• Title/Summary/Keyword: internet phone

Search Result 998, Processing Time 0.036 seconds

An Algorithm for Managing Storage Space to Maximize the CPU Availability in VOD Systems (VOD 시스템에서 CPU 가용성을 최대화하는 저장공간관리 알고리즘)

  • Jung, Ji-Chan;Go, Jae-Doo;Song, Min-Seok;Sim, Jeong-Seop
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.3
    • /
    • pp.140-148
    • /
    • 2009
  • Recent advances in communication and multimedia technologies make it possible to provide video-on-demand(VOD) services and people can access video servers over the Internet at any time using their electronic devices, such as PDA, mobile phone and digital TV. Each device has different processing capabilities, energy budgets, display sizes and network connectivities. To support such diverse devices, multiple versions of videos are needed to meet users' requests. In general cases, VOD servers cannot store all the versions of videos due to the storage limitation. When a device requests a stored version, the server can send the appropriate version immediately, but when the requested version is not stored, the server first converts some stored version to the requested version, and then sends it to the client. We call this conversion process transcoding. If transcoding occurs frequently in a VOD server, the CPU resource of the server becomes insufficient to response to clients. Thus, to admit as many requests as possible, we need to maximize the CPU availability. In this paper, we propose a new algorithm to select versions from those stored on disk using a branch and bound technique to maximize the CPU availability. We also explore the impact of these storage management policies on streaming to heterogeneous users.

Power Relationship of Gaze in the Modern Society through the Super-panopticon as Multi-networks Supervision (다망감시로써의 슈퍼 파놉티콘을 통한 현대사회의 시선의 권력관계)

  • Koo, Yoon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.102-109
    • /
    • 2009
  • What Michel Foucault has interpreted about Jeremy Bentham' Panopticon in the point of power relationship of ones's gaze is put in comparison with the characteristics shown in the modern media and mutual meanings are interpreted in the respect of a power relationship of modern gaze. Modern people communicating through media are placed in certain type of power relationship. This study analyzed the difference of it in the respect of the power of gaze in Panopticon and the consumption of information. Panopticon assumes single-network supervision, that is, one-way gaze. However, in modern media, interactive communication is possible based upon the development of information telecommunication technology. Therefore, this study aims to compare and study modern single-network supervision and multi-networks supervision based on information telecommunication technology. The development of various media such as internet, mobile phone and smart card has changed the single-network supervision system structured since modern times into the multi-network supervision system. 'Gaze-power' presented in the relationship to media enables us to discuss the problem of mutual receptiveness, the presence of various powers according to information structure and consumption power. In particular, the form provided by modern media has the complexity of mutual communication in the relationship of multi-networks, rather not assuming only one-way nature of single-network. Therefore, the approach of communication issue provided by modern media in the respect of multi-networks relationship was done by the power relationship of gaze in the respect of information communication. Gaze determines the power of watching. In addition, the visualization format aims at the power.

Real-Time Implementation of the G.729.1 Using ARM926EJ-S Processor Core (ARM926EJ-S 프로세서 코어를 이용한 G.729.1의 실시간 구현)

  • So, Woon-Seob;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.575-582
    • /
    • 2008
  • In this paper we described the process and the results of real-time implementation of G.729.1 wideband speech codec which is standardized in SG15 of ITU-T. To apply the codec on ARM926EJ-S(R) processor core. we transformed some parts of the codec C program including basic operations and arithmetic functions into assembly language to operate the codec in real-time. G.729.1 is the standard wideband speech codec of ITU-T having variable bit rates of $8{\sim}32kbps$ and inputs quantized 16 bits PCM signal per sample at the rate of 8kHz or 16kHz sampling. This codec is interoperable with the G.729 and G.729A and the bandwidth extended wideband($50{\sim}7,000Hz$) version of existing narrowband($300{\sim}3,400Hz$) codec to enhance voice quality. The implemented G.729.1 wideband speech codec has the complexity of 31.2 MCPS for encoder and 22.8 MCPS for decoder and the execution time of the codec takes 11.5ms total on the target with 6.75ms and 4.76ms respectively. Also this codec was tested bit by bit exactly against all set of test vectors provided by ITU-T and passed all the test vectors. Besides the codec operated well on the Internet phone in real-time.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Design of Personalization Service System in Mobile GIS (모바일 GIS에서의 개인화 서비스 시스템 설계)

  • Park, Key-Ho;Jung, Jae-Gon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.106-112
    • /
    • 2008
  • Personalization is user oriented dynamic method based on user preferences for easy access to what users want to view or get. It has become more important in mobile domain with rapid growth of wireless Internet and mobile phone market after success of web based market and therefore, it can be applied to service of spatial analysis result. In this paper, spatial analysis using user profile and notification service methods are proposed as one of personalized spatial data service methods for mobile users. A service system for spatial analysis with user profile is designed to prove possibility of spatial analysis based on user preferences and notification service is also designedto show generated output can be sent to user's mobile devices efficiently to make users informed of preferred information. Prototype system is implemented and it is applied to real estate data that has many selectable conditions by users. Information service based on user preferences can be applied to spatial data by using proposed system and it is efficient when cache module is used to shorten response time. Various user models for application domains and performance evaluation methods need to be developed in the future.

