• Title/Summary/Keyword: a internet

Search Result 25,346, Processing Time 0.059 seconds

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

A Study of Modified Parallel Feistel Structure of Data Speed-up DES (DES의 데이터 처리속도 향상을 위한 변형된 병렬 Feistel 구조에 관한 연구)

  • Lee, Seon-Keun;kIM, Hyeoung-Kyun;Kim, Hwan-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.12
    • /
    • pp.91-97
    • /
    • 2000
  • With the brilliant development of information communication and the rapid spread of internet, current network communication is carrying several up-to-date functions such as electronic commerce, activation of electro currency or electronic signature and will produce more advanced services in the future. Information communication network such as that electronic commerce would demand the more safe and transparent guard of network, and anticipate the more fast performance of network. In this paper, in order to meet the several demands, DES(data encryption standard) with parallel feistel structure, which feistel structure of the basic structure of DES is transformed into in parallel, is proposed. The existing feistel structure can't use pipeline method for the structural problem of DES itself-the propagation of error. therefore, this modified parallel feistel structure could improve largely the performance of DES which had to have the trade-off relation between data processing speed and data security and in addition a method proposed in SEED having adopted the modified parallel feistel structure shows more excellent secure function and/or fast processing ability. The used CAD Tool use Synopsys Ver. 1999. 10 in both of synthesis and simulation.

  • PDF

Utilization of similarity measures by PIM with AMP as association rule thresholds (모든 주변 비율을 고려한 확률적 흥미도 측도 기반 유사성 측도의 연관성 평가 기준 활용 방안)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.117-124
    • /
    • 2013
  • Association rule of data mining techniques is the method to quantify the relationship between a set of items in a huge database, andhas been applied in various fields like internet shopping mall, healthcare, insurance, and education. There are three primary interestingness measures for association rule, support and confidence and lift. Confidence is the most important measure of these measures, and we generate some association rules using confidence. But it is an asymmetric measure and has only positive value. So we can face with difficult problems in generation of association rules. In this paper we apply the similarity measures by probabilistic interestingness measure (PIM) with all marginal proportions (AMP) to solve this problem. The comparative studies with support, confidences, lift, chi-square statistics, and some similarity measures by PIM with AMPare shown by numerical example. As the result, we knew that the similarity measures by PIM with AMP could be seen the degree of association same as confidence. And we could confirm the direction of association because they had the sign of their values, and select the best similarity measure by PIM with AMP.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Factors Affecting the Continuous Use of Mobile Music Contents (모바일 음악콘텐츠의 지속적 사용에 영향을 미치는 요인에 관한 연구)

  • Yang, Seung-Kyu;Park, Seong-Won;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.291-305
    • /
    • 2008
  • Previous study about Mobile Music Contents was mainly focused on Industry factors & enterprise factors like Technology. This study is not only focused on Technology factors, but also Customer & System factors like TAM of original, and also, this study first tried to find the Mobile Internet medium's customer purchase by each property's Mobile Music Contents from assorting the Mobile music Contents property and defining them. So to speak of this study have tried to concretely verify the factors of purchase. And also, I proposed an transformated model, and added independent variable factors, 'distinction', 'speed of system', 'speed of network', 'a career of use', 'amount of use', 'preservation', 'customization', 'information', 'confidence', 'omni presentation', 'potential possibility of reproduce'. By applying TAM this study has measured how the product property. user property, and system property causes effect to customer purchase of Mobile Music Contents. In results, First, success 8 factors were determined to be the purchase of 'Ringtone'. Second, 8 factors were determined to be the purchase of 'Ring-Back tone', but, 'The use of convenience' was not influenced 'Intention of Purchase'. Third, 6 factors were determined to be the purchase of 'Full Track Download of Music'. At the Conclusion this study presented a scheme that these study results could be applied in actual company and academic world.

  • PDF

Purchasing Behavior of Cosmetics of Chinese Women Depending on Their Complex Purchasing Tendencies (중국여성들의 복합적 구매성향에 따른 화장품 구매행태)

  • Jang, Hye-Jung;You, Eun-Kyung;Kwon, Hye-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.549-554
    • /
    • 2017
  • This study conducted a survey on 319 Chinese women in their 20s to 50s living in three large cities in China, with an aim to analyze the influence on the purchasing behavior and satisfaction for Korean cosmetics depending on their complex purchasing tendencies. According to the research, the rational tendency was higher when the subjects were over 40 years old and married, and the impulsive tendency was the highest in those in their 30s. There was no huge difference in regions depending on the two tendencies, while there were statistically significant differences in purchasing period, times and costs when buying cosmetics. In addition, purchasing satisfaction for cosmetics had a positive correlation with purchasing tendencies. The subjects pursued convenience in purchasing as their rational tendency was higher, while they sought the trends as their impulsive tendency was higher. Based on the results, it is expected to maximize purchasing satisfaction of Chinese female consumers depending on their purchasing tendencies, if the Korean cosmetics makers provide reliable quality assurance, product exchange and customer management services. It is also expected to help revitalize the beauty market for China as well as Southeast Asia, if the Korean cosmetics companies implement differentiated marketing strategies targeting the customers in the age group with the impulsive consumption tendency.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

