• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.033 seconds

A Study on the User Participatory Communication Tools of National Archives Websites (국가 기록관 웹사이트에 나타난 이용자 참여 커뮤니케이션 도구에 관한 연구)

  • Park, Dukran;Sakong, Bok Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.2
    • /
    • pp.261-281
    • /
    • 2014
  • In light of the recent advancement in networking and information technology, the direct information request through website has increasingly proven to be the preferred means over visiting physical archives. Thus, the proper utilization of a communication tool capable of sufficiently capturing user feedback and requests is an absolute necessity. This paper examines the availability and utilization of alternative user participatory communication tools in government websites with particular focus on the archives in South Korea, the United States, the United Kingdom, Canada, China, and Japan. In assessing the use of alternative user participatory communication tools in these archives, we examined the availability of communication mediums other than the online forums, email, and telephone with particular focus on social media tools that may offer a degree of familiarity for the user. Our research indicates that the most frequently utilized social media tool is Facebook while the archive offering the greatest variety of alternative user participatory communication tools was the United States archive.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

TMO based Active Model for u-Healthcare (u-헬스케어를 위한 TMO기반의 액티브 모델)

  • Yoon, Young-Min;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.282-292
    • /
    • 2007
  • In this paper, we propose the active model based on the distributed object group framework which provides adaptive information sharing service to support it to various Healthcare home service. And we applied it to Healthcare home service. This proposed model provides information that collected from physical environment of the home network and sensors for healthcare service according to situation of the user. We uses information of the healthcare information database which was constructed previously, and we uses TMO scheme for to solve each other different periodic qualify. We uses information of the healthcare information database which was constructed previously, and we uses TMO scheme for to solve each other different periodic quality. Specialty, We wrote about interaction of various Healthcare Home services for adaptive information services, and wrote about u-healthcare framework based on DOGF. Finally, we apply active model to healthcare monitoring service, and we showed its result and performance evaluation.

Characteristics of Particulate Matter Concentration and Classification of Contamination Patterns in the Seoul Metropolitan Subway Tunnels (서울시 지하철 터널 내 입자상물질의 농도 특성 및 오염형태 분류)

  • Lee, Eun-Sun;Lee, Tae-Jung;Park, Min-Bin;Park, Duck-Shin;Kim, Dong-Sool
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.33 no.6
    • /
    • pp.593-604
    • /
    • 2017
  • The suspended particulate matter(PM) was measured in subway tunnel of Seoul Line 1 to 9 in order to evaluate the pollution degree and characteristics of the PM in the subway tunnel. Also, to analyze the effect of outdoor aerosol concentration on the PM concentration of subway tunnels, the ambient PM concentration around the subway station was extracted by spatial analysis using $PM_{10}$ data of Seoul air pollution monitoring network. Finally, in order to understand pollution pattern in the Seoul subway tunnels, cluster analysis was performed based on input data set such as PM levels in tunnel, tunnel depth, length, curvature radius, outdoor ambient air pollution levels and so on. The average concentration of $PM_{10}$, $PM_{2.5}$, and $PM_1$ on subway tunnels were $98.0{\pm}37.4$, $78.4{\pm}28.7$, and $56.9{\pm}19.2{\mu}g/m^3$, respectively. As a result of the cluster analysis, tunnels from Seoul subway Line-1 to Line-9 were classified into five classes, and the concentrations and physical properties of the tunnels were compared. This study can provide a method to reduce PM concentration in tunnel for each pollution pattern and provide basic information about air quality control in Seoul subway tunnel.

Establishing Planning elements of Community Facility considering The Social Weak (사회적 약자를 배려한 공동시설의 계획방향 연구)

  • Jae, Hae-Duek;Lee, Joo-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.1753-1763
    • /
    • 2015
  • This study tried to derive the elements of the plan, recognizing the importance of taking into account the social weak when construct community facilities. For these, this study found planning indicator around literature review, then re-established indicators by Focus Group Interview. So it can draw following implication through result of analysis. First, planner considering the social weak should make fair space for harmonious communication between users. physical planning is important, but the building is to be vehicle for the social communication. So it needs to compose program without social elimination. Second, it is important to make participation base for the social weak in community facilities. Finally the reinforce of participation base can be indicator which encourage ownership and locality.