  • PDF

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.

A Specific Characters of Products In viewpoint of Inter-combination with Human -Concentrated on Inter-Combined Products′Type and Feather- (인간과 인터컴비네이션 관점에서의 제품특성연구 -상호결합제품의 유형과 특징을 중심으로-)

  • 진선태;박영목
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.145-154
    • /
    • 2001
  • These days, the products like Walkman, mobile phone, notebook PC, PDA are moving together with our body, and in the imaginary world like internet, our other self, Avatar is moving in place of our body on the cyber world. These products are related with our human body, and when considering the ones, attached to the human body, and having the meaning of mental combination like these, as the combination of the human and the products, it is necessary to examine these products in approaching them with respect to the combination relation between the human and the products. As a result of examining we can understand that the products, said to combine with the human body, are coming oui steadily. and recently, the inclination on the combination and the movement appears strongly. As this background, there are a breakdown of dichotomy thought, mixed sexual imitation, cyber culture, techno culture. concept of informative nomands, phenomenon which the division of human and machine becomes vague. and the miniaturization of products. imitation of human, phenomenon that the Inclination on the combination with human is more accelerated by networking. These products combine with human body at each wearing type in the various forms. Its functions become multi-layered, and closer to the human body physically. or its communication becomes high·graded and, they have the recombined form through the existing products which the human has And, they communicate each other. have the strong fashionable property, and the characteristics like the imaginary product to imitate the human body and substitute for the human behave.

  • PDF

5An Empirical Study on effect between Mobile Device Property and Customer Satisfaction (이동전화단말기 속성이 고객만족에 미치는 영향에 관한 실증적 연구)

  • Choi, Seung-Il;Kim, Dong-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1856-1862
    • /
    • 2010
  • Last rapidly changing mobile handset market in many industries, as well as market conditions affect the prevalence of various content types of consumer spending in general is affecting. Changes in mobile handset market by separating the various consumer-tier analysis, or differentiated in consumers' purchasing behavior are being reflected in the property analysis and overview of customer satisfaction can be assessed by measuring. These mobile devices and the purchase of the devices to investigate the tendency to analyze and weigh the various content industries, you can see how important one can be considered. The development of mobile communication systems and wireless internet and multimedia applications can lead the industry accelerated. In this study, tried to investigate that the mobile communication systems in consideration of the special form of mobile handsets, and customer satisfaction of mobile phone handsets, and the relationship between customer loyalty. Outcome of this study, the mobile properties and the mobile handset brand, price, design and related details to be statistically significant variables were analyzed. In this study, the characteristics of future mobile handset market with a wide range of content-based guidelines for the development of the industry is expected to be able to provide.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

A Study on the Activation for the Mobile App Services of Local Government (지방자치단체의 모바일 앱 서비스 이용 활성화 방안에 관한 연구: 부산광역시를 중심으로)

  • Jung, Su Hee;Hong, Soon Goo;Cha, Yoon Sook;Kim, Jong Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.2
    • /
    • pp.71-83
    • /
    • 2013
  • Because of rapid advance of wireless Internet-related technology and fast diffusion of Smart phone, a variety of mobile applications through domestic and foreign app stores have been made and used. Under the recognition of current trend, both central government and local government have developed and provided public mobile app in order to accomplish the mobile e-government. However, public mobile app is not popular in spite of vast investment for its development and service. This study investigated current issues and problems of public mobile app in public service, management, and technology aspects. To do so, this study categorized the interested people of public mobile app into users, providers, and developers, and conducted deep interviews to them. Based on the interview results, the study suggested the following recommendations for the activating tools of public mobile app: providing user-customized information, fruitfulness of public information management, maintenance of management system for public mobile app service, user-friendly promotion appropriate in mobile environment, public mobile app development based on e-government standard framework, etc.. This study may provide the researchers with the successive study guidelines in mobile e-government and public mobile app fields. Also, the study may help the practitioners to make effective decisions on polices and strategies for mobile e-government of local government.