• 제목/요약/키워드: Content management system

검색결과 1,225건 처리시간 0.034초

실행시간과 안전성을 고려한 웹 기반의 저작권관리 시스템 (A Web-based Right Management System Considering Execution time and Security)

  • 고일석;조용환;신승수;조도은;권영애
    • 정보처리학회논문지C
    • /
    • 제11C권5호
    • /
    • pp.697-702
    • /
    • 2004
  • 디지털콘텐트는 복제가 용이하고 원본과 복사본이 동일하다는 특성 때문에 불법적인 복제와 유통의 방지를 통한 저작권의 보호에 어려움이 있다. 근래에는 웹을 기반으로 한 각종 디지털콘텐트 서비스 시스템이 상용화되고 있으며, 이것이 안정된 수익 모델로서 발전하기 위하여 적절한 저작권 보호 기술이 요구된다. 일반적으로 웹 기반의 저작권 보호를 위해서는 디지털콘텐트의 암호화를 통한 안전한 전송 방법을 사용한다. 이때 암호화된 디지털콘텐트의 크기는 증가하여 실행과정에 필요한 시간을 증가시킨다. 따라서 실행시간과 안전성을 고려한 시스템의 설계가 필요하다. 본 연구에서는, 디지털콘텐트의 저작권 관리 기술을 기반으로 부분 암호화를 통해 수행시간과 안전성을 고려한 디지털콘텐트 전송시스템을 설계하였다. 또한 분석을 통해 제안시스템의 성능을 평가하였다.

Literature Content Analysis: Formulating Different Marketing Plan between Wholesalers and Retailers Supervision System

  • SUH, Junhyuck
    • 유통과학연구
    • /
    • 제19권8호
    • /
    • pp.91-100
    • /
    • 2021
  • Purpose: Supply chain management is a significant component of marketing strategy to achieve the overall goal of maintaining a competitive edge in the industry. To better understand and compare marketing strategies between two major distribution channels (Wholesalers and Retailers), the present study examines the various critical aspects in developing marketing strategies based on numerous prior studies. Research design, data and methodology: Qualitative research involves collecting and analyzing various non-numeric data to establish different concepts or opinions in the data. In content analysis, determining the presence of different themes, concepts, or other valuable texts and their relationships is carried out. Usually, the researchers employ three distinct methods to carry out complete content analysis. Results: Developing the appropriate marketing strategy to manage the supply chain of a business is essential. Marketing strategies should be formulated in a manner that ensures the supply chain is well organized. Applying the marketing strategy in the supply chain management, the current author utilizes the four Ps to integrate strategies for two distribution channels which are essential in ensuring proper management. Conclusions: This study concluded that utilizing the existing marketing strategies and integrating them can help in better management of the supply chain, using communication, decision making, product differentiation, and pricing.

홀로그래피와 증강현실을 활용한 융합형 문화콘텐츠 제작시스템 제안 (A Suggestion for the Convergent Type of the Cultural Content Production System Using Holography and Augmented Reality)

  • 오문석;원종욱
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.177-184
    • /
    • 2012
  • A hologram projects a 3 dimensional video as same as a real subject and it is made by principles of holography. Many researches about holographic technology have been developed. Studies for visualization of 3D videos, holographic storages, and optical media have proceeded mostly in engineering. It is hard to find any researches about the convergent system from the viewpoint of interactive elements and motion graphic design such as this paper's concept. Most studies of augmented reality have been developed in the domain of technology and education but the field of content production. AR has been convergent with various fields and media, so it is time to make an active progress in the study of convergent content development. The goal of this study is to develop cultural contents and create new values through the convergence of holography and AR. The purpose of this paper is to propose the way of developing the convergent type of cultural contents and construct the production system by the new approach to users using the convergence technology of holography and augmented reality.

IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법 (A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack)

  • 임지환;오희국;김상진
    • 정보처리학회논문지C
    • /
    • 제17C권1호
    • /
    • pp.37-46
    • /
    • 2010
  • IPTV 시스템에서 콘텐츠 및 서비스 제공자의 권익보호는 수신제한시스템(CAS, Conditional Access System) 및 디지털저작권관리(DRM, Digital Right Management)를 통해서 이루어진다. 특히 CAS의 경우, 계층화된 인증키를 사용하여 권한이 있는 사용자에게만 암호화된 콘텐츠를 복호화할 수 있도록 한다. 하지만 CAS가 콘텐츠 제공자와 스마트카드(SC, Smart Card) 사이 구간만의 보안을 제공하기 때문에 셋톱박스(STB, Set-Top Box)와 SC 간 보호 받지 못하는 채널을 도청하는 McCormac Hack 공격이나 SC 복제 공격으로부터 시스템을 보호할 수 없다. 본 논문에서는 McCormac Hack 공격뿐 만 아니라 SC 복제 공격에도 강건하면서 다중 STB를 지원할 수 있는 SC / STB 인증 기법을 제안한다. SC 복제 공격을 막기위해 SC등록 단계에서 STB와 SC를 바인딩하였던 기존 기법은 다중 STB환경을 지원하지 못한다. 제안하는 시스템은 가입자관리시스템에서 STB 정보를 IPTV의 양방향 채널 특성을 이용하여 동적으로 갱신함으로서 사용자의 다중 STB를 효과적으로 지원한다.

