• Title/Summary/Keyword: Software service

Search Result 2,464, Processing Time 0.034 seconds

A Study on Preventing Invade of Privacy Using Tag Information for Social Network Service (SNS 상에서 태그 정보를 이용한 프라이버시 침해 대응에 관한 연구)

  • Jeong, Woon-Hae;Park, Doo-Soon
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.1139-1142
    • /
    • 2013
  • SNS(Social Network Service)를 사용하는 인구가 급증함으로 인해 개인의 생각이나 많은 자료들을 SNS 공간을 통해 공유함으로써 많은 문제들도 같이 발생하고 있는 추세이다. 대부분의 SNS는 자신의 공간에 게재된 정보에 대한 접근권한 만을 설정할 수 있고 자신이 타인의 공간에 게재한 게시물에 대해서는 접근 권한 설정에 대한 자격을 부여하지 않는다. 이를 통해 원치 않은 사용자들에게까지 자신의 개인 정보가 노출되는데, 이는 SNS 안에서의 문제만이 아니라 2차적인 문제도 만들어 낼 수 있다. 따라서 본 논문에서는 SNS 환경에서의 프라이버시 보호를 위한 태그 정보 접근 방법을 제안한다. 본 제안사항은 사용자의 태그정보에 대한 접근권한 설정을 통해 원치 않는 사용자가 2차적인 문제를 발생하지 않도록 제어할 수 있다.

Mobile Banking Service in Mongolia: The Role of Online Convenience on the Acceptance and Use Behavior

  • Ivanova, Aisena;Noh, Grimm
    • Asia Marketing Journal
    • /
    • v.24 no.2
    • /
    • pp.51-61
    • /
    • 2022
  • The goal of this study is to scrutinize the impact of individual online convenience dimensions on mobile banking acceptance and use in Mongolia. A total of 211 valid responses were collected from Mongolian university students who currently use mobile banking application services from local banks. The SmartPLS 3.3 software was used to conduct the confirmatory factor analysis and test the hypotheses. Using structural equation modelling, this research discovered that access convenience, transaction convenience, and possession/post-possession convenience are the main constructs related to the adoption of mobile banking services. Perceived innovation showed a significant positive effect on the adoption of mobile banking technologies. Through practical and theoretical implications, this research aims to assist mobile banking service channels of local and international banks in Mongolia. Identifying which online convenience dimensions impact the adoption and use of mobile banking will contribute to the adoption of competitive strategies for financial institutions and banks.

A Study on Structure of Middleware for Effective Cloud Infra and Service Mashup (효율적인 클라우드 인프라 및 서비스 메쉬업을 위한 미들웨어 구조 연구)

  • Park, Seung-Kyun;Park, Yong-Sung;Sung, Gi-Won;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.1549-1550
    • /
    • 2011
  • 현재의 다양한 메쉬업(Mashup) 기술은 웹에서 제공되는 데이터, 웹서비스, RSS/Atom 피드 등에만 사용이 국한되어 있기 때문에, 클라우드 환경에 적용하게 되면 SaaS(Software as a Service) 형태의 서비스로만 구성되게 된다. 하지만, 클라우드에서는 인프라 자원들도 서비스의 형태로 접근될 수 있으며, 이를 이용한 메쉬업이 가능하다. 이에 본 논문에서는 클라우드의 인프라 자원 및 SaaS 형태의 서비스를 메쉬업 할 수 있는 효율적인 미들웨어 구조를 제안하고자 한다.

Research on improving efficiency in VR game development

  • Kim Tae Gyu
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.74-80
    • /
    • 2023
  • Currently, hardware companies such as Oculus, Samsung, and HTC are producing virtual reality devices, and game software development companies are developing or servicing VR games using these devices. Accordingly, the VR game market is expected to continue to grow in the future. However, in order for the VR game market to become active, various problems raised during game development and service must be resolved. This paper investigates solutions to problems raised during the development and service of VR games, such as cyber sickness, risk of injury due to environmental restrictions during play, and reconnection induction problems. Cybersickness can be alleviated by utilizing multiple GPUs for each display processing to achieve higher frame rates and optimizing play space design. Environmental constraints during play can be mitigated by optimizing space design, and the problem of inducing reconnection can be solved by continuously providing the motivation and purpose used in existing game methods. Through this, we were able to apply it to develop VR content that can be played continuously.

