• Title/Summary/Keyword: IT Proposal

Search Result 1,890, Processing Time 0.027 seconds

A Study on the Proposal of Spiral Evolution Model of IPTV, M-IPTV, OTT & Smart Media focusing on Exploration & Exploitation Theory (IPTV, M-IPTV, OTT, 스마트미디어 진화단계에 관한 탐색과 활용관점의 Spiral 모형 연구)

  • Lee, Sang-Ho;Kim, Jai-Beom;Kim, Young-Berm
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.327-338
    • /
    • 2014
  • This study proposes the evolution model of emerging media platform including smart media (M-IPTV, Smart TV) and IPTV, through a spiral evolution model based on the theory of the exploration & the exploitation. Authors suppose that the IP media evolved from IPTV technology, evolution of which has come through the development model of serial circular process. For explanation of this evolution, we propose the research model integrating the spiral model and the exploration & exploitation theory. Researchers define the smart media as the evolved media from IPTV, through this proposed model. We expect this model to be the theoretical base of media regulation and setting direction of future media service. Thus, this research are summed up as follows. To begin with, we classify the evolutionary stage of IPTV from the view points of service feature, regulation frame and technological characters. Secondly, we organize and confirm the research model of IPTV evolution through case analysis of the 3 cycles of each evolutionary stage. As a result, discussion of this study helps understanding mobile IP media and smart media as a post IPTV and leads the solution of various regulation issues and the development of the innovative media service and content. In addition, it can guide the government for the evolutionary direction to promote the media and the content industry.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Performance Improvement of Current-mode Device for Digital Audio Processor (디지털 오디오 프로세서용 전류모드 소자의 성능 개선에 관한 연구)

  • Kim, Seong-Kweon;Cho, Ju-Phil;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.35-41
    • /
    • 2008
  • This paper presents the design method of current-mode signal processing for high speed and low power digital audio signal processing. The digital audio processor requires a digital signal processing such as fast Fourier transform (FFT), which has a problem of large power consumption according to the settled point number and high speed operation. Therefore, a current-mode signal processing with a switched Current (SI) circuit was employed to the digital audio signal processing because a limited battery life should be considered for a low power operation. However, current memory that construct a SI circuit has a problem called clock-feedthrough. In this paper, we examine the connection of dummy MOS that is the common solution of clock-feedthrough and are willing to calculate the relation of width between dummy MOS for a proposal of the design methodology for improvement of current memory. As a result of simulation, in case of that the width of memory MOS is 20um, ratio of input current and bias current is 0.3, the relation of width between switch MOS and dummy MOS is $W_{M4}=1.95W_{M3}+1.2$ for the width of switch MOS is 2~5um, it is $W_{M4}=0.92W_{M3}+6.3$ for the width of switch MOS is 5~10um. Then the defined relation of MOS transistors can be a useful design guidance for a high speed low power digital audio processor.

  • PDF

Super Resolution based on Reconstruction Algorithm Using Wavelet basis (웨이브렛 기저를 이용한 초해상도 기반 복원 알고리즘)

  • Baek, Young-Hyun;Byun, Oh-Sung;Moon, Sung-Ryong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.1
    • /
    • pp.17-25
    • /
    • 2007
  • In most electronic imaging applications, image with high resolution(HR) are desired. HR means that pixel density within an image is high, and therefore HR image can offer more details that may be critical in various applications. Digital images that are captured by CCD and CMOS cameras usually have a very low resolution, which significantly limits the performance of image recognition systems. Image super-resolution techniques can be applied to overcome the limits of these imaging systems. Super-resolution techniques have been proposed to increase the resolution by combining information from multiple images. To techniques were consisted of the registration algorithm for estimation and shift, the nearest neighbor interpolation using weight of acquired frames and presented frames. In this paper, it is proposed the image interpolation techniques using the wavelet base function. This is applied to embody a correct edge image and natural image when expend part of the still image by applying the wavelet base function coefficient to the conventional Super-Resolution interpolation method. And the proposal algorithm in this paper is confirmed to improve the image applying the nearest neighbor interpolation algorithm, bilinear interpolation algorithm.,bicubic interpolation algorithm through the computer simulation.

