• 제목/요약/키워드: Wired Internet Service

검색결과 133건 처리시간 0.031초

Do Innovation and Relative Advantage Affect the Actual Use of FinTech Services?: An Empirical Study using Classical Attitude Theory (핀테크 서비스의 혁신성과 상대적 장점은 실질이용에 영향을 미칠까?: 고전적 태도이론을 이용한 실증 연구)

  • Se Hun Lim
    • Information Systems Review
    • /
    • 제21권3호
    • /
    • pp.87-110
    • /
    • 2019
  • The Fintech services provide innovation to financial services users using various mobile devices and computers in wired and wireless communication environments. In this study, we develope a theoretical research framework to explain the psychology of Fintech services users based on a cognitive, affective, and conative framework. Using this framework, this study analyzes the relationships between the cognitive characteristics (i.e., innovation, relative advantage, ease of use, and usefulness), emotional characteristic (i.e., attitude), and behavioral characteristic (i.e., actual use) toward Fintech services users. This study conducted an online survey of people who have experienced using Fintech services. And the data of the collected Fintech services users was analyzed using structural equation model software (i.e., SMART PLS 2.0 M3). The results of the empirical analysis show the relationships between innovation, relative advantage, perceived usefulness, perceived ease of use, attitude, and actual use of Fintech service users. The results of this study provide useful information to improve the practical use of Fintech services users in the Internet of Things (IoT) environment.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • 제9권4호
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

SnSA Design and Embodiment for ESM of Small Scale Network (소규모 네트워크의 통합보안관제를 위한 SnSA 설계 및 구현)

  • 이동휘;신영준;김귀남
    • Convergence Security Journal
    • /
    • 제3권2호
    • /
    • pp.85-97
    • /
    • 2003
  • At the end of last January, 2003, a domestic top-level domain name server (DNS) shut down the server and it caused the wired and wireless internet services to be completely paralyzed in the aftermath of a virus attack incurring a various range of losses nationwide. The main reason of this event is the lack of our awareness of cyber security. In particular, in the small-scale network, there are few security administrators and no operating devices to protect information as well. Under this circumstance, using ESM center to service real-time security supervision and correspondence for network, it can be one option. However, due to the economic efficiency, most of security systems have been being developed focusing on the large-scale network first. Therefore, ESM centers which inspect security state of network concentrate on IDC or large-scale network services. This dissertation studies economical ESM service by designing exclusive SnSA for small-scale network for widespread use. Firstly, network invasion feeler function N_SnSA and host invasion feeler function H_SnSA are embodied to collect more informations in the small-scale network. Secondarily, the existing vulnerability is studied to find the solutions linked with a low cost to a Public center such as Kyonggi Univ ESM center.

  • PDF

Estimation of De-jitter Buffering Time for MPEG-2 TS Based Progressive Streaming over IP Networks (IP 망을 통한 MPEG-2 TS 기반의 프로그레시브 스트리밍을 위한 de-jitter 버퍼링 시간 추정 기법)

  • Seo, Kwang-Deok;Kim, Hyun-Jung;Kim, Jin-Soo;Jung, Soon-Heung;Yoo, Jeong-Ju;Jeong, Young-Ho
    • Journal of Broadcast Engineering
    • /
    • 제16권5호
    • /
    • pp.722-737
    • /
    • 2011
  • In this paper, we propose an estimation of network jitter that occurs when transmitting TCP packets containing MPEG-2 TS in progressive streaming service over wired or wireless Internet networks. Based on the estimated network jitter size, we can calculate required de-jitter buffering time to absorb the network jitter at the receiver side. For this purpose, by exploiting the PCR timestamp existing in the TS packet header, we create a new timestamp information that is marked in the optional field of TCP packet header to estimate the network jitter. By using the proposed de-jitter buffering scheme, it is possible to employ the conventional T-STD buffer model without any modification in the progressive streaming service over IP networks. The proposed method can be applicable to the recently developed international standard, MPEG DASH (dynamic adaptive streaming over HTTP) technology.

Advanced Protocols and Methods of Robot Collision Avoidance for Social Network Service (로봇의 소셜 네트워크 서비스를 위한 프로토콜 및 충돌회피 방법)

  • Shin, Seok-Hoon;Hwang, Tae-Hyun;Shin, Seung-A;No, In-Ho;Shim, Joo-Bo;Oh, Mi-Sun;Ko, Joo-Young;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • 제15권7호
    • /
    • pp.931-940
    • /
    • 2012
  • Social networking services which spreading rapidly is a system using interrelationship of people by internet or mobile. SNS is a network system of the human-centered. In this paper, in order to make robot become a member of social networks we studied the necessary elements and formation. For robot with communication function and sensing, autonomous, collision avoidance method and communication protocol is needed to let Robot share the present conditions dangerous or special situation. We realized this after investigating necessary sensor for SNS, studying robot's collision-avoidance method, and defining protocol of robot for SNS. Also, we suggested and implemented the wired and wireless integrated communications method.

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • 제14권7호
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

A Study on Routing Implementation and Performance Measurement Scheme among IPv6 Terminals (IPv6 단말간 라우팅 구현과 성능측정 구성 방안에 관한 연구)

  • Woo, Jung-Yoon;Yang, JaeSoo;Lee, Jong Won;Kim, Kangju
    • Journal of Digital Contents Society
    • /
    • 제19권3호
    • /
    • pp.505-512
    • /
    • 2018
  • Internet demand has increased rapidly, and Internet Protocol Version 4, the main Internet protocol, can not cope with various types of network demand in the future. Therefore, it is urgent to spread IPv6-based stable network to solve the shortage of Internet address resources. Due to the proliferation of IoT and the increase in mobile devices, efficient and optimal IPv6 routing design is indispensable. In this paper, we have studied about characteristics of IPv6, address system of IPv6, structure analysis and efficient routing technology among IPv6 terminals. Furthermore, experimental results on routing packet analysis and convergence time are presented in network - based IPv6 routing implementation environment. In addition, we show the results of the experiment analysis by dividing the implementation of IPv6 routing, operation test, and fail over performance into three kinds of routing protocol methods. As a result, this study can be applied to the introduction of IPv6 system, test bed environment construction, and network design.

Development of unified communication for marine VoIP service (해상 VoIP 서비스를 위한 통합 커뮤니케이션 기술 개발)

  • Kang, Nam-seon;Yim, Geun-wan;Lee, Seong-haeng;Kim, Sang-yong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제39권7호
    • /
    • pp.744-753
    • /
    • 2015
  • This paper presents the results of research on developing marine unified communications to provide VoIP service based on marine satellites. With the recent popularity of smart-phones and other mobile devices, the demand for Internet-based wired and wireless unified technology has been growing in marine environments, and increasing interest is being directed to VoIP products and service models with high price competitiveness and the ability to deliver a variety of services. In this regard, this research designed three instruments, developed their unit modules, and verified their performances. These three instruments included the following: (1) a marine VoIP module equipped with an analogue gateway that can be linked to the existing devices used in vessels, which is more than 80% smaller than that of a land system; (2) a text/voice/video engine for marine satellite communications that runs on technology that minimizes communication data usage, which is a core technology for a marine VoIP service; and (3) a unified communication service that can support multilateral cloud-based message conversations, telephone number-based call functions, and voice/video calling between a private space in a ship and shore.

Multi-Level Prediction for Intelligent u-life Services (지능형 u-Life 서비스를 위한 단계적 예측)

  • Hong, In-Hwa;Kang, Myung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.123-129
    • /
    • 2009
  • Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.

  • PDF