• Title/Summary/Keyword: Order communication system

Search Result 3,890, Processing Time 0.036 seconds

The Scheme for Delegation of Temporary Right to Watching Pay-TV in N-Screen Service (유료 콘텐츠의 N-스크린 서비스를 위한 일시적 시청권한 위임 기법)

  • Kim, Jung-Hoon;Lee, Hoon-Jung;Kim, Sang-Jin;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.135-142
    • /
    • 2011
  • Recently, the strategy for N-screen service is in the spotlight along with the consumer's need to use contents regardless of time and place due to the rapid development of communication technology, which is meshing with the desire of service providers seeking a new business model. N-screen, as a screen-extension-concept service which enables consumers to continuously share and use contents in various equipments such as TV, computer and portable terminals, is an advanced type of 3-screen service strategy initially proposed by AT&T, an American telecommunication company. In the N-screen service for pay-contents, in order to support continuous screen changes to and from various equipments, temporary watching right should be given to the equipment intended for screen change. However, it is impossible to give the temporary watching right in the present broadcasting environment, adopting an access-control system. In this paper, the access-control technology being used for pay-contents in the present broadcasting environment and the reason for not being able to give temporary watching right, will be examined. After the examination, the solution for delegation of watching right by using an additional key on the basis of currently used access-control technology, will be proposed.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Analysis of Acceleration and Deceleration on High Performance Train for A Metropolitan Rapid Transit System (대피선 최소화를 고려한 광역·도시철도 급행화를 위한 고성능 열차 가감속도 분석)

  • KO, Kyeong Jun;KIM, Jung Tai;KIM, Moo Sun;JANG, Dong Uk;HONG, Jae Sung;RYU, Sang Hwan;JUNG, Jong Deok
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.6
    • /
    • pp.564-574
    • /
    • 2015
  • As shown by the popularity of the rapid train in the Seoul Metro Line No. 9, the demand for the rapidization of the metro transit has been continuously increased. However, it needs tremendous cost to construct new additional infrastructures to the existing line for the rapidization. In order to overcome the problem, utilizing the existing infrastructures such as crossing tracks as railroad sidetracks can be considered to be a good method of reducing the cost. In this case, there is a way exploiting the existing train as an express train and the advanced train, which increases both acceleration and deceleration, as a local train, but achievable acceleration and deceleration have not been analyzed rigorously. In this paper, we analyze feasible ranges and optimal values of both acceleration and deceleration of the advanced train analytically when we consider the rapidization of the metro transit utilizing the existing infrastructures and verify the results in Seoul Metro Line No. 3. Simulation results show ranges and optimal values of achievable acceleration and deceleration exist when minimum gap between an express train and a local train is smaller than 40 seconds.

The Determinants of Purchasing Private Health Insurance in Korean Cancer Patients (암 환자의 민간의료보험 가입 실태와 관련 요인)

  • Lim, Jin-Hwa;Kim, Sung-Gyeong;Lee, Eun-Mi;Bae, Sin-Young;Park, Jae-Hyun;Choi, Kui-Son;Hahm, Myung-Il;Park, Eun-Cheol
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.2
    • /
    • pp.150-154
    • /
    • 2007
  • Objectives : The aim of this study is to identify factors determining the purchase of private health insurance under the mandatory National Health Insurance(NHI) system in Korea. Methods : The data were collected by the National Cancer Center in Korea. It includes cancer patients who were newly diagnosed with stomach (ICD code, C16), lung(C33-C34), liver (C22), colorectal cancer(C18-C20) or breast(C50) cancer. Data were gathered from the hospital Order Communication System (OCS), medical records, and face-to-face interviews, using a structured questionnaire. Clinical, socio-demographic and private health insurance related factors were also gathered. Results : Overall, 43.9% of patients had purchased one or more private health insurance schemes related to cancer, with an average monthly premium of \65,311 and an average benefit amount of \19million. Females, younger aged, high income earners, national health insurers and metropolitan citizens were more likely to purchase private health insurance than their counterparts. Conclusions : About half of Korean people have supple-mentary private health insurance and their benefits are sufficient to cover the out-of-pocket fees required for cancer treatment, but inequality remains in the purchase of private health insurance. Further studies are needed to investigate the impacts of private health insurance on NHI, and the relationship between cancer patients' burden and benefits.

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

A Study on Causes of Franchisee's Conflict in Distribution Channel of small and middle sized Franchise Industry (중소형 프랜차이즈 유통시스템에서 가맹점의 갈등에 관한 질적 연구 - 토대이론 접근법을 활용하여-)

  • Jeon, Ta-sik
    • Journal of Distribution Science
    • /
    • v.4 no.2
    • /
    • pp.21-40
    • /
    • 2006
  • Small and middle sized Franchise system channels experience conflicts because of constant interaction between franchiser and franchisee. However, it is rarely that attempt has been made to identify causes of conflicts in distribution of franchise industry. The purpose of this study was to explore cause of conflicts from the franchisee. For the study, data were collected from the owner or the shop-manager with a contractor in franchise systems. By means of in-depth interviews with multiple informants, their statement was analyzed qualitatively. From analysis of the resulting data, the causes of conflicts were associated with two broad sets, attitudinal and structural differences between franchisers and franchisees. First, attitudinal sources of conflict were identified as perception of subordinated relationships between channel members, delayed announcement on order changes, difficulties in communication by doing irresponsible behavior, different expectations between channel members in market territory and lack of consistent-supporting. Second, structural sources of conflict involved unilateral decision on interior, payment method, unreasonable delivery issue, treat franchisee with discrimination by the sales, in controlling against free management. There are limitations on generalization due to the results based on interview, but this study will be a useful exploratory step before designing a large scale survey.

  • PDF

Studying on Expansion of Realtime Blocking List Conception for Spam E-mail Filtering (스팸 메일 차단을 위한 RBL개념의 확장에 관한 연구)

  • Kim, Jong-Min;Kim, Hion-Gun;Kim, Bong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1808-1814
    • /
    • 2008
  • In addition to RBL function, which is used to applying for spam e-mail filtering, as an effective way to deal with the recently widespread spam types, this paper proposes how to extract URL that was comprised in the original e-mail, apply it to RBL, and expand it. The BotNet, which is used to using for sending spam mails these days, has a problem that it is not able to solve with the distributed addresses of sent mails in spam e-mails. In general, as these spam e-mails are sent from the infected Zombi PC of individual user, the sent address itself is not efficient and is meaningless to use in RBL. As an effective way to filter spam e-mail sent by BotNet, this paper analyzes URLs that contained in the original spam e-mail and proposes how to effectively improve filter rate, based on the distribution data of URL site tempting users. This paper proposes the sending mechanism of spam e-mails from BotNet and the methods to realize those types of spam e-mails. In order to gather analyzable spam e-mails, this paper also carries out an experiment by configuring trap system of spam e-mail. By analyzing spam e-mails, which have been received during the certain period of experiment, this paper shows that the expanded RBL method, using URLs that contained in spam e-mails, is effective way to improve the filter distribution of spam e-mail.

Understanding Policies related to Home Modification for the Elderly: An Occupational Therapist's Perspective (고령자 가정환경수정 관련 정책에 대한 이해: 작업치료사의 관점에서)

  • Hwang, Na-Kyoung;Shim, Sun-Hwa
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.389-399
    • /
    • 2021
  • The purpose of this study was to explore the domestic and overseas home modification policies, and review the direction of domestic home modification policies to enable 'Aging In Place; AIP' and the competencies required of occupational therapist as and expert in home modification. In order to expand occupational therapy for domestic home modification and strengthen occupational therapist competency, it is required to establish a clear and practical home modification process that reflects the design and intervention of occupational therapy. Appropriate selection and standardization of the evaluation tools that identifies the needs of the elderly and reflects the characteristics of domestic housing types are also required. In addition, it is necessary to understand policies and systems, and endeavour to establish a relevant knowledge base for communication and cooperation with experts in other fields. In terms of the policy, there is a need for the home modification support system that allows the elderly to adapt to their aging regardless of their income level, beyond the existing support system, which was implemented mainly for low-income people and disabled. In addition, as in overseas cases, the efforts need to be made to provide various and efficient measures, such as support for barrier-free housing, expansion of the scope of support through cooperation between the national government and local governments, low-interest loans and tax reductions, and establishment of governance with organizations and institutions related to home modification services.

A Study On Managing Electronic Mail Messages as Records of Public Institutions (공공기관의 이메일기록 관리 방안 연구)

  • Song, Ji Hyoun
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.141-183
    • /
    • 2007
  • It is not an overstatement that nowadays electronic mails are communicated more frequently as well as conveniently than phones and facsimiles, not only in routine life hot also in business transactions. Also, it is evident that emails will be used more and more as a communication method between internal and external organizations. If the information transferred and received via emails takes a role of business records, it is no wonder that emails should be uniformly managed as public records. Currently, however, specific policies or guidelines for the management of email records are not available, nor do most of public employees realize that emails are the actual records of the organization. In fact, the three research methods have been used for this study in the purpose of the establishment of email records management scheme. First of all, bibliographic research has been conducted in an effort to describes the definition and types of email records indicated in the guidelines of each nation, as well as the differences from the transitory email messages. Secondly, email management guidelines and policies of public institutions of England, The United States, Australia, and Canada, so-called the advanced countries of the records management, have been analyzed to examine the advanced examples of email management. In order to manage email records effectively, the functional requirements - capture, classification, storage, access, tracking, disposition, and role and responsibility were categorized in this thesis, based on the ISO 15489. As the designs of these foreign guidelines vary one another, common factors of them were extracted to be included in the realm of the seven stages. Lastly, this thesis has analyzed characteristics of the email system within the Electronic Document Management System of existing administrative institutions. Also, it has examined the overall environment of the email records management of public institutions and sought out its improvement. In essence, focused on the crucial factors on email management drawn out from the email management guidelines of foreign nations and the analysis of the policies, this thesis proposes an email records management scheme for Korean public intuitions, as well as an email management model suitable for forthcoming e-government era.

Development of IoT Searching System Missing Children by utilizing Open Source Hardware (오픈소스 하드웨어를 이용한 IoT 미아찾기 시스템)

  • Heo, Seong-Mu;Kim, Cha-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.277-280
    • /
    • 2016
  • Currently, systems for finding missing children are composed of using communication between a QR code and RFID chip, as the use of a smartphone. However, the current systems for finding missing children have limitations in that children can only be found if there are people in the surrounding area; there is an economic burden on parents required to purchase a smartphone for their children; along with difficulties in finding the missing children without the assistance of those in the surrounding area in critical situations such as a kidnapping, due to the limited duration of the battery life. In order to solve such problems, approaches need to be made from two perspectives: having someone in the surrounding area; and absence of anyone in the surrounding area. This thesis is centered on the development of a IoT (Internet of Things) system for finding missing children that combines two methods, namely, the method of finding missing children without a guardian in the surrounding area -within the limited space in which AP is installed by using a beacon and open source hardware being highlighted as the IoT technology - and the method of finding missing children with the smartphone application in which each individual becomes the Access Point (AP). The Main purpose is to provide accurate information of missing children's location for the 2situations and it is found that the accuracy of smartphones APP is 97.7% and security device AP is 91.1%.

  • PDF