• Title/Summary/Keyword: Translation service

Search Result 120, Processing Time 0.025 seconds

Design and Implementation of Dynamic Multicast Group Key Management Protocol for Multicast Information Security (멀티캐스트 정보 보안을 위한 동적 그룹 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.19-27
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

End-user Computing and End- User Searching (최종이용자컴퓨팅과 최종이용자탐색)

  • 이상복
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.7 no.1
    • /
    • pp.171-192
    • /
    • 1994
  • End-user Computing(EUC) is one of the significant developments of the 1980s with the explosive supply of personal computers and application software related to it. EUC can be defined as the direct assumption of system development and data processing tasks by the user of the service for his own direct benefit. This is in contrast to the traditional approach to computing in which user requirement are identified and defined and then turned over to professional system designers and programmers for implementation, with the end-user a relatively passive participant in the process. The traditional approach to system development has two obvious drawbacks. First, there is the problem that something may be lost in translation of the problem as originally formulated by the requestor and as it is implemented by the computer specialists. Second, there is the problem that it can take a longtime as growth of significant workloads within system department staff. EUC is an attempt to compensate for this drawbacks associated with the traditional system department process. It permits the end-user to interact directly with an information system, utilizing user friendly software support tools. End-user Searching(EUS) can be defined as accessing online databases and performing search operations for the purpose of finding information to be used by that same person rather than another, in contract with intermediary searcher. The concept of EUS is related to the concept of EUS. That is, two concept are similarly to development background, effects and functions. Therefore, as EUC bring on a change the traditional data processing environment, EUS also bring on a change the traditional intermediary search environment.

  • PDF

Satellite Image Watermarking Perspective Distance Decision using Information Tagging of GPS (GPS 정보태깅을 이용한 원근거리 판별 기반의 위성영상 워터마킹)

  • Ahn, Young-Ho;Kim, Jun-Hee;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.837-846
    • /
    • 2012
  • This paper presents a watermarking scheme based on the perspective distance for the secure mash-up service. The proposed scheme embeds the watermark of the location information of satellite image and the user information using edge color histogram, which is dissimilar to general digital image. Therefore, this scheme can trace the illegal distributor and can protect private information of user through the watermarking scheme that is adaptive to satellite image. Experimental results verified that our scheme has the invisibility and also the robustness against geometric attacks of rotation and translation.

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

An Identification and Feature Search System for Scanned Comics (스캔 만화도서 식별 및 특징 검색 시스템)

  • Lee, Sang-Hoon;Choi, Nakyeon;Lee, Sanghoon
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.199-208
    • /
    • 2014
  • In this paper, we represent a system of identification and feature search for scanned comics in consideration of their content characteristics. For creating the feature of the scanned comics, we utilize a method of hierarchical symmetry fingerprinting. Proposed identification and search system is designed to give online service provider, such as Webhard, an immediate identification result under conditions of huge volume of the scanned comics. In simulation part, we analyze the robustness of the identification of the fingerprint to image modification such as rotation and translation. Also, we represent a structure of database for fast matching in feature point database, and compare search performance between other existing searching methods such as full-search and most significant feature search.

A Study on the Recognition, Satisfaction, and Revisit Intentions of Japanese Tourists based on Traditional Korean Foods (방한 일본관광객의 한국음식에 대한 인식, 만족도 및 재방문의도에 관한 연구)

