• Title/Summary/Keyword: 3-Party Communication

Search Result 113, Processing Time 0.021 seconds

A Study of Hybrid Automatic Interpret Support System (하이브리드 자동 통역지원 시스템에 관한 연구)

  • Lim, Chong-Gyu;Gang, Bong-Gyun;Park, Ju-Sik;Kang, Bong-Kyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.3
    • /
    • pp.133-141
    • /
    • 2005
  • The previous research has been mainly focused on individual technology of voice recognition, voice synthesis, translation, and bone transmission technical. Recently, commercial models have been produced using aforementioned technologies. In this research, a new automated translation support system concept has been proposed by combining established technology of bone transmission and wireless system. The proposed system has following three major components. First, the hybrid system consist of headset, bone transmission and other technologies will recognize user's voice. Second, computer recognized voice (using small server attached to the user) of the user will be converted into digital signal. Then it will be translated into other user's language by translation algorithm. Third, the translated language will be wirelessly transmitted to the other party. The transmitted signal will be converted into voice in the other party's computer using the hybrid system. This hybrid system will transmit the clear message regardless of the noise level in the environment or user's hearing ability. By using the network technology, communication between users can also be clearly transmitted despite the distance.

Style Analysis and Design Development of the First Birthday Partywear Based on Examples from Social Media (소셜 미디어에 나타난 돌 파티웨어 스타일 분석 및 디자인 개발)

  • Kim, Soyeon;Lee, Inseong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.16 no.3
    • /
    • pp.33-48
    • /
    • 2014
  • Based on the advent and dissemination of new developments concerning information & telecommunications technology, web services have brought new paradigms into society, thus facilitating the birth and evolution of various service industries to society as a whole. This study is aimed at investigating the expansion of the first Birthday party culture and design examples of the first Birthday partywear appearing in social media, through an inquiry into the communication functions inherent in social media. Also, the development of the first Birthday partywear designs for women aged 20 to 30 years was accomplished by categorically analyzing design characteristics in preferred fashion styles uploaded and shared within online childcare communities. First, it can be concluded that due to the bidirectional flow of information between corporations and consumers occurring from the expansion of social media, the entire structure of the market is undergoing great changes. Next, the need for the supply of professionalized the first Birthday partywear can be proved by the influx of party planners and caterers into this new industry. Third, Through a categorical analysis of these 523 photos, elegance style was the most preferred while classic and romantic styles followed. Last of all, 5 pieces of partywear reflecting contemporary consumer lifestyles which focus on 'enjoying one's own life' were created under the concept of 'Romantic chic'. The created designs aim to present a style which follows the predominant trend of elegance, classic and romantic, whilst keeping sensitivity in moderation. In this context, this study has aimed to present fundamental research data in the field of online the first Birthday partywear, through the development of the first Birthday partywear design based on the first Birthday party consumer characteristics gleaned from various forms of social media.

  • PDF

Ecological support system for promoting youth culture in a new millenium age - Comparative Analysis on psychological environment of family between Adolescent and Parent- (새 밀레니엄에서의 청소년 문화창조를 위한 생태학적 지원체계(II) -청소년 자녀와 부모가 인지한 가족의 심리적 환경 비교 분석-)

  • 김명자;이정우;계선자;박미석;박수선
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.9
    • /
    • pp.41-56
    • /
    • 2000
  • The purpose of this study is to compare the psychological environment of adolescent family between parents and their children through analysis each party's perception. A survey was conducted on 1235 high school students and their parents from 19 high schools. The main results are as follows: 1. Regarding family cohesion and family adjustment, both the parents and their children showed an average level, whereas parents had a tendency to show a higher level than their children. There is no significant difference between girls and boys and between fathers and mothers as for family cohesion, while the girls and their mothers showed significantly higher level of adjustment than boys and their fathers. 2. The adolescents and their parents showed relatively open communication style and parents have significantly more open communication style than their children. 3. The adolescents felt that they were viewed more negatively by their parents than what their parents actual views were.

  • PDF

A Implement of Web-Mail System based on Intranet (인트라넷 기반의 웹 메일 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2346-2352
    • /
    • 2011
  • E-mail systems using the intranet is widely exposed to internal threats should an administrator or a third party decides to misuse the information. To solve this problem, we propose a safe intranet email encryption protocol using the symmetrical-key password algorithm. Since the proposed protocol encrypts the data using a pre-agreed session keys between the users, the data will be safe from malignant access attempts provided that the session key is not exposed.

