• Title/Summary/Keyword: Personal network

Search Result 1,447, Processing Time 0.027 seconds

A Design and Iplementation of Real Time Video on Demand on Internet (인터넷상에서의 실시간 주문형 비디오 설계 및 구현)

  • 이종철;탁영봉
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.7-10
    • /
    • 1998
  • In implementing real time video on demand(VOD), the increase of user on internet causes a network traffic congestion. In this paper, we programmed a CGI able to login in VOD home for limiting the number of user in solving the problem, and also applied and adaptive multimedia synchronization technique for controlling video and audio data in a network. In addition, a real time multimedia player was designed and implemented in a personal computer operating at Window95/98/NT.

  • PDF

Development of Media service for the Multi-Device (멀티 단말 환경에서의 미디어 응용 서비스 개발)

  • Kang, Min-Jeong;Jeong, Ki-Tae;Kim, Jong-Ho
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.595-598
    • /
    • 2007
  • 급변하는 경쟁환경에서 텔코 진영의 미디어서비스가 특정단말이나 특정 네트워크에 종속되어서는 더 이상 경쟁환경에서 차별화를 위한 서비스 제공이 어렵게 된다. KT 인프라연구소에서는 pCod(Portable/Personal Contents on Demand) 서비스라는 이름으로 차세대 미디어의 기본 컨셉이 될 Anywhere, Anytime, Any-work, Any-device를 위한 서비스 플랫폼을 개발하였다. 본 논문에서는 KT인프라연구소에서 개발하여 광주 FTTH 시험사업에 적용한 pCod 서비스와 개인 맞춤 방송 서비스에 대하여 기술하였다.

  • PDF

Study of Bluetooth Scatternet Formation (Bluetooth Scatternet Formation에 관한 연구)

  • 안호성;황진옥;민성기
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.592-594
    • /
    • 2004
  • Bluetooth 칩셋의 생산량을 보면, 보이지 않는 곳에서 Bluetooth의 성장은 계속 되고 있다. [1] 그리고 Bluetooth는 Scatternet을 구성하여 Personal Area Network의 영역을 넘어 Senssor network에 적용하는 것이 가능하다. 그러나 Bluetooth specification[2]에서는 Scatternet Formation 방법에 대해 제안하지 않는다. 이를 개선하기 위해 BTCP (Bleutooth Topology Construction Protocol)[3], Bluetree[4], Bluenet[5], TPSF(Two-Phase Scatternet Formation) protocol[6]이 제안되었다. 본 논문에서는 이러한 protocol들을 개략적으로 설명하고 그에 대한 장단점을 알아보겠다.

  • PDF

Evaluation of different attacks on Knowledge Based Authentication technique

  • Vijeet Meshram
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.111-115
    • /
    • 2023
  • Knowledge Based Authentication is the most well-known technique for user authentication in a computer security framework. Most frameworks utilize a straightforward PIN (Personal Identification Number) or psssword as an data authenticator. Since password based authenticators typically will be software based, they are inclined to different attacks and weaknesses, from both human and software.Some of the attacks are talked about in this paper.

The Effect of Synchronous CMC Technology by Task Network: A Perspective of Media Synchronicity Theory (개인의 업무 네트워크 특성에 따른 동시적 CMC의 영향 : 매체 동시성 이론 관점)

  • Kim, Min-Soo;Park, Chul-Woo;Yang, Hee-Dong
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.21-43
    • /
    • 2008
  • The task network which is formed of different individuals can be recognized as a social network. Therefore, the way to communicate with people inside or outside the network has considerable influence on their outcome. Moreover, the position on which a member stands in a network shows the different effects of the information systems supporting communication with others. In this paper, it is to be studied how personal CMC (computer-mediated communication) tools affect the mission that those who work for a network perform through diverse task networks. Especially, we focused on synchronicity of CMC. On this score, the perspective of Media Synchronicity Theory was taken that had been suggested by criticizing Media Richness Theory. It is the objective, from this perspective, to find which characteristics of networks make the value of IT supporting synchronicity high. In the research trends of social networks, there have been two traditional perspectives to explain the effect of network: embeddedness and diversity ones. These differ from the aspect which type of social network can provide much more economic benefits. As similar studies have been reported by various researchers, these are also divided into the bonding and bridging views which are based on internal and external tie, respectively, Size, density, and centrality were measured as the characteristics of personal task networks. Size means the level of relationship between members. It is the total number of other colleagues who work with a specific member for a certain project. It means, the larger the size of task network, the more the number of coworkers who interact each other through the job. Density is the ratio of the number of relationships arranged actually to the total number of available ones. In an ego-centered network, it is defined as the ratio of the number of relationship made really to the total number of possible ones between members who are actually involved each other. The higher the level of density, the larger the number of projects on which the members collaborate. Centrality means that his/her position is on the exact center of whole network. There are several methods to measure it. In this research, betweenness centrality was adopted among them. It is measured by the position on which one member stands between others in a network. The determinant to raise its level is the shortest geodesic that represents the shortest distance between members. Centrality also indicates the level of role as a broker among others. To verify the hypotheses, we interviewed and surveyed a group of employees of a nationwide financial organization in which a groupware system is used. They were questioned about two CMC applications: MSN with a higher level of synchronicity and email with a lower one. As a result, the larger the size of his/her own task network, the smaller its density and the higher the level of his/her centrality, the higher the level of the effect using the task network with CMC tools. Above all, this positive effect is verified to be much more produced while using CMC applications with higher-level synchronicity. Among the a variety of situations under which the use of CMC gives more benefits, this research is considered as one of rare cases regarding the characteristics of task network as moderators by focusing ITs for the operation of his/her own task network. It is another contribution of this research to prove empirically that the values of information system depend on the social, or comparative, characteristic of time. Though the same amount of time is shared, the social characteristics of users change its value. In addition, it is significant to examine empirically that the ITs with higher-level synchronicity have the positive effect on productivity. Many businesses are worried about the negative effect of synchronous ITs, for their employees are likely to use them for personal social activities. However. this research can help to dismiss the concern against CMC tools.

