• Title/Summary/Keyword: Internet Public Services

Search Result 475, Processing Time 0.031 seconds

A Study on Improvement of Call Admission Control using Wireless Access Point Sharing (무선 AP 공유를 통한 호 제어 방안 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.91-96
    • /
    • 2018
  • Recently, as artificial intelligence technology becomes popular, demand for wireless traffic is rapidly increasing. In order to provide services in response to the increase in demand for wireless traffic, telecommunication companies are generalizing the installation of public APs. In order to provide convenience of using wireless APs between communication companies, it is necessary to share the use of APs in public places to efficiently use wireless resources in a public place, to pre-authenticate between wireless APs in a mobile communication service, So as to increase the convenience of the user. In this paper, we propose to share APs in public places through handoff between APs and pre-authentication between carriers in mobile communication services. The simulation results show that the handoff latency is improved by 35.1% and the bandwidth used by the AP selected by the pre-authentication method can utilize more bandwidth than the method of automatically selecting the AP.

Internet comment manipulation and criminal responsibility

  • Lee, Ju-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.75-79
    • /
    • 2018
  • The purpose of this paper is to introspect again the role of the criminal law at a time when it is said that numerous criminal and legal discussions are needed to develop the so called "reply manipulation " case that is shaking the nation's political history. The research method considered the literature and precedents discussed in the past, and discussed the issue of subculture abuse caused by the internet, which is a product of convenience and affluence that came with the Forth industrial revolution through criminal law. Through a computer program, a discussion was held on what penalties would be imposed on the criminal law for attempting to manipulate public opinion by manipulating the so-called number of comments or Reaction. Question of whether the criminal law should further emphasize the need for a discussion on the need for a method to strengthen the preventive functions of the criminal law and expand the scope of punishment in order to address new causes of risk that came with the development of science. Without reflecting on whether such as "government-inspired demonstration "would be possible in today's world that was in the public perception of the authoritarian government of the past, it is a problem to see that the political goals of a particular group can be achieved by manipulating comments or creating public opinion on the Internet. The duty of criminal law is to protect the interests of the law. The role of the criminal law should be maintained the self limiting as far as possible in cases of violation or danger of the law. Still, it is a problem that the role of the criminal justice system today is too aggressive and is seen as a top tool rather than a last resort for solving problems. he role of the internet will be expanded further in the Hyper Connected society. To solve these problems, we should look forward to a change in the priority of other laws and policies other than criminal law.

A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number

  • Sivakumar, T;Venkatesan, R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2317-2337
    • /
    • 2015
  • Cryptography provides an effective solution to secure the communication over public networks. The communication over public networks that includes electronic commerce, business and military services, necessitates the requirement of simple and robust encryption techniques. In this paper, a novel image encryption method which employs calligraphy based hybrid scan and random number is presented. The original image is scrambled by pixel position permutation with calligraphy based diagonal and novel calligraphy based scan patterns. The cipher image is obtained by XORing the scrambled image with random numbers. The suggested method resists statistical, differential, entropy, and noise attacks which have been demonstrated with a set of standard images.

Electronic Proceedings in Modern Legal Conditions

  • Veselovska, Nataliia;Slipeniuk, Vasyl;Yasynok, Dmytro;Zhukevych, Ihor;Gorbenko, Arina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.224-228
    • /
    • 2021
  • The article is devoted to the problems and prospects of integration of informational technologies in the administration of justice as a necessary component of the development of the informational society in Ukraine. In general, informational technologies make it possible to create new forms of organization and interaction of bodies of public authorities with society, to introduce innovative solutions for legal regulation and organization of public relations. More and more services for citizens are moving to electronic format. Judicial reform is aimed at ensuring more comfortable and convenient interaction with the courts. The need for the usage of informational technology in the proceedings is preconditioned by the global informatization of modern society, the development of new forms of interaction in the civil sphere with the usage of electronic means of communication: the global Internet, mobile, and satellite communication systems and more. "Electronic justice" involves the use of information and communication technologies in the implementation of procedural law.

Improving the speed of the Lizard implementation

  • Rustamov, Shakhriddin;Lee, Younho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.25-31
    • /
    • 2019
  • Along with the recent advances in quantum computers, it is anticipated that cryptographic attacks using them will make it insecure to use existing public key algorithms such as RSA and ECC. Currently, a lot of researches are underway to replace them by devising PQC (Post Quantum Cryptography) schemes. In this paper, we propose a performance enhancement method for Lizard implementation which is one of NIST PQC standardization submission. The proposed method is able to improve the performance by 7 ~ 25% for its algorithms compared to the implementation in the submission through the techniques of various implementation aspects. This study hopes that Lizard will become more competitive as a candidate for PQC standardization.