Phytochemical constituent, percentage yield and phenolic content estimation of different solvent system of Carica papaya leaves

  • Sheneni, Victor Duniya;Usman, Oman Salifu;Musa, Quasim
    • 식품보건융합연구
    • /
    • 제4권2호
    • /
    • pp.17-23
    • /
    • 2018
  • Carica papaya is an important medicinal plant used in the management of different disease conditions. Phytochemical screening was carried out using different chemical test, Percentage yield and total phenolic content was evaluated using Folin Ciocalteu method in different solvent system; methanol, ethanol, ethyl acetate, n-butanol and n-hexane respectively. The phytochemical screening of the studies showed the presence of flavonoids, saponins, tannins, terpenoids, glycosides, steroids, carbonhydrate, anthraquinone and alkaloids. The percentage yield of crude extract and total polyphenol content was high in methanol, ethanol and ethyl acetate when compared with n-butanol and n-hexane. The studies show that Carica papaya leave extracts is a potent source of secondary metabolites. The use of the plant in the management of diseases is justified.

국내 인터넷건강정보 자율규제방안 (Self-regulation of a Health Information On the Internet)

  • 정영철;이견직
    • 보건행정학회지
    • /
    • 제12권2호
    • /
    • pp.92-114
    • /
    • 2002
  • While making a vigorous discussion about self-regulation for exponential growth of harmful health information on the Internet, many countries lave made various efforts to select and circulate high quality health information on the Internet. The purpose of this study Is to review the serf-regulation methods of health information on the Internet and to suggest quality control methods of health information on the Internet suitable for Korea. Self-regulation methods of the health information on the Internet include ‘content rating system(or content selection system)’, ‘codes of conduct or guideline’, ‘internet hot-line’, ‘education for information providers and consumers’. Any self-regulation method should be used with other methods. We can regulate health information on the Internet effectively by using both self-regulation methods and compulsive methods such as law. Also information providers, information consumers, specialists, consumer representatives, scholars, governments officers should take part in doing these efforts and make concern.

바다-$IV/I^2R$: 고차원 이미지 색인 구조를 이용한 효율적인 내용 기반 이미지 검색 시스템의 설계와 구현 (BADA-$IV/I^2R$: Design & Implementation of an Efficient Content-based Image Retrieval System using a High-Dimensional Image Index Structure)

  • 김영균;이장선;이훈순;김완석;김명준
    • 한국정보처리학회논문지
    • /
    • 제7권2S호
    • /
    • pp.678-691
    • /
    • 2000
  • A variety of multimedia applications require multimedia database management systems to manage multimedia data, such as text, image, and video, as well as t support content-based image or video retrieval. In this paper we design and implement a content-based image retrieval system, BADA-IV/I$^2$R(Image Information Retrieval), which is developed based on BADA-IV multimedia database management system. In this system image databases can be efficiently constructed and retrieved with the visual features, such as color, shape, and texture, of image. we extend SQL statements to define image query based on both annotations and visual features of image together. A high-dimensional index structure, called CIR-tree, is also employed in the system to provide an efficient access method to image databases. We show that BADA-IV/I$^2$R provides a flexible way to define query for image retrieval and retrieves image data fast and effectively: the effectiveness and performance of image retrieval are shown by BEP(Bull's Eye Performance) that is used to measure the retrieval effectiveness in MPEG-7 and comparing the performance of CIR-tree with those of X-tree and TV-tree, respectively.

  • PDF

디지털 게임 기반 학습 방법을 이용한 강사 소개 교육용 게임의 구현 (Implementation of the Educational Game for Learning the Lecturers Information using the Digital Game-based Learning Methodology)

  • 아리아 비스마 와휴타마;완다 구스디야;황민태
    • 한국정보통신학회논문지
    • /
    • 제25권9호
    • /
    • pp.1190-1198
    • /
    • 2021
  • 본 논문에서는 디지털 게임 기반 학습(DGBL) 방법을 사용하여 대학 신입생들이 학과의 강사들 정보와 지도 교과목들에 대해 학습할 수 있는 대화형 강사 소개 게임을 구현한 결과를 제시한다. 이 게임은 강사의 이름, 사진, 지도 교과목 등의 정보들을 퀴즈 게임 형식으로 제공하며, 개발 환경으로는 유니티(Unity)와 PHP를 사용하였다. 게임과 통합 콘텐츠 관리 시스템(CMS, Content Management System) 그리고 데이터베이스 간의 통신은 REST API를 사용하여 이루어지며, CMS는 게임의 내용을 관리하고 각 레벨에 대한 점수와 질문 수, 게임 사용자의 암호, 성능 임계값과 같은 게임의 여러 파라미터들로 구성된다. 개발한 대화형 게임은 통합 CMS를 사용하고 있어 상황 변화에 따라 동적으로 컨텐츠 업데이트가 가능하므로 학과의 변경의 대해 쉽게 적용할 수 있으며, 아울러 다양한 교육용 게임 개발에도 활용할 수가 있다.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.