• Title/Summary/Keyword: digital environments

Search Result 1,185, Processing Time 0.035 seconds

Smart Home Environment for the Protection of Multimedia Digital Contents (멀티미디어 콘텐츠 보호를 위한 스마트 홈 환경)

  • Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Ho-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.189-196
    • /
    • 2011
  • As internet is getting advanced day by day, digital contents have been developed in various areas as killer content in the IT industry. It needs to develop lots of complicated digital content protect systems due to the enhancement and variety of user's multimedia devices. Although there are lots of protect systems based on DRM(Digital Rights Management) technology, it is difficult to provide secure protection because of the problems resulting from analog hole problem, inefficiency of key sharing and various independent protect technologies. Thus, in this paper, we propose a novel authentication and protect system based on RFID(Radio Frequency Identification) technology to solve the problems and show possibility of free content duplication and efficient contents management in smart home environments.

Patterns of Information Seeking Behaviour of Law Students in Digital Environment: A Study

  • Das, Rajesh Kumar;Jadab, Anwesha
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.1
    • /
    • pp.15-25
    • /
    • 2017
  • Nowadays the enormous growth of modern information communication technologies and its massive use have influenced information users all over the world. Such a digital environment has drastically changed the information seeking patterns of information users of every community. These also tend law students to use various legal information sources and services in digital environments while seeking information. But there have been few empirical user studies on the aspect of digital information seeking behaviours of law students in either law or library and information science literatures. This paper aims to draw out patterns of information seeking behavior of students of law in digital environments at the University of Dhaka. A stratified random sample survey was conducted for this study. The results show that students prefer the electronic format of information rather than printed format. Major e-resources used by them and the influential factors of use were also identified in this study. This study also identified some crucial problems for seeking information and provides suggestions for the development of electronic legal information systems.

Generating 3D Digital Twins of Real Indoor Spaces based on Real-World Point Cloud Data

  • Wonseop Shin;Jaeseok Yoo;Bumsoo Kim;Yonghoon Jung;Muhammad Sajjad;Youngsup Park;Sanghyun Seo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2381-2398
    • /
    • 2024
  • The construction of virtual indoor spaces is crucial for the development of metaverses, virtual production, and other 3D content domains. Traditional methods for creating these spaces are often cost-prohibitive and labor-intensive. To address these challenges, we present a pipeline for generating digital twins of real indoor environments from RGB-D camera-scanned data. Our pipeline synergizes space structure estimation, 3D object detection, and the inpainting of missing areas, utilizing deep learning technologies to automate the creation process. Specifically, we apply deep learning models for object recognition and area inpainting, significantly enhancing the accuracy and efficiency of virtual space construction. Our approach minimizes manual labor and reduces costs, paving the way for the creation of metaverse spaces that closely mimic real-world environments. Experimental results demonstrate the effectiveness of our deep learning applications in overcoming traditional obstacles in digital twin creation, offering high-fidelity digital replicas of indoor spaces. This advancement opens for immersive and realistic virtual content creation, showcasing the potential of deep learning in the field of virtual space construction.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Global Recovery Management Protocol for Heterogeneous System in Security Environments (보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

The Comparative Error Performance of Digital Communication System in Gaussian/Non Gaussian Nolse and Fading Environments (가우스성/비가우스성 잡음과 페이딩 환경하에서의 제반 디지틀 통신방식의 오율특성)

  • 김현철;조성준
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1987.04a
    • /
    • pp.223-229
    • /
    • 1987
  • The error rate eqations of digital modulated signals transmitted through the fading cdannel have been derived in the Gaussian/Impulsive noise environments Whing the derived equations for the error drobadillties of ASK, QAM, FSK, MSK, PSK, and DPSK signais, the error tate performance of digital modulation systems have been evaluated and represented in the graghes as parameters of carrier to \ulcornernoise power ratio (CNR) and fading figures The results show that in the fading environenet the error is occurred more frequently by gaussian noise in the deep fading Howerer in the shallow fading lmpulsive noise is more domiant than gaussian nosie in occurring the error

  • PDF

Using Grounded Theory Techniques for Reviewing Literature: Shadow Work in Digital Environment (문헌 고찰을 위한 근거이론방법의 활용: 디지털 환경에서의 그림자 노동 개념 도출)

  • Park, Sangcheol;Lee, Woong-Kyu
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.183-195
    • /
    • 2019
  • The objective of this paper is to present how to use Grounded Theory Methodology for conducting a literature review that produces new insights and conceptualizations. In this paper, we have employed Wolfswinkel et al.(2013)'s method, which is called by Grounded Theory Literature-Review Method, for a rigorous literature review. We have utilized this method to capture the concept and insights of individuals' shadow wok in digital environments. By analyzing the relevant literature based on Wolfswinkel et al.'s guide, we have extracted 73 codes in the coding steps and finally showed 12 categories by incorporating similar concepts from those codes. Based on the categories, we end this paper by developing the academic definitions of shadow work in digital environments.

A Study on Self Repairing for Fast Fault Recovery in Digital System by Mimicking Cell

  • Kim, Soke-Hwan;Hur, Chang-Wu
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.615-618
    • /
    • 2011
  • Living cells generate the cell cycle or apoptosis, depending on the course will be repeated. If an error occurs during this period of life in order to maintain the cells in the peripheral cells find the error portion. These cellular functions were applied to the system to simulate the circuit. Circuit implementation of the present study was constructed the redundant structure in order to found the error quickly. Self-repairing of digital systems as an advanced form of fault-tolerance has been increasingly receiving attention according as digital systems have been more and more complex and speed-up especially for urgent systems or those working on extreme environments such as deep sea and outer space. Simulating the process of cell differentiation algorithm was confirmed by the FPGA on the counter circuit. If an error occurs on the circuit where the error was quickly locate and repair. In this paper, we propose a novel self-repair architecture for fast and robust fault-recovery that can easily apply to real, complex digital systems. These Self-Repairing Algorithms make it possible for the application digital systems to be alive even though in very noisy and extreme environments.

The Design of Web-Linked Digital Map for LBS/GIS Service (LBS/GIS 서비스를 위한 웹 연동 수치지도 설계)

  • Park Sung-Seok;Kim Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1023-1031
    • /
    • 2005
  • LBS(Location Based Service) and GIS (Geographic Information System) are supporting necessary services for system which provides geographic information using location information based on various platforms. However the mobile computing environments such as PDA system have serious limitations in functional viewpoints compare of general computing environments, it has problems for developing GIS system which is providing various information. In this paper, we suggest the reduced methods of digital map and format of web-linked digital mao in order to fit in mobile environment. As a result of map generation, the total capacity of the supported digital map was diminished about $99.34\%$ than the original map.

  • PDF