• 제목/요약/키워드: All-In-One Services

검색결과 863건 처리시간 0.033초

NGN에서의 개방형 IPTV 서비스 (Open IPTV Services over NGN)

  • 박효진;배영인;최준균
    • 대한임베디드공학회논문지
    • /
    • 제3권4호
    • /
    • pp.198-206
    • /
    • 2008
  • Internet protocol television (IPTV), one of the most emerging services, offers multimedia streaming services with security, reliability, and relevant quality of service (QoS)/quality of experience (QoE). It provides added values to all the involving players and also brings technical and business challenges to them. For IPTV services, we expect to adopt the next generation network (NGN) environment for high quality and the Web technologies for personalization to meet the customer's necessity. Web can provide an open, flexible, and agile platform. Therefore, in this paper, we propose personalized IPTV services based on Web-based open platform in NGN environment and present functional architecture for Web-based personalized IPTV services. Technical issues for deploying the proposed IPTV services using Web are also provided. The objective of this paper is to analyze the critical architectural issues for developing viable and feasible networking platform models for personalized IPTV services.

  • PDF

농어촌 취약계층의 사회서비스 수요탐색과 정책함의 (Exploring Social Service Demand and Policy Implications of the Vulnerable in Rural Areas)

  • 김윤영;이석환
    • 한국콘텐츠학회논문지
    • /
    • 제20권12호
    • /
    • pp.332-345
    • /
    • 2020
  • 본 연구는 코로나19 사태 속에서 더욱 열악한 환경에 노출된 농어촌 취약계층에 초점을 두고 사회서비스 영역의 수요를 탐색하고 정책적 함의를 제시하고자 하였다. 이를 위해 '2018년 농어업인 등에 대한 복지실태조사' 원자료를 활용하여 가구유형별 취약계층의 사회서비스 욕구를 분석하였다. 분석결과 농어촌 전체, 노인, 장애인, 1인, 노인 1인, 저소득 가구 등이 1순위 사회서비스는 '소득지원서비스'로 나타났고, 아동 가구는 '보육 및 교육 관련 서비스'로 나타났다. 2순위 사회서비스는 전체는 '문화여가향유지원서비스', 노인, 장애인, 노인 1인, 저소득 가구 등은 '보건의료 건강관리 서비스', 아동가구는 '문화여가향유지원서비스', 1인가구는 '일상생활지원서비스'로 나타났다. 이러한 결과를 토대로 농어촌 취약계층 맞춤형 사회서비스 지원 방안을 제안하였다. 또한 농어촌 보건복지 기본계획 등 정부의 도농간 복지 격차 완화 정책의 문제점을 공식부처 간의 협의체계 부재로 보고 농어촌 중장기 정책의 환류기능과 전담조직의 필요성을 논하고 '농어촌 지역맞춤형 사회서비스 제공여건 구축(안)'을 제안하였다.

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • 제2권2호
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.

A Service Composition using Hierarchical Model in Multiple Service Environment

  • Tang, Jiamei;Kim, Sangwook
    • 한국멀티미디어학회논문지
    • /
    • 제18권9호
    • /
    • pp.1091-1097
    • /
    • 2015
  • Internet-of-Things (IoT) becomes one of the most promising future paradigms, which foresees enormous amounts of interoperable things and heterogeneous services. The goal of IoT is to enable all things connected and brings all kinds information and services to people. However, such a great deal of information may lead to cognitive overload or restrain in productivity of people. Thus, it is a necessity to build intelligent mechanisms to assist people in accessing the information or services they needed in a proactive manner. Most of previous related mechanisms are built on well-defined web services and lack of consideration of constrained resources. This paper suggests a services composition method by adapting a hierarchical model, which is a graph-based model composed of four layers: Context Layer, Event Layer, Service Layer and Device Layer. With a such multi-layer graph, service composition can be achieved by the iteration of layer by layer. Then, to evaluate the effectiveness of this proposed hierarchical model, a real-life emergency response dataset is applied and the experimental results are composed with the general probabilistic method and indicate that the proposed method is help for compositing multiple services while considering given context and constrained resources.

불리언 행렬의 모노이드에서의 J 관계 계산 알고리즘 (Algorithm for Computing J Relations in the Monoid of Boolean Matrices)

  • 한재일
    • 한국IT서비스학회지
    • /
    • 제7권4호
    • /
    • pp.221-230
    • /
    • 2008
  • Green's relations are five equivalence relations that characterize the elements of a semigroup in terms of the principal ideals. The J relation is one of Green's relations. Although there are known algorithms that can compute Green relations, they are not useful for finding all J relations in the semigroup of all $n{\times}n$ Boolean matrices. Its computation requires multiplication of three Boolean matrices for each of all possible triples of $n{\times}n$ Boolean matrices. The size of the semigroup of all $n{\times}n$ Boolean matrices grows exponentially as n increases. It is easy to see that it involves exponential time complexity. The computation of J relations over the $5{\times}5$ Boolean matrix is left an unsolved problem. The paper shows theorems that can reduce the computation time, discusses an algorithm for efficient J relation computation whose design reflects those theorems and gives its execution results.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

2001년 완성목표의 우리나라 G7 Project - 광대역종합통신망(B-lSDN) - (Korea's G7 Project - Broadband Integrated Service Digital Network(B-ISDN)- Completion Target Year 2001)

