• Title/Summary/Keyword: Video conferencing

Search Result 170, Processing Time 0.032 seconds

Advanced Network 응용 및 활용 사례: Application Technology 분야

  • 김종원;강신각;신지태;김현철
    • Information and Communications Magazine
    • /
    • v.20 no.10
    • /
    • pp.121-130
    • /
    • 2003
  • 1997년 활동을 시작한 APAN-KR (Asia Pacific Advanced Network - Korea) Technology Area 활동을 계승하여 2003년 초에 재구성된 ANF (Advanced Network Forum: 한국첨단망협회) Application Technology Area에 대한 전반적인 소개에 이어서 VoIP (voice over IP), DV/VC(digital video / video conferencing) 및 P2P(peer to peer)로 나누어진 각 세부 WG (working group)들의 소개, 활동 내용, 향후 계획 등을 살펴본다.

A study on the Analysis and Forecast of Effect Factors in e-Learning Reuse Intention Using Rule Induction Techniques (규칙유도기법을 이용한 이러닝 시스템의 재이용의도 영향요인 분석 및 예측에 관한 연구)

  • Bae, Jae-Kwon;Kim, Jin-Hwa;Jeong, Hwa-Min
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.2
    • /
    • pp.71-90
    • /
    • 2010
  • Electronic learning(or e-learning) has created hype for companies, universities, and other educational institutions. It has led to the phenomenal growth in the use of web-based learning and experimentation with multimedia, video conferencing, and internet-based technologies. Many researchers are interested in the factors that affect to the performance of e-learning or e-learning services. In this sense, this study is aimed at proposing e-learning system reuse prediction models in which e-learner intention to reuse influence factors(i.e., system accessibility, system stability, information clarity, information validity, self-regulated efficacy, computer self-efficacy, perceived usefulness, perceived ease of use, flow, and parental expectation) affect e-learner intention to reuse positively. A web survey was conducted for the full members of the e-learning education institute A in Seoul, Republic of Korea, an exclusive e-learning company that provides real time video lectures via the desktop conferencing system. The web survey was conducted for 20 days from November 5, 2009, through the e-learning web site of the company A. In this study, three data mining techniques were used : the multivariate discriminant analysis, CART, and C5.0 algorithm. This study was conducted to provide the e-learning service providers, e-learning operators, and contents developers with marketing and management strategies for improving the e-learning service companies, based on the data mining analysis results.

  • PDF

Implementation of Multi-user VR Video Conferencing Platform and Performance Evaluation (다중 사용자 대응 VR 화상 회의 플랫폼 구현 및 성능 비교)

  • Yoon, Dong-eon;Lim, Chang-seop;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.31-32
    • /
    • 2022
  • Commercialized game engines help develop content and support various platforms, but there are performance differences depending on the function. In this paper, a VR video conferencing platform corresponding to source multi-use was implemented, and the connection delay time according to the type of game server engine and the number of platform users was measured. As a result of the measurement, the latency was the lowest at 22.146 msec when using the Amazon GameLift engine and with 2 users, and the latency was the highest at 27.007 msec when using the ProudNet engine and with 10 users.

  • PDF

Design and Implementation of Education On Demand System based on SIP to support Conferencing Service (컨퍼런싱형 서비스를 지원하는 SIP 기반의 원격 교육 시스템의 설계 및 구현)

  • Park, Si-Yong;Yun, Byung-Nam;Chung, Ki-Dong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.749-756
    • /
    • 2003
  • Currently, The Internet has been imported in many fields and it's development prompted accordingly. The field of education also has been developed as 'Learners Centered Environment' by combining the existing educational method, so called distance learning, with internet. Learners have become able to adopt the appropriate level of educational service anywhere and anytime they want. In this paper, we propose a EOD system based on SIP. The EOD system is a new conferencing type system in the distance learning field. Using SIP (Session Initial Protocol) for EOD system is more efficient than using H.323, also the more the number of its is increased, and as improvement of its QoS. The EOD system is scalable and provides conferencing service using SIP which suits with web environment. And, the EOD system supports multicast efficiently to utilize bandwidth of networks.

Security Method of Multimedia Data Characteristics on Video Conference System (영상회의 시스템에서 멀티미디어 데이터 특성에 따른 보안 방법)

  • Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.143-148
    • /
    • 2005
  • Video conference system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the compression technique and multimedia data, supports the video conference the research of the Mbone of the IP multicast for being active. being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

A study on video conferencing program user experience -Focused on Zoom and MS Teams- (화상회의 플랫폼 서비스의 사용자 경험 연구 -줌, MS 팀즈를 중심으로-)

  • Hwangbo, Yeon;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.339-344
    • /
    • 2021
  • The purpose of this study is to present measures to enhance non-face-to-face communication platform services by measuring the user experience elements of major videoconferencing platforms in the non-face-to-face era. As a method of research, the platform of Zoom and MS Teams was selected, and the factors affecting the user experience were evaluated in combination with task and Think Aloud, and seven Honeycomb models of Peter Mobil were reconstructed to be analyzed through surveys and in-depth interviews for each paragraph. Studies have shown that Zoom has high usability, usability, accessibility and searchability, and MS Teams have excellent attractiveness. Therefore, based on the results of this study, the guidelines for video conferencing platform services and the improvement of the interface were presented. Based on this study, we hope that the usability of videoconferencing will be improved, and that various related studies will proceed as follow-up studies.

Fashion Image Expression on Video Conferencing Platforms -Focusing on Korean Female Office Workers in Their 20s and 30s- (비대면 화상 플랫폼에서의 패션 이미지 표현 특성 -20~30대 한국 직장인 여성을 중심으로-)

  • Sujin Lim;Jisoo Ha
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.48 no.1
    • /
    • pp.20-36
    • /
    • 2024
  • Over the past three years, even amidst viral threats, a notable shift towards online interactions has been observed. This trend persists the presence of significant viral concerns. Our study centered on female office workers in their twenties and thirties in Korea, seeking to comprehend how they enhance and present their external image in the digital era. We explored the use of digital devices and fashion choices that enable them to amplify their self-expression in video conferences. Using a mix of surveys and in-depth interviews, we employed snowball sampling to recruit twelve participants. These women were given the opportunity to shape their digital persona either to uphold their current image or to adapt it for interactions where they weren't face-to-face. Their desired images fell into three distinct categories: an authoritative professional image, a clean modern image, and a natural image. Depending on the context, the participants aimed to convey these images independently or in various combinations. Our findings suggest the need to develop strategies for acknowledging and projecting individual fashion identities in non-face-to-face interactions. Such strategies would empower individuals to better align their online personas with their desired self-image, whether it's professional, modern, clean, natural, or a combination thereof.

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

e-Learning Education System on Web

  • Choi, Sung;Han, Jung-Lan;Chung, Ji-Moon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.283-294
    • /
    • 2004
  • Within the rapidly changing environment of global economics, the environment of higher education in the universities & companies, also, has been, encountering various changes. Popularization on higher education related to lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities & companies, importance of obtaining information in the universities & companies, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope with these kinds of rapid changes in the education environment, operating E-Learning Education & company by utilizing various information technologies and its fixations such as Internet, E-mail. CD-ROMs. Interactive Video Networks (Video Conferencing, Video on Demand), CableTV etc., which has no time or location limitation, is needed.

  • PDF