• Title/Summary/Keyword: Discovery Service

Search Result 412, Processing Time 0.036 seconds

A Study on convergence of Mobile Smart Commerce and O2O Distributions Business Model for Small to Medium and Micro-Enterprises (중소·소상공인을 위한 모바일 스마트커머스 및 O2O 유통 비즈니스모델 융합 연구)

  • Kim, Byung-Wan
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.161-167
    • /
    • 2016
  • Distribution channels are changing its industry paradigm from quantitative increase to qualitative improvement. In addition, it incorporates new characteristics and consumption tread of customers and the core value of service is developing focused around on online to offline (O2O) business model of omnichannel. In this respect, companies are integrating various distribution channels and in order to provide high content business service to customers, their interest in finding a new business strategy is increasing. Currently, most of the service being provided to customers are formed based on distribution structure centered around big companies and financial industry and the problems faced by small to medium and micro enterprises, which are expansion and improvement of channels, discovery of new distribution channels and finding O2O marketing strategy, can be said as very important task. Accordingly, this research purports to create added values which can serve as the driving force of growth of "creative economy" by improving distribution channels in which anyone who incorporates needs of smart consumers can enter into the smart commerce market and to further form sustainable win-win market that is strategic through business platforms for small to medium and micro enterprises therefrom.

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Case Manager's Perception and Practices of Case Management Process at Community Psychiatric Rehabilitation Centers -Focused on the community psychiatric rehabilitation centers in Busan- (사회복귀시설 사례관리자의 사례관리 과정에 대한 인식과 수행에 관한 연구 -부산지역 사회복귀시설의 사례관리를 중심으로-)

  • Kim, Sun-Joo;Kim, Gyo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.221-233
    • /
    • 2013
  • This study aims to explore how to cognize and perform case management process to community psychiatric rehabilitation center in Busan area. The case of case manager for 12 people obtained by conducting focus group interviews were in-depth analysis. Many commissioned by a variety of human service organizations in the contract and the client-centric intake has been received. Assessment, rather than a function of mental disabilities center service needs, planning difficulties in securing resource discovery and felt. Intervention phase focuses on direct service and when several agencies responsible for the case management approach. The possession of responsibility was unclear. Mainly monthly facilities within the checking step checks are being made, there was a desire for the realistic-supervision. Completion stage expectations showed a performance evaluation oriented, and individualized case management that can be represented well on the rating scale.

MUVIS: Multi-Source Video Streaming Service over WLANs

  • Li Danjue;Chuah Chen-Nee;Cheung Gene;Yoo S. J. Ben
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.144-156
    • /
    • 2005
  • Video streaming over wireless networks is challenging due to node mobility and high channel error rate. In this paper, we propose a multi-source video streaming (MUVIS) system to support high quality video streaming service over IEEE 802.1l-based wireless networks. We begin by collocating a streaming proxy with the wireless access point to help leverage both the media server and peers in the WLAN. By tracking the peer mobility patterns and performing content discovery among peers, we construct a multi-source sender group and stream video using a rate-distortion optimized scheme. We formulate such a multi-source streaming scenario as a combinatorial packet scheduling problem and introduce the concept of asynchronous clocks to decouple the problem into three steps. First, we decide the membership of the multisource sender group based on the mobility pattern tracking, available video content in each peer and the bandwidth each peer allocates to the multi-source streaming service. Then, we select one sender from the sender group in each optimization instance using asynchronous clocks. Finally, we apply the point-to-point rate-distortion optimization framework between the selected sender-receiver pair. In addition, we implement two different caching strategies, simple caching simple fetching (SCSF) and distortion minimized smart caching (DMSC), in the proxy to investigate the effect of caching on the streaming performance. To design more realistic simulation models, we use the empirical results from corporate wireless networks to generate node mobility. Simulation results show that our proposed multi-source streaming scheme has better performance than the traditional server-only streaming scheme and that proxy-based caching can potentially improve video streaming performance.

Routing Protocol with QoS Support in ice Mobile Ad Hoc Networks (이동 애드 흑 네트워크에서의 QoS를 지원하는 라우팅 프로토콜)

  • 강경인;박경배;유충열;정찬혁;이광배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.273-281
    • /
    • 2002
  • Recently, demand for real-time data and multimedia data is rapidly increasing, and it is impossible for mobile Ad Hoc networks with only best effort service to efficiently transfer such data. So, we absolutely need the QoS service which reserves the communication resources in advance. The existing routing protocols, which assume that the links between nodes are bidirectional, provide the convenience for the route discovery and maintenance, but can not support the routing function for the unidirectional links due to the wireless link property easily changing with time under the real wireless environment. In order to solve such problems, in this dissertation we suggested a unidirectional QoS routing a waste of communication resources. The waste of protocol that supports unidirectional links and reduces communication resources is reduced by establishing the shortest route suitable to QoS support, considering in advance the usable communication resources at each node.