  • 조규심
    • 기술사
    • /
    • 제27권2호
    • /
    • pp.42-54
    • /
    • 1994
  • Nowadays communication network is steadily changing from a main body of telephone to a network which is creating new services such as multimedia etc. Jhis article introduces a bud of new service and new network which are able to sustain the above service. Including Korea, world advanced countries have been digitatizing their network with N-ISDN (narrowband ISDN) by e.g. 64K b/s and 1.5M b/s. New service by N-ISDN are extraordinary, though it can not solve all kinds of services. To solve these problems, a solving platform should be constituted. B-ISDN(broadband ISDN), as a platform has to be built to deal with almost all uinds of services, whatever the communication speed, communication mode or communication quality may be. Korea Telecommunication Authority(KTA) opened the narrowband ISDN(N-ISDN) at the end of 1993. This was one step previous opening of the broadband ISDN(B-ISDN) service scheduled to be rendered in 2001. B-ISDN, receiving and transmitting by far more information with high speed than the N-NSDN does, is one of G-7 Progects which the Korean government is driving foreward to raise the national scientific power to seven advan ced countries. This is also linked with an extremely high speed information network scheduled to be built by the Ministry of Communications in 2015.

  • PDF

전라남도 섬과 해상에서 발생한 환자의 현황분석 (Status analysis of patients on islands and seas of Jeollanam-do)

  • 최영주;윤종근
    • 한국응급구조학회지
    • /
    • 제26권2호
    • /
    • pp.87-96
    • /
    • 2022
  • Purpose: By analyzing the health status of emergency patients on islands in the Jeollanam-do province, this study aims to provide basic data for proposed future medical emergency services on the islands. This information includes monthly and hourly statistics on patients' characteristics, patient frequency, an analysis of first aid procedures, response times, and time spent at hospitals. Methods: The study analyzed the monthly and hourly frequency of emergency patients, first aid status and procedures, general patient characteristics, accident types, patient cognitive status and agility, marine police response times, and frequency and percentile of hospital dispatch times. Results: 1Q and #q show the highest patient turnover rate in one year. 50.5% of daily patients are admitted between 4 PM and 12 PM. The hospital dispatch time is within a one- to two-hour window for 54.0% of all patients. Conclusion: The emergency medical service system for the Jeollanam-do province islands and seas is available to all Korean residents, citizens, and visitors. It is necessary to implement an emergency medical system for the relevant organizations.

정보사회의 도서관 경영 (Library Management in Information Society)

  • 전명숙
    • 한국문헌정보학회지
    • /
    • 제25권
    • /
    • pp.151-183
    • /
    • 1993
  • As many Korean libraries has begun to be automated and become a part of the worldwide, open library system, they need a new management. Therefore, the purpose of this paper is to explore the library management in automated libraries and to establish a theory of the library management in information society, The automated libraries could be well explained by the systems theory and the environment of the libraries could be well explained by the contingency theory, The following hypothesis were set to direct this research. 1. As the libraries are automated and become a part of one big, worldwide library system, the libraries interact closely with the environment so that the library and the environment become one. 2. As the libraries are automated and become a part of one big, worldwide library system, the librarians need to work in the environment for the library networks, standardization of cataloging, or government information policy making. 3. As the libraries are automated and become a part of one big, worldwide library system, the librarians only manage the library, The various other library staffs take over the traditional library services directly related to books. The data were gathered from the research done previously, Also the date were collected from the American and Japanese libraries. The findings were as follows: The environment of the library integrated all types of the library services such as school library, university library, etc. And it also integrated all the services of the media centers and the press centers, etc. to library services. And the new library services began in the environment. Librarians worked for these new services. In the library, the librarians distingushed the library system from the environment by planning : mission, goal, objectives, policy, procedures and rules. Library organization became temporary such as forming task forces or matrix or free form. The environment controlled the library. Staffs were controlled by plans or computers. And the professional librarians were controlled by their ability to solve problems raised outside the libraries. Library leaders brought in the technology to the library from its environment. The librarians led the formal and informal organizations so that the staffs cooperated well in their work. And librarians tought the library procedures to the partime workers or the temporary staffs. Participative management and management by objectives were the means of motivating staffs. Budget was based on the ever changing environment. The zero based budget method was applied. Therfore, in the information society, the professional librarians become the able managers in the library and global librarians in the environment.

  • PDF

All-IP 네트워크에서 IPTV 트래픽 수용을 위한 최적의 설계 방안 연구 (A Study on the Optimal All-IP Network Design for Adopting IPTV Traffic)

  • 김형수;조성수;설순욱;전윤철
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.68-71
    • /
    • 2009
  • All-IP network requires change of the existing IP network engineering methods as the convergence service market between communication and broadcasting industries using IP network is growing rapidly. Especially the video services like IPTV require more strict transmission quality and higher bandwidth than the existing data services. So it is difficult to design All-IP network by the over-provisioning method which used to be used for the existing IP network design. It also requires a heavy investment which becomes one of big obstacles to the IPTV service expansion. In order to reduce the investment costs, it is required to design an optimized network by maximizing the utilization of the network resources and at the same time maintaining the customer satisfaction in terms of service quality. In this paper, we first analyze the effects of IPTV traffic on the existing internet. Then we compare two traffic engineering technologies, which are dimensioning without admission control and dimensioning with admission control, on the All-IP network design by simulation. Finally, we suggest cost effectiveness of traffic engineering technologies for designing the All-IP network.

  • PDF