• Title/Summary/Keyword: Download

Search Result 447, Processing Time 0.026 seconds

A Study on the Structure and Content Analysis of Art Museum Websites in Korea (미술관 웹 사이트의 구조 및 콘텐츠 분석에 관한 연구)

  • Noh, Dong-Jo;Lee, Seung-Wook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.277-301
    • /
    • 2020
  • The purpose of this study is to analyze art museum websites and derive implications for future operation of art museum websites. To this end, this research collected basic information about art museums according to '2018 National General Report of Cultural Infrastructure' and investigate the websites of 30 art museums through multi-step sampling process. This study analyzed the structure and menu of the art museum websites as well as the current state of various contents provided by the websites and the search service for the collections offered by the websites. Following sentences are the results. First of all, the art museum websites offer 5.6 top menus on average. Secondly, contents related to art museum, exhibitions, news, education, general forum, and SNS are the basic contents that should be provided on the art museum websites. Third, for contents related to news, education, and events have problems with hierarchical structure and need to be adjusted. Fourth, in the content type, specialized information contents are relatively insufficient and thus need to be improved. Fifth, the art museum websites should give sufficient information about the collection and offer directory searching hat includes keyword searching as well as detail searching service. It is also required to reorganize the directory along with the download function for searched results and the sorting service.

A Research on Streaming Protocol for User-Created Contents in Digital Cable Broadcasting environment (디지털 케이블 방송 환경에서 개인 미디어를 위한 스트리밍 프로토콜 연구)

  • Kim, Seong-Won;Kim, Jung-Hwan;Si, Jang-Hyun;Jung, Moon-Ryul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.1
    • /
    • pp.54-61
    • /
    • 2007
  • In this paper, on-demand service streaming protocol for user-created contents in digital cable broadcasting environment is considered. In order to provide variety media contents service like UCC in digital cable broadcasting environment, the same service model as RVOD(Real Video on Demand) is required and the different interface for each broadcasting platform is needed in a current OCAP environment. Using return path based RTP, we separate existing VOD stream band into broadcasting and VOD stream band. In order to broaden On-demand service, consistent expansion of the infrastructure same as live broadcasting system is inefficient in the digital cable broadcasting environment. Using existing network protocol, the service which is insensitive to the infrastructure for VOD service becomes possible. Therefore we considered the analysis of the class of download available structure in the Set-Top-Box for RTP(Real-time Transport Protocol) and designing the decoding available streaming server for UCC transcoding and transmission in the receiver. Designing a efficient VOD service and system under the broadcasting environment gives a expansion of On-Demand service and more chance to upload and utilization of contents.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.

Factors Affecting the Continuous Use of Mobile Music Contents (모바일 음악콘텐츠의 지속적 사용에 영향을 미치는 요인에 관한 연구)

  • Yang, Seung-Kyu;Park, Seong-Won;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.291-305
    • /
    • 2008
  • Previous study about Mobile Music Contents was mainly focused on Industry factors & enterprise factors like Technology. This study is not only focused on Technology factors, but also Customer & System factors like TAM of original, and also, this study first tried to find the Mobile Internet medium's customer purchase by each property's Mobile Music Contents from assorting the Mobile music Contents property and defining them. So to speak of this study have tried to concretely verify the factors of purchase. And also, I proposed an transformated model, and added independent variable factors, 'distinction', 'speed of system', 'speed of network', 'a career of use', 'amount of use', 'preservation', 'customization', 'information', 'confidence', 'omni presentation', 'potential possibility of reproduce'. By applying TAM this study has measured how the product property. user property, and system property causes effect to customer purchase of Mobile Music Contents. In results, First, success 8 factors were determined to be the purchase of 'Ringtone'. Second, 8 factors were determined to be the purchase of 'Ring-Back tone', but, 'The use of convenience' was not influenced 'Intention of Purchase'. Third, 6 factors were determined to be the purchase of 'Full Track Download of Music'. At the Conclusion this study presented a scheme that these study results could be applied in actual company and academic world.

  • PDF

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

An Analysis on BitTorrent Performance Based on the Number of Unchoked Peers (Unchoked Peer 개수에 따른 BitTorrent 성능 분석)

  • Chung, Tae-Joong;Han, Jin-Young;Kim, Hyun-Chul;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1197-1203
    • /
    • 2010
  • A strength of BitTorrent, which is widely used for file sharing today, is due to its peer selection mechanism which is designed to encourage peers to contribute data. In the peer selection phase in BitTorrent, peers to upload the file in a swarm are selected by determining which peers upload the most to themselves. However, the number of peers to upload (i.e., number of unchoked peers) is fixed to four in its peer selection mechanism of BitTorrent, which yields inefficiency because the situation of the swarm may vary frequently (e.g., number of peers in the swarm, download rates, and upload rates). In this paper, we analyze the swarming system performance when the number of unchoked in BitTorrents is not static, but dynamic. For empirical investigation, we established a testbed in Seoul National University by modifying an open-source BitTorrent client, which is popular. Through our experiments, we show that an adaptive mechanism to adjust the number of unchoked peers considering the situation of the swarm is needed to improve the performance of BitTorrent.

