paper was prepared to understand the overall technical understanding of DeFi and to introduce the services currently in operation. First, the technologies and ecosystems that implement the overall DeFi are explained, and then the representative DeFi services are categorized by feature and described.

A Design of Policy-Based Composite Web Services QoS Monitoring System (정책 기반의 합성된 웹 서비스 품질 모니터링 시스템의 설계)

  • Yeom, Gwy-Duk;Jeong, Choong-Kyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.189-197
    • /
    • 2009
  • As the web service technology matures. research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy (inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.

Comparison of Paired and Unpaired Image-to-image Translation for 18F-FDG Delayed PET Generation (18F-FDG PET 지연영상 생성에 대한 딥러닝 이미지 생성 방법론 비교)

  • ALMASLAMANI MUATH;Kangsan Kim;Byung Hyun Byun;Sang-Keun Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.179-181
    • /
    • 2023
  • 본 논문에서는 GAN 기반의 영상 생성 방법론을 이용해 delayed PET 영상을 생성하는 연구를 수행하였다. PET은 양전자를 방출하는 방사성 동위원소를 표지한 방사성의약품의 체내 분포를 시각화함으로서 암 세포 진단에 이용되는 의료영상 기법이다. 하지만 PET의 스캔 과정에서 방사성의약품이 체내에 분포하는 데에 걸리는 시간이 오래 걸린다는 문제점이 존재한다. 따라서 본 연구에서는 방사성의약품이 충분히 분포되지 않은 상태에서 얻은 PET 영상을 통해 목표로 하는 충분히 시간이 지난 후에 얻은 PET 영상을 생성하는 모델을 GAN (generative adversarial network)에 기반한 image-to-image translation(I2I)를 통해 수행했다. 특히, 생성 전후의 영상 간의 영상 쌍을 고려한 paired I2I인 Pix2pix와 이를 고려하지 않은 unpaired I2I인 CycleGAN 두 가지의 방법론을 비교하였다. 연구 결과, Pix2pix에 기반해 생성한 delayed PET 영상이 CycleGAN을 통해 생성한 영상에 비해 영상 품질이 좋음을 확인했으며, 또한 실제 획득한 ground-truth delayed PET 영상과의 유사도 또한 더 높음을 확인할 수 있었다. 결과적으로, 딥러닝에 기반해 early PET을 통해 delayed PET을 생성할 수 있었으며, paired I2I를 적용할 경우 보다 높은 성능을 기대할 수 있었다. 이를 통해 PET 영상 획득 과정에서 방사성의약품의 체내 분포에 소요되는 시간을 딥러닝 모델을 통해 줄여 PET 이미징 과정의 시간적 비용을 절감하는 데에 크게 기여할 수 있을 것으로 기대된다.

  • PDF