• Title/Summary/Keyword: Internet service use

Search Result 1,478, Processing Time 0.035 seconds

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

An Evaluation Method for Web Contents Services (웹콘텐츠 서비스 평가)

  • Jang, Hee S.;Park, Jong T.
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.33-44
    • /
    • 2013
  • As the Internet and mobile services increase, the use of wired/wireless web contents services increase and the demand for various contents explosively grows. To survive in competitive market, and to minimize the errors and warnings for web accessibility and standardization, and then to maximize the web usability, the periodical evaluation for web site should be performed with the events of web marketing and campaign. Through the web evaluation, the errors for technical programming language and contents offering can be found and diagnosed. In this paper, the quantitative and qualitative evaluation method for web site providing web contents are presented, and the analytic results for the 138 home pages in domestic are evaluated to validate the quantitative methodology. The accessibility, standardization, and usability factor are adopted for the evaluation in which accessibility is evaluated for perceivable, operable, understandable, and robust discipline with K-WAH(Korea-Web Accessibility Helper) tool, the standardization are measured for the number of errors and warnings in technical language with the W3C validator, and finally the usability factor is analyzed for the number of visits, average visit duration, and bounce rate with Google Analytics. In addition to, the quantitative analysis is also performed with the consideration of cost for construction and operation of web site. From the results, in the case of total score of 100 in conversion with relative weight, the average and standard deviation are evaluated to be 55 and 14, respectively. The correlation analysis indicates that the coefficient is estimated as 0.058, and then correlation between the quantitative results and cost is evaluated to be a little positive.

  • PDF

Usability Evaluation Framework for Ubiquitous Computing Device (유비쿼터스 디바이스를 위한 사용성 평가 프레임워크 개발 - 디바이스의 Graphical User Interface 중심으로)

  • Kim, Han-Joon;Choi, Jong-Kyu;Ji, Yong-Gu
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.131-135
    • /
    • 2008
  • Nowadays various information devices using electronic technology has been released. And these digital devices will be continuously developed to make a satisfaction of customer's needs. So digital device will support network service using communication technology, so users will use the internet service anywhere, anytime. Also the networked device which is used in ubiquitous computing environment should be evaluated by new evaluation framework. Therefore previous usability evaluation framework need to reflect the characteristics of ubiquitous computing. However most of pervious research about ubiquitous computing was about conceptual issues like rules and characteristics of ubiquitous computing, so the research of usability testing and evaluation method for ubiquitous computing is rarely conducted. This research's purpose is developing the evaluation framework for ubiquitous computing device and usability model for ubiquitous computing. To develop the evaluation framework, we collect the evaluation indexes which have need used in GUI evaluation And we extract evaluation indexes for ubiquitous computing based on literature review.

  • PDF

Packet Loss Concealment Algorithm Based on Speech Characteristics (음성신호의 특성을 고려한 패킷 손실 은닉 알고리즘)

  • Yoon Sung-Wan;Kang Hong-Goo;Youn Dae-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.691-699
    • /
    • 2006
  • Despite of the in-depth effort to cantrol the variability in IP networks, quality of service (QoS) is still not guaranteed in the IP networks. Thus, it is necessary to deal with the audible artifacts caused by packet lasses. To overcame the packet loss problem, most speech coding standard have their own embedded packet loss concealment (PLC) algorithms which adapt extrapolation methods utilizing the dependency on adjacent frames. Since many low bit rate CELP coders use predictive schemes for increasing coding efficiency, however, error propagation occurs even if single packet is lost. In this paper, we propose an efficient PLC algorithm with consideration about the speech characteristics of lost frames. To design an efficient PLC algorithm, we perform several experiments on investigating the error propagation effect of lost frames of a predictive coder. And then, we summarize the impact of packet loss to the speech characteristics and analyze the importance of the encoded parameters depending on each speech classes. From the result of the experiments, we propose a new PLC algorithm that mainly focuses on reducing the error propagation time. Experimental results show that the performance is much higher than conventional extrapolation methods over various frame erasure rate (FER) conditions. Especially the difference is remarkable in high FER condition.

