• Title/Summary/Keyword: Internet media

Search Result 2,218, Processing Time 0.025 seconds

Consumer's Demands for the T-Commerce By the Technology Adoption Types (소비자의 기술혁신수용 유형에 따른 T-Commerce 수요도)

  • Park, Sun-Young
    • Journal of Broadcast Engineering
    • /
    • v.13 no.3
    • /
    • pp.319-327
    • /
    • 2008
  • The purpose of study is to investigate the customer oriented transaction environment for the customers' convenience, the plan of public policy in regard to the customer oriented T-Commerce, and the consumption pattern of customers' commercial transaction, necessary for the marketing strategy by analyzing the demand for the T-Commerce with the purchase intention and maximum willingness to pay according to the demographic factors, the pattern of commercial transaction, and the technology innovation types. The results showed that there were statistically significant relations between consumer's willingness price to pay for the T-commerce and the consumer's technology adoption types, monthly internet shopping amounts, and weekly TV-home shopping hours. The simulations on a basis of multiple regression analysis for the T-commerce were illustrated by those factors.

Development of a Meeting Android Application Based on Real-Time Remote Screen Control (실시간 원격화면 제어 기반의 회의 지원 안드로이드 앱 개발)

  • Jung, Jae Yoon;Kim, Tae-Hwa;Jung, Hyun-Woo;Lee, Ji-Hoon;Kim, Dong Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.411-413
    • /
    • 2012
  • It is noticeable that the number of newly registered Android applications increases rapidly. Such a recent trend indicates the Android platform is spreading globally. The ongoing platform upgrade might be one of the main reasons of the popularity of the Android mobile platform. Android platform 4.0 or later provides WiFi-Direct APIs that allow smart devices to communicate with each other without intermediate media. In this paper, we propose design and implementation techniques for small-scale impromptu meeting applications based on WiFi-Direct. The proposed meeting application can be used in a situation when one is difficult to connect the Internet. It also provides meeting data sharing capabilities, noting functionality, real-time remote screen control, and grouping of meeting participants. Our development results have demonstrated that the Android WiFi-Direct APIs can be effectively applied to impromptu conferencing mobile applications.

  • PDF

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

Model Validation of a Fast Ethernet Controller for Performance Evaluation of Network Processors (네트워크 프로세서의 성능 예측을 위한 고속 이더넷 제어기의 상위 레벨 모델 검증)

  • Lee Myeong-jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.92-99
    • /
    • 2005
  • In this paper, we present a high-level design methodology applied on a network system-on-a-chip(SOC) using SystemC. The main target of our approach is to get optimum performance parameters for high network address translation(NAT) throughput. The Fast Ethernet media access controller(MAC) and its direct memory access(DMA) controller are modeled with SystemC in transaction level. They are calibrated through the cycle-based measurement of the operation of the real Verilog register transfer language(RTL). The NAT throughput of the model is within $\pm$10% error compared to the output of the real evaluation board. Simulation speed of the model is more than 100 times laster than the RTL. The validated models are used for intensive architecture exploration to find the performance bottleneck in the NAT router.

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

A Study on the Selective Visual Vision and Cinemagraph Expression (영상미디어의 선택적 시각과 시네마그래프 표현 연구)

  • Yu, Jung-Sun;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.325-331
    • /
    • 2017
  • The purpose of this study is optional cinemagraph ads based on the case through the psychological theory of visual multimedia story qualitative analysis, quantitative analysis. Cinemagraph analysis would like to present the model. The analysis popular advertising model who starred with the higher profile in 2016 Gmaket of cinemagraph series of ads research, literature research, and Internet media. Analysis, case studies, etc. The analysis appeared around 10 percent was the most effective in the form of moving the form of copper wire. Part of the video cinema than the overall movement of the graph bigger visual flow effects is a dynamic. Moving the direction of the model used copper wires and broadly consistent with the product. Subject & Surrounding and margins are being used within one point or two points. The story of probability model in the short and expressing simple action of the product. Direction of the action, the proportion of multimedia for quantitative analysis of space story for the qualitative analysis of the periphery and jujebu, stories, such as the probability of four.For consideration the terms.

