• Title/Summary/Keyword: All-In-One Services

Search Result 855, Processing Time 0.026 seconds

Open IPTV Services over NGN (NGN에서의 개방형 IPTV 서비스)

  • Park, Hyo-Jin;Bae, Young-In;Choi, Jun-Kyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.198-206
    • /
    • 2008
  • Internet protocol television (IPTV), one of the most emerging services, offers multimedia streaming services with security, reliability, and relevant quality of service (QoS)/quality of experience (QoE). It provides added values to all the involving players and also brings technical and business challenges to them. For IPTV services, we expect to adopt the next generation network (NGN) environment for high quality and the Web technologies for personalization to meet the customer's necessity. Web can provide an open, flexible, and agile platform. Therefore, in this paper, we propose personalized IPTV services based on Web-based open platform in NGN environment and present functional architecture for Web-based personalized IPTV services. Technical issues for deploying the proposed IPTV services using Web are also provided. The objective of this paper is to analyze the critical architectural issues for developing viable and feasible networking platform models for personalized IPTV services.

  • PDF

Exploring Social Service Demand and Policy Implications of the Vulnerable in Rural Areas (농어촌 취약계층의 사회서비스 수요탐색과 정책함의)

  • Kim, Yun-Yong;Lee, Seok-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.332-345
    • /
    • 2020
  • This study sought to explore the demand in the social service sector and present policy implications, focusing on the vulnerable in rural villages exposed to worse conditions amid the Covid-19 crisis. To this end, the social service needs of vulnerable groups by household type were analyzed by utilizing the raw data of the 2018 Survey on Rural Well-Being. Analysis showed that the greatest demand social services for all rural villages, the elderly, the disabled, one-person, one elderly and low-income households were income support services, while in household that included children the demand was for childcare and education-related services. The second-highest social services in terms of demand were cultural leisure vacation support services for all rural villages, healthcare-related services for the elderly, the disabled, one elderly and low-income households, cultural leisure vacation support services for households including children and daily life support services for single-person households. Based on these results, a measure was proposed to support social services, tailored to vulnerable groups in rural villages. In addition, the government's lack of a consultation system between urban and rural welfare policies, such as a basic plan for health and welfare in rural villages, led this paper to discuss the need for a feedback function and dedicated formulation of mid- to long-term policies in rural villages. It also proposed the establishment of conditions for providing customized social services for rural villages.

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.2
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.

A Service Composition using Hierarchical Model in Multiple Service Environment

  • Tang, Jiamei;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1091-1097
    • /
    • 2015
  • Internet-of-Things (IoT) becomes one of the most promising future paradigms, which foresees enormous amounts of interoperable things and heterogeneous services. The goal of IoT is to enable all things connected and brings all kinds information and services to people. However, such a great deal of information may lead to cognitive overload or restrain in productivity of people. Thus, it is a necessity to build intelligent mechanisms to assist people in accessing the information or services they needed in a proactive manner. Most of previous related mechanisms are built on well-defined web services and lack of consideration of constrained resources. This paper suggests a services composition method by adapting a hierarchical model, which is a graph-based model composed of four layers: Context Layer, Event Layer, Service Layer and Device Layer. With a such multi-layer graph, service composition can be achieved by the iteration of layer by layer. Then, to evaluate the effectiveness of this proposed hierarchical model, a real-life emergency response dataset is applied and the experimental results are composed with the general probabilistic method and indicate that the proposed method is help for compositing multiple services while considering given context and constrained resources.

Algorithm for Computing J Relations in the Monoid of Boolean Matrices (불리언 행렬의 모노이드에서의 J 관계 계산 알고리즘)

  • Han, Jae-Il
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.221-230
    • /
    • 2008
  • Green's relations are five equivalence relations that characterize the elements of a semigroup in terms of the principal ideals. The J relation is one of Green's relations. Although there are known algorithms that can compute Green relations, they are not useful for finding all J relations in the semigroup of all $n{\times}n$ Boolean matrices. Its computation requires multiplication of three Boolean matrices for each of all possible triples of $n{\times}n$ Boolean matrices. The size of the semigroup of all $n{\times}n$ Boolean matrices grows exponentially as n increases. It is easy to see that it involves exponential time complexity. The computation of J relations over the $5{\times}5$ Boolean matrix is left an unsolved problem. The paper shows theorems that can reduce the computation time, discusses an algorithm for efficient J relation computation whose design reflects those theorems and gives its execution results.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Korea's G7 Project - Broadband Integrated Service Digital Network(B-ISDN)- Completion Target Year 2001 (2001년 완성목표의 우리나라 G7 Project - 광대역종합통신망(B-lSDN) -)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.27 no.2
    • /
    • pp.42-54
    • /
    • 1994
  • Nowadays communication network is steadily changing from a main body of telephone to a network which is creating new services such as multimedia etc. Jhis article introduces a bud of new service and new network which are able to sustain the above service. Including Korea, world advanced countries have been digitatizing their network with N-ISDN (narrowband ISDN) by e.g. 64K b/s and 1.5M b/s. New service by N-ISDN are extraordinary, though it can not solve all kinds of services. To solve these problems, a solving platform should be constituted. B-ISDN(broadband ISDN), as a platform has to be built to deal with almost all uinds of services, whatever the communication speed, communication mode or communication quality may be. Korea Telecommunication Authority(KTA) opened the narrowband ISDN(N-ISDN) at the end of 1993. This was one step previous opening of the broadband ISDN(B-ISDN) service scheduled to be rendered in 2001. B-ISDN, receiving and transmitting by far more information with high speed than the N-NSDN does, is one of G-7 Progects which the Korean government is driving foreward to raise the national scientific power to seven advan ced countries. This is also linked with an extremely high speed information network scheduled to be built by the Ministry of Communications in 2015.

