• Title/Summary/Keyword: Service Implementation

Search Result 3,900, Processing Time 0.029 seconds

Design and Implementation of SIP UA for CPL process (CPL 처리를 위한 SIP UA 확장 설계 및 구현)

  • 이일진;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.758-761
    • /
    • 2002
  • Voice of U(VoIP) technology Provides voice service as well as data service via Internet. It has been a promising technology as Internet grows fast and the requirements are increasing. Recently, serveral protocols have been created to allow telephone calls to be made over IP networks, notably, SIP and H.323. Due to introducing SIP and H.323, There are many change at internet telephony service. Internet telephony enables a wealth of new service possibility Users can control telephony service directly. In this paper, we design and implementation CPL client based on SIP system.

  • PDF

Design and Implementation of a Broadcasting Receiver for Bi-directional Personalized Broadcasting Service (양방향 맞춤형 방송 단말기의 설계 및 구현)

  • Hong Chang Ho;Lim Jong Tae
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.283-296
    • /
    • 2004
  • TV-Anytime metadata can be delivered by unidirectional or bi-directional network. In bi -directional environment, the special request of a client is sent to metadata service providers and then the providers provide the personalized metadata back to the client. In this paper. we introduce the design and implementation of a broadcasting receiver for personalized broadcasting service in bi-directional environment. We describe actual system configuration and usage examples for bi-directional personalized service. The implemented receiver provides various functions for a digital broadcasting recorder and is based on TV-Anytime specification and UDDI specification to provide the metadata service discovery.

Implementation of the Shore-based Maritime Information Service Platform for e-Navigation Strategic Implementation Plan (e-Navigation 전략 이행 계획 대응을 위한 Shore 기반 해상정보 서비스 플랫폼 구현)

  • Jang, In-Sung;Kim, Min-Soo
    • Journal of Navigation and Port Research
    • /
    • v.39 no.3
    • /
    • pp.157-163
    • /
    • 2015
  • Recently, there has been much interest in the e-Navigation that applies a variety of digital devices to shipboard thanks to the high interest to maritime safety and the rapid development of ICT technologies. The e-Navigation proposes a new ICT paradigm in maritime information service and maritime safety. This study proposes the shore-based maritime information service platform that enables the converged services of various kinds of maritime data and the standard ENC based on IHO S-100. The proposed maritime information service platform enables the harmonized integration, presentation and web services of ENC, sensed data such as AIS, ocean weather and currents, and geospatial data. Also, the platform enables the mobile maritime information service through WebApp or App software operating in mobile devices of smart phone or web pad. Finally, the proposed platform accommodates the standard ENC of the existing S-57 and the new S-101, and the standard web services of WMS and WMTS of ISO 19100 and OGC.

Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service (실시간 선불 서비스를 위한 모바일 IPv6 권한검증 구현)

  • Kim Hyun-Gon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.121-130
    • /
    • 2006
  • In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

  • PDF

A Study on Implementation Plan for AI Service Impact Assessment (인공지능 서비스 영향평가 추진방안에 대한 연구)

  • Shin, Sunyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.147-157
    • /
    • 2022
  • The purpose of this study is to establish policy recommendations for the promotion of AI service impact assessment based on the definition of impact assessment and analysis of domestic and foreign AI service impact assessment cases. The direction of implementation was analyzed based on the case of impact evaluation promoted in various fields at home and abroad and the case of impact evaluation at home and abroad of artificial intelligence services. As a step-by-step implementation plan, in the first stage, quantitative indicators such as AI level survey-based economic effects are developed, and in the second stage, information culture such as safety and reliability and artificial intelligence ethics described in the Framework Act on Intelligence Information, social, economic, information protection, and people's daily lives are prepared. In the third stage, discussion on detailed metrics and methods will be expanded and impact assessment results will be evaluated. This study requires analysis through various participants such as policy designers, artificial intelligence service developers, and civic groups in the future.