The Protecton of Privacy on Secondary Use of Personal Health Imformation (의료기관 개인건강정보의 이차적 이용)

  • Kim, Jang-Han
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF

Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea (잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제)

  • Chung, Sang-Ki;Kim, Kyung-Yeol
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.

Effects of Self-Presentation and Privacy Concern on an Individual's Self-Disclosure : An Empirical Study on Twitter (자기표현욕구와 개인정보노출우려가 자기노출의도에 미치는 영향 : 트위터를 중심으로)

  • Lee, Sae-Bom;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Korean Management Science Review
    • /
    • v.29 no.2
    • /
    • pp.1-20
    • /
    • 2012
  • While feeling anxious about the risk of exposure of personal information and privacy, users of microblogs and social network services are continuously using them. This study aims to develop a model to investigate this phenomenon. Specifically, this study explores the relationship between personal characteristics (represented by privacy concern and self-presentation) and an individual's self-disclosure. An individual's personal belief (represented by perceived risk and perceived trust) is also tested as an mediator between the relationship. Through a questionnaire survey to 183 twitter users in Korea, the results indicate that self-presentation has a direct influence on self-disclosure as well as an indirect influence through perceived trust. In contrast, privacy concern has not a direct but an indirect negative influence on self-disclosure through perceived risk. In conclusion, self-presentation has a stronger influence on self-disclosure then privacy concern to Twitter users. An individual who has a higher propensity for self-presentation will form a stronger perceived trust on Twitter, which in turn, affects the individual's self-disclosure. On the other hand, an individual who is more concerned with personal privacy will feel more serious about perceived risk, which in turn, negatively influences one's perception of the trust in Twitter as well as his desire for self-disclosure.

A Study on Personal Information Hacking using Domestic Search Engines (국내 검색엔진을 이용한 개인정보 해킹에 관한 연구)

  • Yang, Hyung-Kyu;Lee, Kang-Ho;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.195-201
    • /
    • 2007
  • ARecent advances of network technologies and internet infrastructures construct a fast and useful information-oriented society. However, these nay infringe on privacy and expose sensitive information such as user id, secret number and credit card number. Therefore, we need countermeasures for solving these problems. In this paper we try to hack personal information using Google and domestic search engines, Naver and Empas. After analyze the result, we suggest solutions to prevent personal information hacking based on these search engines.

  • PDF

A Dispatching and Routing Algorithm for Personal Rapid Transit by Considering Congestion (정체를 고려한 Personal Rapid Transit 배차 및 경로 계획 알고리즘)

  • Han, Chung-Kyun;Kim, Baek-Hyun;Jeong, Rag-Gyo;Ha, Byung-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.11
    • /
    • pp.1578-1586
    • /
    • 2015
  • Personal rapid transit (PRT) is getting attention as a new form of transportation. It is energy efficient and provides the high level of passenger service. In this study, the dynamic PRT dispatching and routing problem is dealt with. Passengers request transportation service on a complex network, and an operating system monitors passenger arrivals and coordinates vehicles in real time. A new online dispatching and routing algorithm is proposed, which minimizes the total travel distance of vehicles and the waiting time of passengers. The algorithm dispatches vehicles by considering multiple vehicles' state and multiple passengers at the same time. In particular, finding the shortest-time path is attempted by taking into account the future congestion on lanes. Discrete-event simulation is employed to validate the performance of the proposed algorithm. The results show the algorithm in this study outperforms others.