• Title/Summary/Keyword: 파일공유

Search Result 503, Processing Time 0.025 seconds

A Study of the Intelligent Researcher Connection Network Build-up that Merges the Recommendation System and Social Network (추천시스템과 소셜 네트워크를 융합한 지능형 연구자연결망 구축)

  • Lee, Choong-Moo;Lee, Sang-Gi;Lee, Byeong-Seop
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.199-215
    • /
    • 2009
  • The web 2.0 concept rapidly spreads to the various field which is based on an opening, the participation, and a share. And the research about the recommendation system, that is the personalize feature, and social network is very active. In the case of the recommendation system and social network, it had been developing in the respectively different area and the new research toward the service model of a form that it fuses these is insignificant. In this paper, I'm going to introduce efficient social network which is called the researcher connection network. It is possible to recommend the researcher intellectually who studies the similar field by analyzing the usage log and user profile. Through this study, we could solved the network expandability problem which is due to the user passive participation and the difficulty of the initial network construction that is the conventional social network problem.

A Study on the Structure of Headings in Authority Records (전거레코드 표목의 구조화 연구 - 인명과 단체명 전거레코드의 표목을 중심으로 -)

  • Kim, Tae-Soo;Kim, Lee-Kyum;Lee, Hye-Won;Kim, Yong-Kwang;Park, Zi-Young
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.1-21
    • /
    • 2009
  • This study aims to suggest some idea for construction of headings in authority records to improve conventional method for authority control. The reference structure between established form and other forms was replaced by the link structure based on access points and adopting standard authority numbers was considered. Additional elements such as work information to distinguish homonym and notational system of the headings to promote sharing of authority records were also addressed. Authority records management system was constructed to test structure of headings suggested in this study, too. Through this research, we confirmed that management, identification, and sharing of authority records were considerably improved compared with the conventional authority control system.

High-Dimensional Image Indexing based on Adaptive Partitioning ana Vector Approximation (적응 분할과 벡터 근사에 기반한 고차원 이미지 색인 기법)

  • Cha, Gwang-Ho;Jeong, Jin-Wan
    • Journal of KIISE:Databases
    • /
    • v.29 no.2
    • /
    • pp.128-137
    • /
    • 2002
  • In this paper, we propose the LPC+-file for efficient indexing of high-dimensional image data. With the proliferation of multimedia data, there Is an increasing need to support the indexing and retrieval of high-dimensional image data. Recently, the LPC-file (5) that based on vector approximation has been developed for indexing high-dimensional data. The LPC-file gives good performance especially when the dataset is uniformly distributed. However, compared with for the uniformly distributed dataset, its performance degrades when the dataset is clustered. We improve the performance of the LPC-file for the strongly clustered image dataset. The basic idea is to adaptively partition the data space to find subspaces with high-density clusters and to assign more bits to them than others to increase the discriminatory power of the approximation of vectors. The total number of bits used to represent vector approximations is rather less than that of the LPC-file since the partitioned cells in the LPC+-file share the bits. An empirical evaluation shows that the LPC+-file results in significant performance improvements for real image data sets which are strongly clustered.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Performance Measurement of Residential Broadband Network with Monarch (Monarch를 이용한 주택내 초고속 인터넷망의 성능 측정)

  • Choi, Soon-Byoung;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.369-375
    • /
    • 2009
  • Residential broadband networks (RBN) are quickly evolving from xDSL/Cable networks to FTTH services with lOOMbps bandwidth. With the high-speed Internet services, subscribers tend to use web, multimedia, game or file sharing applications. Therefore, performance of RBN is important to the quality of services for users. Typically, Internet service providers (ISPs) are providing their RBN performance results that are measured by subscribers with the dedicated measurement tools. However, they do not make their results public to people. In order to obtain the performance results measured by users, we have to induce a lot of subscribers, which will take a lot of cost and time. Monarch, that is used in this paper, could provide the 3rd party measurement method without the help of ISPs and subscribers. With the extensive experiments through Monarch, we have shown that 3rd party measurement results are not much different from those of user-initiated measurement. In addition, we have observed that bandwidth is around $80{\sim}90Mbps$ and RTT is less than 30ms in FTTH services provided by three major Korean ISPs.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Parallelization of Genome Sequence Data Pre-Processing on Big Data and HPC Framework (빅데이터 및 고성능컴퓨팅 프레임워크를 활용한 유전체 데이터 전처리 과정의 병렬화)

  • Byun, Eun-Kyu;Kwak, Jae-Hyuck;Mun, Jihyeob
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.10
    • /
    • pp.231-238
    • /
    • 2019
  • Analyzing next-generation genome sequencing data in a conventional way using single server may take several tens of hours depending on the data size. However, in order to cope with emergency situations where the results need to be known within a few hours, it is required to improve the performance of a single genome analysis. In this paper, we propose a parallelized method for pre-processing genome sequence data which can reduce the analysis time by utilizing the big data technology and the highperformance computing cluster which is connected to the high-speed network and shares the parallel file system. For the reliability of analytical data, we have chosen a strategy to parallelize the existing analytical tools and algorithms to the new environment. Parallelized processing, data distribution, and parallel merging techniques have been developed and performance improvements have been confirmed through experiments.

Framework for Building Reusable Design Systems (재사용 가능한 디자인 시스템 구축을 위한 프레임워크)

  • Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.343-348
    • /
    • 2021
  • This study investigated the method of constructing and combining blocks based on the atomic design system in order to propose a framework for rescue of a reusable design system. For that, I first looked at the necessity of a design system and examples of snow white, skeuomorphic design, flat design, and material design. In addition, molecules, atoms, organisms, templates and pages of atomic design using the principles of chemistry as metaphors were defined through literature studies. In order to implement a new framework, an interface inventory was constructed, and among them, font, color, image and control elements were extracted as core visual elements, and guidelines were defined, and molecular elements were classified and composed of atoms based on them. Blocks are constructed in the form of blocks based on the design pattern most used in the content inventory, and the framework is constructed to implement a layout based on a visual grid and design a page through a combination of blocks. The significance of this paper is that the new framework helps team consistency and collaboration by reusing blocks and supports file sharing and updating.

Development of a Python-based Algorithm for Image Analysis of Outer-ring Galaxies (외부고리 은하 영상 분석을 위한 파이썬 기반 알고리즘 개발)

  • Jo, Hoon;Sohn, Jungjoo
    • Journal of the Korean earth science society
    • /
    • v.43 no.5
    • /
    • pp.579-590
    • /
    • 2022
  • In this study, we aimed to develop a Python-based outer-ring galaxy analysis algorithm according to the data science process. We assumed that the potential users are citizen scientists, including students and teachers. In the actual classification studies using real data of galaxies, a specialized software called IRAF is used, thereby limiting the general public's access to the software. Therefore, an image analysis algorithm was developed for the outer-ring galaxies as targets, which were compared with those of the previous research. The results of this study were compared with those of studies conducted using IRAF to verify the performance of the newly developed image analysis algorithm. Among the 69 outer-ring galaxies in the first test, 50 cases (72.5%) showed high agreement with the previous research. The remaining 19 cases (27.5%) showed differences that were caused by the presence of bright stars overlapped in the line of sight or weak brightness in the inner galaxy. To increase the usability of the finished product that has undergone a supplementary process, all used data, algorithms, Python code files, and user manuals were loaded in GitHub and made available as shared educational materials.