• Title/Summary/Keyword: information and communication work

Search Result 1,791, Processing Time 0.035 seconds

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A study on the Effect of Big Data Quality on Corporate Management Performance (빅데이터 품질이 기업의 경영성과에 미치는 영향에 관한 연구)

  • Lee, Choong-Hyong;Kim, YoungJun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.245-256
    • /
    • 2021
  • The Fourth Industrial Revolution brought the quantitative value of data across the industry and entered the era of 'Big Data'. This is due to both the rapid development of information & communication technology and the diversity & complexity of customer purchasing tendencies. An enterprise's core competence in the Big Data Era is to analyze and utilize the data to make strategic decisions for enterprise. However, most of traditional studies on Big Data have focused on technical issues and future potential values. In addition, these studies lacked interest in managing the quality and utilization levels of internal & external customer Big Data held by the entity. To overcome these shortages, this study attempted to derive influential factors by recognizing the quality management information systems and quality management of the internal & external Big Data. First of all, we conducted a survey of 204 executives & employees to determine whether Big Data quality management, Big Data utilization, and level management have a significant impact on corporate work efficiency & corporate management performance. For the study for this purpose, hypotheses were established, and their verifications were carried out. As a result of these studies, we found that the reasons that significantly affect corporate management performance are support from the management class, individual innovation, changes in the management environment, Big Data quality utilization metrics, and Big Data governance system.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Real-Time Implementation of MPEG-1 Layer III Audio Decoder Using TMS320C6201 (TMS320C6201을 이용한 MPEG-1 Layer III 오디오 디코더의 실시간 구현)

  • 권홍석;김시호;배건성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8B
    • /
    • pp.1460-1468
    • /
    • 2000
  • The goal of this research is the real-time implementation of MPEG-1 Layer III audio decoder using the fixed-point digital signal processor of TMS320C6201 The main job for this work is twofold: one is to convert floating-point operation in the decoder into fixed-point operation while maintaining the high resolution, and the other is to optimize the program to make it run in real-time with memory size as small as possible. We, especially, devote much time to the descaling module in the decoder for conversion of floating-point operation into fixed-point operation with high accuracy. The inverse modified cosine transform(IMDCT) and synthesis polyphase filter bank modules are optimized in order to reduce the amount of computation and memory size. After the optimization process, in this paper, the implemented decoder uses about 26% of maximum computation capacity of TMS320C6201. The program memory, data ROM, data RAM used in the decoder are about 6.77kwords, 3.13 kwords and 9.94 kwords, respectively. Comparing the PCM output of fixed-point computation with that of floating-point computation, we achieve the signal-to-noise ratio of more than 60 dB. A real-time operation is demonstrated on the PC using the sound I/O and host communication functions in the EVM board.

  • PDF

Identification of Voice for Listeners who Feel Favor Using Voice Analysis (음성 분석을 이용한 청자가 호감을 느끼는 목소리에 대한 규명)

  • Choi, Ji Hyun;Cho, Dong Uk;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.122-131
    • /
    • 2016
  • In the smart societies, such as the current unlike in the past, the voice that listeners will feel favor is changing through the development of ICT technologies and infrastructure. In other words, in the past, loud, intensive and fast voice is a favorite but now a new social and cultural situation that is changing them with ICT technologies. Now, this becomes one of the important things that we clarify 'Is it a voice that feels a favor?'. For this, in this paper, we identified what voice that listeners feel favor by applying ICT technologies. Studies were carried out to proceed largely divided into two categories. Firstly, as the quantified data, we extracted the impact on favorable feeling of listeners which related with emotional speech by empirical analysis work. To do this, we performed the experiment for the public. Secondly, we identified what kind of voice which listeners feel a good impression. For this, we identified voice characteristics that there are people who are influential in the real society. Also, we extracted both the voice characteristics of each influential people and common voice characteristics. In addition, we want to overcome the problems of qualitative methods that have originally limitations in objective respects which is significant to the voice analysis. For this, we performed the experiments of the voice analysis by numerical and visual approaches.

Multi-Interface Multi-Channel R-HWMP Routing Protocol for End-to-End Bandwidth Reservation in IEEE 802.11s WMNs (IEEE 802.11s 무선 메쉬 네트워크에서 종단간 대역폭 예약을 위한 멀티 인터페이스 멀티 채널 R-HWMP 라우팅 프로토콜)

  • Jung, Whoi Jin;Kim, Bong Gyu;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.37-48
    • /
    • 2014
  • Wireless mesh networks have emerged as a key technology in environment that needs wireless multi-hop communication without infrastructure and IEEE 802.11s mesh network standard have currently been established. One of big differences between this standard and the legacy IEEE 802.11 is that MCCA MAC is included to support QoS. MCCA supports bandwidth reservations between neighbors, so it can satisfy the QoS of bandwidth guarantee. However, MCCA has dis-advantages as follow; 1) it can not guarantee end-to-end bandwidth, 2) in multi-interface multi-channel wireless environments, the IEEE 802.11s does not provide a bandwidth reservation protocol and a wireless channel assignment etc. In this paper, we have proposed MIMC R-HWMP, which expands R-HWMP that was proposed in our previous work[3], to support multi-interface multi-channel. By simulation, we showed end-to-end bandwidth guarantee and the increase in the available bandwidth in multi-interface multi-channel wireless mesh networks.

