• Title/Summary/Keyword: Information and communications technologies

Search Result 753, Processing Time 0.029 seconds

EPC Sensor Network-based Product and Process Traceability System in the Food Supply Chain

  • Chun, Jung-Woo;Oh, Ji-Sung;Rho, Jae-Jueng;Lee, Jung-Wook
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.184-189
    • /
    • 2007
  • Concerns about food safety continue to rise and under this situation, governments of some countries have reinforced their regulations more strictly for food safety. In order to prevent food safety incidents or, at least to minimize the impact, the preparedness is very important. As a consequence of this, traceability system has become an essential tool for food safety. Recently, it requires more prevention-based food safety control system. One of the most generally used systems for food safety control is Hazard Analysis and Critical Control Point (HACCP). Both traceability and HACCP systems can be integrated through Electronic Product Code (EPC) Sensor Network technologies which have four value propositions. In this paper, we will introduce the concept of product and process traceability system (P2TS) through the integration of three systems to improve food safety management. The final aim is to find out the added values of the P2TS.

  • PDF

Digital Library Technologies and Information Infrastructure

  • Hyun, Soon-J.
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.101-114
    • /
    • 1998
  • Digital Library Definitions; A library that has been extended and enhanced by the application of digital technology. Contents and services accessible and deliverable via electronic networks to and from the worldwide libraries and commercial information resources. A large, organized collection of multimedia information for providing users of a community with coherent access to certain information services. A realistic means to build an Information Infrastructure for advanced Internet services of the future. more …(omitted)

  • PDF

Implementation of Automatic Control Function of Tactical Communication Equipment to Wireless Communication Network Survivability Improvement (무선통신망 생존성 향상을 위한 전술 통신 장비 자동 제어 기능 구현 방안)

  • Park, Chang-Soo;Kim, Jong-Hyoun;Park, Chun-Seon;Nam, Duk-Hee;Kim, Jung-Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.467-469
    • /
    • 2018
  • Tactical wireless communications often suffer from communication problems such as channel interference and communication disconnection due to the variability of the network topology and poor communication environment. Therefore, it is very important to overcome the problem of communication failure of the wireless communication network caused by the poor tactical environment and to improve the survivability. This paper describes the automatic control methodology of wireless communication equipment to identify and distinguish the situation of communication failure without user intervention and to implement more effective solution.

  • PDF

IDNet: Beyond All-IP Network

  • Jung, Heeyoung;Lim, Wan-Seon;Hong, Jungha;Hur, Cinyoung;Lee, Joo-Chul;You, Taewan;Eun, Jeesook;Kwak, Byeongok;Kim, Jeonghwan;Jeon, Hae Sook;Kim, Tae Hwan;Chun, Woojik
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.833-844
    • /
    • 2015
  • Recently, new network systems have begun to emerge (for instance, 5G, IoT, and ICN) that require capabilities beyond that provided by existing IP networking. To fulfill the requirements, some new networking technologies are being proposed. The promising approach of the new networking technology is to try to overcome the architectural limitations of IP networking by adopting an identifier (ID)-based networking concept in which communication objects are identified independently from a specific location and mechanism. However, we note that existing ID-based networking proposals only partially meet the requirements of emerging and future networks. This paper proposes a new ID-based networking architecture and mechanisms, named IDNet, to meet all of the requirements of emerging and future networks. IDNet is designed with four major functional blocks-routing, forwarding, mapping system, and application interface. For the proof of concept, we develop numeric models for IDNet and implement a prototype of IDNet.

Web-based synthetic-aperture radar data management system and land cover classification

  • Dalwon Jang;Jaewon Lee;Jong-Seol Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1858-1872
    • /
    • 2023
  • With the advance of radar technologies, the availability of synthetic aperture radar (SAR) images increases. To improve application of SAR images, a management system for SAR images is proposed in this paper. The system provides trainable land cover classification module and display of SAR images on the map. Users of the system can create their own classifier with their data, and obtain the classified results of newly captured SAR images by applying the classifier to the images. The classifier is based on convolutional neural network structure. Since there are differences among SAR images depending on capturing method and devices, a fixed classifier cannot cover all types of SAR land cover classification problems. Thus, it is adopted to create each user's classifier. In our experiments, it is shown that the module works well with two different SAR datasets. With this system, SAR data and land cover classification results are managed and easily displayed.

Architecture and Call Setup Latency of a Softswitch for VoIP Service (소프트스위치 시스템의 호처리 성능 향상)

  • Kim, Sung-Chul;Yoo, Byun-Hoon;Lee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.113-118
    • /
    • 2005
  • Softswitch is the core BcN equipment which voice and multimedia switching based on the IP Technologies. It is designed to replace the Class 5(local Exchange) and Class 4(Toll Exchange) switch based on the circuit wired and wireless switching network technologies. Softswitch gets its name because typically it is a software based solution implemented on general purpose computers/servers. While the traditional PSTN switches are rely on dedicated facilities for T and S inter-connection and are designed primarily for voice communications. Packet based Softswitch is divided the control of call and bearer, very different from Public telephone network. Sometimes Call Agent or Media Gateway Controller, a key component in the VoIP solution, is also called Softswitch. This paper will suggest the software architecture of softswitch for performance in call processing part, also suggest the session management model to cover call setup latency.

  • PDF

Interference Mitigation Scheme for Device-to-Device MIMO Communications Underlaying a Cellular Network

  • Nam, Yujin;So, Jaewoo;Kim, Jinsung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1841-1865
    • /
    • 2017
  • This paper proposes a new interference mitigation scheme for device-to-device (D2D) communications underlaying a cellular network. The object of the proposed scheme is to determine the number of data streams, a precoding matrix, and a decoding matrix of D2D networks so as to maximize the system capacity given the number of data streams of a cellular network while satisfying the constraint of the inter-system interference from D2D networks to the cellular network. Unlike existing interference mitigation schemes based on the interference alignment technique, the proposed scheme operates properly regardless of the number of data streams of a cellular network and moreover it does not require changing the precoding and decoding matrices of a cellular network. The simulation results demonstrate that the proposed scheme significantly increases the system capacity by mitigating the intra- and inter-system interference.

Analysis of Authentication Architecture in Integrated WLAN/3G Networks (통합된 WLAN/3G 네트워크의 증명 방법의 분석)

  • Shrestha, Anish Prasad;Han, Kyong-Heon;Cho, Byung-Lok;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.237-242
    • /
    • 2008
  • A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.

  • PDF

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.