• Title/Summary/Keyword: internet use

Search Result 6,014, Processing Time 0.037 seconds

A Study on the Implementation of Historical and Cultural Information System based on Web GIS for Youngsan River Area (Web GIS 기반의 영산강유역권 역사문화정보시스템 구축 연구)

  • Jang, Mun-Hyun;Lee, Jeong-Rock
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.329-339
    • /
    • 2009
  • A historical and cultural map needs an overall reflection of the links based on time and space among the various composite factors, instead of requiring a simple collection of the respective relics in a particular region. The study of history, culture and living environment of river system area, a place that is known to as a cradle of civilization, will be able to undertake a role in the research and comparison with other cultural regions, reaching beyond the regional units until now and moreover investigation the international and intercontinental history of civilization. In this context, this research focuses on the establishment of a cultural information system for the public use and the insight to the regional identity and materialization of culture based on Korea's peculiar history and culture. Thus, the information system for Youngsan River area aims to create a form of electronic map that contains various cultural and historical information on river system area, which is a integrated information system based on Web GIS that is open to public use through the internet. The above mentioned system is a combined product from the basic research data on various fields of study, including archaeology, architecture, arts, ecological environment, history, folk customs, literature, and food, while it aims for not only its utilization in interdisciplinary studies but also creating new value as a public database. As a result, the expected effects due to the establishment of historical and cultural information system based on Web GIS of Youngsan River area are as follows: First, the study can contribute to verify a road map of the study on Youngsan River area. Second, it will take a role to stimulate the academical research on the dynamic structure and characteristics of the Youngsan River area. Third, we can also expect an effect of gaining a full foothold in providing an electronic academic source specialized for the study of the historical and cultural map.

  • PDF

A Study on Digital Divide from Socio-Technical Convergence: With Focus on Korean Women's Travel Activities (사회기술융합적 관점에서 살펴본 디지털기기 이용한계에 대한 연구: 한국 여성의 관광유형을 중심으로)

  • Lee, Seung-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.177-185
    • /
    • 2015
  • The gender difference in social roles affects digital devices' utilization differences in man and woman even in the 21st Century. Prior studies analyze the digital divide (genders, ages, etc.) from the assessment perspectives of digital equipment, such as PCs. In the area of high speed internet, most functions of PCs have been replaced with smartphones, and around 80% of the mobile phone users adopt smartphones. Subsequently the inequality of physical access to the digital devices is no longer a criterion for digital divide. The focus on digital divide should be shifted from the physical access to other factors, such as socio-technical or socio-cultural ones. This paper examines utilization of women's digital equipment, in particular, preparing for tourism activities, which is popular but sensitive to the technology. A survey was conducted with participants of [Suncheon Garden Expo] 2013. The results of this study capture the inactive use of digital devices particularly women over 50s. This phenomenon (high utilization of the digital devices for social or informative purposes, but low utilization of the digital payment) implies other aspects of Korean women (economic independence, low self-assertion, technical difficulties, etc.), which is considered from the socio-technological convergence perspective. This study also has a practical implication on the side of the digital device developers as well as marketing, where the qualitative communication is likely to be incorporated for the women over 50s.

GMPLS based Functional Models and Connection Admission Control Algorithms for Optical Burst Switched Networks (광 버스트 교환 망을 위한 GMPLS 기반 기능 모델과 연결 수락 제어 알고리즘)

  • So, Won-Ho;Roh, Sun-Sik;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9B
    • /
    • pp.778-790
    • /
    • 2004
  • In this paper, we propose the functional models of optical burst switching (OBS) routers to apply GMPLS (Generalized Multiprotocol Label Switching) to optical networks based on OBS. In addition, we introduce a connection admission control (CAC) algorithms which are operated in this models and can accommodate the required QoS. Firstly, the characteristics of current GMPLS and OBS for the optical Internet are basically considered. With this consideration, the models are proposed to accept OBS features which include the recognition of data bounda η with control information and the statistical multiplexing in terms of bursts. Secondly, we use an offset time decision (OTD) algorithm on behalf of controlling the connection admission with taking QoS parameters such as burst loss rate(BLR) and service-differentiation ratio(SDR) into consideration. The proposed CAC algorithms use the offered load of LSP (Label Switched Path), wavelength information, and QoS parame ‘ ers as inputs of OTD algorithm. A call setup request will be accepted when the offset time decided by OTD algorithm is reasonable for guaranteeing its requested QoS. Simulation is used for performance evaluation Results show the proposed schemes can guarantee the required QoS and those are better than the previous one in terms of channel utilization.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

Improvement of F-GCRA Algorithm for ATM-GFR Service (ATM-GFR 서비스를 위한 F-GCRA 알고리즘 개선)

  • Park, In-Yong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.889-896
    • /
    • 2006
  • ATM Forum has defined a guaranteed frame rate (GFR) service to serve Internet traffic efficiently. The GFR service provides virtual connections (VCs) for minimum cell rate (MCR) guarantees and allows them to fairly share the residual bandwidth. And ATM Forum has recommended a frame-based generic cell rate algorithm (F-GCRA) as a frame classifier, which determines whether an Am cell is eligible to use the guaranteed bandwidth in a frame level. An ATM switch accommodates cells in its buffer or drops them in a frame level according to current buffer occupancy. A FIFO shared buffer has so simple structure as to be feasibly implemented in switches, but has not been able to provide an MCR guarantee for each VC without buffer management based on per-VC accounting. In this paper, we enhance the F-GCRA frame classifier to guarantee an MCR of each VC without buffer management based on per-VC accounting. The enhanced frame classifier considers burstness of TCP traffic caused by congestion control algorithm so as to enable each VC to use its reserved bandwidth sufficiently. In addition, it is able to alleviate the unfairness problem in usage of the residual bandwidth. Simulation results show that the enhanced frame classifier satisfies quality of services (QoSs) of the GFR service for the TCP traffic.