A Study on the Design of the Knowledge Management System for Medical Information Services in a Public Library (공공도서관 의학정보서비스를 위한 지식관리시스템 설계에 관한 연구)

  • 이란주
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.3
    • /
    • pp.63-86
    • /
    • 2001
  • Consumer health information is receiving more attention than ever before. This growing attention can be linked to the Internet and to people seeking more information on health topics. The purpose of this study is to suggest a design of the Knowledge management system for medical information services in a public library. As theoretical backgrounds, it discusses the issues regarding to the medical information services in a public library, knowledge management and knowledge management system. After that, 12 medical information sites are analyzed then the planning and the main menu of a medical information site for a public library are described. Finally, the model of the knowledge management system for a public library with 5 sub-systems are suggested: 1) knowledge creation system, 2) technology support system, 3) training system, 4) community service system, 5) knowledge sharing and network system. This system based on knowledge management will help provide the users high quality of medical information.

  • PDF

A Study on The Controllability Function and Sevice Design for Disaster Damage Reduction in the IoT Environment

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.43-49
    • /
    • 2016
  • In this paper, we propose the controllability function and service design to efficiently implement the control of the disaster communication network, using Internet of Things(IoT) Technology. In accordance with the spread of Information Communication Technology(ICT), the era for building a disaster communications system without exclusion over the entire areas has emerged. National wireless mesh networks for public safety and disaster relief have been evolving to strengthen the pre-disaster response system using the latest technologies through the convergence of various technologies and services from the viewpoint of the command and control between disaster response agencies. In line with such a technological paradigm shift, the controllability of the objects in the IoT has been emerging as a key quality requirement of a disaster communications system. In this study, the objects are classified by the subject of control according to the IoT component, such as data, network resources and services in order to effectively implement their controllability. In addition, based on the destination of this controllability, technologies and services have been designed that can reduce the damage caused by disasters. Technologies and services that were derived from this study must be implemented in the current disaster safety network systems together with the establishment of an infrastructure for the networks in order that all persons are able to effectively utilize the disaster communications system for their safety.

A NAT Proxy Server for an Internet Telephony Service (인터넷 전화 서비스를 위한 NAT 프럭시 서버)

  • 손주영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.47-59
    • /
    • 2003
  • The Internet telephony service is one of the commercially successful Internet application services. VoIP technology makes the service come true. VoIP deploys H.323 or SIP as the standard protocol for the distributed multimedia services over the Internet in which QoS is not guaranteed. VoIP carries the packetized voice over the RTP/UDP/IP protocol stack. The data transmission trouble is caused by UDP when the service is provided in private networks and some ISP-provided Internet access networks in the private address space. The Internet telephony users in such networks cannot listen the voices of the other parties in the public Internet or PSTN. Making the problem more difficult, the Internet telephony service considered in this paper gets the incoming voice packets of every session through only one UDP port number. In this paper, three schemes including the terminal proxy, the gateway proxy, and the protocol translation are suggested to solve the problems. The design and implementation of the NAT proxy server based on gateway proxy scheme are described in detail.

A Study of Differently-Abled Users' Perception of Public Relations Services in Libraries (도서관장애인서비스 이용자의 홍보에 대한 인식조사 연구)

  • Noh, Young-Hee;Ahn, In-Ja;Park, Mi-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.179-207
    • /
    • 2011
  • This study was conducted by surveying users' perception about the public libraries' current public relations, which can contribute to developing the most appropriate public relations strategies for persons with disabilities(PWDs). This study concluded, first, PWDs' experience with the PR of the library services was a very low 32.4%. Intellectual disabilities, especially, were reported to have no experience in public relations. Second, the library public relations media which PWDs utilized the most were the Internet, library bulletin boards, banners, ARS services, and podcasting, in that order. However, satisfaction with promotions appeared below average(3 points or less). On the other hand, interest in public relations media was very high. Third, it appeared that library users with disabilities most frequently use the websites of their school library, the National Library of Korea, and public libraries in that order. However, the usage rate of services and users' satisfaction with them were very low. Finally, a high demand for facilities with accessibility to PWD users emerged as a result of this study. Therefore, this study recommends greater accessibility, convenience, and ease of facility use for persons with disabilities.

Oversubscription factors for Community Wireless Services using AODV Routing

  • Ajith, P.K.;Yan, Huai-Zhi;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.53-60
    • /
    • 2005
  • Community Wireless Networks define the next generation wireless services. Multimedia usages for financial services over community Wireless LAN (WLAN) based mesh networks require link stability. Several new services are being proposed for multimedia over WLANs. Portable Internet Services are implemented by several wireless carriers to proliferate their customer base. However, these services are still expensive and require a central telecom/wireless carrier whose monopoly and preference defines the availability of new services. Our research project identifies the usage of these critical services in public places over the financial services backbone architecture to provide efficient easy-to-use and economical services to their customers and merchants without being dependent on the central wireless carrier. The user connects to the network using his regular WLAN NIC using the Mesh Router/Bridge interconnectivity and obtains the needed multimedia and financial services from the ATM-AP Gateway, In our proposed scenario, the ATN AP-MR use AODV protocol and MR-MC is based on 802.11g/a/b IEEE standard. We use multi path routing protocols for reducing the congestion over a particular route. We demonstrate the results of our simulations and test-bed outcome to evaluate link failure rate and oversubscription factors to eliminate network congestion and non-availability of the critical financial services.

  • PDF