• Title/Summary/Keyword: networking services

Search Result 685, Processing Time 0.028 seconds

U-Learning of 21 Century University Education Paradigm (21세기 대학교육 패러다임의 U-Learning)

  • Park, Chun-Myoug
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • This paper presents a model of e-learning based on ubiquitous computing configuration. First of all, we survey the advanced e-learning systems for foreign and domestic universities. Next we propose the optimal e-learning model based on ubiquitous computing configuration. The proposed e-learning model as following. we propose the e-learning system's hardware and software configurations, that are server and networking systems. Also, we construct the proposed e-learning systems's services. There are attendance and absence service, class management service, common knowledge service, score processing service, facilities management service, personal management service, personal authorization issue management service, campus guide service, lecture-hall management service. Then we propose the laboratory equipment management service, experimental materials management service etc. The proposed model of e-learning based on ubiquitous computing configuration will be able to contribute to the next generation university educational paradigm.

  • PDF

What Affects the Value of Information Privacy on SNS?

  • Jung, Woo-Jin;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.289-305
    • /
    • 2015
  • The dramatic growth of social networking sites (SNS) has created a myriad of privacy concerns. Our study focuses on how much monetary incentive SNS users are willing to accept in exchange for disclosing their SNS information by accepting friend requests. First, we focused on information privacy in SNS, and estimated the value of information privacy by using the contingent valuation method. Second, we attempted to estimate how SNS users' willingness to accept would change when demographic information and additional information vary. Privacy-sensitive SNS users have the following characteristics: higher education, less SNS experience, and higher security consciousness. On the contrary, those who make good use of SNS and use open-based SNS are less sensitive to privacy. In summary, privacy-sensitive SNS users are fearful or uneasy when they have insufficient control of SNS information. Considering 14 conditions on the value of information privacy on SNS, the mean value of SNS information per person is 173,957 won. If we apply this value to Facebook users, the total Facebook information value would be 1.91 trillion won, considering that there are 11 million users in Korea.

Development of Hospice Model Networked with the Existing Welfare Systems in Gimhae City (김해지역 호스피스 보건복지연계 모형개발에 관한 연구)

  • Cho, Hyun
    • Journal of Hospice and Palliative Care
    • /
    • v.5 no.2
    • /
    • pp.101-110
    • /
    • 2002
  • Purpose : With the elongation of the average life span, the main causes of death are chronicle illness including cancers resulting in a large amount of medical resources. And there are still many patients to whom a sufficient medical care is not given. All these bring on the uneven distribution of medical resources together with the increase of medical cost. Hence, an efficient system should be set up to solve these problems. Methods : The hospice draws a great attention as a resolution of high medical cost and uneven medical resource distribution, and has been proved to be an alternative to the existing medical system. So, the characteristics of the hospice has been reviewed, particularly with respect to its scopes and related resources. And by tracking the actual cases, the necessary services and supports are investigated. Results : The intrinsic characteristics of hospice is that it executes not only the medical exercise but also all the subjects related with patients and their families. And the hospice is performed not only by the medical experts but also by all the disciplines including social and spiritual affairs. This indicates that the hospice requires the integrated system comprised of medical, social and other welfare entities. Conclusion : To establish the actual hospice, an efficient and systematic integration of all the existing medical and other welfare resources in the local society is necessary. The most practical way is the networking of resources, which practices the hospice more efficiently without additional investment.

  • PDF

Numerical Analysis of Caching Performance in Content Centric Networks Using Markov Chain (마코프체인을 이용한 콘텐츠 중심 네트워크의 캐싱 성능 분석)

  • Yang, Won Seok
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.224-230
    • /
    • 2016
  • Recently, CCN(Content Centric Network) has been extensively interested in the literature to transfer data traffic efficiently according to the rapid growth of multimedia services on the Internet. CCN is a new networking paradigm to deliver contents efficiently based on the named content not the named or addressed host. This paper presents a mathematical approach for analyzing CCN-caching systems with two routers. Considering the stochastic characteristics of communication networks, the caching system is modeled as a two dimensional Markov chain. This paper analyzes the structural feature of the transition rate matrix in the Markov chain and presents a numerical solution for the CCN-caching performance of the two router system. In addition, various numerical examples are presented.

