• Title/Summary/Keyword: User Network

Search Result 4,591, Processing Time 0.031 seconds

Recommendation Method for 3D Visualization Technology-based Automobile Parts (3D 가시화기술 기반 자동차 부품 추천 방법)

  • Kim, Gui-Jung;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.185-192
    • /
    • 2013
  • The purpose of this study is to set the relationship between each parts that forms the engine of an automobile based on the 3D visualization technology which is able to be learned according to the skill of the operator in the industry field and to recommend the auto parts using a task ontology. A visualization method was proposed by structuring the complex knowledge by signifying the link and the node in forms of a network and using SOM which can be shown in the form of 3 dimension. In addition, by using is-a Relationship-based hierarchical Taxonomy setting the relationship between each of the parts that forms the engine of an automobile, to allow a recommendation using a weighted value possible. By providing and placing the complex knowledge in the 3D space to the user for an opportunity of more realistic and intuitive navigation, when randomly selecting the automobile parts, it allows the recommendation of the parts having a close relationship with the corresponding parts for easy assembly and to know the importance of usage for the automobile parts without any special expertise.

A study on the Application of PB/MC-CDMA for IoT Services in Small Cell Environment (IoT 서비스를 위한 스몰셀 환경에서 PB/MC-CDMA 적용 방안에 대한 연구)

  • Lee, Kyu-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.21-27
    • /
    • 2016
  • In this paper, we introduce the PB/MC-CDMA (Partial Block/Multi-Carrier-Code Division Multiple Access) system to mitigate inter-cell interference (ICI) and enhance user capacity in the small cell environment. In 5G mobile communications, the number of devices connected to the network is expected to increase exponentially with the expansion of the IoT (Internet of Things) services. In addition, each device is expected to be required by the various data rates by their content types. In LTE/LTE-A, there are some limitations that large scale connectivity and supporting various data rates. Therefore, we introduce a PB/MC-CDMA physical layer system which is suitable for the small cell environment, and evaluate the performance in the multi cell environment which is affected by ICI. Through computer simulation results, we demonstrate the effectiveness of PB/MC-CDMA for the small cell environment.

System Architecture Design and Policy Implications on the e-Marketplace for Telecom Bandwidth Trading (Telecom Bandwidth Trading을 위한 시스템 아키텍처 설계와 거래시장 모형)

  • Kim, Do-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.257-267
    • /
    • 2007
  • Bandwidth Trading(BT) represents a potential market with over 1 trillion USD across the world and high growth potential. BT is also likely to accelerate globalization of the telecommunications industry and massive restructuring driven by unbundling rush. However, systematic researches on BT remain at an infant stage. This study starts with structure analysis of the Internet industry, and discusses significance of Internet interconnection with respect to BT issues. We also describe the bandwidth commoditization trends and review technical requirements for effective Internet interconnection with BT capability. Taking a step further, this study explores the possibility of improving efficiency of network providers and increasing user convenience by developing an architectural prototype of Hub-&-Spoke interconnection model required to facilitate BT. The BT market provides an innovative base to ease rigidity of two-party contract and increase service efficiency. However, as fair, efficient operation by third party is required, this research finally proposes an exchanging hub named NIBX(New Internet Business eXchange).

  • PDF

Implementation of Embedded Educational Router System (임베디드 교육용 라우터 실습장비의 구현)

  • Park, Gyun Deuk;Chung, Joong Soo;Jung, Kwang Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.9-17
    • /
    • 2013
  • This paper presents the design of the educational router system. This system is designed and implemented to support network configuration and embedded programming technology of the user on Internet. Not only Static routing protocol but also a kind of dynamic routing protocols such as OSPF and RIP and firewall have been programmed for education based on ethernet interface. ADS 1.2 as debugging environment, uC/OS-ii as RTOS and C language as development language are used. The educational procedures is compile, loading of static routing protocol, a kind of dynamic routing protocols such as OSPF and RIP and firewall program already supplied. Thereafter the verification is checked by using "ping" test to allow for demo operation such as hands-on training procedure. Finally programming procedure similar with demo operation of static routing protocol, a kind of dynamic routing protocols such as OSPF and RIP and packet filtering function is educated step by step.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.