  • Lee, Yeon-Jung
    • Korean journal of food and cookery science
    • /
    • v.23 no.1 s.97
    • /
    • pp.156-164
    • /
    • 2007
  • This study investigated the impacts from the recognition and satisfaction of Korean foods on the revisit intentions of japanese tourists to Korea. The subjects of this study consisted of 365 Japanese tourists visiting Korea. The findings are summarized as follows: (1) the recognition of Korean food included 'the quality of food material is fresh and good'(3.99 pints), 'Korean food is nutritious and healthful food'(3.89 points), and 'Koran food consisted of grains and vegetables, and the cooking methods were developed specially'(3.88 points) in the order. (2) They were highly satisfied with the 'nutrition of the food,' 'taste of the food,' and 'quantity of the food,' in terms of the Korean food quality however, they were not satisfied with 'Japanese marks on ingredients,' 'sanitary,' 'smell,' and 'freshness.' (3) The most influential recognition variables to affect revisit intentions to Korea was 'health knowledge' followed by 'unique,' 'preference,' 'experience,' and 'interest.' (4) The most influential satisfaction variable to affect revisit intentions to Korea was 'food and menu' followed by 'translation and understanding,' and 'flavor and appearance.'

Development of effective convergence type medical tourism platform

  • Park, Jong-Youel;Chang, Young-Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.115-120
    • /
    • 2018
  • Current medical tourism is focused on the services of large hospitals and it is hard to find ways to attract the users. Users collect information for medical tourism through various paths in order to receive the medical consultations and customized tour services. To expand medical tourism to small and medium sized hospitals, it is necessary to have the customized medical consultations, tours and interpreter services, which are the key elements of medical tourism. This study suggests ways to provide the services based on information on medical consultations, tours and interpreter services that users had experienced directly, and also based on the platform for the essential items integrated from users, hospitals and guides' viewpoints. With information on hospitals that provide medical consultations and guides who are able to provide professional services in translation, interpretation and customized tour, users may accumulate and share the information about hospitals and customized tours verified by other users from the integrated platform. To match the contents provided by hospitals and guides with information experienced by users into a system, this study suggests the construction plan for the service model that can match the experience information between users and hospitals, between users and guides and between hospitals and guides systematically by operating the data in the universal container.

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Study on Object Modelling for Oceanic Data (해양자료 객체 DB 모델링 연구)

  • 박종민;서상현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.454-457
    • /
    • 1999
  • Most of oceanic information are related with spatial properties directly or impliedly and Presented differently depend on applications. So, without efficient integrated data model and strategies it inevitably occurs redundant development results of database itself and application systems. Therefor to avoid these inefficiencies it is most basic need to establish the ocean data infrastructure based on unified data model. In this paper we suggest the guideline for object data model based on ocean GIS concept followed with a sample primitive object data model implementing tile proposed guideline. With this unified data model we could expect the improvement ill the every phase of ocean related environment from data acquisition through translation and utilizing to service and exchange.

  • PDF

Meta's Metaverse Platform Design in the Pre-launch and Ignition Life Stage

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.121-131
    • /
    • 2022
  • We look at the initial stage of Meta (previous Facebook)'s new metaverse platform and investigate its platform design in pre-launch and ignition life stage. From the Rocket Model (RM)'s theoretical logic, the results reveal that Meta firstly focuses on investing in key content developers by acquiring virtual reality (VR), video, music content firms and offering production support platform of the augmented reality (AR) content, 'Spark AR' last three years (2019~2021) for attracting high-potential developers and users. In terms of three matching criteria, Meta develops an Artificial Intelligence (AI) powered translation software, partners with Microsoft (MS) for cloud computing and AI, and develops an AI platform for realistic avatar, MyoSuite. In 'connect' function, Meta curates the game concept submitted by game developers, welcomes other game and SNS based metaverse apps, and expands Horizon Worlds (HW) on VR devices to PCs and mobile devices. In 'transact' function, Meta offers 'HW Creator Funding' program for metaverse, launches the first commercialized Meta Avatar Store on Meta's conventional SNS and Messaging apps by inviting all fashion creators to design and sell clothing in this store. Mata also launches an initial test of non-fungible token (NFT) display on Instagram and expands it to Facebook in the US. Lastly, regarding optimization, especially in the face of recent data privacy issues that have adversely affected corporate key performance indicators (KPIs), Meta assures not to collect any new data and to make its privacy policy easier to understand and update its terms of service more user friendly.