• Title/Summary/Keyword: Internet media

Search Result 2,218, Processing Time 0.026 seconds

Lonely Deaths among Elderly People in the Aging Korean Society: Risk Factors and Prevention Strategies (고령화 한국사회의 노인 고독사: 위험요인과 예방전략)

  • Kim, Hae Sung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.454-462
    • /
    • 2017
  • The purpose of this study was to explore the lonely-death phenomenon and to understand the circumstances surrounding the lonely-death cases among elderly people by examining the articles on such phenomenon and the media reports of such cases. The cases of lonely death reported from 2007 to 2017 were used. Case analysis was conducted, and the news articles that described the lonely death cases were identified using an internet search engine. Forty seven cases were analyzed. Several risk factors emerged from the data obtained, such as economic hardship, chronic illness, mental health problems like alcohol addiction, social isolation, disconnection from family members or the neighborhood, unemployment, single household, unmarried or divorced status, and living in an urban area. Based on the findings, prevention strategies were addressed.

Interactive Storytelling Example Analysis of Promotion Site (웹 프로모션의 인터랙티브 스토리텔링 사례 분석)

  • Kim, Sun-Young;Ahn, Seong-Hye
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.631-636
    • /
    • 2007
  • Promotion websites of companies have several advantages: They can publicize the brand image in various ways by using the character of web environment; they enable consumers to learn the information of products in the round with interests; they can stretch out their marketing targets to the whole world. In order to make an effective delivery of their information in such promotion websites, interaction with their consumers is an important factor, for which understanding Interactive Storytelling is essential. The purpose of this thesis is to study Interactive Storytelling which enables us to have effective interaction with consumers in making promotion websites of companies. For this, this thesis analyzes examples of Interact Storytelling focused on it have story promotion websites on the basis of the five steps for internet marketing promotions: attraction of visitors, attraction of interests and participations, acquisition of the information of customers, grasp of the needs of customers, and an offer of values classified by customers.

  • PDF

Home Screen Adaptive Next Generation Broadcasting Service using MSA-ABR (MSA-ABR을 이용한 홈 스크린 적응형 차세대 방송 서비스 연구)

  • Mariappan, Vinayagam;Lee, Minwoo;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Lim, Yunsik;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.37-42
    • /
    • 2016
  • In this paper, in today's highly complex video and broadcast operations, broadcasters are constantly challenged to reliably deliver low-latency, high-quality video to multiscreen audiences on-air and online. The Adaptive Bit Rate (ABR) protocols enable internet video to a wide range of multiscreen devices. However, video quality is often marginal and would prove unacceptable for valued linear broadcast content delivered to the Big Screen today. The Media information processing technology advances in ABR enables service providers to take control and offer quality managed linear video services to ALL screens in the home, including the Big Screen, with a single unified IP Video infrastructure. The New Multiscreen-Assisted ABR (MSA-ABR) delivery management system proposed using Cloud based multicast-assisted ABR for a broadcast facility that performs routing of contribution content and online publishing services within a virtual, centralized cloud infrastructure.

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.

WWW Security Mechanism Using Plug-in and PGP (Plug-in 기법을 이용한 PGP 기반의 Web 보안 시스템 개발)

  • 김태갑;조은경;박정수;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.205-218
    • /
    • 1996
  • World Wide Web(WWW) has a lot of useful charaters. Easiness of use, multi-media data supporting and interactive communication capability are typical reasons why people want to use WWW. But because WWW is based on Internet, it has some security problems which originate in plain format data transmission on physical transmission line. The unique solution fer this problems is data encryption. Since theoritically proved encryption algorithms ensure data confidentiality, a unauthorized user can not know what is transmitted on network. In this paper, we propose a cryptography system which uses public key system. In detail, our public key based web security mechanism is using PGP module. PGP is a e-mail security system implemented by Phil Zimmermann. The basic idea of our propose is data encryption and integrity checking for all data which is transmitted on Web. To implement these facilities, we. use netscape browser extension technology, plug-in. Through these technology, security mechanisms are added on netscape browser.

  • PDF

Mutimedia Mail Authoring System Providing Message Integration (메시지 통합성을 제공하는 멀티미디어 메일 저작 시스템)

  • Lee, Taek-Kyeun;Kim, Tai-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3139-3149
    • /
    • 1997
  • E-mail system has been widely used for information transmission. As multimedia technologies are developed, many Internet services support multimedia. E-mail system only transmits 7bit ASCII data using simple mail transfer protocol(SMTP) specified in RFC 821. E-mail system can't support the authoring and the transmission of multimedia data. In this study multimedia mail authoring system has been designed and implemented in order to provide message integration. Multimedia messages can be authored and transformed into text types with this system. Transformed messages are transmitted from sender's mail transfer agent (MTA) to receiver's MTA by means of SMTP. Messages can be authored in hypertext markup language (HTML) including text, image, audio and video. This system provides integrated messages which consist or various media. BASE64 Encoding method is used in order to transform multimedia messages into text types. Received mails are managed by multimedia user agent (MUA) which is proposed in this study. Convenience for user is improved in this system.

  • PDF

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

An Empirical Study on the Weight of Purchasing Factors according the Purchasing Style Using the AHP (계층분석과정을 이용한 소비자의 구매행태에 따른 구매요인별 중요도에 관한 실증적 연구)

  • Kim Shin-Joong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.259-270
    • /
    • 2005
  • The primary research objective of this study is to evaluate a weight of purchase decision making factors according to the purchasing style. In this study, the purchasing style is classified into two categories-online shopping and offline shopping group. This study adopts the AHP method to calculate a weight of factors. For this purpose, 22 purchasing factors which affect on consumer purchasing decision making are classified into four factors - a product related factor, a convenience related factor, a purchasing risk related factor and a shopping enjoyment related factor. In this study, the weights of purchasing factors are evaluated according to 1)the purchasing style-online and offline Purchasing group, 2)the frequency of online shopping-high and low group, 3)the media used for online shopping-the TV home shopping and Internet home shopping group. The result shows that there are difference the weight of factors according to the purchasing style.

  • PDF

The Defense Strategies against Consumer Unethical Behaviors (소비자의 비윤리적 행동에 대한 방어전략)

  • Lee, Un-Kon;Park, Jong Pil;Choi, Young Eun;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.17-37
    • /
    • 2012
  • The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.

Detection of Aesthetic Measure from Stabilized Image and Video (정지영상과 동영상에서 미도의 추출)

  • Rhee, Yang-Won;Choi, Byeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.33-38
    • /
    • 2012
  • An free-fall object is received only force of gravity. Movement that only accept gravity is free-fall movement, and a free-falling object is free falling body. In other words, free falling body is only freely falling objects under the influence of gravity, regardless of the initial state of objects movement. In this paper, we assume, ignoring the resistance of the air, and the free-fall acceleration by the height does not change within the range of the short distance in the vertical direction. Under these assumptions, we can know about time and maximum height to reach the peak point from jumping vertically upward direction, time and speed of the car return to the starting position, and time and speed when the car fall to the ground. It can be measured by jumping degree and risk of accident from car or motorcycle in telematics.