• Title/Summary/Keyword: Two-way Communication

Search Result 780, Processing Time 0.029 seconds

Efficient and Privacy-Preserving Near-Duplicate Detection in Cloud Computing (클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법)

  • Hahn, Changhee;Shin, Hyung June;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1112-1123
    • /
    • 2017
  • As content providers further offload content-centric services to the cloud, data retrieval over the cloud typically results in many redundant items because there is a prevalent near-duplication of content on the Internet. Simply fetching all data from the cloud severely degrades efficiency in terms of resource utilization and bandwidth, and data can be encrypted by multiple content providers under different keys to preserve privacy. Thus, locating near-duplicate data in a privacy-preserving way is highly dependent on the ability to deduplicate redundant search results and returns best matches without decrypting data. To this end, we propose an efficient near-duplicate detection scheme for encrypted data in the cloud. Our scheme has the following benefits. First, a single query is enough to locate near-duplicate data even if they are encrypted under different keys of multiple content providers. Second, storage, computation and communication costs are alleviated compared to existing schemes, while achieving the same level of search accuracy. Third, scalability is significantly improved as a result of a novel and efficient two-round detection to locate near-duplicate candidates over large quantities of data in the cloud. An experimental analysis with real-world data demonstrates the applicability of the proposed scheme to a practical cloud system. Last, the proposed scheme is an average of 70.6% faster than an existing scheme.

Efficient Transmission of Scalable Video Streams Using Dual-Channel Structure (듀얼 채널 구조를 이용한 Scalable 비디오(SVC)의 전송 성능 향상)

  • Yoo, Homin;Lee, Jaemyoun;Park, Juyoung;Han, Sanghwa;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.381-392
    • /
    • 2013
  • During the last decade, the multitude of advances attained in terminal computers, along with the introduction of mobile hand-held devices, and the deployment of high speed networks have led to a recent surge of interest in Quality of Service (QoS) for video applications. The main difficulty is that mobile devices experience disparate channel conditions, which results in different rates and patterns of packet loss. One way of making more efficient use of network resources in video services over wireless channels with heterogeneous characteristics to heterogeneous types of mobile device is to use a scalable video coding (SVC). An SVC divides a video stream into a base layer and a single or multiple enhancement layers. We have to ensure that the base layer of the video stream is successfully received and decoded by the subscribers, because it provides the basis for the subsequent decoding of the enhancement layer(s). At the same time, a system should be designed so that the enhancement layer(s) can be successfully decoded by as many users as possible, so that the average QoS is as high as possible. To accommodate these characteristics, we propose an efficient transmission scheme which incorporates SVC-aware dual-channel repetition to improve the perceived quality of services. We repeat the base-layer data over two channels, with different characteristics, to exploit transmission diversity. On the other hand, those channels are utilized to increase the data rate of enhancement layer data. This arrangement reduces service disruption under poor channel conditions by protecting the data that is more important to video decoding. Simulations show that our scheme safeguards the important packets and improves perceived video quality at a mobile device.

Media Mix for Webtoon Character Marketing : Focusing on (미디어믹스를 활용한 웹툰 캐릭터 마케팅 : <하마탱의 일편단심 하여가>를 중심으로)

  • Choi, In-Soo;Yoon, Ki-Heon
    • Cartoon and Animation Studies
    • /
    • s.19
    • /
    • pp.145-159
    • /
    • 2010
  • Similar to the other cultural contents, the character industry is based on the media which acts as the technological background. In fact, the character industry is the process of that a created character accesses to the consumers via media, builds its value and becomes licensed as a brand in the market. Therefore, it is crucial to select the most effective media for the consistence of a character in the market, as well as for construction of a higher brand quality of the character. Today, "Webtoon" might be considered as one of the marketing means which utilizes the Internet media for raising the character as a brand. Webtoon has apparent strength because it can be produced in shorter period and with less expense than through other media. Furthermore, Webtoon can be simply featured by the easiness of two-way communication and transference to another media through it. For these reasons, and according to the result of analyzing some Korean Webtoons, it seems obvious that the most effective media in character marketing is the Internet. In addition to the Internet, the strategic development in the media-mix is also important for establishing a brand of a character. However, the effective media-mix is available only when the character's external identity meets with the trait of its media. For the purpose of learning how the media-mix works when a character reaches for the consumers, a character "Hamataeng" was born and used in the experiment. This study will explain the marketing process through the use of own-created Webtoon and other contents, and suggest the ways to build a brand of a character. In addition, it is also indicated that a media-mixing strategy for transformation and expansion of the character to other media.