WWW Security Mechanism Using Plug-in and PGP (Plug-in 기법을 이용한 PGP 기반의 Web 보안 시스템 개발)

  • 김태갑;조은경;박정수;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.205-218
    • /
    • 1996
  • World Wide Web(WWW) has a lot of useful charaters. Easiness of use, multi-media data supporting and interactive communication capability are typical reasons why people want to use WWW. But because WWW is based on Internet, it has some security problems which originate in plain format data transmission on physical transmission line. The unique solution fer this problems is data encryption. Since theoritically proved encryption algorithms ensure data confidentiality, a unauthorized user can not know what is transmitted on network. In this paper, we propose a cryptography system which uses public key system. In detail, our public key based web security mechanism is using PGP module. PGP is a e-mail security system implemented by Phil Zimmermann. The basic idea of our propose is data encryption and integrity checking for all data which is transmitted on Web. To implement these facilities, we. use netscape browser extension technology, plug-in. Through these technology, security mechanisms are added on netscape browser.

  • PDF

Secrecy Enhancement via Artificial Noise with Protected Zones of Transmitter and Receiver (인공 잡음 및 송수신기 보호 구역을 활용한 보안 성능 향상)

  • Chae, Seong Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.558-564
    • /
    • 2016
  • The network interference gives positive and negative effects to security and QoS simultaneously by disturbing the decoding of receiver and eavesdropper. The transmission of artificial noise enables to indirectly control these contradicting effects. This paper proposed the secrecy enhancement technique via artificial noise with protected zones of transmitter and receiver and investigated its gain by using stochastic geometry. For given arbitrary artificial noise power ratio, we first analyzed connection outage probability and secrecy outage probability for four different scenarios (separated, overlapped, included secrecy protected zones- type A, B) according to distance and size of protected zones of the transmitter and receiver. We then derive the secrecy transmission rate and find the optimal artificial noise power ratio to maximize it. Finally, with numerical examples, we investigate the effects of the system parameters such as size of protected zones of transmitter and receiver on the optimal artificial noise power ratio.

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

Virtual Environment Interfacing based on State Automata and Elementary Classifiers (상태 오토마타와 기본 요소분류기를 이용한 가상현실용 실시간 인터페이싱)

  • Kim, Jong-Sung;Lee, Chan-Su;Song, Kyung-Joon;Min, Byung-Eui;Park, Chee-Hang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3033-3044
    • /
    • 1997
  • This paper presents a system which recognizes dynamic hand gesture for virtual reality (VR). A dynamic hand gesture is a method of communication for human and computer who uses gestures, especially both hands and fingers. Since the human hands and fingers are not the same in physical dimension, the produced by two persons with their hands may not have the same numerical values where obtained through electronic sensors. To recognize meaningful gesture from continuous gestures which have no token of beginning and end, this system segments current motion states using the state automata. In this paper, we apply a fuzzy min-max neural network and feature analysis method using fuzzy logic for on-line pattern recognition.

  • PDF

A Design of Channel Models for the ISDN Subscriber Loops (ISDN 가입자 루프에 대한 전송로 모델의 설계)

  • 백제인;박원식;이유경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.293-305
    • /
    • 1994
  • In this paper the efficient channel models of the subscriber loops for the ISDN U-interface digital transmission are presented. Several configuration medels of the loop network are adopted from the CCITT recommendations, and various parameters specifying the physical dimensions are determined in accordance with the measurements of the loop characteristics of Korea. A typical loop interfacing circuit is applied at both ends of the loops and the overall transmissing circuit model is obtained. Based on this circuit model of transmission. 3 types of signal path models, related to transmission, echo, and near end crosstalk noise are defined and their transfer function are respectively derived as the channel models. As examples of the proposed channel models, numerical calculation has been performed for some loop configuration models and the channel responses are investigation in both domains of frequency and time. It is shown that various changes of the loop characteristics can well be explained in terms of the proposed models. And these models can efficiently be used for the simulation of the digital transmission over the subscriber loop.

  • PDF