A Study on the Policy Implication on the Addiction of Social Media Service User : Focusing on the Proposal of Korean SNS Addiction Index (KSAI) (소셜미디어 사용자의 중독에 관한 정책적 함의 연구 : 한국형 SNS 중독지수(KSAI) 제안을 중심으로)

  • Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.255-265
    • /
    • 2013
  • This study deals with the policy proposals focusing on the addiction for the rapidly growing social media service (SNS) and its diagnosis. Researcher intends to define the SNS addiction and develops a diagnostic measure, which is a valuable subject. The reason is why the SNS becomes more convenient with prevalence of smart phones and the SNS addiction becomes enough severe to suggest internet addiction policy. Researcher presents the subjects into three parts. Firstly, the SNS addiction variables are derived and validated. Secondly, the path model between the SNS addiction variables is verified and discussed. Thirdly, researcher proposes the diagnostic results and the group comparison. Therefore, the result of this study is that the SNS addiction can be measured by the four elements, which are the failure in stopping the use of the SNS, time tolerance, living disability, withdrawal and anxiety. Researcher verifies the sequential impact of each variable and figures out the SNS addict through the presentation of a realistic measurement for the addiction index and the determination of the level of the addiction. By the above result, the researcher proposes the public relations of the government policy for the sound usage of the SNS and the self management of user. Finally, various proposed in this study will help to prevent juvenile crime, social problems in the future.

A Management for IMS Network Using SDN and SNMP (SDN과 SNMP를 이용한 IMS 네트워크 관리)

  • Yang, Woo-Seok;Kim, Jung-Ho;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.694-699
    • /
    • 2017
  • In accordance with the development of information and communications technology, a network user has to be able to use quality of service (QoS)-based multimedia services easily. Thus, information and communications operators began to focus on a technique for providing multimedia services. The IP Multimedia Subsystem (IMS) is a platform based on Internet Protocol (IP) as a technology for providing multimedia services and application services. The emerging 5G networks are described as having massive capacity and connectivity, adaptability, seamless heterogeneity, and great flexibility. The explosive growth in network services and devices for 5G will cause excessive traffic loads. In this paper, software-defined networking (SDN) is applied as a kind of virtualization technology for the network in order to minimize the traffic load, and Simple Network Management Protocol (SNMP) is used to provide more efficient network management. To accomplish these purposes, we suggest the design of a dynamic routing algorithm to be utilized in the IMS network using SDN and an SNMP private management information base (MIB). The proposal in this paper gives information and communications operators the ability to supply more efficient network resources.

Non-Disruptive Server Management for Sustainable Resource Service Based on On-Premise (온-프레미스 기반 지속적인 자원 서비스를 위한 서버 무중단 기법)

  • Kim, Hyun-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.12
    • /
    • pp.295-300
    • /
    • 2018
  • The rapid development of IT, many conventional passive jobs have been automated. This automation increases the leisure time of many people and various services are being developed for them. In addition, with the advent of smart devices that are compact and portable, it is possible to use various internet services without any time and place discretion. Various studies based on virtualization are under way to efficiently store and process large data generated by many devices and services. Desktop Storage Virtualization (DSV), which integrates and provides users with on-premise-based distributed desktop resources during these studies, uses virtualization to consolidate unused resources within distributed, legacy desktops. This DSV is very important for providing high reliability to users. In addition, research on hierarchical structure and resource integration for efficient data distribution storage processing in a distributed desktop-based resource integration environment is underway. However, there is a lack of research on efficient operation in case of server failure in on-premise resource integration environment. In this paper, we propose Non-disruptive Server Management (NSM) which can actively cope with the failure of desktop server in distributed desktop storage environment based on on-premise. NSM is easy to add and remove desktops in a desktop-based integrated environment. In addition, an alternative server is actively performed in response to a failure occurrence.

A Study on the Technological Priorities of Manufacturing and Service Companies for Response to the 4th Industrial Revolution and Transformation into a Smart Company (4차 산업혁명 대응과 스마트 기업으로의 변화를 위한 제조 및 서비스 기업의 기술적용 우선순위에 대한 연구)

  • Park, Chan-Kwon;Seo, Yeong-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.83-101
    • /
    • 2021
  • This study is to investigate, using AHP, what technologies should be applied first to Korean SMEs in order to respond to the 4th industrial revolution and change to a smart enterprise. To this end, technologies related to the 4th industrial revolution and smart factory are synthesized, and the classification criteria of Dae-Hoon Kim et al. (2019) are applied, but additional opinions of experts are collected and related technologies are converted to artificial intelligence (AI), Big Data, and Cloud Computing. As a base technology, mobile, Internet of Things (IoT), block chain as hyper-connected technology, unmanned transportation (autonomous driving), robot, 3D printing, drone as a convergence technology, smart manufacturing and logistics, smart healthcare, smart transportation and smart finance were classified as smart industrial technologies. As a result of confirming the priorities for technical use by AHP analysis and calculating the total weight, manufacturing companies have a high ranking in mobile, artificial intelligence (AI), big data, and robots, while service companies are in big data and robots, artificial intelligence (AI), and smart healthcare are ranked high, and in all companies, it is in the order of big data, artificial intelligence (AI), robot, and mobile. Through this study, it was clearly identified which technologies should be applied first in order to respond to the 4th industrial revolution and change to a smart company.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.