Design and Implementation of Multi Messaging System Using SK-VM Based On J2ME (J2ME기반의 SK-VM을 이용한 다중 메시징 시스템 설계 및 구현)

  • 김응곤;최완규;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.41-45
    • /
    • 2001
  • In the case of mobile internet service using WAP, It was connected to http protocol using WAP Gateway. So, Users take increased cost of mobile internet service. and it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language. Which is independant of platform and low cost and intensely security and downloadable application. Additional, Using socket connection, Multi Messaging System(MMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation o( multi messaging used SK-VM based on .12ME, It will be foundation to develop various mobile application in the future.

  • PDF

Design of Portal System Architecture for Large Consumers and Its Prototype Implementation (대수용가 포털 시스템 아키텍처 설계 및 프로토타입 구현)

  • Yang, Il-Kwon;Kim, Sun-Ic;Song, Jae-Ju;Oh, Do-Eun;Lee, Sang-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.11
    • /
    • pp.2117-2123
    • /
    • 2008
  • This paper describes the portal system architecture of large consumers for ESP(Energy Service Provider) to provide customers with various value added services such as monitoring and controlling a wide variety of electric devices in consumer's premises for optimal energy management from both consumer side and ESP side, and the prototype implementation of 2 kinds of value added services. The architecture is composed of the device portal which gathers the information from electric devices and controls them and the consumer portal which can make ESP operate the optimal energy management with two-way communications. The demand side management and energy management functions was chosen and implemented for the prototype system as value added services. The prototype was designed to create, manage, and trace the events about services between ESP and customers.

Six Sigma Implementation Methods for a Telecommunication Service Industry: A Case Study of KT (통신서비스산업에서의 식스시그마 추진 전략 : KT의 사례를 중심으로)

  • Bae, Shin-Gyu;Hwang, Gee-Hyun;Byun, Jai-Hyun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.4
    • /
    • pp.347-357
    • /
    • 2006
  • Six sigma activities in an information and communication technology company in Korea are introduced. Korea Telecom(KT) was a public company for a long time and became a private enterprise not long ago. Although this company adopted many innovation programs, they were not effective because of the company's characteristics : long-time government-owned and information service industry. This paper describes the reason why KT introduced six sigma, some implementation strategy, and key factors to successfully deploy it. This paper is expected to be helpful to public or service industry in which it is very difficult to implement innovation activities.

Effect of Centralization in Decision Making Upon Real Option Utilization : Empirical Approach of Cloud Service Implementation in Korean Small & Medium Sized Firms (의사결정 집중화 수준과 불확실성이 실물옵션 활용에 미치는 영향에 대한 연구 : 국내 중소기업 클라우드 서비스 도입에 대한 연구)

  • Kim, Taeha;Nam, Seunghyeon;Yang, Heedong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.117-131
    • /
    • 2017
  • We question whether Korean IT managers consider real options to reduce risks of cloud service implementation. This work investigates the impact of technology risk, relationship risk, economy risk, security risk upon the intention of IT managers to utilize abandon & expansion options. We also analyze moderation effect of centralization level of decision making between these risks and the utilization of real options. Using the survey questionnaire, we empirically find that technology risk, relationship risk and security risk have significant effect upon abandon option and technology risk, relationship risk, and economy upon expansion option. We also find the evidence that centralization level moderates some risks and the direction of moderation effect is to offset the effect of risks on intention to utilize real options.

Realization of the Biba Security Model in an OSI-distributed (OSI-분산 시스템에서의 Biba Security 모델의 구현)

  • Park, Chong-Hwa
    • The Journal of Information Technology
    • /
    • v.5 no.2
    • /
    • pp.35-45
    • /
    • 2002
  • This paper discusses a distributed implementation of the Biba security policy model. Implementation of an service in the OSI-RM is not sufficient for enforcing the Biba model. Also confidentiality services are necessary. Public Key Systems(PKSs) are considered for the realization of these security services. In this paper symmetric & asymmetric cryptographic systems are considered for the realization of these security service. It is investigated how key-distributions can be found resulting in a minimum number of key.

  • PDF