Uesrs Pattern Discovery of Social Network Service by Social Network Analysis : Focusing on Facebook (소셜네트워크 서비스 사용자 패턴 발견을 위한 사회 네트워크 분석 활용에 관한 연구: 페이스북을 중심으로)

  • Ha, ByungKook;Jang, Youngsoo;Cho, JaeHee
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.13-27
    • /
    • 2012
  • Companies see a new business opportunity in the increased popularity of social network services and the related studies are also gaining more attention. This study attempted to analyze the social networks and thereby find a pattern in the use of social network services. Network users' pattern has been categorized by their purpose of use. Among various social network services, we selected the Facebook and its users were analyzed by a network analysis tool called NodeXL. In the end, several subgroups have been identified in a seemingly homogeneous network. Furthermore, the network shape differences according to the usage of social network services has been studied by comparing "friends" of an individual Facebook user with those of the K University Facebook page.

  • PDF

UPnP Services for RFID Context-Aware System (RFID 상황인식 시스템을 위한 UPnP 서비스)

  • Kim, Dong-Kyun;Jeon, Byung-Chan;Lee, Sang-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2005-2014
    • /
    • 2008
  • In this paper, it is presented to utilize UPnP as RFID service discovery and control mechanism for context-aware services. Using UPnP, it is possible to achieve easy deployment of context-aware services and to provide zero-configuration for RFID services. In addition, SQL based cleaning module which raises detection rates is developed since context-aware applications heavily rely on streams of data gathered from RFID tags. Using the cleaning technique, detection rates are improved from 60-80% to 98% or more In order to verify RFID context aware service based on the UPnP, sample context-aware scenario for physical distribution services is implemented on UPnP over RFID system. The impacts of UPnP messages (or service advertisements on network congestion and SQL cleaning module are experimented and analyzed, and the result show the good correctness and validity of the proposed system.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Suggestions on Future Research Directions of Autonomous Vehicles based on Information-Centric Micro-Service (정보중심 마이크로서비스 기반 자율차량 연구 방향에 대한 제언)

  • Rehman, Muhammad Atif Ur;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.7-14
    • /
    • 2021
  • By changing the bulky monolithic services architecture to a microservices-based architecture, industries are managing the rising complexity of Autonomous Vehicles. However, the underlying communication mechanisms for the utilization and distribution of these microservices are incapable of fulfilling the requirements of the futuristic AV, because of the stringent latency requirements along with intermittent and short-lived connectivity issues. This paper proposes to tackle these challenges by employing the revolutionary information-centric networking (ICN) paradigm as an underlying communication architecture. This paper argues that a microservice approach to building autonomous vehicle systems should utilize ICN to achieve effective service utilization, efficient distribution, and uniform service discovery. This research claims that the vision of an information-centric microservices will help to focus on research that can fill in current communication gaps preventing more effective, and lightweight autonomous vehicle services and communication protocols.

Underserved Elements and Regions of Physical Infrastructure for the Community Care - Case Study of Mapogu (지역사회 통합돌봄을 위한 물리적 인프라의 서비스 취약요소 및 취약지역 진단 연구 - 마포구를 대상으로)

  • Kim, Hyunju;Lee, Seungji;Lee, Eunjin;Jeon, Suyeon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.2
    • /
    • pp.39-48
    • /
    • 2021
  • Purpose: The study aims to demonstrate regional diagnosis methods and results combined with geographical information to expand the physical infrastructure related to community care services. To this end, the physical infrastructure for the core elements of community care was analyzed in terms of the fulfilment and access of facilities to derive the underserved elements and regions. Methods: Utilizes GIS network analysis techniques that can derive physical infrastructure service areas. Underserved elements are derived by comparing and analyzing the service area for each core element. Next, the underserved regions for each core element are derived through the overlapping of the set service area and the diagnosis population. Results: Among the physical infrastructure by core elements for community care, the housing support element was considerably weak, and the nursing care facility compared to health care was also analyzed to be weak. In addition, underserved regions by dong in Mapo-gu were deduced and presented for each diagnosed population. Implications: The discovery of underserved elements and underserved regions is meaningful as a diagnostic process that can derive the physical infrastructure that needs to be expanded urgently for the realization of community care and determine the priority projects and targets of the projects.