• Title/Summary/Keyword: 두 버전

Search Result 164, Processing Time 0.023 seconds

The Service Features Influencing the Acceptance of Telecommunication-Broadcasting Bundling in Convergence Environment (컨버전스 환경 하에서 통신.방송 결합상품 수용의도에영향을 미치는 서비스 특성 연구)

  • Sim, Jin-Bo
    • Journal of Technology Innovation
    • /
    • v.18 no.2
    • /
    • pp.59-89
    • /
    • 2010
  • One of the key words that represent the culture and social phenomena in this 21st century is 'Digital Convergence'. Presently our society is going through the second evolving phase of the convergence, integration between industries. Integration between industries refers to the phenomenon of integrating various industrial areas such as broadcasting, communication, finance, automobile, and medical treatment as the range of IT utilization becomes extended. The telecommunication-broadcasting bundling is a typical example of integration between industries. This study analyzed the effect of the service features of the bundling on the customer's acceptance intention by applying the innovative technology product acceptance model, TAM, in the process of accepting the telecommunication-broadcasting bundling. This study suggests three independent variables, the 'low cost(discount)', 'service integrity', and 'selectability', which affect perceived usefulness, perceived ease of use, and perceived risk, and figures out the actual influence as follows. In conclusion, these results suggest that in order to accept and spread the telecommunication-broadcasting bundling, it is necessary to establish (1) the cost discounting strategy realize (price strategy), (2) the fee noticing system, payment system, call-service system, and systemic integration including installation and A/S system integration, and develop (service strategy), (3) the bundling or related options that can provide users with selectability (product strategy).

  • PDF

A change Management Model for BPM Documents in e-Business Environments (e-Business를 위한 BPM 문서 변경관리 모델)

  • 배혜림;조재균;정석찬;박기남
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.87-105
    • /
    • 2003
  • Business Process Management (BPM) is an emerging trend of managing business process life cycles and integrating heterogeneous systems . Recently, BPM is considered as an essential element for automation of complex business processes involving many companies, particularly for those in an e-Business environment. In such an environment, it is very important for each business partner to trace history of resources. However, it has been a difficult problem for Workflow Management Systems(WFMSs) to support management of resource changes because of limited storage, complex process structure, and absence of formal change model. In this paper. a new framework is proposed, which can support change management for documents, one of core resources of business process. Under a traditional WFMSs framework, all workflow components belong to either build-time or run-time function, and executions of workflow processes are performed by the two functions . To manage changes of documents while process executing. a new framework with additional component modules are required. A version control method is introduced for the purpose of managing document changes. The proposed method includes five models for document structure, process structure, association between process and document, version management, and efficient version storage. A prototype system is developed to demonstrate the effectiveness of the proposed models.

  • PDF

Improving the Performance of Document Clustering with Distributional Similarities (분포유사도를 이용한 문헌클러스터링의 성능향상에 대한 연구)

  • Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.4
    • /
    • pp.267-283
    • /
    • 2007
  • In this study, measures of distributional similarity such as KL-divergence are applied to cluster documents instead of traditional cosine measure, which is the most prevalent vector similarity measure for document clustering. Three variations of KL-divergence are investigated; Jansen-Shannon divergence, symmetric skew divergence, and minimum skew divergence. In order to verify the contribution of distributional similarities to document clustering, two experiments are designed and carried out on three test collections. In the first experiment the clustering performances of the three divergence measures are compared to that of cosine measure. The result showed that minimum skew divergence outperformed the other divergence measures as well as cosine measure. In the second experiment second-order distributional similarities are calculated with Pearson correlation coefficient from the first-order similarity matrixes. From the result of the second experiment, secondorder distributional similarities were found to improve the overall performance of document clustering. These results suggest that minimum skew divergence must be selected as document vector similarity measure when considering both time and accuracy, and second-order similarity is a good choice for considering clustering accuracy only.

