• Title/Summary/Keyword: networking services

Search Result 685, Processing Time 0.023 seconds

Regional Strategic Industry (RSI) Promotion Projects and Their Impact on Regional Economic Growth: Focused on Chungbuk Province Cases (지역전략산업육성사업과 지역경제성장 파급효과: 충북 사례를 중심으로)

  • Choi, Nam-Hee;Jo, Byung-Seol;Ahn, Yoo-Jeong;Lee, Man-Hyung
    • Korean System Dynamics Review
    • /
    • v.14 no.1
    • /
    • pp.5-29
    • /
    • 2013
  • This study tries to measure the direct and indirect effects of the Regional Strategic Industry (RSI) promotion projects in Chungbuk Province in Korea. In specific, it critically examines whether there exists policy consistency and connectivity between the hardware-oriented Stage I (2002~2007) and the software-centered Stage II (2008~2012) RSI promotion projects. Applying System Dynamics (SD) techniques, this study examines complex system characteristics of RSI promotion projects, all of which have been derived from the causal and stock-flow models and their simulated results. Major findings are as follows: Firstly, 'the continuous investment' is regarded as the most crucial policy leverage for the strategic industry promotion and regional economic growth. Secondly, without exceptions, the RSI promotion projects should switch their evaluation criteria to performance-oriented ones. Thirdly, in selecting their subprojects, the RSI promotion projects should pay due attention to evaluating technology value and marketability. Fourthly, it should put policy priority in strengthening cluster networking and interconnectivity among projects, inevitably supporting a selective number of virtuous network systems. Fifthly, auxiliary projects such as marketing, technology aid, and knowledge-based services should not be overlooked.

  • PDF

Analysis of Resilience Factors in Multi-Cultural Families Using Depth Interviews (심층면접을 통한 다문화가족의 레질리언스에 관한 연구)

  • Chang, Jin-Kyung;Jun, Jong-Mi;Shin, Yoo-Kyung
    • Journal of the Korean Home Economics Association
    • /
    • v.47 no.6
    • /
    • pp.21-38
    • /
    • 2009
  • This study examined the resilience factors of multi-cultural families using depth interviews. Thirty-one multi-cultural families(totaling 98 individuals) were interviewed on a range of issues, including the process of marriage, the attitude of international marriage, family relations, social networks, the process of social adaptation, and their needs for specific social services. The resilience theory was used to categorize resilience factors, multi-cultural families. Analysis of results from depth interviews identified three broad resilience factors. The first was related to for belief systems which included 'family's common goal', The second was related to family functioning systems which included 'family cohesion', 'family adaptability', and 'satisfaction for role-expectation'. The third was related to social networking which included 'satisfaction from social activities'. These resilience factors helped multi-cultural families cope with stressful events and risk situations related to every day life. Results from this study imply that multi-cultural families possess the abilities to lead a meaningful and healthy life-style regardless of obstacles such as communication difficulties, cultural differences, and societal stigma.

A Method for User Sentiment Classification using Instagram Hashtags (인스타그램 해시태그를 이용한 사용자 감정 분류 방법)

  • Nam, Minji;Lee, EunJi;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1391-1399
    • /
    • 2015
  • In recent times, studies sentiment analysis are being actively conducted by implementing natural language processing technologies for analyzing subjective data such as opinions and attitudes of users expressed on the Web, blogs, and social networking services (SNSs). Conventionally, to classify the sentiments in texts, most studies determine positive/negative/neutral sentiments by assigning polarity values for sentiment vocabulary using sentiment lexicons. However, in this study, sentiments are classified based on Thayer's model, which is psychologically defined, unlike the polarity classification used in opinion mining. In this paper, as a method for classifying the sentiments, sentiment categories are proposed by extracting sentiment keywords for major sentiments by using hashtags, which are essential elements of Instagram. By applying sentiment categories to user posts, sentiments can be determined through the similarity measurement between the sentiment adjective candidates and the sentiment keywords. The test results of the proposed method show that the average accuracy rate for all the sentiment categories was 90.7%, which indicates good performance. If a sentiment classification system with a large capacity is prepared using the proposed method, then it is expected that sentiment analysis in various fields will be possible, such as for determining social phenomena through SNS.