Pattern-based Design and Safety Analysis for Networked Supervisory Medical Systems (네트워크 통합형 의료기기를 위한 안전한 상호작용 패턴과 구조적 안전성 검사)

  • Kang, Woochul
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.561-566
    • /
    • 2014
  • There are growing demands for improving the patient safety and the effectiveness of medical services through device connectivity and interoperability. However, integration through networking might greatly increase the complexity of the system if it is not properly designed, jeopardizing patient safety. In this paper, we codify safe medical device interaction patterns, and exploit them for the low complexity design and safety analysis of networked supervisory medical systems. We implement the proposed approach as a plug-in of Architecture Analysis and Description Language (AADL). Our implementation enables the modeling and safety analysis of medical devices and their interactions before actual development.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Implementation of Home-Network Sewer using UPnP based on the Embedded Linux (Embedded Linux 기반의 UPnP를 사용한 홈-네트워크 서버 구현)

  • 정진규;진선일;이희정;황인영;홍석교
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.9
    • /
    • pp.638-643
    • /
    • 2004
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this paper is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

Efficient Content-based Load Distribution for Web Server Clusters (웹 서버 클러스터를 위한 효율적인 내용 기반의 부하 분배)

  • Chung Ji Yung;Kim Sungsoo
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.60-67
    • /
    • 2005
  • A cluster consists of a collection of interconnected stand-alone computers working together and provides a high-availability solution in application area such as web services or information systems. Content-based load distribution for web server clusters uses the detailed data found in the application layer to intelligently route user requests among web servers. In this paper, we propose a content-based load distribution algorithm that considers cache hit and load information of the web servers under the web server clusters. In addition, we expand this algorithm in order to manage user requests for dynamic file. Specially, our algorithm does not keep track of any frequency of access information or try to model the contents of the caches of the web servers.

A Study on the Revitalization of High Performance Computing in Korea

  • Choi, Younkeun;Lee, Hyungjin;Jeong, Hyonam;Cho, Jaehyuk
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2016
  • Crucial aspects to successfully realizing the re-emergence of a contemporary and sustainable supercomputing community in South Korea will involve the devoted efforts and support from key government and R&D organizations. We suggest various supplementation plans regarding the roles of support for the statutory plan. This includes the committee and the plans which are often missing necessary support systems that help competent ministries to plan properly according to the missions of the research center. This dissertation suggests that adjustment in the HPC trends will depend upon exposing and correcting problems in the law as well as overall improvement of the law. Also, the total development of a super computing market is necessary. The results of these guidelines will create a spread of demand for supercomputing for national IT resource sharing, and will foster the development of supercomputer specialists worldwide. Other major end results include significant increases in research productivity and increased rates of product development.

Competitive intelligence in Korean Ramen Market using Text Mining and Sentiment Analysis

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.155-166
    • /
    • 2018
  • These days, online media, such as blogospheres, online communities, and social networking sites, provides the uncountable user-generated content (UGC) to discover market intelligence and business insight with. The business has been interested in consumers, and constantly requires the approach to identify consumers' opinions and competitive advantage in the competing market. Analyzing consumers' opinion about oneself and rivals can help decision makers to gain in-depth and fine-grained understanding on the human and social behavioral dynamics underlying the competition. In order to accomplish the comparison study for rival products and companies, we attempted to do competitive analysis using text mining with online UGC for two popular and competing ramens, a market leader and a market follower, in the Korean instant noodle market. Furthermore, to overcome the lack of the Korean sentiment lexicon, we developed the domain specific sentiment dictionary of Korean texts. We gathered 19,386 pieces of blogs and forum messages, developed the Korean sentiment dictionary, and defined the taxonomy for categorization. In the context of our study, we employed sentiment analysis to present consumers' opinion and statistical analysis to demonstrate the differences between the competitors. Our results show that the sentiment portrayed by the text mining clearly differentiate the two rival noodles and convincingly confirm that one is a market leader and the other is a follower. In this regard, we expect this comparison can help business decision makers to understand rich in-depth competitive intelligence hidden in the social media.