  • PDF

An Adaptive USB(Universal Serial Bus) Protocol for Improving the Performance to Transmit/Receive Data (USB(Universal Serial Bus)의 데이터 송수신 성능향상을 위한 적응성 통신방식)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.327-332
    • /
    • 2004
  • USB(Universal Serial Bus) is one of the most popular communication interfaces. When USB is used in an extended range, especially configurating In-home network by connecting multiple digital devices each other, USB interface uses the bandwidth in the way of TDM(Time Division Multiplexing) so that the bottleneck of bus bandwidth can be brought. In this paper, the more effective usage of bus bandwidth to overcome this situation is introduced. Basically, in order to realize the system for transferring realtime moving picture data among digital information devices, we analyze USB transfer types and Descriptors and introduce the method to upgrade detailed performance of Isochronous transfer that is one of USB transfer types. In the case that Configuration descriptor of a device has Interface descriptor that has two AlternateSetting, if Isochronous transfers are not processed smoothly due to excessive bus traffic, the application of the device changes AlternateSetting of the Interface descriptor and requires a new configuration by SetInterface() request. As a result of this adaptive configuration, the least data frame rate is guaranteed to a device that the sufficient bandwidth is not alloted. And if the bus traffic is normal, the algorithm to return to the original AlteranteSetting is introduced. this introduced method resolve the bottleneck of moving picture transfer that can occur in home network connected by multiple digital devices.

  • PDF

Understanding Personal and Cultural Factors on the Level of UCC Participation: Centered on Korea and U.S.A (UCC 사용자 참여수준과 개인적 및 문화적 특성 요인과의 관계 - 한국과 미국을 중심으로 -)

  • Lee, Hyun-Ju;Kim, Yoo-Jung;Kang, So-Ra
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.216-232
    • /
    • 2009
  • The purpose of this paper is to examine the ethical implications in UCC participation. This paper aimed at examining the advent of UCC as a critical media tool in interactive two-way communication and the effect of ethical questions on the level of UCC participation. The findings show that uncertainty avoidance gives an positive and significant effect on privacy concern and regulatory preference, but it is not related to copyright invasion in Korea and U.S.A. It is shown that privacy concern does not influence on UCC retrieval in Korea whereas it is positively related to UCC retrieval in the United States. Also, privacy concern has not relationship with UCC production(modification, recreation, generation) in both nations. In the case of regulatory preference, it posits an significant and positive effect on UCC retrieval in Korea while it is not related to UCC retrieval in the United States. Also, regulatory preference does not affect on UCC production in Korea whereas it influences on UCC generation without impacting UCC modification and recreation in U.S.A. Finally, the results show that copyright invasion has stronger relationship with UCC recreation and generation than UCC modification, and it is positively related to UCC retrieval in both nations.

DDS-Based BLE Adaptor for Standard Profile Data Interoperation in Internet of Things (사물인터넷 환경에서 표준 Profile 데이터 상호운용을 위한 DDS 기반 BLE 어댑터)

  • Oh, Jung-Hoon;Back, Moon-Ki;Oh, Gil-Tak;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.403-410
    • /
    • 2016
  • IoT(Internet of Things) has purpose for providing new kind of service though interaction with everything. With development of IoT, computer model which is based on internet is changed to distributed connection model between heterogeneous things. There is a problem that it is impossible to connect between each other different protocols. To solve this problem, we should abstract each of things of data through using adaptor of middleware structure in order to make consistent data unit. In this paper, we propose BLE(Bluetooth Low Energy) adaptor, which is interaction with things, based on DDS(Data Distribution Service) that is real-time standard middleware. It is possible to data interaction between BLE Devices as well as two-way data interaction with different protocol devices. Also existing BLE Devices and study have a problem that Data exchange without using a standard data format of a profile defined by the Bluetooth SIG. Using the data formats defined independently by a problem that should not exchange data according to the type and manufacturer of the device BLE. The BLE adapter to solve this problem, the classification and analysis of the 12 stand profile was applied to create a profile based on the standard data format. It is possible to get wide interoperability of not affected on the BLE devices type and manufacturer of the device because it is applied a profile that standard data format.