A Study on Key Delivery Protocols for End-to-End Secure Communication (종단 간 암호화 통신을 위한 키 전달 프로토콜에 관한 연구)

  • Kim, Jung-Yoon;Hwang, In-Yong;Lee, Jong-Eon;Kim, Seok-Joong;Lee, You-Shin;Choi, Hyoung-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.391-394
    • /
    • 2009
  • All-IP는 통신에 관련된 모든 개체가 IP를 사용하는 네트워크를 의미한다. All-IP 네트워크에서는 보안을 위해 통신 내용에 대한 암호화가 반드시 이루어져야 하며, 신뢰할 수 있는 3자 (trusted third party)는 서비스 중재 및 부가 서비스 제공을 위해 통신에 사용된 암호화 키를 획득할 수 있어야 한다. 이는 통신 개체가 다른 개체에게 암호화 키를 전달하는 메커니즘이 필요하다는 것을 의미한다. 우리는 본 논문을 통해, 통신 개체가 다른 개체에게 키를 전달하는 기법을 37에로 분류하고 각 기법에 대해 상세히 설명한다. 또한, 우리는 새로운 키 전달 프로토콜을 제안하고 3가지 운용 모드를 제시한다. 우리가 제안하는 프로토콜용 사용자의 필요에 따라 보안 기능을 선택적으로 운용할 수 있다. 성능평가 및 분석 결과에 따르면, 보안 가능과 성능은 뚜렷한 트레이드오프(trade-off) 관계가 있음을 알 수 있고, 기본적인 기능만을 운용할 경우 추가적인 오버헤드가 거의 없음을 알 수 있다.

  • PDF

A Study on Access Control Mechanism for 3rd Party Applications Process on Smart Digital TV (스마트 디지털 TV에서의 제3자 개발 애플리케이션을 위한 보안 요구사항 분석)

  • Park, Seon-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.820-823
    • /
    • 2010
  • 최근 스마트폰의 대중적 확산으로 인해 소프트웨어 및 콘텐츠에 대한 관심이 빠르게 증대되고 있으며, 제3자 개발자들이 애플리케이션 및 콘텐츠들을 개발하여 시장에 진입할 수 있는 앱스토어와 같은 제3자 애플리케이션 마켓도 함께 증가하고 있다. 이에 따라 제3자 개발 애플리케이션이 스마트기기에 설치되어 동작할 때 발생 가능한 보안 위협 및 이에 대한 대응 기술 연구가 주목받고 있다. 본 연구는 임베디드 리눅스 기반의 디지털 TV 환경에서 제3자 애플리케이션이 구동될 때 발생 가능한 보안 위협에 대응하기 위해서 필요한 보안 요구사항을 분석하고, 제3자 개발 애플리케이션의 전체 생명 주기를 고려한 보안 정책 관리 방법을 제안한다.

A Study on Access Control for Applications Developed by 3rd party (제 3 자 개발 애플리케이션 접근제어에 대한 연구)

  • Park, Seon-Ho;Park, Min-Woo;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.705-706
    • /
    • 2009
  • 본 논문은 향후 임베디드 단말 기기에 탑재되어 실행되는 응용 애플리케이션들이 제 3 자에 의해 개발되어 앱스토어를 통해 배포될 경우, 신뢰성 및 보안 문제 해결을 위해 제 3 자 개발자에 의해 개발된 애드온 애플리케이션들의 접근통제 메커니즘에 대해 연구하였다. 본 논문에서는 태스크-플로우 기반 메쏘드 접근제어 모델을 제시하고, X.509 기반의 권한 관리 구조를 통해 임베디드 단말에서 애드온 프로세스의 접근 통제를 위한 구조를 디자인하였다

Interference analysis of mutual radio communication in subway (지하철 무선환경의 전파간섭 영향 분석 방안 연구)

  • Oh, Sungkyun;Kim, Moon Hwan;Kim, Deokwon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.135-141
    • /
    • 2013
  • Subway in Korea, most of a metropolitan public transport use only worth ten million people a day floating population of wireless communication can be considered HOT SOPT. These three operators' 2G/3G/4G / Wi-Fi / T-DMB frequency and the number of services to co-exist, and the subway train passengers and subway party for operation and management of the communication network is also the co-subway passenger safety and for this service for the effects of mutual interference of whether the verification was necessary. This research and testing different frequency / communication interference between services and testing to determine whether, through the subway authorities and mobile operators in each frequency-specific interaction check and there is no interference to the safety and quality of subway passengers communication services that can be verified as the data was found. The verification methods in the metro area, not just from one region to determine whether the interference with a common verification methods can be applied.

A Case Study on Kakao's Resilience: Based on Five Levers of Resilience Theory

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.44-58
    • /
    • 2017
  • The purpose of this study is to prove the Korean Internet company, Kakao's resilience capacity. For it, this paper reviews the previous literatures regarding Kakao's business models and discusses 'resilience' theory. Then, it organizes the research questions based on the theoretical background and explains the research methodology. It investigates the case of Kakao's business and organization. The case analysis shows that five levers of resilience are a good indicator for a successful platform business evolution. The five levers are composed of coordination, cooperation, clout, capability, and connection: First lever, coordination that makes the company to restructure its silo governance in order to respond to actual business flow starting from the basic asset like game and music content; second lever, cooperation where the firm provides creative people with playground for startups such as KakaoPage; third lever, clout where the company shares its data by opening its API of AI and chatbot to $3^{rd}$ party developers; fourth lever, capability where the firm establishes AI R&D center, KakaoBrain as the function of multi-domain generalist for developing diverse platforms tackling customer needs; and the last fifth lever, connection where the firm continues to expand its platform business to the peripheries, O2O businesses such as KakaoTaxi, KakaoOrder, KakaoPay, and KakaoBank. In conclusion, this study proposes Internet companies to be a resilient platform utilizing those five levers of resilience in order to form successful platform. This study contributes to the agile innovation of Internet platform with ecological sense.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.