• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.034 seconds

T-DMB Hybrid Data Service Part 1: Hybrid BIFS Technology (T-DMB 하이브리드 데이터 서비스 Part 1: 하이브리드 BIFS 기술)

  • Lim, Young-Kwon;Kim, Kyu-Heon;Jeong, Je-Chang
    • Journal of Broadcast Engineering
    • /
    • v.16 no.2
    • /
    • pp.350-359
    • /
    • 2011
  • Fast developments of broadcasting technologies since 1990s enabled not only High Definition Television service providing high quality audiovisual contents at home but also mobile broadcasting service providing audiovisual contents to high speed moving vehicle. Terrestrial Digital Multimedia Broadcasting (T-DMB) is one of the technologies developed for mobile broadcasting service, which has been successfully commercialized. One of the major technical breakthroughs achieved by T-DMB in addition to robust vehicular reception is an adoption of framework based on MPEG-4 System. It naturally enables integrated interactive data services by using Binary Format for Scene (BIFS) technology for scene description and representation of graphics object and Object Descriptor Framework representing multimedia service components as objects. T-DMB interactive data service has two fundamental limitations. Firstly, graphic data for interactive service should be always overlaid on top of a video not to be rendered out of it. Secondly, data for interactive service is only received by broadcasting channel. These limitations were considered as general in broadcasting systems. However, they are being considered as hard limitations for personalized data services using location information and user characteristics which are becoming widely used for data services of smart devices in these days. In this paper, the architecture of T-DMB hybrid data service is proposed which is utilizing broadcasting network, wireless internet and local storage for delivering BIFS data to overcome these limitations. This paper also presents hybrid BIFS technology to implement T-DMB hybrid data service while maintaining backward compatibility with legacy T-DMB players.

Real-time Event Processing Role Management System for IFTTT Service (IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템)

  • Kim, KyeYoung;Lee, HyunDong;Cho, Dae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

Quality of Service and Network Performance for the IMT-2000 Services (IMT-2000 에서의 서비스품질 및 네트워크 성능 체계)

  • Cho, Kee-Sung;Jang, Hee-Seon;Lim, Seog-Ku;Kim, Yeoung-Sun
    • IE interfaces
    • /
    • v.15 no.3
    • /
    • pp.256-262
    • /
    • 2002
  • In this paper, we develop a framework for identifying the quality of service(QoS) and network performance (NP) in the IMT-2000 services, and analyze the QoS/NP system in the 3GPP IMT-2000 services. Based on the ITU-T E.800, the QoS is classified into customer, technical, contents, telecommunications quality, and internet communication quality, and the NP consists of the service access/transmission, reliability/operating & maintenance, charging performance, and mobility management performance. Under the basic framework, the major parameters in the IMT-2000 services are identified for each QoS/NP criterion. The QoS framework in the IMT-2000 user aspects is also introduced to determine the major QoS parameters. Finally, to define the performance factors of the network elements in the NP system, the various control parameters for the wireless and core networks are presented.

Analysis of the Trend for SIP based Internet Telephony Service on IETF (SIP기반 인터넷 텔레포니 서비스를 위한 IETF 동향 분석)

  • 박선옥;허미영;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.331-334
    • /
    • 2002
  • According as internet service diffusion is popularized by internet user's increase, internet telehpony technology is becoming main issue of Internet Service Providers. Standardization issue about technologies related VoIP is discussed keeping in step on market's fast change and request in IETF. Specially, Standardizaiton is working through discussion on MMUSIC WG, SIP WG, SIPPING WG about SIP that is proposed by the alternative of ITU-T's H.323. Therefore in this Paper, introduce SIP standard that is established through several reconsideration revision works, and examine about IETF's trend for SIP based internet telephony service.

