• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.033 seconds

The Study of Countermove and Distorted Instances about Korean History in Japanese Game (일본 게임에 나타난 한국 역사의 왜곡사례와 대응방안 연구)

  • Ko Byeong-Hee
    • Journal of Game and Entertainment
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2006
  • The relations between the two countries, Korea and Japan, are growing worse because of the matter of distorting korean history, absurd remark for aggressive war, and claiming Dokdo by Japan. At the point of time, I research the distorted instances of Korean history in Japanese game. The distorted instances of Korean history in game are existed in any countries' game such as China and the West; however, Japanese game takes distorted instances too far. Teenagers in the interior of a country and people from other countries easily access the distorted game because of the development of Internet and promoted cultural exchange among nations so it is necessary that systematic countermeasure should be set.

  • PDF

Mashup Application for Geo-spatial Feature Generation on Web Browser using Google Maps API

  • Park, Yong-Jae;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.389-396
    • /
    • 2008
  • In these days, various kinds of web applications based on web 2.0 paradigm have been developed. In web 2.0 paradigm pursuing participation, sharing, and openness on the web-as-platform, web mapping or web GIS application are regarded as top most applications, so that web applications, handling geo-spatial contents, with user-interaction interface and search engine of high performance have been provided for both public users and expert users in the special domains. Public and industrial needs for web mapping mashup application by open API, linked with the practical web computing technologies, are gradually increasing. In this study, a user interface in mashup for geo-spatial feature generation was implemented by using mainly Google maps API. Spatial database resources in this implementation are those of Google mapping server. As the results, public users on web client can create their own geo-spatial data sets in web vector formats, without the help of any GIS tools or access to proprietary databases. It is concluded that web-based mashup application in client-side using open API can be used as an alternative for geo-browsing system or portable feature generation system.

Method for Remotely Accessing the Home Network in the Mobile Environment (이동환경에서 홈 네트워크와 원격으로 연결하는 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Lee, Youn-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.649-651
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) standard enables easy sharing of multimedia contents in the home network environment. However, with the proliferation of mobile computing devices such as smartphones and tablets, the need for media sharing to expand beyond the boundaries of the home network arose. In this paper, a method for accessing DLNA based home network from the mobile environment is proposed. The proposed method uses mobile Virtual Private Network (VPN), and enables easy access to the resources in the home network from the wireless mobile environment.

  • PDF

A Study on the Impact of Corporate Communication on Work Performance (기업 내 커뮤니케이션 형태가 업무성과에 미치는 영향에 관한 연구)

  • Lee, Ji-Hun;Baek, Chaehwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.3
    • /
    • pp.242-251
    • /
    • 2019
  • The purpose of this study was to identify the relationship between complexity, tacit knowledge, know-how, perception, and perception on business performance, and to suggest management implications for corporate performance and organizational executives. Therefore, the implications of this study are as follows. First, corporate representatives and staff in charge of organization should be able to access various information and contents through various routes about the work of members of the organization, and should make efforts to freely communicate among members. Second, corporate representatives and organizational practitioners should consider using the traditional methods of communication within their work, but allowing more informed and inmates to do more off-the-job activities that can increase intimacy with each other. Third, corporate representatives and organizational practitioners should provide a situation in which they can acquire work knowledge in a variety of ways, but must devise communication methods to increase information sharing and information value among members. Fourth, corporate representatives and organizational practitioners should endeavor to provide employees with educational support, family invitation events, awards and bonuses, and compliments that will make them more interested in their work. Lastly, corporate representatives and organizational practitioners are encouraged to maintain effective communication, employee pride, etc., so that the concentration of work, achievement, quality and productivity of work, and high professionalism can be maintained. You will have to work hard.

