• Title/Summary/Keyword: Personal network

Search Result 1,447, Processing Time 0.034 seconds

XML Based Standard Protocol for Remote Control (확장성표기언어(XML) 기반의 원격제어규약 표준)

  • Choi, Jung-In
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.5
    • /
    • pp.216-219
    • /
    • 2006
  • This paper presents an XML based standard specification of remote control protocol for home appliances. In the framework level, the XML protocol provides a useful bridge between services and platforms. The proposed protocol has been implemented into a personal video recorder for remote recording service. The results imply the potential of global standards for remote control by its minimum overhead in network and processor. The proposed XML is designated RCXML in this paper.

An applicable Key Distribution and Authentication Protocol in Personal Communication Networks (개인 통신망에서 적용가능한 인증 및 키분배 프로토콜)

  • 송희삼;전문석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

A construction method for IP-based Fixed and Personalized A/V Mosaic EPG service (IP 기반 고정형 및 맞춤형 동영상 모자익 EPG 서비스 구축방법)

  • Song, Chee-Yang;Choi, Lark-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.39-52
    • /
    • 2006
  • As accelerates the technical evolution of high-speed network and progresses the digitalization of broadcasting network, TV channel service through satellite/cable/terrestrial networks becomes more stable and mature. However, TV channel service using IP network such as IPTV is recently emerging. Especially, when it comes to current mosaic EPG(Electronic Program Guide) as a channel guide, the implementation of EPG via IP network is under developing. Furthermore, the personal target mosaic EPG is not provided at all in the IPTV. This paper proposes a construction method of mosaic system which can support fixed and personalized mosaic EPG using IP network for viewers. The fixed mosaic EPG is made several steps as follows ; First, H/E generates several mosaic A/V streams. Then, which are transmitted to the STB in terms of multicasting via IP network. Finally, mosaic EPG is displayed on TV through STB. In addition, this paper describes a construction model of the personalized A/V mosaic EPG that represents each person's favorite channels according to their tastes and interests. As for the contributions. The TV channel guide using IP network enable viewer to select channel more easily with practical adaptation of multi-channel expansibility and sufficient usability. In addition, through personal mosaic EPG, a number of viewers can compose their own mosaic EPG and enjoy a variety of channel easily in accordance with their preferences. Finally, the personal mosaic EPG can prohibit non-adult users from connecting adult-only contents more efficiently.

  • PDF

A Personal Prescription Management System Employing Optical Character Recognition Technique (OCR 기반의 개인 처방전 관리 시스템)

  • Kim, Jae-wan;Kim, Sang-tae;Yoon, Jun-yong;Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2423-2428
    • /
    • 2015
  • We have implemented a personal prescription management system which enables resource-limited mobile device to utilize the optical character recognition technique. The system enables us to automatically detect and recognize the text in the personal prescription by using a optical character recognition technique. We improved the recognition rate over a pre-processing in order to improve the character recognition rate of the original method. The examples such as a personal prescription management service, alarm service, and drug information service with mobile devices have been demonstrated by using the our system.

Influence of Mobile SNS on Personal Relationship Enhancement and Self-esteem of Married Women in Their 30s and 40s: Based on Usage Acceleration Factors (모바일 SNS 사용이 30~40대 기혼여성의 대인관계 강화와 자존감에 미치는 영향: 사용촉진 요인을 중심으로)

  • Kim, Jongki;Han, Ji-Yeon
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.53-71
    • /
    • 2014
  • The center of networking is moving toward mobile from PC based computing environment. The number of smartphone users are increasing rapidly today. One of the most popular smart phone applications is mobile SNS such as Kakao Story, Facebook, Twitter, Mobile Cyworld, etc. Mobile SNS means social network services based on mobile communication technology. This research focused on mobile SNS usage of married women who have not enough time for face-to-face communication with their friends to enhance their friendship. Married women in their 30s and 40s have lots of things to do like housework and caring their children. Mobile SNS would help their communication in aspect such of free of space and time. Through Mobile SNS married women can reinforce their personal relationship and self-esteem. Social Information Processing Theory (SIP) is an interpersonal communication theory developed by Walther(1992). Once established, online personal relationships may demonstrate the same relational dimensions and qualities as face-to-face relationships. The theory explains how people get to know one another online, without nonverbal cues, and how they develop and manage relationships in the computer-mediated environment. The result of empirical analysis indicates that marred women's Mobile SNS activities reinforce their personal relationship and self-esteem.

SOCIAL NETWORK THEORY AND PRIVATE HOUSING DEVELOPERS IN MALAYSIA

  • Muhammad Hijas Sahari;Mastura Jaafar;Abdul Rashid Abdul Aziz
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.704-710
    • /
    • 2007
  • This paper examines the operations of private housing developers (PHDs) based on Social Network Theory. PHDs need to choose the best consultants, contractors and suppliers (CCS) to make sure the project run and complete successfully. PHDs gather the scarce resources from the external environment through personal network. This research used the social network method which relies on alliances based on network, social, tie and trust. The more people/firm PHDs network with, the better chances of finding the right CCS.

  • PDF

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.