The Method of Extended Extreme Programming for Content Software Development Environment (콘텐츠 소프트웨어 개발 환경을 위해 확장된 익스트림 프로그래밍 방법)

  • Seo, Yeung-Su;Jung, Hun;Kang, Byung-Wook
    • Journal of the Korea society of information convergence
    • /
    • v.1 no.1
    • /
    • pp.33-40
    • /
    • 2008
  • When performing a software development project, the most important thing is building a result with planned quality within development period. Particularly, if the project is delayed or has no good quality in the case of the content software development project which is sensitive to the release time and quality, it is immediately connected to the failure of the whole project. Extreme programming is a methodology that divides the development cycle into smaller units for reducing the risk factor of the project in which the development period is important. In this paper, we suggest the expanded extreme programming which can consider the development period and quality at the same time for content software development environment. The suggested methods are documentation mechanism that is upcoming during the development project and multiple role model which is extended from pair programming method.

  • PDF

Development of Android Startup Program and Power Synchronous Algorithm for IPTV Set-Top Box (안드로이드 시작프로그램과 IPTV-셋톱박스의 전원 동기화 알고리즘 개발에 관한 연구)

  • Kim, Bong-Hyun;Cho, Joon-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.1-6
    • /
    • 2019
  • In this paper, we have developed an app that can control IPTV - Miracast and the Internet with Android 7.0 on the embedded board. The app can be controlled by the remote control of IPTV and can receive TV when using IPTV. And Miracast and Embedded board are put into the power saving mode. When one mode is selected in this way, the other two modes enter the power saving mode and the power saving control technology is applied to reduce energy consumption. The board used in this paper was Android version 7.1.2 version of Raspberry pie 3B / B + and Asus Tinker board s, and Android Studio program was used to make the app and a synchronization control program was also developed to operate with IPTV remote control. The operation of the Android start program using the power saving power control technology and the remote control synchronization control program developed in this way is confirmed to be normal operation as a result of applying to the actual IPTV.

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

Analysis of Effects of Hidden Nodes and CCA Deferment Algorithm on IEEE 802.15.4 Performance Using ns-2 Simulator (ns-2 시뮬레이터를 이용한 은닉 노드와 CCA 지연 알고리즘이 IEEE 802.15.4 네트워크의 성능에 미치는 영향 분석)

  • Lee, Kang-Woo;Hyun, Gyu-Wan;Shin, Youn-Soon;Ahn, Jong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.393-406
    • /
    • 2009
  • This paper introduces two functions added to the current version of ns-2 simulator for better accuracy of IEEE 802.15.4 network simulations. The first one is to automatically place hidden nodes over the ring topology in which the coordinator is centered, when the number of hidden nodes and total number of nodes is given. Collisions of signals can be distinguished into the trace file according to the ways of participation of hidden nodes. The second one is the CCA deferment algorithm described in IEEE 802.15.4-2006 standard which is not implemented in the current version of ns-2. Owing to these additional functions, we can carry out the precise analysis of the performance effects of hidden nodes and CCA deferment algorithm on 802.15.4 networks. Simulation results present at least 66% of performance degradation in throughput and drastic increase of collision probability up to 90% from 65% by just a single hidden node. Besides, 2006 standard for CCA deferment algorithm gives 19% lower collision probability and 38% higher performance.

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

Hardware Implementation of Rasterizer with SIMD Architecture Applicable to Mobile 3D Graphics System (모바일 3차원 그래픽스 시스템에 적용 가능한 SIMD 구조를 갖는 래스터라이저의 하드웨어 구현)

  • Ha, Chang-Soo;Sung, Kwang-Ju;Choi, Byeong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.313-315
    • /
    • 2010
  • In this paper, we describe research results of developing hardware rasterizer that is applicable to mobile 3D graphics system, designed in SIMD architecture and verified in FPGA. Tile-based scan conversion unit is designed like SIMD architecture running four tiles simultaneously and each tile traverses pixels hierarchical in 3-level so that visiting counts is minimized. As experimental results, $8{\times}8$ is the most efficient size of tile and the last step of tile traversing is performed on $2{\times}2$ sized subtile. The rasterizer supports flat shading and gouraud shading and texture mapper supports affine mapping and perspective corrected mapping. Also, texture mapper supports point sampling mode and bilinear interpolating sampling mode and two types of wrapping modes and various blending modes. The rasterzer operates as 120Mhz on xilinx vertex4 $l{\times}100$ device. To easy verification, texture memory and frame buffer are generated as block rom and block ram.

  • PDF