A Study on Securing Stability following the proposal and Application of Integration Procedure following the Diversification Process of Information Security Policies (정보보안 정책의 다변화 과정에 따른 일원화 절차의 제안과 적용에 따른 안전성 확보에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.405-410
    • /
    • 2018
  • Distribution of a series of procedure for establishment and revision for various instructions on information security for public institutions and diversified process of performance system following the compliance with the instruction are applied to the integrated procedure that any revision or change has led to the studies that are applied on the basis of all environment requirements and the facilitation of such studies in the integrated procedure for the entire information security. However, as the difference of possessing the work territory for each institution, maintaining and securing the security with the heterogeneous type for subject, the information still displays the issues to link to a series of process to the procedure to secure the foregoing as stability, In addition, the notice should be made by the public institutions for the result structured and notified on the basis of budget and the additional time and expenses for re-distributing to the private institutions would be another issue for the part to accomplish the purpose of such study. Therefore, under this study, the subject of information security of similar institutions should be sorted out and statistically classified, and it proposes the integration procedure through a series of diversity and multi-change process and summarize the same in the proposed procedure to engage in studies to secure the optimal stability.

Stability Analysis for a Dyke Subjected to Tidal Fluctuations (조위변동(潮位變動)을 받는 호안제(護岸堤)의 사면안정해석(斜面安定解析))

  • Kim, Sang Kyu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.8 no.3
    • /
    • pp.91-100
    • /
    • 1988
  • Assuming that tidal level is constantly changed with an amplitude of 10 meters and a cycle of 12 hours, the slope stability for a typical dyke is analysed. The variation of pore water pressure within the dyke during the tidal change is obtained using a computer program, FLUMP, which is incorporated with saturated-unsaturated and transient flow. The results show that the variation of free water surface and distribution of pore water pressure within the dyke during the tidal fluctuations can be clearly predicted with the computer program. When a tide is lowered to the minimum level, the predicted pressure head is higher than the level of the free water surface in some parts of the dyke; that is, excess pore water pressure is generated in a zone affected by the tidal change. Also an unsaturated zone which shows negative pore water pressure is temporally created when a tide is lowered. The shear strength of the zone can be predicted based on the proposal suggested by Fredlund et al. It is emphasized that the excess pore water pressure generated during tidal fluctuations and strength parameters for the unsaturated zone should be considered in analyzing the slope stability of dykes. When those are considered, the critical slip surface seems to be located below the free water surface obtained when a tide is at the lowest.

  • PDF

A Proposal on the Business Model of Technology Holding Company Focused on the Case Study of Venture Capital in Korea (기술지주회사 사업 모델 제안: 창업투자회사 사례를 중심으로)

  • Lee, Hyun-Keun;Jang, Jae Hyuk;Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.466-476
    • /
    • 2016
  • Technology-holding company was introduced in 2008 according to the Korean related law. In the end of 2014, technology holding company of university amounts to 39 companies, and ETRI Holdings is only the company belonging to the research institute among these companies. The technology holding company was launched to support a technology transfer from university or research institute to companies, and to boost up start-ups. Though 7 years has passed after the first technology-holding company was launched, there is no success model until now. Holding company is basically an investment company, which earns a profit from subsidiary company. The business model of a holding company is similar to venture capital that invests in start-ups. A direction of desirable business model of technology-holding company was suggested in this paper based on the case study on 2 Korean venture capital company. Holding company is generally categorized into two types. One is a pure holding company that only get a profit from subsidiary company, and the second is a operating holding company that creates an extra business revenue in addition to the role of pure holding company. In this paper, it is suggested that a technology holding company is recommended to be a operating holding company rather than a pure holding company.

