• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.036 seconds

Wireless Webcam Implementation and Application Utilizing Wireless USB Technology (무선 USB 기술을 활용한 무선웹캠 구현 및 적용방법)

  • Chae, Jung-Sik;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.569-575
    • /
    • 2014
  • These days as smart TVs or android set top boxes have come into wide use, VoIP(Voice over Internet Protocol) services such as the Skype which can beused on computer system, can be also accessed by smart TVs or set top boxes. and the various kinds of distance learning programs have been developed on smart TVs or set top boxes. but when users have utilized a webcam with smart TVs or set top boxes, users have to go in front of smart TVs or set top boxes In this research paper, the new technology can be solved the problem of webcam use according to chaned environment. This tech is related with the wireless webcam one which can be applicable to open spaces such as living room with some distance between user and smart TV. There are few problems in long distance the test results show high reliability in living room with some distance.

A Study on the High Performance TCP over Various Communication Links (다양한 통신 링크에서 고성능 TCP에 관한 연구)

  • Kim, Sang-Mi;Choe, Seon-Wan;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.197-212
    • /
    • 2002
  • Transmission Control Protocol (TCP) [1] has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG[2], by using Network Simulator 2 (NS-2).

A New Certificate Validation Scheme for Delegating the Digital Signature Verification (디지틀 서명 검증을 위임하기 위한 새로운 인증서 검증 기법)

  • Choi Yeon-Hee;Park Mi-Og;Jun Moon-Seog
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.53-64
    • /
    • 2003
  • To perform the certificate validation on the user-side application induces the very considerable overhead on the user-side system because of the complex and time-consuming characteristic of the validation processing. Most of the time spend for performing the validation processing is required for the digital signature verification, since the verification accompanies with the cryptographic calculation over each certificate on the certificate path. In this paper, we propose a new certificate validation scheme using DSVP(Delegated Signature Validation Protocol) which can reduce the overhead for the user-side certificate validation processing. It is achieved by delegating the digital signature verification to CAs of the PKI domain. As the proposed DSVP is the protocol performed between a user and CAs, it is applied to the hierarchical PKI efficiently and used for delegating the digital signature verification reliably and safely, our proposed scheme can not only reduces the overhead for the validation processing by decreasing the cryptographic calculation but also improves the utilization of CAs by employing them to the validation processing.

  • PDF

A Method of Automated Quality Evaluation for Voice-Based Consultation (음성 기반 상담의 품질 평가를 위한 자동화 기법)

  • Lee, Keonsoo;Kim, Jung-Yeon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.69-75
    • /
    • 2021
  • In a contact-free society, online services are becoming more important than classic offline services. At the same time, the role of a contact center, which executes customer relation management (CRM), is increasingly essential. For supporting the CRM tasks and their effectiveness, techniques of process automation need to be applied. Quality assurance (QA) is one of the time and resource consuming, and typical processes that are suitable for automation. In this paper, a method of automatic quality evaluation for voice based consultations is proposed. Firstly, the speech in consultations is transformed into a text by speech recognition. Then quantitative evaluation based on the QA metrics, including checking the elements in opening and closing mention, the existence of asking the mandatory information, the attitude of listening and speaking, is executed. 92.7% of the automated evaluations are the same to the result done by human experts. It was found that the non matching cases of the automated evaluations were mainly caused from the mistranslated Speech-to-Text (STT) result. With the confidence of STT result, this proposed method can be employed for enhancing the efficiency of QA process in contact centers.

Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification (공격 메일 식별을 위한 비정형 데이터를 사용한 유전자 알고리즘 기반의 특징선택 알고리즘)

  • Hong, Sung-Sam;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Since big-data text mining extracts many features and data, clustering and classification can result in high computational complexity and low reliability of the analysis results. In particular, a term document matrix obtained through text mining represents term-document features, but produces a sparse matrix. We designed an advanced genetic algorithm (GA) to extract features in text mining for detection model. Term frequency inverse document frequency (TF-IDF) is used to reflect the document-term relationships in feature extraction. Through a repetitive process, a predetermined number of features are selected. And, we used the sparsity score to improve the performance of detection model. If a spam mail data set has the high sparsity, detection model have low performance and is difficult to search the optimization detection model. In addition, we find a low sparsity model that have also high TF-IDF score by using s(F) where the numerator in fitness function. We also verified its performance by applying the proposed algorithm to text classification. As a result, we have found that our algorithm shows higher performance (speed and accuracy) in attack mail classification.