Design of a Request Pattern based Video Proxy Server Management Technique for an Internet Streaming Service (인터넷 스트리밍 서비스를 위한 요청 기반 비디오 프록시 서버 관리 기법의 설계)

  • Lee, Jun-Pyo;Cho, Chul-Young;Lee, Jong-Soon;Kim, Tae-Yeong;Kwon, Cheol-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.57-64
    • /
    • 2010
  • Due to the limited storage space in video proxy server, it is often required to replace the old video data which is not serviced for long time with the newly requested video. This replacement causes the service delay and increase of network traffic. To circumvent this problem, we propose the an efficient replacement scheme in a video proxy server. In addition, we present a video data management technique for decreasing the number of replacement in video proxy server. For this purpose, we employ a memory in video proxy server. If the video segment which is loaded in memory is requested once again by a different user, this segment is resided in memory. The video in the memory is stored in the video proxy server depending on the consuming pattern by users. The simulation results show that the proposed algorithm performs better than other algorithms in terms of packet hit rate and number of packet replacement.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Keystroke Application Technique for User Authentication in E-Learning System (이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.25-31
    • /
    • 2008
  • It is important for users to be confirming in e-Leaning system, because legitimate learner should be joined to the system for teaming and testing Thus, most system for authentication was verified using id and password with learner's id and password. In this case, It can be easy for hackers to steal learner's id and password. In addition, soma learner gets another to sit for the examination for one with another person id and password. For the solution like this problem it needs a biometrics authentication for complement. This method is required so much extra cost as well as are an unwanted concern. Therefore, we proposed keystroke technique to decide which learners are righteous or unlawful in this paper. In addition, we applied statistics and neural network for the performance of keystroke system. As a result, the performance of FAR and FRR in keystroke authentication was increased by proposed method.

Development of Network-Based Online GPS Baseline Processing System (네트워크 기반 온라인 GPS 기선해석 시스템 개발)

  • Kim, Su-Kyung;Bae, Tae-Suk
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.2
    • /
    • pp.138-146
    • /
    • 2011
  • With the increased use of GPS in the field of various applications including surveying, the request for fast and precise positional information has increased. Several countries such as USA, Canada, and Australia have already been operating Internet-based automatic GPS data analysis system using e-mail and FTP. Expanding GPS market, it is necessary to establish automatic GPS baseline processing system that is accessible via Internet. The system developed in this study is operating on the web, and it allows the users to access easily regardless of time and place. The main processing engines are Bernese V5.0 and PAGES. They process user data with three GPS CORS(Continuously Operating Reference Station), and then send the report to the users through e-mail. This system allows users to process high accurate GPS data easily. It is expected that this system will be used for various GPS applications such as monitoring large-scale structures and providing spatial information services in private sector.

Tempo-oriented music recommendation system based on human activity recognition using accelerometer and gyroscope data (가속도계와 자이로스코프 데이터를 사용한 인간 행동 인식 기반의 템포 지향 음악 추천 시스템)

  • Shin, Seung-Su;Lee, Gi Yong;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.286-291
    • /
    • 2020
  • In this paper, we propose a system that recommends music through tempo-oriented music classification and sensor-based human activity recognition. The proposed method indexes music files using tempo-oriented music classification and recommends suitable music according to the recognized user's activity. For accurate music classification, a dynamic classification based on a modulation spectrum and a sequence classification based on a Mel-spectrogram are used in combination. In addition, simple accelerometer and gyroscope sensor data of the smartphone are applied to deep spiking neural networks to improve activity recognition performance. Finally, music recommendation is performed through a mapping table considering the relationship between the recognized activity and the indexed music file. The experimental results show that the proposed system is suitable for use in any practical mobile device with a music player.