• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.025 seconds

The Study of the Object Replication Management using Adaptive Duplication Object Algorithm (적응적 중복 객체 알고리즘을 이용한 객체 복제본 관리 연구)

  • 박종선;장용철;오수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.51-59
    • /
    • 2003
  • It is effective to be located in the double nodes in the distributed object replication systems, then object which nodes share is the same contents. The nodes store an access information on their local cache as it access to the system. and then the nodes fetch and use it, when it needed. But with time the coherence Problems will happen because a data carl be updated by other nodes. So keeping the coherence of the system we need a mechanism that we managed the to improve to improve the performance and availability of the system effectively. In this paper to keep coherence in the shared memory condition, we can set the limited parallel performance without the additional cost except the coherence cost using it to keep the object at the proposed adaptive duplication object(ADO) algorithms. Also to minimize the coherence maintenance cost which is the bi99est overhead in the duplication method, we must manage the object effectively for the number of replication and location of the object replica which is the most important points, and then it determines the cos. And that we must study the adaptive duplication object management mechanism which will improve the entire run time.

  • PDF

The Usage of Diet and Nutritional Information on the Internet by Users' Age (이용자의 연령에 따른 인터넷 상의 식생활 및 영양 정보 이용)

  • Cho, Kuk-Hee;Choi, Bong-Soon;Seo, Ju-Young;Park, Geum-Soon;Lee, In-Sook
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.16 no.5
    • /
    • pp.542-549
    • /
    • 2006
  • The purpose of this study was to develop a web site providing sound and specific diet and nutritional information for internet users in different age groups to protect themselves from junk nutritional information. Among 660 internal users (436 in their 20s, 154 in their 30s, and 63 in their 40s), 66.4% had access to a computer to get nutritional information. Almost 38% of those in their 20s searched in the internet using the term 'diet', whereas 25.9% of those in their 30s and 27.1% of those in their 40s searched using 'cooking and recipe'(p<0.001). The main purpose of using nutritional information on the internet of the subjects was 'to take care of health'(p<0.001). Seventy percent of subjects answered 'so-so' for the satisfaction about the content of nutritional information that was self-explored. Contents related to nutritional information which needed to be improved was 'sound information' for 47.2% of those in their 30s, 'convenience for the application to daily life' for 51.1% of those in their 20s, and 39.6% of those in their 40s. A specialized nutritional information site must to be developed for users to gain access to reliable and valuable information without difficulty, as the variety of the interested area and application area for each user.

  • PDF

A Study on the Annotation of Digital Content (디지털 콘텐트의 어노테이션에 관한 연구)

  • Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.267-286
    • /
    • 2006
  • Tools are needed to have access to more effective information and to select it in the environment of digital information where information pours in. and some of the advanced techniques to make up these tools are metadata and annotation. Annotation additionally records the marks for the supplementary explanation of and emphasis on a specific part of the original text and kas more various merits than metadata in terms of the search and use of digital resources. This research aims at suggesting methods that annotation. which has a range of functions including access to information. its reuse and sharing in the digital surroundings of late, can be applied to digital contents such as web services, digital libraries and electronic books. As to the research method, the case studies of annotation systems applied to web services and digital libraries have been carried out, and the metadata formation of the systems has been analyzed.

A Study on the Relationship of Interaction Design - With Emphasis on the Research of Various Knowledge System about the Relationship - (인터랙션 디자인에서의 '관계'에 대한 연구 - 관계에 대한 다 학제적 관점의 고찰을 중심으로 -)

  • 천가원;박영목
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.53-62
    • /
    • 2002
  • If the stage of establishing concept in interaction design approaches only analytic and numeral & quantitative aspects, it would be lack of new and creative ideas of concept for the suitable and proper relationship among the human and tools or machinery which is required in interaction design. This study has explored the possibility of access through the research of diverse point of views in the various knowledge systems about the relationship. That is this study has expanded from improvement-intended approach as analyzing human and tools and solving problems with analytic and engineering aspect to value-intended approach as pursuing new ideas though various points of relationship. Or so, to examine 'Relationship' in other knowledge systems, it could be the basic research for more deepening and specific study in interaction design. To integrate this study, at first, it deals with interaction design and process. Through the specific method, it has investigated the current interaction design and related studies. In the next, it has researched the study of relationship in oriental and western philosophy, cultural science, social science, natural science and engineering so it has examined the relationship in the various points of knowledge systems. Based on the contents, it has considered the possibility of access in interaction design to explain the relationship in the various points of knowledge systems.

