• Title/Summary/Keyword: 통신기술발전

Search Result 4,662, Processing Time 0.03 seconds

Hybrid Multicast/Broadcast Algorithm for Highly-Demanded Video Services with Low Complexity (Highly-Demanded 비디오 서비스를 위한 낮은 복잡도의 혼합 멀티캐스트/브로드캐스트 알고리즘)

  • Li, Can;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.101-110
    • /
    • 2011
  • With the deployment of broadband networking technology, many clients are enabled to receive various Video on Demand (VoD) services. To support many clients, the network should be designed by considering the following factors: viewer's waiting time, buffer requirement at each client, number of channel required for video delivery, and video segmentation complexity. Among the currently available VoD service approaches, the Polyharmonic and Staircase broadcasting approaches show best performance with respect to each viewer's waiting time and buffer requirement, respectively. However, these approaches have the problem of dividing a video into too many segments, which causes very many channels to be managed and used at a time. To overcome this problem, we propose Polyharmonic-Staircase-Staggered (PSS) broadcasting approach that uses the Polyharmonic and Staircase approaches for the head part transmission and the Staggered approach for the tail part transmission. It is simple and bandwidth efficient. The numerical results demonstrate that our approach shows viewer's waiting time is comparable to that in the Harmonic approach with a slight increase in the bandwidth requirement, and saves the buffer requirement by about 60\% compared to the Harmonic broadcasting approach by simply adjusting the video partitioning coefficient factor. More importantly, our approach shows the best performance in terms of the number of segments and the number of channels managed and used simultaneously, which is a critical factor in real operation of VoD services. Lastly, we present how to configure the system adaptively according to the video partitioning coefficient.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

On the Use of SysML Models in the Conceptual Design of Unmanned Aerial Vehicles (무인항공기체계의 개념설계에서 SysML 모델의 활용에 관한 연구)

  • Kim, Young-Min;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.206-216
    • /
    • 2012
  • Today's war fields can be characterized by net-centric wars where a variety of independent weapon systems are operated in connection with each other via networks. As such, weapon systems become dramatically advanced in terms of complexity, functionality, precision and so on. It is then obvious that the defense R&D of those requires systematic and efficient development tools enabling the effective management of the complexity, budget/cost, development time, and risk all together. One viable approach is known to be the development methods based on systems engineering, which is already proved to successful in U.S. In this paper, a systems engineering approach is studied to be used in the conceptual design of advanced weapon systems. The approach is utilizing some graphical models in the design phase. As a target system, an unmanned aerial vehicle system is considered and the standard SysML is also used as a modeling language to create models. The generated models have several known merits such as ease of understanding and communication. The interrelationships between the models and the design artifacts are identified, which should be useful in the generation of some design documents that are required in the defense R&D. The result reported here could be utilized in the further study that can eventually lead to a full-scale model-based systems engineering method.

A Desirable Corporate Culture under Smart Work Environment (스마트워크 환경 하에서의 바람직한 기업문화)

  • Lee, Joo-Hyoung;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.93-102
    • /
    • 2012
  • The purpose of this research is to create a preferable corporate culture under the SmartWork environment. There is growing interests in SmartWork, which can satisfy the compatible conditions of government's carbon emission restriction policy, corporate efficient expense reduction, productivity maximization, and each individual's work and a family. Due to the interests and the rapid development of IT technology, a realistic condition for SmartWork is established but the promotion without a sufficient preparation, such as legal examination and relevant systems, created much confusion and very few companies are introducing it. This paper discusses that a social agreement should be reached through adjustments among parties interested, such as government, companies, and employees, studies the WIN-WIN plan that individuals and organization can grow together, and proposes a new corporate culture under the SmartWork environment. SmartWork has more than the simple meaning of 'remote working'. SmartWork, a method of smart working, means a transition to a new paradigm that minimizes moving for work and work & human move together, and a change from a work-oriented culture to a human-oriented culture. This paper summarized the role of government and companies for the successful introduction of SmartWork, and proposed that a government level 'SmartWork Activation Executive Committee (tentative name)' with a strong promotional power would create a new culture of SmartWork and form a civilian consultative body to support SmartWork corporate culture creation & expansion in the private corporate area, in a tuning with Ministry of Public Administration & Security, Ministry of Labor, Ministry of Gender, and Communications Commission.

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.1
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

Effects of interactivity and usage mode on user satisfaction, usefulness, and intetion to use in text information presentation in mobile environment (모바일 환경에서의 텍스트 표현 방식의 상호작용성과 사용모드가 사용자의 만족도, 유용성, 사용의도에 미치는 영향)

  • Baek, Hyunji;Lee, Sangwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.223-226
    • /
    • 2017
  • With the development of information technology, users are provided with information they want through mobile device in various situations. When users communicate with information, there is interaction through gesture activities such as tapping and experience in the process. Experience through interaction in mobile affect the user's psychology. This is important because it is related to the behavior of the user in the future. Various types of information presentation methods have been researched in mobile environment. However, there are more research focusing on functional interactivity. The purpose of this study is to investigate the effect of interaction and usage mode on satisfaction, usefulness, and intention to use for sound text presentation that is user-centered. As variables for my study, there are two factors which are interactivity and usage mode. The interactivity type is composed of two ways that are: High and Low depending on modality and message interactivity; and the usage mode is composed of Action mode and Goal mode depending on whether user has a task or not. The experimental design is $2{\times}2$. The same content is provided in (a) only Modality interactivity, and (b) Modality and Message interactivity are provided. Depending on usage mode, (a) Action mode is processed without a specific task, and (b) Goal mode is performed with a specific task to participants. The experimental study demonstrated that there is a difference in satisfaction, usefulness, and intention to use depending on the difference of interaction and usage mode when providing information in mobile environment. The results of this study are summarized as follows: interaction and usage mode have significant influence on mobile user's satisfaction, usefulness, intention to use.

  • PDF

Ubiquitous Campus Model for Students Oriented (학생 중심의 유비쿼터스 캠퍼스모델)

  • Kim, Chang-Su;Lee, Jae-Hyuk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1407-1413
    • /
    • 2007
  • University environment on campus has been changed faster than before in today. Especially, they have devised middle & long-term development plans such as improving the image of campus and increasing campus competitive power to overcome difficulties in campus management. Therefore, many of those have made every effort to provide convenient university services for campus students and to improve the image of campus through building a Ubiquitous-Campus. But existing systems of a Ubiquitous-Campus have not understood actual conditions of IT (Information Technology) for campus students or not provided basic environment to analyze actual conditions of efficient using the system, expectations of the following people about a Ubiquitous-Campus is getting higher md higher though. Must become technology base ubiquitous campus construction, and is real erudition that ubiquitous campus model who can utilize substantially through service construction that is required newly with student's IT infra practical use analysis hereupon such as is required to solve these problems, But there is a limitation on designing the model in rapidly changed university environment on campus. In this paper, we studied about a Students Centralized Ubiquitous Campus model through U-Learning, U-Recruit, U-Printer, and personal information history service which are based on data warehouse for students analysis which is a key point element of building a Ubiquitous Campus.

Quality Improvement Method on Grammatical Errors of Information System Audit Report (정보시스템 감리보고서의 문법적 오류에 대한 품질 향상 방안)

  • Lee, Don Hee;Lee, Gwan Hyung;Moon, Jin Yong;Kim, Jeong Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.211-219
    • /
    • 2019
  • Accomplishing information system, techniques, methodology have been studied continuously and give much help to auditors who are using them. Additionally audit report which is the conclusion of accomplishing ISA(information system audit), has law of a basis and phase with ITA/EA Law(Electronic Government Law). This paper is for better quality of ISA report. But it has more errors about sentence and Grammatical structures. In this paper, to achieve quality improvement objectives, it is necessary to recognize the importance of an audit report by investigating on objectives, functionality, structures and usability of a report firstly, and a legal basis, the presence of report next. Several types of audit reports were chosen and the reports errors were divided into several categories and analyzed. After grasping reasons of those errors, the methods for fixing those errors and check-lists model was provided. And based on that foundation, the effectiveness validation about real audit reports was performed. The necessity for efforts to improve the quality of audit reports was emphasized and further research subject(AI Automatic tool) of this paper conclusion. We also expect this paper to be useful for the organization to improve on ISA in the future.

The Design of the Obstacle Avoidances System for Unmanned Vehicle Using a Depth Camera (깊이 카메라를 이용한 무인이동체의 장애물 회피 시스템 설계)

  • Kim, Min-Joon;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.224-226
    • /
    • 2016
  • With the technical development and rapid increase of private demand, the new market for unmanned vehicle combined with the characteristics of 'unmanned automation' and 'vehicle' is rapidly growing. Even though the pilot driving is currently allowed in some countries, there is no country that has institutionalized the formal driving of self-driving cars. In case of the existing vehicles, safety incidents are frequently happening due to the frequent malfunction of the rear sensor, blind spot of the rear camera, or drivers' carelessness. Once such minor flaws are complemented, the relevant regulations for the commercialization of self-driving car and small drone could be relieved. Contrary to the ultrasonic and laser sensors used for the existing vehicles, this paper aims to attempt the distance measurement by using the depth sensor. A depth camera calculates the distance data based on the TOF method calculating the time difference by lighting laser or infrared light onto an object or area and then receiving the beam coming back. As this camera can obtain the depth data in the pixel unit of CCD camera, it can be used for collecting depth data in real-time. This paper suggests to solve problems mentioned above by using depth data in real-time and also to design the obstacle avoidance system through distance measurement.

  • PDF