  • PDF

Status analysis of patients on islands and seas of Jeollanam-do (전라남도 섬과 해상에서 발생한 환자의 현황분석)

  • Choi, Young-Ju;Yun, Jong-Geun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.26 no.2
    • /
    • pp.87-96
    • /
    • 2022
  • Purpose: By analyzing the health status of emergency patients on islands in the Jeollanam-do province, this study aims to provide basic data for proposed future medical emergency services on the islands. This information includes monthly and hourly statistics on patients' characteristics, patient frequency, an analysis of first aid procedures, response times, and time spent at hospitals. Methods: The study analyzed the monthly and hourly frequency of emergency patients, first aid status and procedures, general patient characteristics, accident types, patient cognitive status and agility, marine police response times, and frequency and percentile of hospital dispatch times. Results: 1Q and #q show the highest patient turnover rate in one year. 50.5% of daily patients are admitted between 4 PM and 12 PM. The hospital dispatch time is within a one- to two-hour window for 54.0% of all patients. Conclusion: The emergency medical service system for the Jeollanam-do province islands and seas is available to all Korean residents, citizens, and visitors. It is necessary to implement an emergency medical system for the relevant organizations.

Library Management in Information Society (정보사회의 도서관 경영)

  • Chun Myung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.151-183
    • /
    • 1993
  • As many Korean libraries has begun to be automated and become a part of the worldwide, open library system, they need a new management. Therefore, the purpose of this paper is to explore the library management in automated libraries and to establish a theory of the library management in information society, The automated libraries could be well explained by the systems theory and the environment of the libraries could be well explained by the contingency theory, The following hypothesis were set to direct this research. 1. As the libraries are automated and become a part of one big, worldwide library system, the libraries interact closely with the environment so that the library and the environment become one. 2. As the libraries are automated and become a part of one big, worldwide library system, the librarians need to work in the environment for the library networks, standardization of cataloging, or government information policy making. 3. As the libraries are automated and become a part of one big, worldwide library system, the librarians only manage the library, The various other library staffs take over the traditional library services directly related to books. The data were gathered from the research done previously, Also the date were collected from the American and Japanese libraries. The findings were as follows: The environment of the library integrated all types of the library services such as school library, university library, etc. And it also integrated all the services of the media centers and the press centers, etc. to library services. And the new library services began in the environment. Librarians worked for these new services. In the library, the librarians distingushed the library system from the environment by planning : mission, goal, objectives, policy, procedures and rules. Library organization became temporary such as forming task forces or matrix or free form. The environment controlled the library. Staffs were controlled by plans or computers. And the professional librarians were controlled by their ability to solve problems raised outside the libraries. Library leaders brought in the technology to the library from its environment. The librarians led the formal and informal organizations so that the staffs cooperated well in their work. And librarians tought the library procedures to the partime workers or the temporary staffs. Participative management and management by objectives were the means of motivating staffs. Budget was based on the ever changing environment. The zero based budget method was applied. Therfore, in the information society, the professional librarians become the able managers in the library and global librarians in the environment.

  • PDF

A Study on the Optimal All-IP Network Design for Adopting IPTV Traffic (All-IP 네트워크에서 IPTV 트래픽 수용을 위한 최적의 설계 방안 연구)

  • Kim, Hyoung-Soo;Cho, Sung-Soo;Seol, Soon-Uk;Jun, Yun-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.68-71
    • /
    • 2009
  • All-IP network requires change of the existing IP network engineering methods as the convergence service market between communication and broadcasting industries using IP network is growing rapidly. Especially the video services like IPTV require more strict transmission quality and higher bandwidth than the existing data services. So it is difficult to design All-IP network by the over-provisioning method which used to be used for the existing IP network design. It also requires a heavy investment which becomes one of big obstacles to the IPTV service expansion. In order to reduce the investment costs, it is required to design an optimized network by maximizing the utilization of the network resources and at the same time maintaining the customer satisfaction in terms of service quality. In this paper, we first analyze the effects of IPTV traffic on the existing internet. Then we compare two traffic engineering technologies, which are dimensioning without admission control and dimensioning with admission control, on the All-IP network design by simulation. Finally, we suggest cost effectiveness of traffic engineering technologies for designing the All-IP network.

  • PDF