• 제목/요약/키워드: Subscribers

검색결과 493건 처리시간 0.027초

Appropriate Roles for the Subscriber, Publisher, Editor, Author, and Reviewer in the Archives of Plastic Surgery

  • Hwang, Kun
    • Archives of Plastic Surgery
    • /
    • 제40권6호
    • /
    • pp.663-665
    • /
    • 2013
  • Authors, editors and reviewers, publishers, and subscribers all play their role in scientific journals. These 5 stakeholders are essential to journals. In this paper, firstly, I briefly summarize the role of each journal stakeholder and their respective goals. Secondly, the status of each participant in the Archives of Plastic Surgery is described. Finally, I propose an appropriate role and plan for each of them. Specific roles and responsibilities include the following: subscribers should welcome and submit the critiques of published papers in letters to the editor. Publishers should trust editors and provide them with adequate financial support for ongoing quality improvement of the journal. The editor-in-chief should be given a sufficient period of time-several years-to build up journal quality and train the incoming editor. The editors, including section editors, are also responsible for increasing the author pool. One editor might be designated a 'devil's referee', that is, a kind of devil's advocate with the responsibility of examining the originality of the manuscript, taking a skeptical view of the manuscript, and looking for holes in the methods and results of reported experiments. Authors' responsibilities include submitting manuscripts with scientific integrity and being ready to take responsibility for their articles even long after publication. Finally, reviewers' responsibilities include identifying similar articles not cited. Reviewers are also welcome to write a discussion on the article they review.

글로벌 패션 유튜버의 콘텐츠 유형과 특성에 관한 사례연구 (A case study on the content types and characteristics of global fashion YouTubers)

  • 김고운;김윤
    • 복식문화연구
    • /
    • 제28권3호
    • /
    • pp.389-407
    • /
    • 2020
  • With YouTube's overwhelming share of the market, research on analyzing the types of content on YouTube is essential. An analysis of major global fashion YouTubers that the types of video content could be largely classified into three main categories: Fashion, beauty and daily life. The fashion category was subdivided into styling and fashion product review content type. The beauty category was subdivided into tutorials, beauty product reviews, and beauty tip content types. The daily life category was subdivided into daily sharing, consultation, and Q & A content types. Video content within fashion YouTuber channels is accompanied by expertise in fashion and beauty. At the same time, videos on daily life are uploaded, and through interactive communication with viewers, YouTubers form an intimate bond with subscribers. Content emphasizing entertainment, not just information delivery that introduces fashion products, is attracting growing interest among subscribers. This study analyzed the content of the increasingly popular fashion YouTuber channels and determined its important characteristics. The study makes a significant contribution to academic research by laying a foundation for future studies of YouTube content in the fashion field. Since differences in country of birth and race among YouTubers may influence content production, follow-up research will be conducted on the types and characteristics of domestic fashion YouTubers.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

Development of the Home Location Register/Authentication Center in the CDMA Mobile System

  • Lim, Sun-Bae;Shin, Kyeong-Suk;Kim, Hyun-Gon
    • ETRI Journal
    • /
    • 제19권3호
    • /
    • pp.186-201
    • /
    • 1997
  • In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For Easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocated software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called "AUTHR" using shared secret data (SSD) and compared it with the other AUTHR received from the MS. The MC also generates and stores seed keys called "A-keys" which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.

  • PDF

WDM-PON기반 FTTP 광가입자망 시스템 (Fiber-To-The-Pole(FTTP)-A NOVEL ACCESS NETWORK SOLUTION USING WDM-PON)

  • 김보겸;박태동;최영복;오호석;이원형
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.107-108
    • /
    • 2006
  • In order to meet the customers'emerging demands for more bandwidth and diverse IP multimedia applications including high definition(HD) video streaming service, KT presents innovative FTTP solution using WDM-PON system. FTTP comprises an OLT inside the central office, a fiber optic distribution network including a passive remote node in the outside plant, and ONU installed on the pole or wall of customers premise. The passive remote node is located in a manhole near the subscribers and does not require any electrical power supply. And finally, UTP cable is connected from ONU to subscribers'IP appliances like PC or HGW or IP-STB. KT finished its FTTP trial service in 2004 and commercial deployment has begun since 2005. With this FTTP solution, each subscriber can enjoy high-speed internet service with speeds of up to symmetric 100 Mbit/s and various IP media applications including HD quality IP video streaming service and high quality video phone service.

  • PDF

이동통신서비스 외부성 마크업 추정 (Estimating Network Externalities Mark-up in Mobile Telecommunications Service in Korea)

  • 정충영;이종용;정송민
    • 한국통신학회논문지
    • /
    • 제36권7B호
    • /
    • pp.806-817
    • /
    • 2011
  • 본 연구는 영국의 Ofcom 모형에 기초하여 한국의 이동망 외부성 추정모델을 설정하고 마크업을 추정하였다. 주요 분석결과는 다음과 같다. 첫째, 한국의 경우 이동전화시장이 성숙기에 해당되는 시장임에도 불구하고 15,626,711 명의 한계가입자가 존재하는 것으로 나타났다. 둘째, 한국의 이동전화시장에서 망외부성의 가치는 최대 4,354억원에서 최소 21억원인 것으로 나타났다. 셋째, 이동사업자가 추정된 한계가입자를 지원할 수 있도록 하기 위해 이동접속료에 추가되어야할 적정 외부성 마크업 수준은 최대 6.47원에서 최소 0.03원으로 분석되었다. 이러한 연구결과는 외부성 마크업 관련 논쟁뿐만 아니라 보편적서비스 및 이동접속료 관련 정책에 유용한 시사점을 제공한다.

