• 제목/요약/키워드: nam-hae

검색결과 1,756건 처리시간 0.047초

JXTA Based P2P Services for Mobile Devices

  • Park, Hae-Woo;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Lee, Jun-Hyuk;Kang, Byung-Wook
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.195-198
    • /
    • 2008
  • The JXTA was made in order to solve the problem of being generated with the computer platform suggested with the P2P(Peer-to-peer) method in the distributed computing. JXTA makes a communication between the various network and the devices is connected to a network which possible. It was designed to the client having the minimum computing ability could attend in the peer-to-peer network. However, for smoothly applying JXTA in the wireless environment, there is a limit with the limited resource of the Mobile Device. By using the Relay of the JXTA based for the Mobile Device, this paper implemented the P2P service which is flexibly effective in the wireless network environment.

  • PDF

A Study of Applying Extreme Programming Method in Mobile Game Development Environment

  • Seo, Yeung-Su;Jung, Hun;Park, Hae-Woo;Yu, Chun-Gun;Lee, Jun-Hyuk;Kang, Byung-Wook
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.59-62
    • /
    • 2008
  • When performing a project, the most important thing is building a result with planned quality within development period. Particularly, if the project is delayed or has no good quality in the case of the mobile game development project which is sensitive to the release time and quality, it is immediately connected to the failure of the project. Extreme Programming is a methodology that divides the development cycle into smaller units for reducing the risk factor of the project in which the development period is important. In this paper, we suggest the Expanded Extreme Programming for mobile game development environment in which the development period and quality are important

  • PDF

발해의 침구학에 관한 연구 (A Study on BalHae's acupuncture and moxibustion)

  • 이정록;오준호;서지연;김태은;홍세영;윤성익;차웅석;김남일
    • Korean Journal of Acupuncture
    • /
    • 제24권1호
    • /
    • pp.1-12
    • /
    • 2007
  • Objectives : Balhae was a Kingdom forming the Period of Southern and Northern Kingdoms with shilla. Because there have been paid little attention to the medicine of Balhae in the medical history field, we have little information on the medicine of Balhae thoroughly in detail. The aim of this study was to explorer on the acupuncture and moxibustion in Balhae as a part of the study on the medicine of Balhae. Methods : Because the historical remains of BalHae is not sufficient, it is hard to find out the part directly related to medicine However, the study established the category of acupuncture and moxibustion based on two rational frames from both diachronic and synchronic respects. Results : BalHae succeeded to the unique tradition and manufactured excellent needles which is harmless to human body. And BalHae's acupuncture was the highest level in those days by succeeding to the tradition from Gogugryeo. There might have been the Bi-Bo idea that we can treat country's disease with the Bo-sa (補瀉) theory of acupuncture in BalHae. Conclusions : We could know that there has been many medical scriptures of our own in BalHae, We could find out that BalHae succeeded to the legitimacy of our native medicine from Gojosun to Goguryeo and that they had the highest Acupuncture and Moxibustion in those days.

  • PDF

Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

  • Lee, Jun-Hyuk;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Park, Hae-Woo
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.93-97
    • /
    • 2008
  • In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio(PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise(AWGN)

  • PDF