Design of a Marine Leisure Information Retrieval Agent for Mobile Terminal Support of WIPI Environment (WIPI 환경의 모바일 단말기 지원을 위한 해양 레저 정보 탐색 에이전트의 설계)

  • Choi, Hong-Seok;Jung, Sung-Hun;Lim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.171-174
    • /
    • 2005
  • According as marine leisure industry has developed and the demand of leisure culture has increased rapidly, a desire about service which supply marine safety and connect marine information is enlarging. The performance of personal mobile device has improved and been evolved by composition terminal. So, it became possible that storage and expression of multimedia information as well as simple communication facility. Domestic wireless internet has given development strain to developer and contents Provider(CP) because of different platform. And this has become hindrance factor of wireless internet activation. But, recently, the use of WIPI(Wireless Internet Platform for Interoperability), the wireless internet standard platform, could use different wireless application programs and also guarantee the independency for hardware. We wish to develop contents of download form that supply geographic information of Electronic Navigational Chart(ENC) in the marine that is digitalized to carrying along terminal of WIPI base and various informations for marine leisure. For this, DB that offer ENC and additional information should be constructed. Also, we need server (CPS; Contents provider Server) that offer required contents. In this paper, we design web retrieval agent which store request information to database. When consumer required necessary information through personal mobile device, CPS can inform that by real time. So, we wish to develop agent component that parse informations in various World Wide Webs, and store to database.

  • PDF

The e-Business Component Construction based on Distributed Component Specification (분산 컴포넌트 명세를 통한 e-비즈니스 컴포넌트 구축)

  • Kim, Haeng-Gon;Choe, Ha-Jeong;Han, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.705-714
    • /
    • 2001
  • The computing systems of today expanded business trade and distributed business process Internet. More and more systems are developed from components with exactly reusability, independency, and portability. Component based development is focused on advanced concepts rater than passive manipulation or source code in class library. The primary component construction in CBD. However, lead to an additional cost for reconstructing the new component with CBD model. It also difficult to serve component information with rapidly and exactly, which normalization model are not established, frequency user logging in Web caused overload. A lot of difficult issues and aspects of Component Based Development have to be investigated to develop good component-based products. There is no established normalization model which will guarantee a proper treatment of components. This paper elaborates on some of those aspects of web application to adapt user requirement with exactly and rapidly. Distributed components in this paper are used in the most tiny size on network and suggest the network-addressable interface based on business domain. We also discuss the internal and external specifications for grasping component internal and external relations of user requirements to be analyzed. The specifications are stored on Servlets after dividing the information between session and entity as an EJB (Enterprise JavaBeans) that are reusable unit size in business domain. The reusable units are used in business component through query to get business component. As a major contribution, we propose a systems model for registration, auto-arrange, search, test, and download component, which covers component reusability and component customization.

  • PDF

Seeking Alternative Models and Research Trends for Big Deals in the Electronic Journal Consortium (전자저널 빅딜 계약의 연구 동향과 대안 탐색)

  • Kim, Sang-Jun;Kim, Jeong-Hwan
    • Journal of Information Management
    • /
    • v.42 no.1
    • /
    • pp.85-111
    • /
    • 2011
  • The purpose of this study was to seek a workable alternative to replace a big deal related to the journal budget for the maintenance of academic libraries with the largest issue on the E-journal consortium. The contents of this study was to present it. It had examined the current situation, strengths, weaknesses and corresponding to replace the big deal contract. After reviewing the literature, we looked into the alternative activities for the big deal such as open access-based, usage-based, consortium improvement-based, publishers lead, and other models. As a result, the 'consortium cost reapportion model' was an alternative for the KESLI. The alternative was in the short term for cost division format, but long-term oriented for a consortium single(bloc) payment type or national licence model. The model was based on the data from the last year. It had evaluated download the PDF and HTML documents, but the three times weighting more than others, and the rest of 14 factors of 0.5 to 5 out of 100 total score. The total amount negotiated by national units 10, 20 and 30 grades for the final step was allocated to the participating library on the KESLI consortium.

Design and Performance Evaluation of Software On-Demand Streaming System Providing Virtual Software Execution Environment (가상 소프트웨어 실행 환경을 제공하는 주문형 소프트웨어 스트리밍 시스템 설계 및 성능평가)

  • Kim Young-Man;Park Hong-Jae;Han Wang-Won;Choi Wan;Heo Seong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.501-510
    • /
    • 2006
  • Software streaming allows the execution of stream-enabled software on desktop or portable computing devices like PC, PDA, laptop, cellular phone, etc., even while the transmission/streaming from the server may still be in progress. In this paper, we present an efficient streaming system called Software On-Demand(SOD) streaming system to transmit stream-enabled applications in addition to automatic installation of program registry, environment variables, configuration files, and related components. In particular, we design and implement a SOD system in Linux to provide the user with the instant look-and-click software execution environment such that software download and installation are internally proceeded in a completely user-transparent way. Therefore, the SOD system relieves the user from the tricky, failure-prone installation business. In addition, the software developer now obtains a new, powerful means to advertise and propagate their software products since the user can use software packages via user-friendly UI window or web browser by look-and-click interactive operation. In the paper, we also make a couple of SOD streaming experiments using a spectrum of popular softwares. Based on the analysis of the experiment results, we also propose two performance improvement schemes.