Adaptive Load Balancing Algorithms for Overlay Multimedia Network (오버레이 네트워크에서 멀티미디어 서비스를 위한 적응적인 부하균형 기법)

  • Kim, Sung-Wook;Kim, Sung-Chun
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.239-245
    • /
    • 2007
  • New multimedia services over the cellular/WLAN overlay networks require different Quality of Service (QoS). In the cellular/WLAN overlay structure, the main issue of load balancing is to balance the available bandwidth among different networks. In this paper, we propose a new online network management scheme. Our proposed scheme is designed to improve bandwidth utilization by balancing the traffic load between the cellular network and WLANs. Simulation results indicate the superior performance of our proposed framework to strike the appropriate performance balance between contradictory QoS requirements under widely varying diverse traffic loads.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

An Adjustable Round Robin Scheduling Algorithm for the High Data Rate Mobile Communication System (고속 이동 통신을 위한 적응 가능한 라운드 로빈 스케줄링 방식)

  • Bae, Jeong-Min;Song, Young-Keum;Kim, Dong-Woo
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.27-32
    • /
    • 2007
  • Next-generation wireless networks are expected to support a wide range of services, including high-rate data applications, Various service types request differentiated QoSs(Qualities of Service) such as minimum data rate, accuracy, fairness and so on. Although resources of radio systems are limited, for many applications, it is important that certain QoS targets are required to be met. In this paper, we propose a QoS based scheduling algorithm for next generation systems, based on analyzing previous researches, and we develop the proposed QoS algorithm only for MIMO(multi-Input Multi-Output) systems. Moreover, we subsequently prove that the proposed algorithm optimize throughput relative to prespecified target values and converge to certain throughput.

The Needs and Behaviors of the Elderly in Existing and Future Restaurants (현재와 미래 외식공간에 대한 노인의 이용행태와 요구에 관한 연구)

  • Min, Byoung-A;Kwon, Hyun-Joo;Lee, Soo-Jin;Lee, Yeun-Sook
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2007.05a
    • /
    • pp.181-187
    • /
    • 2007
  • The world is changing drastically by digital information technology and ubiquitous networking. Meanwhile, with the demographic avalanche, South Korea officially became an 'ultra-aging society' in 2026. Simultaneously, this demographic change will also stimulate a cultural climate which facilitates the formation and dissemination of 'slow culture' from the existent urban 'fast culture' which has been weakening the retirement living. One of the fundamental connections with the slow movement appears in the cooking and dining area. With this point of view, this study aims to identify the needs and behaviors of the elderly in current restaurants and a digitally planned multi-purpose one for the future. Small group workshop was employed for this study. In order to elicit detailed information from the elderly group members, scenarios were developed. A group facilitator kept the discussion on track by asking a series of open-ended questions meant to stimulate discussion. As the results, it was revealed that the elderly were interested in digitally planned restaurant which provides one-stop service including entertainment activities, health related contents and socializing with family. Even though this study took restaurant scenarios, the ideas in them also provide holistic perspectives on the direction of marketing and planning strategies on various future environments and services.

  • PDF

A Flow-based Detection Method for VoIP Anomaly Traffic (VoIP 이상 트래픽의 플로우 기반 탐지 방법)

  • Son, Hyeon-Gu;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.263-271
    • /
    • 2010
  • SIP/RTP-based VoIP services are being popular. Recently, however, VoIP anomaly traffic such as delay, interference and termination of call establishment, and degradation of voice quality has been reported. An attacker could intercept a packet, and obtain user and header information so as to generate an anomaly traffic, because most Korean VoIP applications do not use standard security protocols. In this paper, we propose three VoIP anomaly traffic generation methods for CANCEL;BYE DoS and RTP flooding, and a detection method through flow-based traffic measurement. From our experiments, we showed that 97% of anomaly traffic could be detected in real commercial VoIP networks in Korea.