• Title/Summary/Keyword: Computer usage

Search Result 1,243, Processing Time 0.026 seconds

Impediment to Device Utility Through the Constraint on USIM Card Usage Range (USIM 사용 범위 제한을 통한 장치 활용성의 저해)

  • Shin, Hyeon-Jun;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.349-352
    • /
    • 2014
  • 본 논문에서는 WCDMA, LTE에 이르기까지 USIM을 사용한 국내 이동통신서비스 시장에서 단말기정보를 사용하여 USIM에 의한 사용자 인증을 제한하여 이용자의 정상적인 통신서비스의 이용을 제한하는 현상이 벌어지고 있는것과 관련하여 국내에서 USIM을 사용하기 시작한 뒤부터 최근에 이르기까지 어떻게 이용자의 USIM 사용을 제한하여 장치 활용성을 저해하여 왔는지에 대한 방법과, 이로 인하여 유비쿼터스 컴퓨팅의 5-Any 중(中) 하나인 Any-Device성(性)을 저해하는 현상과 영향에 대하여 논한다.

  • PDF

A Study on the Factors in the use of Office Automation Information Technology (사무자동화 정보기술 이용의 영향요인에 관한 실증연구)

  • 곽두진;김성국;이정관
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.121-129
    • /
    • 1999
  • The purpose of this study is to examine the effects of Critical Factors in the use of Personal Computer, Office Automation Information Technology. The author presents a therortical model related Office Automation Information Technology by end-users and suggests how this model should be conceptualized. A model was estimated with data from 98 end-users. The results revealed that degree of organizational support. demographic charateristic, and useful to the task was positively related to usage of Office Automation Information Technology.

Analysis and Optimal Control of Linear Time-delay Systems via Fast Walsh Transform (고속윌쉬변환에 의한 선형시지연계의 해석 및 최적제어)

  • Han, Sang-In;Lee, Myeong-Gyu;Kim, Jin-Tae;An, Du-Su
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.5
    • /
    • pp.601-606
    • /
    • 1999
  • A Walsh function method is proposed in this report for the analysis and optimal control of linear time-delay systems, which is based on the Picard's iterative approximation and fast Walsh transformation. In this research, the following results are obtained: 1) The differential and integral equation can be solved by transforming into a simple algebraic equation as it was possible with the usual orthogonal function method: 2) General orthogonal function methods require usage of Walsh operational matrices for delay or advance and many calculations of inverse matrices, which are not necessary in this method. Thus, the control problems of linear time-delay systems can be solved much faster and readily.

  • PDF

Preventing Unauthorized Software Usage by Internet Authentication and Encryption of Secondary Files (인터넷 인증 및 2차 생성 파일 암호화를 이용한 소프트웨어 부정 사용 방지 기술)

  • Park, Sung-Ha;Chae, Dong-Kyu;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.435-436
    • /
    • 2014
  • 소프트웨어의 불법 복제 및 인증을 거치지 않은 부정 사용 등이 큰 문제가 되고 있다. 소프트웨어 부정 사용을 막기 위해 usb 인증, 시리얼 키 인증, 서버접속을 통한 인증 등 다양한 방법들이 존재해 왔다. 그러나 이러한 기술들의 우회 방법들이 상당수 공개된 실정이다. 본 연구에서는 보다 강화된 인터넷 인증 기반의 불법 사용 방지 기술을 제안하고자 한다. 뿐만 아니라 소프트웨어를 사용해 만들어 낸 2차 창작물 또한 보호하는 방법을 제시하고자 한다.

On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.131-136
    • /
    • 2021
  • This research aims to analyse the practices adopted by social media users in the Kingdom of Saudi Arabia (KSA), specifically users of Facebook and Snapchat. To collect data from participants, a questionnaire was used, generating 915 responses. The analysis of the data shows a clear preference for Snapchat over Facebook in the KSA, where 89% of the participants have accounts on Snapchat compared to 66% of them with accounts on Facebook. Moreover, the preference for Snapchat over Facebook has been clearly shown in the daily usage of participants, where 83% of those with Snapchat accounts can be described as very active users. They have accessed their Snapchat accounts at least once a day compared to only 15% of Facebook users. Different reasons were provided by the participants explaining the practices they adopted. We believe that such research could help social media applications' designers and policy makers to understand the behaviour of users in the KSA when using social media applications and the rationale behind their behaviour and preferences. This understanding could help improve the performance of current applications and new ones.

Applying Clustering Approach to Mobile Content-Centric Networking (CCN) Environment

  • Saad, Muhammad;Choi, Seungoh;Roh, Byeong-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.450-451
    • /
    • 2013
  • Considering the recent few years, the usage of mobile content has increased rapidly. This brings out the need for the new internet paradigm. Content-Centric Networking (CCN) caters this need as the future internet paradigm. However, so far, the issue of mobility in the network using CCN has not been considered very efficiently. In this paper, we propose clustering in the network. We apply clustered approach to CCN for catering the mobility of client node in the network. Through this approach we achieve better convergence time and control overhead in contrast to the basic CCN.

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

Femtocell Networks Interference Management Approaches

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.329-339
    • /
    • 2022
  • Small cells, particularly femtocells, are regarded a promising solution for limited resources required to handle the increasing data demand. They usually boost wireless network capacity. While widespread usage of femtocells increases network gain, it also raises several challenges. Interference is one of such concerns. Interference management is also seen as a main obstacle in the adoption of two-tier networks. For example, placing femtocells in a traditional macrocell's geographic area. Interference comes in two forms: cross-tier and co-tier. There have been previous studies conducted on the topic of interference management. This study investigates the principle of categorization of interference management systems. Many methods exist in the literature to reduce or eliminate the impacts of co-tier, cross-tier, or a combination of the two forms of interference. Following are some of the ways provided to manage interference: FFR, Cognitive Femtocell and Cooperative Resource Scheduling, Beamforming Strategy, Transmission Power Control, and Clustering/Graph-Based. Approaches, which were proposed to solve the interference problem, had been presented for each category in this work.

Scalable Big Data Pipeline for Video Stream Analytics Over Commodity Hardware

  • Ayub, Umer;Ahsan, Syed M.;Qureshi, Shavez M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1146-1165
    • /
    • 2022
  • A huge amount of data in the form of videos and images is being produced owning to advancements in sensor technology. Use of low performance commodity hardware coupled with resource heavy image processing and analyzing approaches to infer and extract actionable insights from this data poses a bottleneck for timely decision making. Current approach of GPU assisted and cloud-based architecture video analysis techniques give significant performance gain, but its usage is constrained by financial considerations and extremely complex architecture level details. In this paper we propose a data pipeline system that uses open-source tools such as Apache Spark, Kafka and OpenCV running over commodity hardware for video stream processing and image processing in a distributed environment. Experimental results show that our proposed approach eliminates the need of GPU based hardware and cloud computing infrastructure to achieve efficient video steam processing for face detection with increased throughput, scalability and better performance.