The proposal on the new method for accurate to measure the plastic limits (정확한 소성한계 측정을 위한 새로운 실험법 제안)

  • Ko, Jae-Min;Lee, Byung-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.68-79
    • /
    • 2018
  • An examination of the characteristics of the ground material in is very important in a ground investigation. Casagrande classified soil using the material properties of soils. The liquid-plastic limit test is useful for obtaining basic information of soil, and is an effective method for classifying silt and clay, as well as the material properties, such as shear strength, shrinkage, and expansion. Unlike the liquid limit test, the plasticity limit test is due to the ambiguity of the test procedure. Many geotechnical engineers and scholars have questioned the test results. In this study, a new plasticity limit method was used to compare with the thread rolling method with kaolinite, ilite and bentonite at a certain ratio, and samples were collected from the west coast of Korea. As a result of the comparison, the test value of the new test method showed high reproducibility because the error range of the test value of the conventional thread rolling test was only 10% but the error range of the new test values decreased to 2%. The difference in the slope of the existing plasticity test values was 0.1519 ~ 0.1925, and the results of the test were similar or coincided with each other. Aone - point method was proposed to make it easier to apply the new test method.

Centralized TDMA Slot Assignment Scheme Based on Traffic Direction for QoS Guarantee in Unmanned Robot Systems (무인로봇체계에서 QoS 보장을 위한 트래픽 방향 기반 중앙집중식 TDMA 슬롯 할당 기법)

  • Han, Jina;Kim, Dabin;Ko, Young-Bae;Kwon, DaeHoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.555-564
    • /
    • 2016
  • This paper proposes a time slot allocation scheme for military patrol environments. This proposal comes from analysis of traffic properties in a military patrol environment. In the near future, robots are expected to explore enemy grounds and measure threat, taking the place of human patrol. In order to control such robots, control messages must be extremely accurate. One mistake from the control center could cause a tragedy. Thus, high reliability must be guaranteed. Another goal is to maintain a continual flow of multimedia data sent from patrol robots. That is, QoS (Quality of Service) must be guaranteed. In order to transmit data while fulfilling both attributes, the per-path based centralized TDMA slot allocation scheme is recommended. The control center allocates slots to robots allowing synchronization among robots. Slot allocation collisions can also be avoided. The proposed scheme was verified through the ns-3 simulator. The scheme showed a higher packet delivery ratio than the algorithm in comparison. It also performed with shorter delay time in the downlink traffic transmission scenario than the algorithm in comparison.

Recent Information on the Plagiarism Prevention (표절 방지에 관한 최근 정보)

  • Lee, Sung-Ho
    • Development and Reproduction
    • /
    • v.15 no.1
    • /
    • pp.71-76
    • /
    • 2011
  • Due to its role in maintaining the health of scientific societies, research ethics (or integrity) is notably receiving attention by academia, governments and even individuals who are not engaged in scientific researches. In this paper, I will introduce some valuable papers dealt with plagiarism as a representative research misconduct. In general, researcher's results that will soon be published must meet the crucial scientific criteria: originality, accuracy, reproducibility, precision and research ethics. The definition of plagiarism is "appropriation of another person's ideas, processes, results, or words without giving appropriate credit." Compared to fabrication and falcification, plagiarism is often considered as a minor misconduct. With intentionality, however, plagiarism can be corresponding to 'theft of intellectual product'. The context of plagiarism is not restricted to the stage of publication. It can be extended to prior stages of proposing (i.e. preparing the research proposal) and performing (executing the research), and reviewing (writing the review papers). Duplicate publication is regarded as a self-plagiarism in broad interpretation of plagiarism. To avoid dangers of plagiarism, earnest efforts from all members of scientific community are needed. First of all, researchers should keep 'transparency' and 'integrity' in their scientific works. Editorial board members and reviewers should keep fairness and well-deserved qualification. Government and research foundations must be willing to provide sufficient financial and policy support to the scientific societies; Up-graded editorial services, making good use of plagiarism detection tools, and thorough instruction on how to write a honest scientific paper will contribute to building up a healthy basis for scientific communities.