A Study on Development and Validation of Digital Literacy Measurement Tool (디지털 리터러시 측정도구의 개발 및 예측타당성 검증 연구)

  • Chung, Mi-hyun;Kim, Jaehyoun;Hwang, Ha-sung
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.51-63
    • /
    • 2021
  • Recently, virtual communication has become a standard tool due to the outbreak of COVID-19. Likewise online communication is emerging as an essential competency. In this study, we aimed to develop a comprehensive and systematic digital literacy measurement tool reflecting the changes and needs of society. Construct variables were drawn by characterizing existing digital literacy measurement tools. Thirty-four items corresponding to the concept of each variable were developed. The developed measurement tool was then evaluated in the form of surveys from university students belonging to the digital native generation, and the reliability and validity were performed through exploratory and confirmatory factor analysis. The digital literacy measurement tool contained five sub-factors and twenty-five questions. In addition, hierarchical regression analysis was performed to verify the predictive validity of digital literacy sub-factors. Based on these findings, the implication of future research is discussed.

Modeling of Switched Reluctance Motor (SRM) Drive and Control System using Rotor Position Information Sensor (회전자 위치정보 센서를 이용한 Switched Reluctance Motor (SRM)의 구동 및 제어 시스템 Modeling)

  • Jeong, Sungin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.137-142
    • /
    • 2021
  • In recent years, permanent magnets such as IPM (Interior Permanent Magnet) motors or SPM (Surface Permanent Magnet) motors that can obtain high efficiency and power density by inserting rare earth permanent magnets into the rotor are used. Research on the used electric motor is being actively conducted. Since it uses a permanent magnet, it has the advantage of high efficiency and high power density compared to reluctance motors and induction motors, but by inserting a permanent magnet into the rotor, it operates at high speeds and decreases reliability due to demagnetization of the permanent magnets, and increases the cost of rare earth metals. In this paper, in accordance with the development of future technology that can replace rare-earth permanent magnet motors and technological preoccupation of rare-earth reduction type motors and de-rare-earth motors, switched reluctance motors that do not require permanent magnets (Switched Reluvtance Motors) Motor, SRM) to drive driving control. Using the 3-phase SRM library provided by the PSIM simulation program, we will study the driving and control system modeling of SRM using the rotor position information sensor.

Implementation of Intelligent Remote Control System based on Internet of Things (사물인터넷을 활용한 지능형원격제어시스템 구현)

  • Kim, Dong Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.546-552
    • /
    • 2020
  • The remote control system, in which the remote control server and the actuator are connected and operated through a wireless network, has a great potential risk as well as its convenience. The control commands can be lost because of unreliable wireless channels. The intelligent remote control system is a system that adds a function to infer a control command to the actuator to operate even if the control command is not received. In this paper, we implemented an intelligent remote control system testbed and confirmed the problems that could occur in the remote control system through experiments and verified that the intelligent remote control system solves the problem. The intelligent remote control system can achieve the performance that can be achieved when general remote control system has high communication overhead with less communication overhead.

The Case Study for Childcare Service Demand Forecasting Using Bigdata Reference Analysis Model (빅데이터 표준분석모델을 활용한 초등돌봄 수요예측 사례연구)

  • Yun, Chung-Sik;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.87-96
    • /
    • 2022
  • This paper is an empirical analysis as a reference model that can predict up to the maximum number of elementary school student care needs in local governments across the country. This study analyzed and predicted the characteristics of the region based on machine learning to predict the demand for elementary care in a new apartment complex. For this purpose, a total of 292 variables were used, including data related to apartment structure, such as number of parking spaces per household, and building-to-land ratio, environmental data around apartments such as distance to elementary schools, and population data of administrative districts. The use of various variables is of great significance, and it is meaningful in complex analysis. It is also an empirical case study that increased the reliability of the model through comparison with the actual value of the basic local government.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.