A Study of the History of Domestic Precious Metal and Gems Market from Liberation to 1960s (광복~1960년대 국내 귀금속보석 산업사 연구)

  • Hong, Ji Youn
    • Fashion & Textile Research Journal
    • /
    • v.23 no.4
    • /
    • pp.439-447
    • /
    • 2021
  • The purpose of this study is to examine the evolution of precious metal and gem stores, and to derive the characteristics of this period from the government, industry, and consumers. Correspondingly, the contents of daily newspaper articles during this period were analyzed using Naver's news library search engine. The historical development process is as follows. Before the Korean War, precious metal jewelers operated in Jongno, Namdaemun, and Chungmuro, dealing with gold, silver, and platinum. Large stores not only sold jewelry and watches, but also functioned as craftsmen and watch repairers. After the war, a shopping district for precious metals and jewelry was formed around Midopa Department Store. By 1963, the number of jewelry stores in Seoul increased to about 130 and to about 280 by 1966. The characteristics of the government, industry, and consumers are as follows. The government continued to implement a policy to regulate the precious metal and jewelry industry. Despite challenges, the industry exhibited the potential for foreign currency acquisition and growth through domestic amethyst. Consumers could access information regarding precious metal jewelry in daily newspapers. In the late 1960s, various types of jewelry were distributed in line with an increase in income levels.

A Study on implementing Android library for streaming multimedia contents to multiple devices in Wi-Fi Direct networks (Wi-Fi Direct 망에서 다수의 단말에게 동영상 스트리밍을 위한 안드로이드 라이브러리 개발)

  • Park, Chan-Je;Kim, Dong-Woo;Kim, Sung-Wook;Lee, Dong-Gun;Yoo, Hong-Suk;Goyal, Ankita;Kim, Dong-Kyun;Yang, Eun-Joo
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.253-256
    • /
    • 2013
  • Device-to-device (D2D) 통신 기술은 기지국 및 Access Point (AP)와 같은 인프라의 경유 없이 트래픽 교환이 단말기간에 직접적으로 이루어지도록 하는 기술이다. 오늘날 D2D 통신 기술은 셀룰러 망 과부하 문제의 해결책으로써 많은 관심을 받고 있다. 본 논문에서는 대표적인 D2D 통신 기술인 Wi-Fi Direct에 기반하여 형성된 네트워크에 존재하는 다수의 단말에게 동영상을 스트리밍하기 위한 안드로이드 라이브러리 개발 사례를 소개한다. 본 논문에서 소개하는 라이브러리는 의사 브로드캐스트(Pseudo-broadcast) 방식을 사용하여 다수의 단말에게 동영상을 스트리밍한다. 의사 브로드캐스트 방식은 빠른 전송 속도로 동영상을 스트리밍할 뿐만 아니라 한 번의 전송을 다수의 단말에게 동일한 데이터를 전송할 수 있는 장점이 있다.

E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions (DLP방식의 문제점 극복을 위한 E-DRM 방식의 개인정보 보호 기술)

  • Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1103-1113
    • /
    • 2012
  • DLP technology has been effectively enforcing privacy protection policy in on-line computing environment. However, with wide spread use of smart devices and promotion of smart-works, it has been pointed out that DLP technology cannot effectively prevent privacy leakage at smart devices and is comparatively weak at APT attack. In this paper, we suggests a hybrid approach, PPS, which integrates E-DRM system with DLP technology, taking advantages of both technologies. The technology basically uses encryption function and access control of E-DRM system, and thus it can effectively prevent leakage of privacy information of customers, even if the documents are in the hands of malicious third parties.

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.99-106
    • /
    • 2022
  • In this paper, we proposes digital content management technology in a cloud computing environment. proposes digital content management technology in a cloud computing environment. Computing services using networks are basic infrastructure services that cannot be missed in the era of the 4th Industrial Revolution. Financial services, digital content services, and industrial and home network services using smartphones are changing from services in the local area to a cloud service environment where the entire service is possible. Therefore, this study proposed a system to safely support digital content services suitable for cloud computing environments. The proposed system provides convenience and safety for users to access the system, protects the copyright of digital content authors, and provides a secure digital content distribution and management system. The purpose of this study is to stabilize and revitalize the digital content market by providing a digital content distribution structure suitable for the cloud computing environment.

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2772-2786
    • /
    • 2022
  • We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.