• Title/Summary/Keyword: Private Technical

Search Result 300, Processing Time 0.025 seconds

A Study on the Development Trend and Strategies of Digital Contents in the Ubiquitous Era (유비쿼터스 시대(時代) 디지털콘텐츠의 발전방향(發展方向)과 개발전략(開發戰略)에 관한 연구(硏究))

  • Shim, Sang-Ryul
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.121-142
    • /
    • 2006
  • With the advent of Ubiquitous era, Korean government understood its strategic importance and formulated 'IT839 Strategies' with various action plans not to miss the great opportunities which it may allow and eventually to realize u-Korea. As a result, m-Commerce is actualized and new types of Ubiquitous services such as digital multimedia broadcasting(DMB) and wireless broadband Internet(WiBro) are now on their commercial stages. Digital contents are the key success factors of these new services. Digital contents industry is regarded as next generation of growth engine in the digital economy, because it is knowledge-based and high value-added global industry affecting positively on the whole private and public sectors. This paper reviewed the characteristics, business models, technical and market trend of digital contents to be compatible with Ubiquitous environment. Also, it reviewed the development strategies of DMB and WiBro services, which are newly introduced and commercialized in Korea to make it as world leader in these fields. It may be concluded that Korea should make more efforts to development market-oriented digital contents for Ubiquitous era and to realize the sustained economic growth.

  • PDF

Food Security Problems in North-East Asia and Cooperative Measures in the 21st Century (21세기 동북아 식량안보문제와 지역간 협력방안)

  • Kwon, Yong Dae
    • Korean Journal of Agricultural Science
    • /
    • v.27 no.2
    • /
    • pp.182-189
    • /
    • 2000
  • The issue of food security will become one of the most widely concerned area of public policy in North East Asia coming 21st century. Although those countries such as China, Japan, South and North Koreas and Mongolia places emphasis on the need to have stable and reliable capacity for food production, it will be highly possible for these regions to experience the shortage of food supply due to growing population, expanding urbanization and rapid industrialization within next decade. Since world food markets are characterized as unstable structure and dominated by large multinational firms, their reliances on importing staple food may create the aggravation of food shortage problem in emergency situations. One possible proposal for solving food security in north-east region might be movements toward multilateral food supply assurance agreements as a component of trade negotiations among these countries. As measures for cooperation for securing food supply in these regions, following principles would be suggested; 1) encouraging agricultural cooperation based on private business, 2) exchange of technical and human resources rather than material support, 3) developing mutual concern and benefits, 4) managing joint buffer stock for staple food.

  • PDF

A Study on Application of Performance Warranty Contract to Building Construction (성능보증계약제도의 건축분야 적용 방안에 관한 연구)

  • Ko, Hyun;Kim, Kyung-Hwan;Lee, Youn-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.687-690
    • /
    • 2007
  • This study is a basic research on looking onto bringing performance warranty contract into the country, to consider the usage in architecture which it is usually used on road pavement in developed countries. The study will also apply performance warranty contracts on public private partnerships through examination and analysis of various matters which will lead to globalization of the korean architecture industry, the increase of quality of result, better convenience for the orderer, the decrease of cost, and the acceleration on research for technical development.

  • PDF

A Study on the Numbering Plan for National Information Infrastructure (초고속 통신망의 번호 체계에 관한 연구)

  • Hwang, Gunn;Kim, Yong-Jin;Choi, Jun-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.283-293
    • /
    • 1998
  • The numbering plan, basic requirements for interworking standards, and technical standard specification for National Information Infrastructure have not been defined specifically yet. It is reviewed for the numbering plans of public/private ATM networks based on the standard specifications of W-T and ATM Forum. The specifications for numbering plan are discussed for the interworking between current various networks and National Information Infrastructure based on the related standard specification of ITU-T and ATM Forum.