  • PDF

Related Veriables of Impulse Buying Behavior in Silver Fashion Market (실버패션마켓의 의복충동구매행동 관련 변수에 관한 연구)

  • Park Eun-Joo;Kang Eun-Mi
    • The Research Journal of the Costume Culture
    • /
    • v.13 no.6 s.59
    • /
    • pp.871-882
    • /
    • 2005
  • The purposes of this study were to investigate the relationships among shopping orientation, information source, service duality, and impulse buying behavior of the elderly women, which nay provide insights related to silver fashion market in Korea. Data were obtained from 50's and 60's women living in Busan(N=285), and analyzed Using by factor analysis, Cronbach's alpha and t-test. The results of this study are as follows: 1. Comported to unimpulse buying group, impulse buying group was more likely to be influenced by hedonics shopping orientation, economic shopping orientation, personal shopping orientation, and convenient shopping orientation. 2. for information source, impulse buying group seemed more to use various information sources than unimpulse buying group, such as advertising of newspaper, magazin or TV, experience, salespersons' opinions. 3. For perceived service quality, impulse buying group was more likely to be effected by events of store, product advertisement, and opening/closing time of store. But demographic characteristics doesn't significant differences between impulse-group and unimpulse-buying group of elderly women. This study suggests some implications and strategies for silver fashion market.

  • PDF

Analysis of COSPAS-SARSAT 406 MHz Personal Locator Beacon Specification (COSPAS-SARSAT 406 MHz 개인용 탐색구조 단말기의 기술기준 분석)

  • Jeong, Gi-ryong;Jeong, Seong-hoon;Lim, Jong-gun
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.6
    • /
    • pp.514-521
    • /
    • 2018
  • COSPAS-SARSAT 406 MHz emergency beacons include ELTs for aviation, EPIRBs for maritime, and PLBs for individuals in distress. They are used to sending messages encoded on 406 MHzdistress frequency and sending alertsfor search and rescue in distress. C/S T.001 and T.018 are COSPAS-SARSAT technical documents. They include basic technical information needed for developing beacons, howmessages are constructed, and test methods for type approval. COSPAS-SARSAT systems that use existing low earth orbit (LEO) and geostationary earth orbit (GEO) satellites do not have a return link service (RLS). So, the survivors could not confirm whether the distress signal was sending or not. However, a new medium earth orbit (MEO)satellite system has been added to thissystem, allowing confirmation through the RLS function. This paper analyzed C/S T.001 and T.018 needed to develop navigation structuresthat incorporated improved PLB of 406 MHz, a homing signal generator of 121.5 MHz, and a VHF AM transmitter for aviation of 243 MHz.

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

The Design of IoT-based Drive Through Service System for Customers in Distribution Stores (대형 유통매장의 고객을 위한 IoT기반 드라이브 스루 서비스 시스템 설계)

  • Min, So-Yeon;Lee, Jong-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.151-157
    • /
    • 2017
  • Recently, the retail industry has created efficient store operations, and has differentiated customer service through the future store. The intelligence of these stores is being applied by using technologies such as the Internet of Things (IoT), and the business process is being improved through this. The process also focuses on efficient store operations and service developments to provide customers with shopping convenience. The change in trends in the industry means that domestic distribution has already reached maturity. Even in countries where retail industries are mature, such as the U.S. and Europe, recent trends are moving toward maximizing operational efficiency and customer service. The reason is that many retailers have already reached saturation and survived the competition. This paper is a study of a drive-through service for automation and efficiency in receiving service after ordering by a customer of the distribution store. When ordering a product being purchased by a customer, the product picking process is done in a timely fashion through a picking scheduling agent. When the customer enters the store parking lot, a service supports the entry of information and finding a parking place so the customer can quickly pick up the goods. The proposed service can be applied to a retail store drive-through system, the distribution store's delivery system, the digital picking system, and indoor/outdoor large parking management systems, and it is possible to provide one-dimensional customer service through the application of IoT technology.

A Study on Business Support System For Small Enterprises Using CRM (CRM을 활용한 중소기업 지원시스템에 관한 연구)

  • Jin, Byoung-Sam;Lee, Sang-Hwan;Moon, Young-Su;Choi, Jin-Young;Shin, Ki-Jeong
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1581-1584
    • /
    • 2004
  • 정부와 공공기관은 전자정부 및 정보화사업 등을 통해 구축한 시스템을 통해 각종 정보와 인터넷 지원서비스를 기업에 제공하고 있다. 공공부분의 정보시스템 구축과 웹을 통한 서비스는 일반화 되어 있으며, 이제 정보시스템의 효율성과 고객 활용도 및 만족도를 높이기 위해 다양한 IT 기술의 적용을 고민하고 있다. 본 논문에서는 중소기업 지원시스템에서 CRM(Customer Relationship Management)을 활용한 기업중심의 On-Off Line 통합 기업지원 모델을 제시한다.

  • PDF