• Title/Summary/Keyword: internet-based system

Search Result 6,295, Processing Time 0.033 seconds

A Study on the Apparel Industry and the Clothing Culture of North Korea (북한(北韓)의 의류산업(衣類産業)과 의생활문화(衣生活文化) 연구(硏究))

  • Cho, Kyu-Hwa
    • Journal of Fashion Business
    • /
    • v.5 no.4
    • /
    • pp.158-175
    • /
    • 2001
  • The purpose of this study was to understand and improve the clothing habits and the apparel industry of North Korea in preparation for the reunification of South and North Korea. For this study, literary data, reports, periodicals, interviews and internet data of the two Koreas were reviewed. North Korean clothing habits used to be monotonous and uniform but nowadays people's clothes have become somewhat brighter in color and more diverse in design than before. In particular, liberal and individual dressing habits appeared among the privileged classes. When taking part in national events, women have to wear the traditional Korean costume, Hanbok, while men wear business suits for formal wear. In general, men don't wear Hanbok. Students have to be in uniforms but blue jeans, T-shirts with English logos were popular among them reflecting their sensitivity and openness towards western cultures. The brides usually wear pink Hanboks and the bridegrooms wear black business suits for their wedding. North Koreans also wear Hanbok on national holidays like South Koreans. Clothing is the most important item in the trade of process commission between North and South Korea. Trading items are mid to low end men's clothing for the most part due to less emphasis on fashion in the North. The processing is indirect trade and composed of sample making and contracting, sending out materials and production, carrying in goods and setting accounts. To activate South-North trade, establishment of infrastructure, stabilization of shipping, reducing high costs of distribution, building direct communication system by setting up office in a neutral zone and simplifying procedures in applying for the South and North Korea Economic Cooperation Fund. On the other hand, clothing and textiles education is carried on at art colleges, light industries colleges and commercial colleges in Pyongyang. Clothing institutes which study Hanbok and Western clothes, are installed in each city and province. Graduates who majored in clothing and textiles are posted in institutes or apparel factories. Their job is designing, patternmaking and sewing for their customers. Most of them are women and in good state of economic conditions. The North Korean clothing industry has been the core national industry that has developed based on overseas demand form the mid 1980s. The standard is that of South Korea in the early 1980s. In 1999, trade of North Korean textile products with trade counterparts such as Japan and China was $1.3 million in exports and $1.27 in imports. Of this amount the export takes up 25.4% of the total exports in North Korea. However, fundamentally even in sectors that are irrelevant to politics such as the fashion clothing industry, trust between the South and North should be a prerequisite. Only through this can exchange between North and South and economic cooperation contribute towards the reunification.

  • PDF

Study on Jinminso as an Indoor Relief Institution (구한말 민간 빈민구제시설 진민소[賑民所]에 관한 연구)

  • Yang, Okkyung
    • Korean Journal of Social Welfare
    • /
    • v.66 no.4
    • /
    • pp.257-280
    • /
    • 2014
  • This is a study of Jinminso. The purpose of the study is to search and analyze the documents about Jinminso. The data is composed with the first hand historical documents both government documents and civil newspapers which are searched by internet. Based on the documents found, it is safe to say that Jinminso has existed and functioned as an indoor almshouse for the poor. It was established in June 25, 1898 by civil people with donated money in order to reduce the burden of Emperor and to share the love and care for their people with a brotherhood mind. The Jinminso resident were the poor, the sick, the orphans, widows, elderly living alone, and the disabled. They received food, clothes, and shelter. However, Emperor Gojong ordered to shut down Jinminso, and it was closed in Sept. 25, in 1898. The main reason was inappropriate collection of money for the agency operation from the merchants. When Jinminso was closed, all the inmates became homeless. The founders asked to reopen it, and it was accepted but this time was opened as a government agency in 1899. Jinminso imposes great meanings. One, Jinminso was not just an office but a direct service agency housing hundreds of poor people; two, poverty was understood as social problem not just a local district problem; three, rules and regulations were prepared to set up a system of modern age social welfare. The findings provide a clue how the government and society perceived poverty and the poor during the time of late 1800s to early 1900s. The existence of Jinminso will pose many new question.

