• Title/Summary/Keyword: Future internet

Search Result 2,264, Processing Time 0.028 seconds

CCN-Helper Performance Analysis for Data Transmission Delay over Federated Testbed Environment (국제 연동 테스트베드에서 데이터 전송 지연을 위한 CCN-Helper 성능 분석)

  • Choi, Won-jun;Ramneek, Ramneek;Seok, Woo-jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1947-1957
    • /
    • 2015
  • CCN networking is one of the future internet. With the rapid development of network platforms emerged a wide range of services through a virtual network environment. The performance of CCN in the high bandwidth delay is important to provide various services between nations. We can check the high bandwidth delay product in federation. Federation between the nations has the advantage of being effective to do a various services for the users, and the remote heterogeneous physical hardware engine supports various environments. Data transmission delay can be occur in long distance network even though the network is federated network. In this paper, we propose CCN-Helper protocol for data transmission delay in ling distance networks. We connect from KREONET in Korea to iLab.t in Belgique in order to test CCNx over heterogeneous federated environment.

Analysis of YouTube Channels of Domestic Companies from IMC Perspective (IMC 관점에서 국내기업의 유튜브채널 분석)

  • Kim, Byung-Dae
    • Management & Information Systems Review
    • /
    • v.39 no.3
    • /
    • pp.127-140
    • /
    • 2020
  • This study conducted analysis of YouTube channels by domestic companies as the marketing strategies of domestic companies vary due to the rapid growth of the Internet and YouTube channels. The YouTube channel analysis analyzed the number of subscribers, plays, videos and classifications of domestic companies on YouTube channels, the top 100 domestic companies in the YouTube ranking site "Company/Official. The analysis showed that 4.53 million companies had the largest number of subscribers, Samsung mobile, 544.69 million circuit Samsung mobile, and 11,416 League of Legends-Korea channels had the largest number of videos. The most product classification showed that food/dining companies were engaged in a lot of YouTube activities. The use of YouTube, which is rapidly growing in companies through analyzing YouTube channels from the perspective of a company's new marketing strategy, is a new tool for integrated marketing communications. It is expected that the YouTube channel, which enables two-way communication of companies' marketing strategies, will be used as basic data when producing YouTube content in the future.

A Study on the Utilization of the SaaS Model UPnP Network in e-Trade (전자무역의 SaaS모형 UPnP 네트워크 활용방안에 관한 연구)

  • Jeong, Boon-Do;Yun, Bong-Ju
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.563-582
    • /
    • 2012
  • In this paper, UPnP Network SaaS model has been studied. Currently, this model of UPnP Network and the trade mission is being used by outsourcing. From now on, the introduction of new trading systems and existing systems and the commercialization of this model as a UPnP network service connection should work. The future of UPnP network SaaS model will become commercially available software, commercial software can be accessed remotely via the Internet should be. Customer site activities must be managed from a central location. Application software architecture, pricing, partnerships, management should not include the character models. N should be the model. When used in small and medium enterprises have a very high value.

  • PDF

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.

Analysis of the Status of Basic Industries in Military Drone (군사 드론의 기초산업 현황 분석)

  • Han, Hoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.493-498
    • /
    • 2020
  • The fourth industrial revolution is the first topic thrown by Klaus Schwab at the Davos World Economic Forum in January 2016, meaning the next industrial revolution led by the Internet of Things (IOT), artificial intelligence (AI), robot technology and life sciences. In addition, in our lives, humans, computers and machines are connected organically, and organic relationships are evolving and developing at a furious rate in all areas of life. Since the 1953 armistice agreement, South Korea has remained in a state of confrontation with North Korea, and there have been continued fighting by the North, including naval skirmishes in the West Sea, artillery attacks on Yeonpyeong Island, the sinking of the Cheonan warship, and unmanned aerial vehicles and ankle mines. To prepare for such a local initiative, our military is constantly preparing and will have to strengthen its combat capabilities by developing and introducing advanced military equipment. After all, the military drone industry linked to the Fourth Industrial Revolution following the development of new war should continue its research on military drones in line with accurate diagnosis and the rapid development of future science and technology and IT technologies.