A Study of the Communications in On-line Communities: Focused on Self-construals (온라인 커뮤니티 내의 커뮤니케이션에 관한 연구: 자아성향(Self-construal)에 따른 관계 중심으로)

  • Kweon, Sang-Hee;Bang, Kyung-Hwa
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.423-462
    • /
    • 2006
  • This thesis explores the relationship between self-construal and online communication pattern. The Internet has changed human-to human communication. This study was to analyze how the self-construal was appeared and what relationship self-construal had with several variables: the motivation of the on-line community member, the on-line community's character, the communication behavior, the level of relationship between on-line community members- in on-line communities. The data was collected through the on-line survey research(N=79) and off-line survey research(N=255). The results lead us to conclude that the self-construals in on-line communities reflect two factors, which is similar to the off-line community. Nevertheless, self-construals in on-line communities are more complicated. In addition, uniqueness of self-construals which is the tendency to express the self and think connection with others critical is the important factor in on-line communities' communication. It is also central that the impact of self-construals on communication behavior is significant. I think this study was a small touch to explore cyber communication applying to self-consturals. And I hope this small touch would spread out and help to understand human communication as well as cyber communication.

  • PDF

Development of Real-time Oceanographic Information System using Platforms of Aquaculture Farms (양식장 플랫폼을 활용한 실시간 해양환경 정보제공시스템 개발연구)

  • Yang, Joon-Yong;Suh, Young-Sang;Choi, Yong-Kyu;Jung, Kyu-Kui;Jeong, Hee-Dong;Park, Jong-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.2
    • /
    • pp.47-57
    • /
    • 2007
  • Real-time oceanographic information system was developed using platforms of aquaculture farms to examine causes of mass mortality of hatchery fishes, and to reduce the damage of mass mortality which has been occurred frequently off coast by abnormal change of ocean conditions. The system had the advantages of direct data distribution to fishermen at the farm and instant maintenance of equipments due to easy access to the farms and residents at the farms in comparison with offshore mooring buoy system. To avoid discontinued measurement of the system, repairs caused by malfunction of equipments, bimonthly preventive maintenances and daily monitoring of measured data were systematized. Confidence intervals calculated by a statistical method using accumulated data were applied to data management. Such activities could minimize discontinuance of measurement and keep information more trustful. In addition, the system has various ways of data distribution. Through homepage and e-mail in the internet, information was provided to public. Display units which were connected to equipments at the farm gave the measured data directly to fishermen, which guided them to run their farm scientifically. Finally large display unit was installed at a fish market and showed the measured data at the nearest station with tide and weather information. Proper region for aquaculture and wintering region were studied using temperature data obtained by the system in 2006. The system will contribute to reduce economic damage of coastal fishery and to understand coastal marine environment.

  • PDF

The Study of Developing Korean SentiWordNet for Big Data Analytics : Focusing on Anger Emotion (빅데이터 분석을 위한 한국어 SentiWordNet 개발 방안 연구 : 분노 감정을 중심으로)

  • Choi, Sukjae;Kwon, Ohbyung
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.1-19
    • /
    • 2014
  • Efforts to identify user's recognition which exists in the big data are being conducted actively. They try to measure scores of people's view about products, movies and social issues by analyzing statements raised on Internet bulletin boards or SNS. So this study deals with the problem of determining how to find the emotional vocabulary and the degree of these values. The survey methods are using the results of previous studies for the basic emotional vocabulary and degree, and inferring from the dictionary's glosses for the extended emotional vocabulary. The results were found to have the 4 emotional words lists (vocabularies) as basic emotional list, extended 1 stratum 1 level list from basic vocabulary's glosses, extended 2 stratum 1 level list from glosses of non-emotional words, and extended 2 stratum 2 level list from glosses' glosses. And we obtained the emotional degrees by applying the weight of the sentences and the emphasis multiplier values on the basis of basic emotional list. Experimental results have been identified as AND and OR sentence having a weight of average degree of included words. And MULTIPLY sentence having 1.2 to 1.5 weight depending on the type of adverb. It is also assumed that NOT sentence having a certain degree by reducing and reversing the original word's emotional degree. It is also considered that emphasis multiplier values have 2 for 1 stratum and 3 for 2 stratum.