• 제목/요약/키워드: Information and communication Technology

Search Result 11,726, Processing Time 0.046 seconds

A Study on the Editorial Design of Magazine, Its New Concept & Advancement (디자인 전문지 <에미그레(Emigre)> 편집디자인의 혁신과 진보)

  • 이옥수
    • Archives of design research
    • /
    • v.13 no.4
    • /
    • pp.163-174
    • /
    • 2000
  • issued in the U.S is a magazine specialized in graphic design, which has a totally different style from commercial magazines such as show case. The main motive why Rudy VanderLans, the publisher, first issued this magazine in the early 1980s is his assertion that there is no design paradigm of universial concept in the aspect of viaual communication design. Also, it started from his recognition that a medium for letting a new generation's show their liberal thinking and experimental expressions. This study looks at theologies and assertions on new graphic concept, which is called the New Wave of graphic design by classifying the plans of into form and contents, and analyzes its specialty in design. Also, this study examines the overall trends of non-Grid editorial design since the modern style. By doing so, I could have a general look at the progressive traits and their futuristic directions that become to have a shorter life cycle with the advent of the 21st century's information era, high-tech media and the change of production environment by digital technology.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Development of the ICT Time Management Program for the Middle School Students' Creative Extra Curricular Activities (중학교 창의적 재량활동 시간을 위한 ICT활용 시간관리 교육프로그램 개발 및 효과)

  • Kim Roe-Wook;Lee Yon-Suk
    • Journal of Korean Home Economics Education Association
    • /
    • v.17 no.3 s.37
    • /
    • pp.123-138
    • /
    • 2005
  • The purposes of this study were to develop ICT time management program for middle school students using in the creative extra curricular activities and to test the effect of this program in the knowledge and attitude aspects of time management. The contents of a middle school Home Economics curriculum and nine different textbooks were analyzed Based on these analyses 5 ICT lesson plans on time management were developed. The ICT instructional method was used to develop 5 lesson plans. The second grade middle school students as an experimental group participated in 5 ICT time management classes during middle school creative extra curricular activities. The control group of students who had some condition with the experimental group were taught by traditional instructional methods. After experiment, the changes in attitude and knowledge of time management of both groups were analyzed using Analysis of Covaziance. The significant improvements of attitude and knowledge on time management were found among the experimental group of students compared with control group of students. Thus the following conclusion is made the ICT time management instruction conducted in this study was found loaming more effective than traditional one in attitudes and knowledge of time management

  • PDF

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

Determinants of Hotel Customers' Use of the Contactless Service: Mixed-Method Approach (호텔 고객의 비대면 서비스 이용의도의 영향요인에 대한 연구)

  • Chung, Hee Chung;Koo, Chulmo;Chung, Namho
    • Knowledge Management Research
    • /
    • v.22 no.3
    • /
    • pp.235-252
    • /
    • 2021
  • The development of information and communication technology and COVID-19 have caused an unusual change in the hotel industry, and the demand for the contactless services such as service robots from hotel customers has surged. Therefore, this study investigates the perception of hotel customers on contactless services by applying a mixed-method analysis. Specifically, this study identified the causal correlations between variables through the structural equation model, and further applied the fuzzy set qualitative comparison analysis to derive patterns of variables that form the intention to use the non-face-to-face services. As a result of the analysis, it was shown that service experience co-creation, palyfulness, personalization, and trust had a significant effect on intention to use through the contactless service use desire. On the other hand, in the results of fuzzy-set qualitative comparison analysis, playfulness was derived as a core factor in all patterns. Based on these analysis results, this study provides academic basis for in-depth understanding of hotel customers' perception of contactless service and specific guidelines for hotel managers on the contactless service strategies in the era of COVID-19 pandemic.

A Study on the Analysis of Miles Training Effect (마일즈 훈련효과 분석에 관한 연구)

  • Lee, Yong-Yeon;Lee, Ho Jun;Kim, Yong-Pil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.353-359
    • /
    • 2021
  • The Army is constructing a training system using Miles equipment that applies the latest science and technology to carry out military training. The Miles training system is a system that uses Miles equipment to simulate the damage situation of combat personnel and equipment in the same way as an actual battlefield by conducting practiced maneuvers in the field. Through this, the training force can experience conditions similar to an actual battle. In particular, the training effects of the warriors participating in the training can be maximized by establishing an integrated system that utilizes cutting-edge science technologies, such as information communication and computer simulation. This study analyzed the effects of Miles training in the army using scientific techniques targeted at the mid-range Miles. In particular, the effect index for analyzing the training effect was derived from a literature survey and expert opinions. The weight of each effect index was calculated by applying the Swing method. The final training effect was calculated by combining the results of the survey from train-experienced people. The Miles training effect was 2.6 times more effective than previous training without using Miles, and the satisfaction rate with Miles training according to status was high through variance analysis, and the difference was statistically significant.