Risky Behavior Subtypes and Suicide Attempts in Adolescents with Depression (우울장애 청소년의 위험행동 유형과 자살시도의 관련성)

  • Kim, Ran;Kwon, Hoin;Lee, Young-Ho;Yook, Ki-Hwan;Song, Jeongun;Song, Min-A;Hong, Hyun Ju
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.26 no.3
    • /
    • pp.149-158
    • /
    • 2015
  • Objectives : The objective of this study was to identify the risky behavior subtypes in adolescents with depression, and the relationship between those subtypes and suicide attempt. Methods : Ninety adolescents who met the Diagnostic and Statistical Manual of Mental Disorders-4th edition criteria for major depressive disorder, dysthymia, or depressive disorder not otherwise specified participated in the study. Participants were interviewed about suicidal attempts, non-suicidal self-injuries. Smoking, drinking behaviors, and searching for the word "suicide" on the internet, negative life events including bulling-bullied experiences, and history of abuse were also included with questionnaires. Results : The results of cluster analysis showed that four risky behaviors were divided into three clusters : non-risky type, characterized by few risky behaviors ; delinquency type, which was characterized by smoking and drinking ; non-suicidal self-injury type. In non-suicidal self-injury type, percentage of girls was higher and clinical symptoms were more severe than delinquency type. In addition, delinquency type members could be a bully, while non-suicidal self-injury type members could be abused by a family member. Logistic regression analysis showed that both risky behavior subtypes were significant predictors of suicide attempt. Conclusion : These results suggest that two types of risky behaviors of depressed adolescents have an effect on the suicide attempts independently. Then, the implications and limitations of the study were discussed and directions for future studies were suggested.

HTR(Hard-To-Reach) Code Registration methods and Fuzzy controls using network signaling information in ATM systems (ATM시스템에서 네트웨크 시그날링 정보를 이용한 HTR(Hard-To-Reach) 등록방법 및 퍼지제어 방법)

  • Chul Soo, Kim;Jung tae, Lee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.55-65
    • /
    • 2004
  • ATM was recommended by the ITU and ATM Forum as a means of transportation for B-ISDN. At this time, due to the comprehensive mature of ATM protocol, ATM has been adapted as the backbone system for carrying Internet traffi $c^{[1,2,3,4]}$. But major conceptsregarding the ATN protocol will be used on future technology. This paper presents preventive congestion control mechanisms for detecting HTR(Hard-To Reach) code in ATM systems, in particular for an improved HTR call registration method using network signaling information will discussed. In high speed circuit switching system environments, a fast HTR control mechanism is necessary. We present research results for improving HTR call registration and control methods using network signaling information and fuzzy control mechanisms. We concluded that it showed fast congestion avoidance mechanisms with a fewer system load maximized the efficiency of network resources by restricting ineffective machine attempts.

A Review of Experimental Study for Herbal Medicines of Anti-allergic Effects (항알레르기 효능을 가진 한약물의 실험 연구 결과에 대한 고찰)

  • Lee, Woo-Gun;Hong, Eu-Gene;Kim, Bong-Hyun;Kim, Kyu-Seok;Nam, Hae-Jeong;Kim, Yoon-Bum
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.25 no.3
    • /
    • pp.34-55
    • /
    • 2012
  • Objective : The purpose of this study is to survey the experimental studies for Herbal Medicines of Anti-allergic Effects by reviewing oriental medicine journals. Methods : We collected 48 research papers on Oriental herbal medicines (prescriptions, herbs and aqua-acupunctures) of Anti-allergic effects in the internet site OASIS using the keyword 'Antiallergy'. Then we analyzed them according to published journals, years, and research methods, etc. Results : 48 papers in relation to Oriental herbal medicines of anti-allergic effects have been published in many kinds of journals and shows a tendency to increase every year. There are 23 cases of using herb simplexes, 21 cases of herb-combined prescription, and 4 cases of aqua-acupuncture. Conclusions : This result will provide useful information of field of Oriental herbal medicine for the development of anti-allergic related herb simplexes and herb combined prescriptions. In the future, we have to perform more studies such as clinical trial and research papers on combined medication of the oriental and the western medicines for anti-allergic effects.

Performance Analysis of MMSE-Based Equalization of IMT-Advanced System in Time-Varing Channels (IMT-Advanced 시스템의 시변 채널에서의 MMSE 기반 등화 성능 분석)

  • Park, Sung-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.91-96
    • /
    • 2011
  • As the user's demand for ultra high-speed wireless internet has increased, the standardization, research and development of future mobile communication systems have been done for several years. IMT-Advanced system which is called fourth generation mobile communication should support the data rate of 1 Gbps for nomadic users and 100 Mbps for mobile users. Also, the system should hold call connection at the mobile speed of 350 km/h. Meanwhile, since Doppler spread is linearly proportional to mobile speed, high mobility leads to the increase of interference between subcarriers and the deterioration of detection performance consequently. In this paper, we evaluate and analyze detection probability with respect to equalization methods in time-varying channels under system parameters complying with IMT-Advanced requirements. According to computer simulation conducted by varying mobile speed and code rate, MMSE based equalization can mitigate performance degradation of IMT-Advanced system considerably in time-varying channels.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.