  • PDF

Analysis of Chaotic True Random Number Generator Using 0.18um CMOS Process (0.18um CMOS 공정을 사용한 카오스 난수 발생기 분석)

  • Jung, Ye-Chan;Jayawickra, Chamindra;Al-Shidaifat, AlaaDdin;Lee, Song-Wook;Kahrama, Nihan;Song, Han-Jung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.635-639
    • /
    • 2021
  • As times goes by, a ton of electric devices have been developing. Nowadays, there are many personal electric goods that are connected each other and have important private information such as identification, account number, passwords, and so on. As many people own at least one electric device, security of the electric devices became significant. To prevent leakage of the information, study of Chaotic TRNG, "Chaotic True Random Number Generator", protecting the information by generating random numbers that are not able to be expected, is essential. In this paper, A chaotic TRNG is introduced is simulated. The proposed Chaotic TRNG is simulated with Virtuoso &, a circuit design program of Cadence that is a software company. For simulating the mentioned Chaotic TRNG, setting values, 0V low and 3V high on Vpulse, 1.2V on V-ref, 3.3V on VDD, and 0V on VSS, are used.

The Data Sharing Economy and Open Governance of Big Data as Public Good

  • LEE, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.87-96
    • /
    • 2021
  • Data-driven markets depend on access to data as a resource for products and services. Since the quality of information that can be drawn from data increases with the available amount and quality of the data, businesses involved in the data economy have a great interest in accessing data from other market players and sharing data with other stakeholders. Despite the growing need for access to data and evidence of the economic and social benefits, data access and sharing remains below its potential. Individuals, businesses, and governments often face barriers to data access, which may be compounded by the reluctance to share, including within and across sectors. To address these challenges, this paper focuses on finding possible solutions for a better data-sharing economy. This paper 1) Discusses opportunities and challenges of open data and the data-sharing economy, limitations of private sector data, and issues with open government data. 2) Introduces open government data initiatives and open governance networks initiatives. 3) Suggests possible solutions, including the governance and management, the legal and policy frameworks, and the technical standards for open data with proposing an open data governance model for the data-sharing economy.

Design of Online Certificate Revocation Information Transfer using Verifier Lists (검증자목록을 이용한 실시간 인증서 폐지 정보 전송의 설계)

  • 이용준;정재동;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.45-54
    • /
    • 2003
  • A public key certificate may be revoked before its validity period due to causes like the owner identification information change or the private key damage. Since a certificate has long valid time relatively, it is possible to become revoked during lifetime of certificate. The main technical issue in the public key infrastructure is how to handle the status of the certificate. We propose a simple mechanism for online certificate status validation that is suited to the financial network The characteristic of the proposed method is to broadcast certificate revocation information by using verifier list. The experimental results provide the same realtime as OCSP(Online Certificate Status Protocol). The proposed mechanism reduces the network load for certificate status validation in highly concentrated unbearable network.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Technical Trends of Medical AI Hubs (의료 AI 중추 기술 동향)

  • Choi, J.H.;Park, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.81-88
    • /
    • 2021
  • Post COVID-19, the medical legacy system will be transformed for utilizing medical resources efficiently, minimizing medical service imbalance, activating remote medical care, and strengthening private-public medical cooperation. This can be realized by achieving an entire medical paradigm shift and not simply via the application of advanced technologies such as AI. We propose a medical system configuration named "Medical AI Hub" that can realize the shift of the existing paradigm. The development stage of this configuration is categorized into "AI Cooperation Hospital," "AI Base Hospital," and "AI Hub Hospital." In the "AI Hub Hospital" stage, the medical intelligence in charge of individual patients cooperates and communicates autonomously with various medical intelligences, thereby achieving synchronous evolution. Thus, this medical intelligence supports doctors in optimally treating patients. The core technologies required during configuration development and their current R&D trends are described in this paper. The realization of the central configuration of medical AI through the development of these core technologies will induce a paradigm shift in the new medical system by innovating all medical fields with influences at the individual, society, industry, and public levels and by making the existing medical system more efficient and intelligent.

Theoretical Basis of Studying the Educational Environment with the Application of GR-Technologies

  • Romanchenko, Inna;Vasylevska, Olena;Haltsova, Svitlana;Babicheva, Hanna;Batsula, Natalia;Kravchenko, Hanna;Lytvyn, Aelita
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.28-32
    • /
    • 2021
  • The article discusses the theoretical and methodological part that characterizes and assessment of the current state of the theory of GR-activity, disclosed the essence and content of the concept of GR-technologies, as well as their classification. The analysis of the system of additional education for children in the social structure, as well as the analysis of the current state of the education system is carried out. The formulation of tasks for the construction of an effective model for the use of GR-technologies in the process of developing the education system using GR-technologies