CSMA/CA 기반 반이중 전송방식 무전기를 이용한 1:N 가입자간 통신 프로토콜 (Communication protocol for 1:N subscribers using half-duplex radio equipments based on CSMA/CA)

  • 장명진;박성진
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 춘계학술대회
    • /
    • pp.531-534
    • /
    • 2010
  • 현재 우리 군에서 많이 사용하는 PRC-999K 무전기의 기능성은 반이중전송방식이며 동일망에 가입한 가입자 중 한 가입자가 데이터를 송신하면 나머지 가입자는 모두 데이터를 수신하는 broadcast 방식이다. 군 사격지휘시스템에서 무선데이터통신은 지휘소와 가입자들 사이에 1:1(peer to peer)방식을 사용하고, 데이터 충돌을 회피하기 위해 CSMA/CA 기법을 적용한다. 이러한 환경 하에서 데이터송수신 시간 단축을 위해서 각 가입자에게 순차적인 주소를 할당하여 지휘소가 데이터를 1회 broadcasting하면 데이터 수신이 지정된 가입자들은 순차적으로 데이터 충돌을 회피하며 응답전문을 송신하는 protocol과 알고리즘을 구현하여 제시한다.

  • PDF

Heuristic Algorithms for Constructing Interference-Free and Delay-Constrained Multicast Trees for Wireless Mesh Networks

  • Yang, Wen-Lin;Kao, Chi-Chou;Tung, Cheng-Huang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.269-286
    • /
    • 2011
  • In this paper, we study a problem that is concerning how to construct a delay-constrained multicast tree on a wireless mesh network (WMN) such that the number of serviced clients is maximized. In order to support high-quality and concurrent interference-free transmission streams, multiple radios are implemented in each mesh node in the WMNs. Instead of only orthogonal channels used for the multicast in the previous works, both orthogonal and partially overlapping channels are considered in this study. As a result, the number of links successfully allocated channels can be expected to be much larger than that of the approaches in which only orthogonal channels are considered. The number of serviced subscribers is then increased dramatically. Hence, the goal of this study is to find interference-free and delay-constrained multicast trees that can lead to the maximal number of serviced subscribers. This problem is referred as the MRDCM problem. Two heuristics, load-based greedy algorithm and load-based MCM algorithm, are developed for constructing multicast trees. Furthermore, two load-based channel assignment procedures are provided to allocate interference-free channels to the multicast trees. A set of experiments is designed to do performance, delay and efficiency comparisons for the multicast trees generated by all the approximation algorithms proposed in this study.

월간 <디자인> 잡지 구독 서비스의 사용자 경험 연구 (A study on User Experience of Monthly Magazine Subscription Service)

  • 최소영;김승인
    • 디지털융복합연구
    • /
    • 제19권8호
    • /
    • pp.337-343
    • /
    • 2021
  • 본 연구는 디자인을 공부하는 학생 사용자, 혹은 디자이너로 일하고 있는 사용자를 중심으로 월간 <디자인> 잡지 구독 서비스의 사용자 경험에 관한 연구이다. 잡지 산업의 매출액은 2012년 이후 지속적으로 감소하고 있으며, 국내에서 발행되는 일부 잡지는 폐간 혹은 영구 휴간 절차를 밟았다. 이 연구는 잡지 매출액의 가장 큰 부분을 차지하는 잡지 판매 수입을 증대하기 위해 월간 <디자인>을 중점으로 잡지 구독 서비스의 사용자 경험을 측정하였다. 이를 위해 구독자와 비구독자 대상으로 설문조사 및 심층 인터뷰를 실시하여 개선사항을 제안하였다. 이 연구는 사용자 경험에 초점을 두었으며, 향후 잡지 구독 서비스 연구에 참고자료로 활용할 것으로 기대한다.

User-Customized News Service by use of Social Network Analysis on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.131-142
    • /
    • 2021
  • Recently, there has been an active service that provides customized news to news subscribers. In this study, we intend to design a customized news service system through Deep Learning-based Social Network Service (SNS) activity analysis, applying real news and avoiding fake news. In other words, the core of this study is the study of delivery methods and delivery devices to provide customized news services based on analysis of users, SNS activities. First of all, this research method consists of a total of five steps. In the first stage, social network service site access records are received from user terminals, and in the second stage, SNS sites are searched based on SNS site access records received to obtain user profile information and user SNS activity information. In step 3, the user's propensity is analyzed based on user profile information and SNS activity information, and in step 4, user-tailored news is selected through news search based on user propensity analysis results. Finally, in step 5, custom news is sent to the user terminal. This study will be of great help to news service providers to increase the number of news subscribers.