5G service and universal service (5G시대 통신서비스의 공익성 제고 방안에 대한 모색)

  • Kim, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.103-110
    • /
    • 2020
  • The fire incident of KT's Ahyun branch occurred last year indicates that hyper-connected society led by 5G technology would be a dystopia instead of a utopia unless seamless connection of 5G service is well secured. Looking backward on 1999, we could peacefully and happily greet the new millennium by making a great effort to prevent the millennium bugs(Y2K) from causing the catastrophe such as a shut-down of banking system. Likewise, we should make a great effort to keep 5G networks and 5G service continuously working without the disruption of even just a second, which would enable us to avoid facing any catastrophes caused by the disruption of 5G service. As a way to do so, it can be considered that 5G service is designated as universal service because it has the key features of public goods like telephone and high-speed internet services.

Study in Analyzing Method of Web Interface Design (웹 인터페이스디자인 분석방법 연구)

  • 이현주;이정현;방경락;류성현;신계옥;이은주
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.209-216
    • /
    • 2001
  • With rapid growth of internet uses and the new media, web has become a new medium of communicating and sharing of information. Therefore, the methodology of web interface design must be set to improve the efficiency of communicating and sharing information The study has researched on analyzing method of web interface design for effective uses of web. The study is a precedent research of methodology of web interface design based on the following structures-grouping web contents, information architecture, web page design, structural elements of interface design. Accordingly, the study provides the analyzing method of web interface design with the basis of its structural elements. The analyzing method of web interface design is divided into three steps-grouping of web sites, analyzing structural elements, and evaluation. As a result, grouping and embodying of interface design brings usability guideline for design development as well as collecting of data for examining further results through design processes.

  • PDF

A Study on the Development of CACD(Computer Aided Clothing Design) and the Present Condition Applied for Industry (CACD(Computer Aided Clothing Design)의 발달 및 산업계의 적용 현황에 대한 고찰)

  • Wu, Se-Hee;Choy, Hyon-Sook
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.11 no.1
    • /
    • pp.87-97
    • /
    • 2009
  • A technology in development called CACD (Computer Aided Clothing Design) can reproduce fashion shows by utilizing computers, and is of particular interest. Considering the growth potential of this area, the purpose of this study is to present the development potentials that CACD technology will bring to the fashion area and to promote the diversity of the fashion industry. This will be realized by identifying the current status of CACD and its reach in the field of Fashion, followed by an in-depth analysis of its application. The methodologies employed in this study are as follows; in-depth study of related literature, field research of business firms, and investigation on Internet data. For the systematic advance of CACD, the development of user-friendly programs for 3D clothing design is of the utmost priority. The four technologies that should be intensively developed to enhance the development of the clothing industry through the utilization and commercialization of CACD are as follows; First, technology capable of performing accurate three-dimension measurement of the human body is needed. Second, technology which realizes automatic pattern formation is needed. Third, the nature physical properties of the material and textile design when applied to pre-formed patterns must be expressed similarly to the real thing. Last of all, an integrative technology which can conduct fast and accurate clothing simulations must be developed.

  • PDF

A Qualitative Study on the Purchase Behavior for the Counterfeit of Fashion Luxury Brands (패션 명품(名品) 복제품(複製品)의 구매행동(購買行動)에 관(關)한 질적(質的) 연구(硏究))

  • Kim, Il
    • Journal of Fashion Business
    • /
    • v.8 no.5
    • /
    • pp.41-59
    • /
    • 2004
  • The purpose of this study is to analyze consumers' purchase behavior for the counterfeits of fashion luxury brands. The research method of the study used a naturalistic approach. The first participant observation was carried out in the internet sites in order to collect the data on the purchase behavior for counterfeits; and the second participant observation was applied in the Dongdaemun shopping mall, Namdaemun shopping mall and Itaewon shopping mall; finally 6 informants were selected and then an interview was held with them. The results of the study are as follows; 1. The reasons for the first purchase of counterfeits are variously shown according to life stages, and the repetitive purchase behavior is influenced by the degree of satisfaction for the first purchase. The information collection for counterfeits is widely made through various media, and especially the information collection is active and positive in the case of planned purchase but it is passive and negative in the case of unplanned purchase. 2. The most important criteria in purchasing counterfeits is the degree of similarity with luxury brands and other criteria include price, design, utility etc. The majority of purchase items is not clothing but miscellaneous goods which are more similar in terms of design and quality. The purchase of counterfeits is made by impulse purchase but the purchase of luxury brands is made by planned purchase. 3. The rationalization mechanism for the purchase of counterfeits is observed in all informants, which is a sort of defence mechanism for avoiding a guilty conscience to buy illegal goods.