Improving Haskell GC-Tuning Time Using Divide-and-Conquer (분할 정복법을 이용한 Haskell GC 조정 시간 개선)

  • An, Hyungjun;Kim, Hwamok;Liu, Xiao;Kim, Yeoneo;Byun, Sugwoo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.377-384
    • /
    • 2017
  • The performance improvement of a single core processor has reached its limit since the circuit density cannot be increased any longer due to overheating. Therefore, the multicore and manycore architectures have emerged as viable approaches and parallel programming becomes more important. Haskell, a purely functional language, is getting popular in this situation since it naturally supports parallel programming owing to its beneficial features including the implicit parallelism in evaluating expressions and the monadic tools supporting parallel constructs. However, the performance of Haskell parallel programs is strongly influenced by the performance of the run-time system including the garbage collector. Though a memory profiling tool namely GC-tune has been suggested, we need a more systematic way to use this tool. Since GC-tune finds the optimal memory size by executing the target program with all the different possible GC options, the GC-tuning time takes too long. This paper suggests a basic divide-and-conquer method to reduce the number of GC-tune executions by reducing the search area by one-quarter for every searching step. Applying this method to two parallel programs, a maximally independent set and a K-means programs, the memory tuning time is reduced by 7.78 times with accuracy 98% on average.

A Study on UI Prototyping Based on Personality of Things for Interusability in IoT Environment (IoT 환경에서 인터유저빌리티(Interusability) 개선을 위한 사물성격(Personality of Things)중심의 UI 프로토타이핑에 대한 연구)

  • Ahn, Mikyung;Park, Namchoon
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.2
    • /
    • pp.31-44
    • /
    • 2018
  • In the IoT environment, various things could be connected. Those connected things learn and operate themselves, by acquiring data. As human being, they have self-learning and self-operating systems. In the field of IoT study, therefore, the key issue is to design communication system connecting both of the two different types of subjects, human being(user) and the things. With the advent of the IoT environment, much research has been done in the field of UI design. It can be seen that research has been conducted to take complex factors into account through keywords such as multi-modality and interusability. However, the existing UI design method has limitations in structuring or testing interaction between things and users of IoT environment. Therefore, this paper suggests a new UI prototyping method. In this paper, the major analysis and studies are as follows: (1) defined what is the behavior process of the things (2) analyzed the existing IoT product (3) built a new framework driving personality types (4) extracted three representative personality models (5) applied the three models to the smart home service and tested UI prototyping. It is meaningful with that this study can confirm user experience (UX) about IoT service in a more comprehensive way. Moreover, the concept of the personality of things will be utilized as a tool for establishing the identity of artificial intelligence (AI) services in the future.

  • PDF

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

Comparative Analysis on Security Needs Satisfaction and Life Satisfaction of Electronic Security System Users by City Size (도시크기에 따른 기계경비시스템 이용자의 안전욕구충족과 생활만족 비교분석)

  • Yoo, Young-Chang;Lee, Jong-Hwan;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.330-341
    • /
    • 2010
  • The purpose of this study is to have comparative analysis on the differences between metropolis and provincial city's electronic security system users' security needs satisfaction and life satisfaction. This study sampled total 400 users with using purposeful sampling after selecting specific metropolis and provincial cities as population. It was conducted on 4 realms-bank, jewelry store, convenience store and communication industry- with two times. First one was on June, 2008, it was conducted in Seoul, 5 areas divided based on Hangang, which are Gang-dong, Gang-seo, Gang-nam, Gang-buk, and civic center. We sampled 40 electronic security system users of each area which are 200 in sum. Second one was on January, 2009, with users in Cheonan and Asan, 200 was sampled in the same way with metropolis; 100 users of each city. The reliability of the questionnaire showed Cronbach's ${\alpha}$ value over .812. The results are as follows. First, there showed difference on physical security needs satisfaction of electronic security system users with the size of city. In other word, users in metropolis have higher environmental, psychological, and informational security needs satisfaction than users in provincial city. Second, there is also difference in life satisfaction. Namely, users in metropolis have higher security needs satisfaction than users in provincial city. Third, security needs satisfaction of electronic security system users by city size effects life satisfaction. That is, in case of users in metropolis, the more physical, environmental, and informational security needs satisfaction it shows, the more life satisfaction it showed.