• Title/Summary/Keyword: Future internet

Search Result 2,215, Processing Time 0.028 seconds

A Study on the Effect of Social Psychological Factors on Internet Addiction (사회 심리적 요인이 인터넷 중독에 미치는 영향에 관한 연구)

  • Kim, Jung-Yul;Lee, Sung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.245-254
    • /
    • 2009
  • New research on internet addiction identifies online users who became hooked on internet online games, chatting, and even internet shopping only to see their lives become increasingly unmanageable because of the Internet. The purpose of this study is to examine the causal relationship between internet addiction and social psychological factors of college students. This study model used four themes(self-esteem, self-efficacy, family relationships, stress) in order to identify the effect of social psychological factors on internet addiction. The result of this study identified that self-esteem, self-efficacy, stress have a significant effect on internet addiction. Future areas for studying internet addiction are continuously discussed.

Implementation and Evaluation of Dynamic and Distributed Mapping System in ID-LOC Separation Internet Architecture (ID-LOC 분리 기반 인터넷 구조에서 분산형 매핑 시스템의 구현 및 평가)

  • Kang, Hyung-Woo;Choi, Nak-Jung;Kim, Ji-In;Jung, Heeyoung;Koh, Seck-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.984-992
    • /
    • 2012
  • In this paper, we discuss a new architecture of future Internet for mobile-oriented environments, named Mobile-Oriented Future Internet (MOFI). The MOFI architecture is designed with Host Identifier and Local Locator (HILL) for identifier and locator separation. Based on the HILL separation architecture, we propose a Dynamic and Distributed Mapping System (DDMS) for identifier-locator mapping control. In DDMS, the mapping control function is distributed onto each access router in the domain, which is different from the centralized approach using a central anchor. For validation of the proposed MOFI-DDMS architecture, we implemented the data delivery and mapping control functions using Linux platform. From the testbed experimental results, we see that the DDMS architecture can give better performance than the existing Proxy Mobile IP (PMIP) protocol in terms of data transmission throughput.

Cooperative Fishing Boat Robots Model for Extreme Worker

  • Sin, Seunghan;Yang, Kyeongae;Kim, Jaeheon;Shin, Seungjung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.79-83
    • /
    • 2018
  • According to the Korea Robotics Industry Association, the number of robots companies, sales and production are steadily increasing until 2016, and the global robot market outlook is expected to continue to increase until 2025. We need to develop more attention to robots that can make life easier for us and can replace human tasks that we cannot do. It is predicted that robots will be more developed in the future with the above statistics, and future robots will be more activated by robots that can depend on each other, fix each other, and adapt to the changing environment without humans. Therefore, the shape of the robots in the future will be developed as a group robot(swarmbot) that cooperate with each other while the robot works. These robots have been studied for a longtime, but there are only two community robots that are applied in real life, only two of which are jailbreaking robots made in KAIST and KIVA robots made in Amazon company. In the future, as these robots develop more and more, and environment where robots can live without human intervention is created, so that a plurality of robots can collaborate and do individual work.

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Improved Accountable Internet Protocol Using Signature (시그니처를 이용한 향상된 Accountable 인터넷 프로토콜)

  • Park, Gi-Tae;Lee, Jae-Hwoon;Jung, Hee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.200-206
    • /
    • 2014
  • Accountable Internet Protocol (AIP) is one of the future Internet architectures to provide accountability concept by using the self-certifying address that is derived by the public key of the host. In AIP, when a host sends a packet, a domain that is located between the source and the destination hosts discards the packet in order to verify the source IP address. Therefore, performance degradation can occur due to packet discard especially when there is asymmetric route. In this paper, we propose the improved AIP mechanism to verify the source IP address without discarding the packet by including the timestamp, public key value and the signature for protecting from forfeiting the source address. Security safety of the proposed mechanism is evaluated and the proposed mechanism can provide the more robust security as well as reducing the latency due to discarding packets.

Development of Structural Analysis Platform through Internet-based Technology Using Component Models (컴포넌트 모델을 이용한 인터넷 기반 구조해석 플랫폼 개발)

  • Shin Soo-Bong;Park Hun-Sung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.19 no.2 s.72
    • /
    • pp.161-169
    • /
    • 2006
  • The study proposes component models in developing an efficient platform for internet-based structural analysis. Since a structural analysis requires an operation of complicated algorithms, a client-side computation using X-Internet is preferred to a server-side computation to provide a flexible service for multi-users. To compete with the user-friendly interfaces of available commercial analysis programs, a window-based interface using Smart Client was applied. Also, component-based programming was performed with the considerations on reusability and expandability so that active Preparation for future change or modification could be feasible. The components describe the whole system by subdivision and simplification. In the relationship between upper-and lower-level components and also in the relationship between components and objects, a unified interface was used to clearly classify the connection between the libraries. By performing data communication between different types of platforms using XML WebService, a conner-stone of data transfer is proposed for the future integrated CAE. The efficiency of the developed platform has been examined through a sample structural analysis and design on planar truss structures.

Antecedents of internet purchasing intention - Impulse buying, market mavenism, online interaction readiness, and online consumer procrastination - (인터넷 구매의도의 선행변수 - 충동구매, 마켓메이븐 성향, 온라인 상호작용 준비성, 온라인 소비자 연기 -)

  • Park, Hye-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.25 no.5
    • /
    • pp.593-610
    • /
    • 2017
  • In order to identify the antecedents of internet purchasing intention toward fashion items, this study examines shopping-related variables as both direct antecedents of internet purchasing intention, and as indirect antecedents of internet purchasing intention through online-related variables. Impulse buying and market mavenism were considered as shopping-related variables, whilst online interaction readiness and online consumer procrastination were considered as online-related variables. It was hypothesized that impulse buying and market mavenism not only directly influence purchasing intention toward fashion items, but also indirectly influence it through online interaction readiness and online consumer procrastination. Data were gathered by surveying university students in Seoul using convenience sampling. A total of 286 questionnaires were used in the statistical analysis. SPSS was used for exploratory factor analysis, and AMOS was used for confirmatory factor analysis and path analysis. The factor analysis of market mavenism, impulse buying, and online consumer procrastination revealed one dimension, whilst the factor analysis of online interaction readiness revealed two dimensions: 'online relationship' and 'internet role.' Tests of the hypothesized path proved that impulse buying indirectly influences internet shopping intention only through online consumer procrastination, whereas market mavenism influences internet shopping intention indirectly through both online interaction readiness and online consumer procrastination. The results will be useful for Internet shopping mall marketers and for future study.