• Title/Summary/Keyword: Internet addition

Search Result 2,983, Processing Time 0.03 seconds

Mobile Rich Media Technologies: Current Status and Future Directions

  • Song, Jae-Yeon;Lee, Byoung-Dai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.359-373
    • /
    • 2011
  • Demand for rich media services is rapidly increasing and, as a result, several technologies are competing to deliver rich media services to mobile, resource-constrained devices. In this paper, we explore the existing rich media technologies and analyze their key features. In addition, in order to accommodate the new requirements introduced by emerging service models, such as service convergence, these technologies must evolve from their current status. We examine how the community intends to achieve this.

Development of Efficient Dynamic Bandwidth Allocation Algorithm for XGPON

  • Han, Man Soo;Yoo, Hark;Lee, Dong Soo
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.18-26
    • /
    • 2013
  • This paper proposes an efficient bandwidth utilization (EBU) algorithm that utilizes the unused bandwidth in dynamic bandwidth allocation (DBA) of a 10-gigabit-capable passive optical network (XGPON). In EBU, an available byte counter of a queue can be negative and the unused remainder of an available byte counter can be utilized by the other queues. In addition, EBU uses a novel polling scheme to collect the requests of queues as soon as possible. We show through analysis and simulations that EBU improves performance compared to that achieved with existing methods. In addition, we describe the hardware implementation of EBU. Finally we show the test results of the hardware implementation of EBU.

A Study on the Effect of Pair Check Cooperative Learning in Operating System Class

  • Shin, Woochang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.104-110
    • /
    • 2020
  • In the 4th Industrial Revolution, the competitiveness of the software industry is important, and as a solution to fundamentally secure the competitiveness of the software industry, education classes should be provided to educate high quality software personnel in educational institutions. Despite this social situation, software-related classes in universities are largely composed of competitive or individual learning structures. Cooperative learning is a learning model that can complement the problems of competitive and individual learning. Cooperative learning is more effective in improving academic achievement than individual or competitive learning. In addition, most learners have the advantage of having a more desirable self-image by having a successful experience. In this paper, we apply a pair check model, which is a type of cooperative learning, in operating system classes. In addition, the class procedure and instruction plan are designed to apply the pair check model. We analyze the test results to analyze the performance of the cooperative learning model.

Development Status and Prospects of Graphical Password Authentication System in Korea

  • Yang, Gi-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5755-5772
    • /
    • 2019
  • Security is becoming more important as society changes rapidly. In addition, today's ICT environment demands changes in existing security technologies. As a result, password authentication methods are also changing. The authentication method most often used for security is password authentication. The most-commonly used passwords are text-based. Security enhancement requires longer and more complex passwords, but long, complex, text-based passwords are hard to remember and inconvenient to use. Therefore, authentication techniques that can replace text-based passwords are required today. Graphical passwords are more difficult to steal than text-based passwords and are easier for users to remember. In recent years, researches into graphical passwords that can replace existing text-based passwords are being actively conducting in various places throughout the world. This article surveys recent research and development directions of graphical password authentication systems in Korea. For this purpose, security authentication methods using graphical passwords are categorized into technical groups and the research associated with graphical passwords performed in Korea is explored. In addition, the advantages and disadvantages of all investigated graphical password authentication methods were analyzed along with their characteristics.

The Effects of Customer Experience at the Banks on Customer loyalty (은행에서의 고객경험이 고객충성도에 미치는 영향)

  • Jeon, Gilgu;Yoo, Hanjoo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.2
    • /
    • pp.357-372
    • /
    • 2016
  • Purpose: The paper aims to measure customer experience at banks in South Korea. This study examines six factors of customer experience and identifies their impacts on customer loyalty. Methods: The collected data with surveys were analyzed by using multi-regression analysis. The measurement tools used for this study were categorized into six dimensions: Customization, Employees, Servicescape, Internet Banking, Value addition, and the Presence of other customers. Results: Customer experience has an influence on customer satisfaction: The effects of Customization, Employees, Servicescape, Internet Banking and Value addition were found. However, the presence of other customers was not significant on customer satisfaction. Interestingly, it was found that customer satisfaction made a statistically significant influence on customer loyalty. Conclusion: This study focuses on a bank sector of customer experience. Thus, six factors of measuring customer experience were found. The results of this study will predict customers' experience and also build up effective strategies for the utmost satisfaction of the customers.