Construction and Validation of a Data Synchronization Server supporting OMA DS Standards (OMA DS 표준을 지원하는 자료동기화 서버 구축 및 적합성 검증)

  • Pak, Ju-Geon;Park, Kee-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.5
    • /
    • pp.79-91
    • /
    • 2011
  • In this paper, a DS (Data Synchronization) server for mobile communication environments is constructed and the suitability and the performance of its operations are validated. The DS server provides a way to update the newest data and keep data consistency for clients (mobile devices). In addition, the DS server constructed in this paper supports various synchronization types, and detects all changes and conflicts. In case of data conflicts, the DS server resolves the conflicts according to the several policies implemented in this work. The DS server conforms to the OMA(Open Mobile Alliance) DS standard protocol for interoperability with other mobile devices and servers. In addition to the transmission-by record scheme proposed by the OMA DS standard protocol, the DS server constructed in this paper also provides the transmission-by field scheme for the enhancement transmission performance between the server and clients. In order to validate its operations, data synchronization between the DS server and the SCTS (SyncML Conformance Test Suit), the suitability validation tool provided by the OMA, is performed. The validation results show that the DS server constructed in this paper satisfies all of the test cases except the Large Object function. The Large Object function will be implemented later because the function is not needed for the personal information synchronization process which this paper aims for. Also, synchronization times of the DS server are measured while increasing the number of data and clients. The results of the performance evaluations demonstrate that the DS server is scalable, in the sense that it has not suffered from any serious bottlenecks with respect to the number of data and clients. We expect that this work will provide a framework for various studies in the future for improving mobile DS operations.

When carrying out a government-supported consulting project A Study on the Effect of Collaborative Characteristics among Consultants on the Consulting Performance (정부지원 컨설팅사업 수행시 컨설턴트간 협업특성이 컨설팅 성과에 미치는 영향에 관한 연구)

  • Kim, Hoon;You, Yen-yoo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.327-335
    • /
    • 2019
  • This study recognized the mutual collaborative characteristics among consultants as important factors in the performance of the government-supported consulting business, and wanted to look at the impact of the cooperative characteristics among consultants on the consulting performance. First, a research model was presented based on theoretical background, hypotheses were set up and surveyed, and hypotheses were verified by multi-circulation analysis. Among the collaboration characteristics among consultants, the most influential was mutual reliable followed by smooth communication, professional competence and role sharing. information sharing was rejected and was found to be relatively less affected than other variables. This can be seen as more important than the quantitative aspect of information sharing because of the collaborative nature of consultants who must work toward common goals. Collaboration among consultants has been positive when carrying out government-funded consulting projects, suggesting that quantitative characteristics should be considered based on the qualitative characteristics based on mutual reliable. In the future, we hope that this data will be useful for identifying collaborative characteristics among consultants when carrying out consulting projects.

Voronoi-Based Search Scheme for Road Network Databases (도로 망 데이터베이스를 위한 보로노이 기반의 탐색 방안)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.348-357
    • /
    • 2007
  • Due to the improved performance and cost of personal mobile devices and rapid progress of wireless communication technology, the number of users who utilize these devices is increasing. This trend requires various types of services be available to users. So far, there have been many solutions provided for the shortest path problem. But, technologies which can offer various recommendation services to user depending on user’s current location are focused on Euclidean spaces rather than road network. Thus, in this paper, we extend the previous work to satisfy this requirement on road network database. Our proposed scheme requires pre-computation for the efficient query processing. In the preprocessing step, we first partition the input road network into a fixed number of Voronoi polygons and then pre-compute routing information for each polygon. In the meantime, we select the number of Voronoi polygons in proposition to the scale of road network. Through this selection, the required size of pre-computation is linearly increasing to the size of road network. Using this pre-computated information, we can process queries more quickly. Through experiments, we have shown that our proposed scheme can achieve excellent performance in terms of scheduling time and the number of visited nodes.

  • PDF

An Analysis of the Web Services of Government Publication by the National Archives of Korea (국가기록원의 정부간행물 웹 서비스의 한계와 개선 방안)

  • Park, Yun-Mi
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.139-191
    • /
    • 2014
  • Government publications, as the important media of communication between the public and the government, have served as informational sources to provide a variety of information. Although technological development led into sharp changes in the types and services of government publications, the Korean service of government publications has yet to respond to the changes properly. The web service of government publications is provided only in the archives-based way with no consideration of the characteristics of the government publications, so that it is considerably difficult to use the service. Therefore, based on literature research, request of information disclosure, website survey, and interviews, this work overhauled the web service of government publications provided by the National Archives of Korea, and suggested an improvement plan of the service. This study is meaningful in the point that it suggested an improvement plan for the web service of government publications, which have been managed as a sort of archives but have been placed in the blind spot of service, through interviews with the persons in charge of government publications in relevant public organizations and the National Archives of Korea.