• Title/Summary/Keyword: contents access

Search Result 1,137, Processing Time 0.024 seconds

A Study on Availability of AtoM for Recording Korean Wave Culture Contents : A Case of K-Food Contents (한류문화콘텐츠의 기록화를 위한 AtoM 활용 방안에 관한 연구 K-Food 콘텐츠를 중심으로)

  • Shim, Gab-yong;Yoo, Hyeon-Gyeong;Moon, Sang-Hoon;Lee, Youn-Yong;Lee, Jeong-Hyeon;Kim, Yong
    • The Korean Journal of Archival Studies
    • /
    • no.43
    • /
    • pp.5-42
    • /
    • 2015
  • Korean wave 3.0 is focused on 'K-Culture' which includes traditional culture, cultural art as well as existing culture contents as a keyword. It considers everything about Korean culture as materials of Korean wave culture contents. Since Korean wave culture contents reflect contemporary social aspect, it needs to preserve those contents as archives and records which have the important value of evidence. With this social environment, this study aims to implement RMS based on AtoM that manages various kinds of Korean wave culture contents through analysis of management situation of those materials. Recently, it is in progress individually to manage them through organizations dealing with korean cultures such as K-Pop, K-Food, K-Movie. However, it has problems in accumulating information and reproducing high quality contents because of lack of coordination among organizations. To solve the problems, this study proposed RMS based on open source software Access to Memory(AtoM) for managing and recording Korean wave culture contents. AtoM provides various functions for managing records and archives such as accumulation, classification, description and browsing. Furthermore AtoM is for free as open source software and easy to implement and use. Thus, this study implemented RMS based on AtoM to methodically manage korean wave culture contents by functional requirements of RMS. Also, this study considered contents relating K-Food as an object to collect, classify, and describe. To describe it, this study selected ISAD(G) standard.

Presentation Priority and Modality Conversion in MPEG-21 DIA

  • Thang, Truong Cong;Ro, Yong Man
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.339-350
    • /
    • 2003
  • The Part 7 of MPEG-21, called Digital Item Adaptation, aims at an interoperable transparent access of multimedia contents in heterogeneous environments. This standard facilitates the development of Universal Multimedia Access (UMA) systems, which adapt the rich multimedia contents to provide user the best possible presentation under the constraints of various terminals and network connections. Content adaptation has two major aspects: one is modality conversion that converts content from one modality (e.g. video) to different modalities (e.g. image) the other is content scaling that changes the titrates (or qualities) of the contents without converting their modalities. At the output of adaptation process, the highly-subjective qualities of adapted contents nay vary widely with respect to point-of-views of different providers and different users. So, user should have some control on the adaptation process. In this paper, we describe two description tools of user characteristics, the presentation priority preference and the modality conversion preference, which allow user to have flexible choices on the qualities and modalities of output contents. We also present a systematic approach to integrate these user preferences into the adaptation process. These description tools are developed in the process of MPEG-21 standardization.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

The Blockchain Delivery System for Secure Privacy with QR Code and Smart Glasses (QR코드 및 스마트 글라스 활용 개인 정보 보호 블록체인 택배 시스템)

  • Choi, Seung-Joo;Sim, Min-Joo;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.630-637
    • /
    • 2020
  • The importance of protecting personal information is getting attention more than ever. However, the package delivery system has yet to keep up with the privacy movement. The waybill attached to the package contains personal information about the recipient in text form, which is exposed to anyone with visible eyesight. In order to remedy the problem, this paper proposes that the contents of the waybill should be replaced by QR code instead of plain text which can be read and accessed through the human eye. In addition, in order to prevent indiscriminate access to the contents of the QR code, the access is only permitted using smart glasses registered in the delivery blockchain network system. Lastly, to prevent leaking the contents of the QR code from the person who has access to the registered smart glasses, an inside job, the access record is recorded on the blockchain.

A Novel Branch Method for Designing Educational Contents (교육용 컨텐츠 설계를 위한 새로운 분기방법)

  • 오용선
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.1-8
    • /
    • 2002
  • In this paper, we propose a novel branch method which improve learning effects of the digital contents using a user-friendly access method by taking any conceptual object as the unit of interface. The conceptual objects may exist as a part of one or more contents pages, and we can access them to repeat, replay or return to the original branch point, that elevates the interactions of the digital contents. This method is useful for all kinds of digital contents, but it is especially effective to make educational contents in the field of science, engineering, and language courses because they contain various conceptual elements such as blocks of modeling, mathematical equations, and memorizing units. In addition, if we realize the blanch method proposed in this paper with the conventional page-branch or title-branch methods in the same contents, user interaction will be maximized and learning effects of the contents maybe beautifully improved.

  • PDF

Design and Implementation of a HTMLtoVoiceXML Converter (HTMLtoVoiceXML 변환기의 설계 및 구현)

  • Choi, Hoon-il;Jang, Young-Gun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.559-569
    • /
    • 2001
  • It is possible to access web contents by mobile terminals and telephones due to the evolution of voice and VoiceXML technologies. Nevertheless, because these days most of all the web contents are constructed by HTML, it is impossible to access them by using the new technology. Therefore, to access the contents through voices requires the conversion of the web document from HTML to VoiceXML, but its manual conversion process should be involved additional time and expenditure. In this paper, we design and implement HTMLtoVoiceXML converter, suggest a system structure of it and propose a practical identification algorithm of meaningful fragmented group of contents to solve the problem. To test the performance and validity of the converter, we apply it to more than 400 web pages in Korean web sites, it works well except for web pages which involve invalid HTML codes.

  • PDF

A Study on Contents Sharing using Domain in Digital Home (디지털 홈에서 도메인을 이용한 콘텐츠 공유에 대한 연구)

  • Lee, Jung-Soo;Kim, Jeong-Hyun;Park, Ji-Hyun;Yoon, Ki-Song;Suh, Young-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.745-748
    • /
    • 2009
  • DRM(Digital Rights Management) and CAS(Conditional Access System) have been used for preventing the illegal use of contents. These schemes had caused inconvenience to even legal users about contents, however, as restricting movement and playing. As going increment of requirement about the flexible usage of the content in digital home recently, we propose a new method that can easily share and use the DRM applied contents using domain concept. As setting the domain license in the extent of license that the existing DRM has been provided, the proposed system can cut off the illegal use and distribution of the content.

  • PDF

Method to Support Handover for Service Continuity based on IMS in Wireless LAN (무선랜 환경에서 서비스 연속성 지원을 위한 IMS 기반 핸드오버 지원 방안)

  • Kim, Kam-Yong;Kim, Hwa-Suk;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.79-87
    • /
    • 2010
  • This paper proposes a L3 handover method to minimize packet loss for supporting service continuity to IMS Terminal which has a single WLAN interface. The existing IMS based handover solution is able to support handover between different access networks in case that a terminal has multiple interfaces. That is, WLAN terminals need multiple interfaces to connect with one or more access networks. This proposed method configures IP address for the terminal in target WLAN previously by using Candidate Access Router Discovery(CARD) mechanism. Also, in the proposed method, service continuity server performs L3 connection establishment in target WLAN and registration to IMS server instead of the terminal. And then session control mechanism based on SIP is performed to support service continuity. We analyzed handover latency and signaling cost in the proposed method and existing method to show the improved performance by the proposed method.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF