• Title/Summary/Keyword: Approach of Network

Search Result 4,527, Processing Time 0.031 seconds

A Study on virtual character from the viewpoint of E-branding (E-branding관점에서 본 감정이입 가상 캐릭터의 연구)

  • 이지희
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.81-90
    • /
    • 2004
  • The reason of the appearance of Internet is regarded as a milestone since we have shared information globally in a mutual way. The important thing on this point is what contents we choose for ourselves. The Internet could be meaningless unless we use it in a certain way, which ultimately means that the Internet has to deliver something valuable to us humans. Therefore, we have looked at how we can deliver and share humanity and emotion through the Internet, also how we can instill vital power into our real life, through the Internet. Fortunately, the current study must essentially be ongoing due to its nature with perhaps a multidisciplinary team brainstorming ideas. The reason for that is that not only could we find new business models for companies, but also find out new ways to appease the human mind in the modern age. In addition, as consumers needs become more specialized and diversified, companies are expected to face up to fierce competition with the help of innovative ideas. The ever-intensifying competition requires companies to cultivate new strategic tools in order to have new, powerful and sustainable comparative advantages. The goal of this research will be to explore ways of finding a new approach. Specifically, this research is about how to use the EVC(empathetic virtual character), which, this researcher believes, can deliver emotional benefits so as to make e-branding successful. According to reports, it has been proven that this new concept including the EVC can result in tremendous success. So the goal of this research is to explore the current situation and to anticipate the future concerning virtual characters.

  • PDF

Service Level Agreement Specification Model of Software and Its Mediation Mechanism for Cloud Service Broker (클라우드 서비스 브로커를 위한 소프트웨어의 서비스 수준 합의 명세 모델과 중개 방법)

  • Nam, Taewoo;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.591-600
    • /
    • 2015
  • SLA (Service Level Agreement) is an essential factor that must be guaranteed to provide a reliable and consistent service to user in cloud computing environment. Especially, a contract between user and service provider with SLA is important in an environment using a cloud service brokerage. The cloud computing is classified into IaaS, PaaS, and SaaS according to IT resources of the various cloud service. The existing SLA is difficult to reflect the quality factors of service, because it only considers factors about the physical Network environment and have no methodological approach. In this paper, we suggested a method to specify the quality characteristics of software and proposed a mechanism and structure that can exchange SLA specification between the service provider and consumer. We defined a meta-model for the SLA specification in the SaaS level, and quality requirements of the SaaS were described by the proposed specification language. Through case studies, we verified proposed specification language that can present a variety of software quality factors. By using the UDDI-based mediation process and architecture to interchange this specification, it is stored in the repository of quality specifications and exchanged during service binding time.

The Future of Countermobility Capability with a Literature Analysis from FASCAM to Terrain Shaping Obstacle(TSO) (미래 대기동 작전 능력의 발전방안 연구 -살포식지뢰(FASCAM)로부터 지형 조성 장애물(TSO) 전력을 중심으로-)

  • Park, Byoung-Ho;Sim, Jaeseong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.291-298
    • /
    • 2021
  • In this study, the future of countermobility capability is presented by analyzing the status of the countermobility obstacles focusing on the history of landmines and munitions. The conventional landmine was forbidden globally by the CCW and Ottawa Treaty because it caused civilian damage after the war. Because the inhumanity of those mines had been acknowledged, shatterable mines with a self-destruct (SD) function and M93 "HORNET" anti-tank munition with enhanced sensors have been fielded. In 2016, the Obama administration announced a policy that banned all antipersonnel landmines, leaving a considerable gap in the countermobility capability. To deal with these problems, the developments of "SAVO" and the SLEP program of Volcano mines were conducted. In the sense of a long-term approach, the countermobility obstacles, including mines, were chosen as fundamental forces for Multi-Domain Operations and were improved to Terrain Shaping Obstacles (TSO). TSO has improved sensors and mobility kill capabilities and features an enhanced remote control over each munition on the battlefield through a network established with satellite communication. The combined arms countermobility might be fully capable until 2050 if the TSO program can be completed successfully.

Hierarchical Internet Application Traffic Classification using a Multi-class SVM (다중 클래스 SVM을 이용한 계층적 인터넷 애플리케이션 트래픽의 분류)

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.7-14
    • /
    • 2010
  • In this paper, we introduce a hierarchical internet application traffic classification system based on SVM as an alternative overcoming the uppermost limit of the conventional methodology which is using the port number or payload information. After selecting an optimal attribute subset of the bidirectional traffic flow data collected from the campus, the proposed system classifies the internet application traffic hierarchically. The system is composed of three layers: the first layer quickly determines P2P traffic and non-P2P traffic using a SVM, the second layer classifies P2P traffics into file-sharing, messenger, and TV, based on three SVDDs. The third layer makes specific classification of the entire 16 application traffics. By classifying the internet application traffic finely or coarsely, the proposed system can guarantee an efficient system resource management, a stable network environment, a seamless bandwidth, and an appropriate QoS. Also, even a new application traffic is added, it is possible to have a system incremental updating and scalability by training only a new SVDD without retraining the whole system. We validate the performance of our approach with computer experiments.

Multi-Level Prediction for Intelligent u-life Services (지능형 u-Life 서비스를 위한 단계적 예측)

  • Hong, In-Hwa;Kang, Myung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.123-129
    • /
    • 2009
  • Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.

  • PDF

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF

The Prediction of Cryptocurrency on Using Text Mining and Deep Learning Techniques : Comparison of Korean and USA Market (텍스트 마이닝과 딥러닝을 활용한 암호화폐 가격 예측 : 한국과 미국시장 비교)

  • Won, Jonggwan;Hong, Taeho
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.1-17
    • /
    • 2021
  • In this study, we predicted the bitcoin prices of Bithum and Coinbase, a leading exchange in Korea and USA, using ARIMA and Recurrent Neural Networks(RNNs). And we used news articles from each country to suggest a separated RNN model. The suggested model identifies the datasets based on the changing trend of prices in the training data, and then applies time series prediction technique(RNNs) to create multiple models. Then we used daily news data to create a term-based dictionary for each trend change point. We explored trend change points in the test data using the daily news keyword data of testset and term-based dictionary, and apply a matching model to produce prediction results. With this approach we obtained higher accuracy than the model which predicted price by applying just time series prediction technique. This study presents that the limitations of the time series prediction techniques could be overcome by exploring trend change points using news data and various time series prediction techniques with text mining techniques could be applied to improve the performance of the model in the further research.

The Countermeasures of North Korea's Nuclear Weapon Terror (북한의 핵테러와 대응방안)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.129-138
    • /
    • 2014
  • South Korea should correspond to the primary threat to North Korea's nuclear weapons. It is necessary to have countermeasures to solve the realistic problems of North Korea's nuclear weapons. We can intensify military pact between the United States and Korea and at the same time strengthening the current military power. Currently, we take note the threat North Korea's missile. We can not control the development of a nuclear weapon and there are possibilities that North Korea have successfully miniaturized nuclear enough to carry by the missile. We should overview and check the Korea's missile defenses system. While the direction of the overall missile defense system deployment with a focus on lower and upper air defense network. And discuss defense research should be to build a system that can be protected with a key strategic facilities and cities. While North Korea have nuclear weapon, the main issues related to North Korea's nuclear threat. The six party talks countries try to solve the problem by the international and diplomatic approach. At the same time we should make somewhat to defend measures such as military defenses of Kill chain system to protect our country. Kill Chain is on of the effective defense system. We know that North Korea do not abandon to develop nuclear weapons by diplomatic efforts. We should performed in fact by a variety of military suppression method.

A Study of Future Internet Testbed Construction using NetFGA/OpenFlow Switch on KOREN/KREONET (KOREN/KREONET기반 NetFPGA/OpenFlow 스위치를 이용한 미래인터넷 테스트 베드 구축 방안 연구)

  • Park, Man-Kyu;Jung, Whoi-Jin;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.109-117
    • /
    • 2010
  • Building a large-scale testbed for Future Internet is very important to evaluate a new protocol and new network architecture designed by clean-slate approach. In Korea, new Future Internet testbed project, called FIRST (Future Internet Research for Sustainable Testbed), has been started since Mar. 2009 to design and test new protocols. This project is working together with ETRI and 5 universities. The FIRST@PC is to implement a virtualized hardware-accelerated PC-node by extending the functions of NetFPGA card and build a Future Internet testbed on the KOREN and KREONET for evaluating newly designed protocols and interesting applications. In this paper, we first briefly introduce FIRST@PC project and explain a 'MAC in IP Capsulator' user-space program using raw-socket in Linux to interconnect OpenFlow enabled switch sites on the KOREN and KREONET. After that, we address test results for TCP throughput performance for varying packet size. The test results show that the software based capsulator can support a reasonable bandwidth performance for most of applications.

Cost-Based Directed Scheduling : Part II, An Inter-Job Cost Propagation Algorithm (비용기반 스케줄링 : Part II, 작업간 비용 전파 알고리즘)

  • Suh, Min-Soo;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.1
    • /
    • pp.117-129
    • /
    • 2008
  • The cost-based scheduling work has been done in both the Operations Research (OR) and Artificial Intelligence (AI) literature. To deal with more realistic problems, AI-based heuristic scheduling approach with non-regular performance measures has been studied. However, there has been little research effort to develop a full inter-job cost propagation algorithm (CPA) for different jobs having multiple downstream and upstream activities. Without such a CPA, decision-making in scheduling heuristics relies upon local, incomplete cost information, resulting in poor schedule performance from the overall cost minimizing objective. For such a purpose, we need two types of CPAs : intra-job CPA and inter-job CPA. Whenever there is a change in cost information of an activity in a job in the process of scheduling, the intra-job CPA updates cost curves of other activities connected through temporal constraints within the same job. The inter-job CPA extends cost propagation into other jobs connected through precedence relationships. By utilizing the cost information provided by CPAs, we propose cost-based scheduling heuristics that attempt to minimize the total schedule cost. This paper develops inter-job CPAs that create and update cost curves of each activity in each search state, and propagate cost information throughout a whole network of temporal constraints. Also we propose various cost-based scheduling heuristics that attempt to minimize the total schedule cost by utilizing the cost propagation algorithm.

  • PDF