• Title/Summary/Keyword: IT 기반의 서비스 환경

Search Result 2,372, Processing Time 0.035 seconds

A Package Design for Multimedia Live Streaming in Distributed Environment (분산 환경에서 멀티미디어 실시간 스트리밍을 위한 패키지 설계)

  • Seo Bong-Kun;Kim Yun-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.4
    • /
    • pp.490-504
    • /
    • 2006
  • It needs to control each objects on various platform and transmit multimedia data to multiple receivers which are for developing a multimedia service with multimedia live streaming in a distributed environment. In this paper, we present a DLS (Distributed Live Streaming) package which support l:N multimedia live streaming in a distributed environment. Also, it has extended RMI which is a distributed object technology and JMF using multimedia transmission/processing. A java-based DLS package has been designed to separate a transmission and a control for more efficient distributed processing. It is possible to apply in development of multimedia service supported 1:N transmission and runned independently to any platform.

  • PDF

Software-based Quality Measurement of Mobile VoIP Services (소프트웨어 기반 모바일 VoIP 서비스 품질 측정)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.55-60
    • /
    • 2011
  • The mobile internet telephony service rapidly grows according to the extending deployment of smartphones. Unlike telephony service over a conventional public switched telephone network (PSTN) or mobile network, internet telephony service cannot guarantee its service quality, which can be severer in a wireless environment. Therefore, a more strict and systematic quality management is required for successful settlement and popularization of mobile internet telephony service. Existing quality management scheme using a specific measurement equipment cannot measure all the time so that it performs late management. In order to overcome the problem, this paper develops a software that can be equipped on a user terminal and measures the service quality all the time. By using the developed software, all-time and user-activating service quality monitoring can be supported.

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

InfoDID: A robust user information management serivce based on Decentralized Identifiers

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.75-84
    • /
    • 2021
  • In this paper, we introduce InfoDID, a robust user information management service based on DID that manages user information reliably. Since blockchain technology provides an environment in which data can be handled transparently on a decentralized basis, various services using blockchain are currently being developed As the importance of user's personal information has recently emerged, the DID technology is receiving attention. The technology allows a user to control his or her information through decentralized identifiers, and various information management services are being tried based on the technology. Using blockchain-based DID technology, InfoDID reliably controls personal information requested frequently, helping users to provide their information to other services more conveniently. In addition, to support service continuity, InfoDID uses BR2K technique that provides robust execution of blockchain application services, so that even partial service failures can be systematically recovered. To facilitate this operation, we present a replication status monitoring tool that can continuously check the replication states of blockchain application services running in association with the BR2K technique such as InfoDID.

Development of the Cross-vertical Ontology for Context Aware Service in Various IoT Environment (다양한 IoT 환경에서 상황인지 서비스 제공을 위한 크로스 버티컬 온톨로지 개발)

  • Yang, Nari;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.58-73
    • /
    • 2015
  • In the IoT environment, context information is important to provide context service to the user. For this, collected data from devices such as sensors or actuators, converts to context information using the ontology. Because the existing ontologies designed for target service, if the user wants to change the service requirements, service condition, service environment or another service, overall ontology will be redesigned to the changed service. To overcome this difficulty, we propose the cross-vertical ontology model called the Generic Ontology Models(GOMs). It can define the user's desired services without regarding to place and situation. Also, we propose IoT service concept model that represents data flow of the IoT service and IoT service environment. Moreover, as the use case, we show that the proposed GOMs are able to provide the IoT service well.

Context Information Modeling Method based on Ontology (온톨로지 기반의 컨택스트 정보 모델링 기법)

  • Kim, Jin-Hyung;Hwang, Myung-Gwon;Jung, Han-Min
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.437-447
    • /
    • 2011
  • Ubiquitous Computing is required to define models for broad context information occurrence by surrounding environment and to study how to model a mechanism for selectively collecting useful pieces of context information and providing relevant intelligent services. Further, studies are also required as to process of context information, and its maintenance and reasoning. However, current context-aware research area still lacks modeling technique that reflects the characteristics of ontology effectively for providing relevant intelligent services. It has also limitation about context reasoning and interoperability among context information. Therefore, this paper proposes ontology-based context-aware modeling technique and framework enabling efficient specification of context information for providing intelligent context-aware services that support context management and reasoning.