A Study on Improved Service Time and Efficient Resource Utilization Based on DB Scaling in Kubernetes (쿠버네티스에서의 DB 스케일링 기반 서비스 시간 개선 및 효율적인 자원 사용 방안)

  • Joonyoung Yoon;Heonchang Yu
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.108-111
    • /
    • 2024
  • 클라우드 사용이 보편화 되고 확대됨에 따라, 서비스를 유연하게 확장 및 축소하여 신속하게 시장의 수요에 대응할 수 있는 PaaS(Platform-as-a-Service) 형태의 서비스가 많은 기업에서 각광받고 있다. 그리고 이러한 PaaS 형 서비스의 핵심이 되는 기술인 컨테이너(Container)와 컨테이너 관리를 효율화 해주는 쿠버네티스(Kubernetes)가 실질적인 표준으로 사용되고 있다. 이때 쿠버네티스 기반의 환경에서 서비스 어플리케이션은 다양한 구성사례가 존재하나, DB 는 아직 안정성 및 데이터 정합성 등을 이유로 베어메탈(Baremetal)이나 VM(Virtual Machine)을 기반으로 구성하고 있는 상황이다. 그러나, 인프라 구성 및 운영에 있어서도 파드(Pod) 형태의 DB 구성은 베어메탈 및 VM 대비 장점이 존재한다고 생각하여 본 실험을 수행하였다. 본 논문에서는 서비스 응답시간 및 자원 사용의 효율성 측면에서 VM 기반의 DB 와 쿠버네티스 파드 기반의 DB 에 각각 트래픽을 발생시켜서 비교한 결과와 시사점을 제시한다.

Development of the Port Authority Chatbot Service Using Generative AI and RAG (생성형 AI 및 RAG 활용한 항만공사 챗봇 서비스 개발)

  • Tae-Gang Kim;Seong-Ju Shin;Kang-Jun Lee;Seong-Bin Cho;Jun-Gyu Park;In-Soo Kim
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.1016-1017
    • /
    • 2024
  • 본 연구는 생성형 AI와 검색 증강 생성(Retrieval-Augmented Generation, RAG) 기술을 결합하여 환각(Hallucination)을 방지하고 항만공사 환경에 특화된 챗봇 서비스를 제안한다. 주요 특징은 첫째, KMS 저장소, 벡터 데이터베이스, 검색 및 재조정 처리, LLM을 이용한 프롬프트 처리 등을 통해 사용자 질의에 최적화된 응답을 생성한다. 둘째, '챗봇 One-Step-Service'은 사용자에게 업무 처리용 Form을 제공해 업무 처리의 편의성을 향상시킨다. 해당 시스템을 항만공사에 적용하여 한정된 상담 인력 문제를 해결하고 다양한 내부 업무에 적용하여 업무 효율성이 향상될 것으로 기대된다.

Metadata Management System Implementation for Object-oriented Personalized Media Service based on Multiple Camera (다중 카메라 기반의 객체중심 맞춤형 영상 미디어 서비스를 위한 메타데이터 관리 시스템 구현)

  • Byun, Sung-Woo;Lee, So-Min;Lee, Seok-Pil
    • Journal of Broadcast Engineering
    • /
    • v.19 no.5
    • /
    • pp.631-639
    • /
    • 2014
  • Since digital broadcasting service has been begun, user's requirements have been increased for personalized broadcasting system that users can watch the part of programs which they want to watch in anytime. In personalized broadcasting system, metadata is important for searching program information based on user's input data. In this paper, an object-oriented media service metadata management module is implemented. Metadata used in this system is described by extending TV-Anytime specifications which is the International standard for personalized media service. For this, extended segments information is provided including object information which do not existing in previous personalized broadcasting standard. This system can provide better satisfaction to users by using object segmentation information.

Implementation of Multilateral Control System for Small UAV Control-Focused on Design (소형 무인기 통제를 위한 다자간 방식 관제시스템 구축방안-설계 중심으로)

  • Choi, Hyun-Taek;Kim, Seok-Kwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.65-71
    • /
    • 2017
  • In this paper, we propose a design method for the construction of LTE-based small unmanned aerial vehicle control system to quickly and reliably collect multiple small unmanned aerial vehicle position information simultaneously flying all over the country. In particular, the main requirements are the network (N/W), hardware (H/ W), software(SW), Database(DB), development architecture, and business needs. To satisfy these requirements, N/W, H/W, SW, DB design, and architectural design plan were suggested regarding the design requirements of a small UAV system. To effectively control the small unmanned multi-party system in the system design, the architecture is divided into the front-end service area and the back-end service area according to the function and role of the unit system. In the front-end service area that grasps and controls the position and state of small unmanned aerial vehicles (UAVs), we have studied the design part that can be expanded to N through TCP/IP network by applying Client PC method.

Conformity Assessment and Test Method for Implementation of Web Services Compositions based on Choreography (코레어그래피 기반 웹 서비스 조합의 구현 적합성 평가 및 테스트 방법)

  • Kuk, Seung-Hak;Seo, Yong-Jin;Kim, Hyeon-Soo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.83-98
    • /
    • 2012
  • Recently Web services and SOA(Service Oriented Architecture) is widely used for an effective integration way of distributed applications. The service choreography is a way of service compositions to define workflows and the message exchange protocols among several partner ser-vices in the B2B business process environment. It defines the overall business process from a global perspective. However, it must be transformed into some kind of the executable form to implement service compositions, because it does not support an execution mechanism but is a de-clarative form. Therefore, the transformed executable model must be validated with the original choreography model to guarantee behavior equivalence. In this paper, we propose the conformity assessment with respect to service compositions method between the choreography model and the transformed executable model. And we suggest the test method to show behavior equivalence between them from a viewpoint of the dynamic execution.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.