  • PDF

A construction method for IP-based Fixed and Personalized A/V Mosaic EPG service (IP 기반 고정형 및 맞춤형 동영상 모자익 EPG 서비스 구축방법)

  • Song, Chee-Yang;Choi, Lark-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.39-52
    • /
    • 2006
  • As accelerates the technical evolution of high-speed network and progresses the digitalization of broadcasting network, TV channel service through satellite/cable/terrestrial networks becomes more stable and mature. However, TV channel service using IP network such as IPTV is recently emerging. Especially, when it comes to current mosaic EPG(Electronic Program Guide) as a channel guide, the implementation of EPG via IP network is under developing. Furthermore, the personal target mosaic EPG is not provided at all in the IPTV. This paper proposes a construction method of mosaic system which can support fixed and personalized mosaic EPG using IP network for viewers. The fixed mosaic EPG is made several steps as follows ; First, H/E generates several mosaic A/V streams. Then, which are transmitted to the STB in terms of multicasting via IP network. Finally, mosaic EPG is displayed on TV through STB. In addition, this paper describes a construction model of the personalized A/V mosaic EPG that represents each person's favorite channels according to their tastes and interests. As for the contributions. The TV channel guide using IP network enable viewer to select channel more easily with practical adaptation of multi-channel expansibility and sufficient usability. In addition, through personal mosaic EPG, a number of viewers can compose their own mosaic EPG and enjoy a variety of channel easily in accordance with their preferences. Finally, the personal mosaic EPG can prohibit non-adult users from connecting adult-only contents more efficiently.

  • PDF

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Analysis of visible light communication system using 15 watt LED and 40 watt solar panel (소형 창고형 공장 적용을 고려한 15와트 LED 조명과 40와트 태양광 패널을 활용한 가시광통신 송수신 시스템 분석)

  • Woo, Deok Gun;Mariappan, Vinayagam;Park, Jong Yong;Lee, Jong Hyeok;Kim, Young Min;Cha, Jae Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.608-614
    • /
    • 2018
  • In addition to the diffusion of ICT technology, various protocols of short range wireless communication technology are being applied for efficient information operation. However, due to limitations of short-range wireless communication, communication is not smooth in places where frequency environment is poor, such as frequency confusion and warehouse type factory. When an alternative is needed. The development of LED technology and expansion of infrastructure through LED based visible light communication is attracting attention as an alternative and spreading the usage in wide range now a days. In addition, the infrastructure has been expanded with solar panels in response to the development of smarthome built-in with renewable energy. In this situation, visible light communication using PD has been limitedly applied in a near environment where the receiving angle of the PD and the ambient light ensure the LoS and the influence of the ambient light is small. In order to solve this problem, we have implemented visible light communication using LED lighting with large current infrastructure and solar panel with large receiving area, and proposed a circuit for restoring accurate data even in ambient light. Through this study results, it is expected that visible light communication can be more widely used and this result used as the base data for visible light communication research using the solar panel as the receiver.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

The Stocks Profit Rate Analysis which Uses Individual.Engine.foreigner.Knowledge Base HTS at The Bear Period.The Bear Wave Period.The Bull Period.The Bull Wave Period (하락기.하락조정기.상승기.상승조정기에 개인.기관.외국인.Knowledge Base HTS를 이용한 주식 수익률 분석)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.207-217
    • /
    • 2010
  • It is taken a violent fall of the international stocks market that was an American Subprime Mortgage Situation. The loss rate of individual investor judged than foreigner and institution by bigger thing. Therefore, further scientific and mechanical investment is needed at the stock investment using Internet HTS. This dissertation is stocks profit rate analysis which uses individual engine foreigner Knowledge Base HTS at the Bear Period the Bear Wave Period the Bull Period the Bull Wave Period. Knowledge Based e-friend HTS was Installed. HTS does composite stock exchange index in actuality stock trading and engine's fund earning rate, yield that is abroad comparative analysis using trend line that is HTS tool, MACD, Bollinger Bands, Stochastic slow's function. Usually, each subjects suppose that deal 5 stocks, and comparative study of the profit(loss)rate of the down to earth falling rate and rising rate, by comparing the earning rate of 5 Small capital stocks with 5 medium capital stocks and 5 Large capital stocks during the bear period, the bear wave period, the bull period, the bull wave period has meaning at the making research of the financial IT field.

Project Management for the Productivity Improvement of Small and Medium-sized Enterprises (SMEs): Industrial Machinery and Equipment Manufacturing Enterprises (중소기업 생산성 향상을 위한 기계설비 제작 프로젝트 관리: 산업기계설비 제조기업을 중심으로)

  • Song, Youngmin;Jeong, Jongpil;Park, Byungjun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • In this paper, it was found that most of the machinery facilities problems generated by clients could be prevented in advance by systematically managing the mechanical equipment production process of small and medium enterprises (SMEs) that produce machinery facilities. Major point of this process is to establish an operating system that corresponds to reality of facility manufacturers as it represents 63% of machinery facilities problems that occur in customers and is a task that needs to be solved most intensively. Technical issues account for 23% of machinery facilities problems occurring at the client's companies and should be approached from a long-term perspective as they are directly related to the technical capabilities of the manufacturers. Organizational problems account for 14% of machinery facilities problems occurring in customer companies, and can change depending on the relationship of members and the nature of the human being, such as morality and motivation. In addition, we propose the establishment of an Internet-based production process management platform for smooth and efficient transfer of information between customers and machinery facilities manufacturers.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.