The Energy Efficient for Wireless Sensor Network Using The Base Station Location

  • Baral, Shiv Raj;Song, Young-Il;Jung, Kyedong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.23-29
    • /
    • 2015
  • Energy constraints of wireless sensor networks are an important challenge. Data Transmission requires energy. Distance between origin and destination has an important role in energy consumption. In addition, the location of base station has a large impact on energy consumption and a specific method not proposed for it. In addition, a obtain model for location of base station proposed. Also a model for distributed clustering is presented by cluster heads. Eventually, a combination of discussed ideas is proposed to improve the energy consumption. The proposed ideas have been implemented over the LEACH-C protocol. Evaluation results show that the proposed methods have a better performance in energy consumption and lifetime of the network in comparison with similar methods.

The Effects of the Internet Addiction of the Youth according to the Types of Family (가족형태가 청소년의 인터넷 중독에 미치는 영향)

  • Kwon, Mi-Ran;Yoon, Chy-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.129-135
    • /
    • 2010
  • This study practically analyzed the relationships of Internet addiction, self-esteem, interpersonal relations and maladjusted behaviors according to family types and in particular, made a practical analysis about whether self-esteem, interpersonal relations and maladjusted behaviors have mediation effects in the relationship between family types and Internet addiction. As a result of regression analysis, the Internet addiction according to family types was a negative relationship and significant. Family types were positively related to self-esteem. As for interpersonal relations, family types were significant as a positive relationship. On the other hand, maladjusted behaviors were proved that they have a negative relationship with family types like the Internet addiction. That is to say, even the mediation effects that family types through self-esteem, interpersonal relations and maladjusted behaviors related to Internet addition were verified. As a result, it was concluded that self-esteem, interpersonal relations and maladjusted behavior factors play mediator roles between family types and Internet addiction.

Moderating Effect of Security Ability on the Relation between Privacy Concern and Internet Activities

  • Hong, Jae-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.151-157
    • /
    • 2020
  • This study explored the moderating effects of security ability on the influence of privacy concerns on internet activity using Korea media panel survey data. To this end, we applied between-subjects factorial design between 2 (privacy concern high / low) × 2 (security ability high / low) groups and compared five types of internet activity among four groups by variance analysis. As a result, privacy concerns have a main effect on internet activity, and security ability have a moderating role in this relationship. Despite the privacy concerns, people do their internet activities in order to enjoy the benefit from the internet. This study have academic implication in that it focus on the issue of privacy paradox in terms of the type of internet activity. In addition, practical implications are that, in order to activate online activities of individuals in an internet-connected society, efforts for enhancing their security abilities are necessary.

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

An Internet Stopper Using ARP Spoofing with Automatic Node Identification (자동 노드 인식 기능을 갖는 ARP 스푸핑을 이용한 인터넷 차단기)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.93-106
    • /
    • 2011
  • In this paper we describe an efficient and easy to use internet stopper, which is called AINS (Automatic Internet Stopper), which uses ARP spoofing scheme. Instead of forwarding packets to router for the case of hacking, in ARP spoofing, the AINS ignores all the packets so that internet stopping operates. The AINS program needs to be installed only in manager computer that does not require additional agent program. In addition to setting manually the stopping computer list, it is able to indentify network nodes automatically by analyzing broadcasting packets. The experimental results show that less than 4 secs for spoofing interval is enough for blocking internet usage regardless the number of computers and therefore network overhead is negligible. The AINS can indentify and control network nodes not only on same subnet but also on different subnet only if they are connected onto same ethernet switch physically. It is being used for an efficient tool for controling internet usage of university computer laboratory and also for an efficient network management.