Policy-based End-to-End QoS Provision for 3G Networks Using DiffServ-aware MPLS (3G 네트워크상에서 정책기반 End-to-End QoS 지원을 위한 DiffServ-aware MPLS)

  • Choi Sung-Gu;Jun Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.349-354
    • /
    • 2006
  • In 3G networks interworking with external IP-based networks, provision of end-to-end QoS to packet-based services is a critical issue. In this paper, we propose DiffServ-aware Multiple Protocol Label Switching(MPLS) as a new policy enforcement means. With the adoption of the proposed DiffServ-aware MPLS, it is feasible to provide differentiated QoS provision with the help of DiffServ as well as to improve network utilization by using multiple paths based on MPLS. We verify the effectiveness of our proposed policy enforcement means through a simulation in which realtime traffic and non-realtime traffic are served together.

A Study on the Establishment of Massive IoT based on Low Power Wide Area Network Technology (저전력 광역 네트워크 기술 기반 Massive IoT 구축 연구)

  • Lee, Gyeongheon;Hong, Jiyeon;Youn, Joosang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.103-104
    • /
    • 2019
  • 최근 스마트시티 구축 사업에서 사물인터넷 기반 서비스 개발이 활발히 진행 중이다. 그 서비스들을 제공하기 위해 사용되어야 할 디바이스 수가 수백만 개까지 증가할 것으로 예상하고 있으며 수백만 개의 디바이스들을 수용하기 위해서는 Massive IoT 네트워크의 환경 구축을 필요로 하고 있다. 따라서 본 논문에서는 Massive IoT 네트워크 환경을 구축하기 위해 저전력 광역 네트워크(LPWAN) 기술 중 LoRa(Long Range) 네트워크가 적용이 가능한지를 LoRaSim을 이용하여 시뮬레이션한다. 시뮬레이션한 결과 중 충돌 횟수를 통해 충동률을 구하고 그래프를 이용하여 신뢰성을 나타내며, Massive IoT 네트워크에 적합성에 대해 분석한다.

  • PDF

Adult Certification System on Mobile RFID Service Environments (모바일 RFID 서비스 환경에서의 성인 인증 시스템)

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.131-138
    • /
    • 2009
  • This paper is about adult certification on Mobile RFID Service Environments coming through the combination of RFID(Radio Frequency IDentification) technology, as the core technology of ubiquitous environments, and mobile telecommunication technology. To overcome the shortcoming of simple adult certification on current internet, we suggest a framework for content-based classification and propose an adult certification system using it. At first, we explain conventional methods for adult certification, and show a criteria of content-based classification for preventing an exposure of adult contents from minors. Additionally, we describe data structure and system for the proposed adult certification on mobile RFID environment, and finish it with concluding remarks.

A Study on USIM based Integrated Authentication in IT Shared Service Environment (IT Shared Service 운영 환경에서 USIM 을 활용한 통합 인증에 관한 연구)

  • Kim, Jae-Heung
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1086-1089
    • /
    • 2010
  • 글로벌 기업은 공통 활용 가능한 IT 요소를 통합/재정립하여 비즈니스 전략을 효과적으로 지원하기 위한 IT Shared Service(이하 ITSS) 체계로 전환하고 있다. IT 자원은 통합되고 업무는 네트워크 기반의 가상화된 서비스로 제공되며, 모바일 중심의 개인 업무 환경으로 전환되고 있다. 본 논문은 상용화된 보안 인증 방식 중 ITSS 운영환경에 적합한 방식을 검토하고, 문제점 및 취약점을 찾아 개선 방안을 도출하고자 한다. 특히, 모바일 환경이 급속도로 확산되는 추세에서 USIM을 활용한 인증 방식이 기업의 보안 요구사항을 충족 시킬 수 있는지 집중 검토하고자 한다.