A Study on Occurance Possibility of Suicide Bombing using Utilize Unmanned Aircraft in Korea (한국 내 무인항공기를 이용한 자폭테러 발생가능성에 대한 연구)

  • Oh, Seiyouen;Lee, Jaemin;Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.288-293
    • /
    • 2014
  • The purpose of this study was to provide response plans against acts of suicide bomb using utilize unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. As the result, First, this research suggests revising the definition and categorization of utilizing unmanned aircrafts and legislating the Anti-terrorism law. Second, it is needed to establish the proper social safety network through terrorism response management integrated system against the terror of related organization. Third, suicide bomb using utilizing unmanned aircrafts can be occurred because it is possible to make bomb and open web site for terrorism without connection with terrorist organization because of universal use of Internet. In response to this, it is needed to make a law which can block the use and open of illegal site and contents. Forth, the increasing number of foreigners and immigrants can make conflicts, and cause the foreigner's anti-korea feeling and the citizen's anti-cultural diffusion. Therefore, it is needed for the citizen to change and improve the awareness of them, and the change of social politics.

An AP Selection Scheme for Enhancement of Multimedia Streaming in Wireless Network Environments (무선 네트워크 환경에서 멀티미디어 서비스를 위한 AP 선정 기법)

  • Ryu, Dong-Woo;Wang, Wei-Bin;Kang, Kyung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.997-1005
    • /
    • 2010
  • Recently, there has been a growing interest in the use of WLAN technology due to its easy deployment, flexibility and so on. Examples of WLAN applications range from standard internet services such as Web access to real-time services with strict latency/throughput requirements such as multimedia video and voice over IP on wireless network environments. Fair and efficient distribution of the traffic loads among APs(Access Points) has become an important issue for improved utilization of WLAN. This paper focuses on an AP selection scheme for achieving better load balance, and hence increasing network resource utilization for each user on wireless network environments. This scheme makes use of active scan patterns and the network delay as main parameters of load measurement and AP selection. This scheme attempts to estimate the AP traffic loads by observing the up/down delay and utilize the results to maximize the link resource efficiency through load balancing. We compared the proposed scheme with the original SNR(Signal to Noise Ratio)-based scheme using the NS-2(Network Simulation.2). We found that the proposed scheme improves the throughput by 12.5% and lower the network up/down link delay by 36.84% and 60.42%, respectively. All in all, the new scheme can significantly increase overall network throughput and reduce up/down delay while providing excellent quality for voice and video services.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

Performance Improvement of Spam Filtering Using User Actions (사용자 행동을 이용한 쓰레기편지 여과의 성능 개선)

  • Kim Jae-Hoon;Kim Kang-Min
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.163-170
    • /
    • 2006
  • With rapidly developing Internet applications, an e-mail has been considered as one of the most popular methods for exchanging information. The e-mail, however, has a serious problem that users ran receive a lot of unwanted e-mails, what we called, spam mails, which cause big problems economically as well as socially. In order to block and filter out the spam mails, many researchers and companies have performed many sorts of research on spam filtering. In general, users of e-mail have different criteria on deciding if an e-mail is spam or not. Furthermore, in e-mail client systems, users do different actions according to a spam mail or not. In this paper, we propose a mail filtering system using such user actions. The proposed system consists of two steps: One is an action inference step to draw user actions from an e-mail and the other is a mail classification step to decide if the e-mail is spam or not. All the two steps use incremental learning, of which an algorithm is IB2 of TiMBL. To evaluate the proposed system, we collect 12,000 mails of 12 persons. The accuracy is $81{\sim}93%$ according to each person. The proposed system outperforms, at about 14% on the average, a system that does not use any information about user actions.

Application of Photo-realistic Modeling and Visualization Using Digital Image Data in 3D GIS (디지털 영상자료를 이용한 3D GIS의 사실적 모델링 및 가시화)

  • Jung, Sung-Heuk;Lee, Jae-Kee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.73-83
    • /
    • 2008
  • For spatial analysis and decision-making based on territorial and urban information, technologies on 3D GIS with digital image data and photo-realistic 3D image models to visualize 3D modeling are being rapidly developed. Currently, satellite images, aerial images and aerial LiDAR data are mostly used to build 3D models and textures from oblique aerial photographs or terrestrial photographs are used to create 3D image models. However, we are in need of quality 3D image models as current models cannot express topographic and features most elaborately and realistically. Thus, this study analyzed techniques to use aerial photographs, aerial LiDAR, terrestrial photographs and terrestrial LiDAR to create a 3D image model with artificial features and special topographic that emphasize spatial accuracy, delicate depiction and photo-realistic imaging. A 3D image model with spatial accuracy and photographic texture was built to be served via 3D image map services systems on the Internet. As it was necessary to consider intended use and display scale when building 3D image models, in this study, we applied the concept of LoD(Level of Detail) to define 3D image model of buildings in five levels and established the models by following the levels.