  • PDF

Video Indexing for Efficient Browsing Environment (효율적인 브라우징 환경을 위한 비디오 색인)

  • Ko, Byong-Chul;Lee, Hae-Sung;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.1
    • /
    • pp.74-83
    • /
    • 2000
  • There is a rapid increase in the use of digital video information in recent years. Especially, user requires the environment which retrieves video from passive access to active access, to be more efficiently. we need to implement video retrieval system including video parsing, clustering, and browsing to satisfy user's requirement. In this paper, we first divide video sequence to shots which are primary unit for automatic indexing, using a hybrid method with mixing histogram method and pixel-based method. After the shot boundaries are detected, corresponding key frames can be extracted. Key frames are very important portion because they help to understand overall contents of video. In this paper, we first analyze camera operation in video and then select different number of key frames depend on shot complexity. At last, we compose panorama images from shots which are containing panning or tilting in order to provide more useful and understandable browsing environment to users.

  • PDF

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

The standardization and R&D directions on contents protection technology in UHD broadcasting (UHD방송 콘텐츠 보호기술 개발 및 표준화 추진 방향)

  • Min, J.H.;Koo, H.S.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.638-641
    • /
    • 2016
  • UHD(Ultra High Definition) broadcasting is an attractive next-generation service of realistic broadcasting that enables you to feels like listening on the spot in ultra-high definition resolution. In addition, the test broadcasting run by UHD broadcasting agencies and UHDTV terminal launch could herald the full-scale UHD broadcasting era. However, in order that UHD broadcasting will be activated, the function of conditional access control and information protection through which we can on pay per view watch the programs of subscriber preference from the channels of various and subdivided genres is essential. To provide a technical foundation for these features and to achieve the UHD TV transition early, determining technology development & standardization strategy through the analysis of the key protection technologies is required In this paper, we propose standardization technologies which our country can lead and present a long-term driving directions by analyzing UHD broadcasting technology & test broadcasting trends and content protection technology & standardization trends.

  • PDF

Study on a Web-based Testbed for Historical Astronomy Records and Accounts Services

  • Seo, Yoon Kyung;Mihn, Byeong-Hee;Kim, Sang Hyuk;Ahn, Young Sook;Lee, Ki-Won;Choi, Goeun;Ham, Seon Young
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.49.3-50
    • /
    • 2018
  • Korea has kept its records of astronomical phenomena since around 2,000 years ago. However, the contents and scope of relevant service have been limited for researchers who need those records due to lack of complete data collection. In this regard, it is necessary to establish efficient collection and management systems of Korean astronomical records by utilizing an environment that is easily accessible. This study is intended to complete the development of a testbed system that allows researchers to systematically input and validate, in a Web environment, multiple astronomical records among the historical documents until Modern Joseon after the Three Kingdoms Period. Recognition of the pre-translated data and tables in advance is followed by its storage in the database built on the Web. Then, data validation is implemented by providing a retrieval service according to a specific form to only a finite number of researchers who have access authority. This study is targeted at a testbed system that takes around three months to be completely developed. The completed testbed system is expected to allow internal and external researchers of an organization to easily access the service on the Web. This will ensure that the accuracy of the data can be verified mutually and help identify areas of service improvement. The opinions collected regarding service improvement will be reflected in the future system. Eventually, domestic astronomical records will subsequently be able to be utilized internationally through the multilingual service.

  • PDF

The Roles of Public Libraries for the Formation of Digital Capital (디지털 자본의 형성을 위한 공공도서관의 역할)

  • Lee, Seungmin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.521-540
    • /
    • 2021
  • This research categorizes the factors of digital capital accumulated both in personal and social level into digital access and digital competence, and empirically analyzes how the use of public libraries effects on the formation of digital capital. As a result, it was found that participation in public library programs, the use of information services, and the utilization of digital collections had positive effect on the formation and accumulation of digital capital at the personal and social level. In contrast, it was analyzed that the use of digital collections in public libraries did not significantly affect the creation of digital contents or reciprocal collaboration based on online networks. Therefore, in order for public libraries to fully support the formation of digital capital, they should not only provide knowledge and information which is a traditional role of public libraries, but also play a role as a digital-based cooperative system.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.