Machine Learning for Predicting Entrepreneurial Innovativeness (기계학습을 이용한 기업가적 혁신성 예측 모델에 관한 연구)

  • Chung, Doo Hee;Yun, Jin Seop;Yang, Sung Min
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2021
  • The primary purpose of this paper is to explore the advanced models that predict entrepreneurial innovativeness most accurately. For the first time in the field of entrepreneurship research, it presents a model that predicts entrepreneurial innovativeness based on machine learning corresponding to data scientific approaches. It uses 22,099 the Global Entrepreneurship Monitor (GEM) data from 62 countries to build predictive models. Based on the data set consisting of 27 explanatory variables, it builds predictive models that are traditional statistical methods such as multiple regression analysis and machine learning models such as regression tree, random forest, XG boost, and artificial neural networks. Then, it compares the performance of each model. It uses indicators such as root mean square error (RMSE), mean analysis error (MAE) and correlation to evaluate the performance of the model. The analysis of result is that all five machine learning models perform better than traditional methods, while the best predictive performance model was XG boost. In predicting it through XG boost, the variables with high contribution are entrepreneurial opportunities and cross-term variables of market expansion, which indicates that the type of entrepreneur who wants to acquire opportunities in new markets exhibits high innovativeness.

Multi-Path Routing Algorithm for Cost-Effective Transactions in Automated Market Makers (자동화 마켓 메이커에서 비용 효율적인 거래를 위한 다중 경로 라우팅 알고리즘)

  • Jeong, Hyun Bin;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.269-280
    • /
    • 2022
  • With the rise of a decentralized finance market (so called, DeFi) using blockchain technology, users and capital liquidity of decentralized finance applications are increasing significantly. The Automated Market Maker (AMM) is a protocol that automatically calculates the asset price based on the liquidity of the decentralized trading platform, and is currently most commonly used in the decentralized exchanges (DEX), since it can proceed the transactions by utilizing the liquidity pool of the trading platform even if the buyers and sellers do not exist at the same time. However, Automated Market Maker have some disadvantages since the cost efficiency of each transaction using Automated Market Maker depends on the liquidity size of some liquidity pools used for the transaction, so the smaller the size of the liquidity pool and the larger the transaction size, the smaller the cost efficiency of the trade. To solve this problem, some platforms are adopting Transaction Path Routing Algorithm that bypasses transaction path to other liquidity pools that have relatively large size to improve cost efficiency, but this algorithm can be further improved because it uses only a single transaction path to proceed each transaction. In addition to just bypassing transaction path, in this paper we proposed a Multi-Path Routing Algorithm that uses multiple transaction paths simultaneously by distributing transaction size, and showed that the cost efficiency of transactions can be further improved in the Automated Market Maker-based trading environment.

A Case Study on ESG Management in the Age of the Fourth Industrial Revolution - Focused on ESG management of appraisers and Korea Association of Property Appraisers (제4차 산업혁명시대에 있어서 ESG 경영 사례연구 -감정평가사와 한국감정평가협회 ESG 경영 활동을 중심으로)

  • Jeon, Gwang Seop
    • Smart Media Journal
    • /
    • v.11 no.7
    • /
    • pp.28-38
    • /
    • 2022
  • The term 'fourth industrial revolution' was mentioned at the World Economic Forum (WEF) in 2016 and has become a term representing a new industrial era based on information and communication technology (ICT). In the environment of the 4th industrial revolution, ESG management activities are becoming a very important factor in business activities. With the emergence of a new paradigm of organizational operation in the post Covid19 era, the demands for ESG (Environment, Social, Governance) investment related to the environment, social responsibility are increasing. This study examines the role that can support ESG management by utilizing the expertise of appraisers. Real estate is one of the fields of high public interest, and since most ESGs have been conducted centered on the role of private companies, the role of the expert group or the role of public corporations and public institutions is relatively insufficient. If a company or general company engaged in the real estate investment business establishes the role of the Korea Appraisers Association to revitalize ESG management using appraisers, such as ESG appraisers, when investing in real estate, it is believed that it will be possible to promote efficient and sound development of the real estate industry. It was judged that a study on a group of experts was also necessary. In addition, even if the impact of Covid-19 is excluded, it is necessary to gradually introduce an appraisal using non-face-to-face or various advanced technologies (the 4th industry). This study differs from previous studies in that it focused on the role of ESG by the Korea Association of Property Appraisers while research on the role of ESG in public institutions or expert groups is being actively conducted in recent years.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.