• Title/Summary/Keyword: broadcasting area

Search Result 599, Processing Time 0.022 seconds

A Design of WBAN Data Integration System for the HL7-based patient management

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.66-69
    • /
    • 2015
  • Recently with the development of IT technology, the medical technology have been developed in various ways. Among them, WBAN can check the state of the patient in real time. However, the data generated by these techniques have a problem that they have heterogeneous properties depending on the type of sensors and devices. In this paper, we proposed a method using meta repository as a way to provide the sensing data of WBAN for the health care system by integrating along the HL7 standard item.

Design and Implementation of Damaged Video File Recovery Tool using Container Format Structure

  • Choi, Yun-Seok;Lee, Wan Yeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.64-70
    • /
    • 2019
  • Video files of video devices such as black box and CCTV may be damaged due to repetitive file read / write and physical environment factors. Even though there are available parts of video information, it may happen that playback can't be performed due to damage of some information. To playback the remaining video information normally, it is necessary to recover damaged areas of the files. For this, it is necessary to accurately check the damage range of the files. In this paper, we propose the design and implementation of a tool which detects damaged areas of a video file and recovers the usable area of the file to playback. The proposed tool can analyze and recover without additional information by analyzing common information of video container format and can check detailed damaged ranges with chunks. It is possible to perform recovery just only with the target file and reference file without any other information such as codec specification.

The moderating role of motivations in problematic use of online gaming: A study of live streaming viewers of Twitch

  • Chen, Chi-Ying;Chang, Shao-Liang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.84-92
    • /
    • 2019
  • While the Internet continues to integrate with modern lives, the risks of negative outcomes resulting from problematic use (PU) are also increasing. Although psychological well-being and use motivations have been shown to play major roles in Internet PU, understanding the moderating mechanism is critical for advanced knowledge. The present study employed survey data from users of a live video-game streaming service (LVGS) that is an area rarely been studied. Result concluded a positive moderating effect of escapism motive (EM) on the association between loneliness and the PU of LVGS, while the moderating mechanism between EM and stress was not indicated. A moderating effect of information seeking (IS) on the relationship between stress and the PU of LVGS was found negative, but no mechanism between IS and loneliness was indicated. This study highlights how the interplay of different motivation and pathologies may induce or prevent video-game-related addiction.

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

Classification of NFT Security Issues and Threats through Case Analysis

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.23-32
    • /
    • 2023
  • Since NFTs can be used like certificates due to the nature of blockchain, their use in various digital asset trading markets is expanding. This is because NFTs are expected to be actively used as a core technology of the metaverse virtual economy as non-transferable NFTs are developed. However, concerns about NFT security threats are also growing. Therefore, the purpose of this study is to investigate and analyze NFT-related infringement cases and to clearly understand the current security status and risks. As a research method, we determined NFT security areas based on previous studies and analyzed infringement cases and threat types for each area. The analysis results were systematically mapped in the form of domain, case, and threat, and the meaning of the comprehensive results was presented. As a result of the research, we want to help researchers clearly understand the current state of NFT security and seek the right research direction.

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

A Quantitative Analysis on Machine Learning and Smart Farm with Bibliographic Data from 2013 to 2023

  • Yong Sauk Hau
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.388-393
    • /
    • 2024
  • The convergence of machine learning and smart farm is becoming more and more important. The purpose of this research is to quantitatively analyze machine learning and smart farm with bibliographic data from 2013 to 2023. This study analyzed the 251 articles, filtered from the Web of Science, with regard to the article publication trend, the article citation trend, the top 10 research area, and the top 10 keywords representing the articles. The quantitative analysis results reveal the four points: First, the number of article publications in machine learning and smart farm continued growing from 2016. Second, the article citations in machine learning and smart farm drastically increased since 2018. Third, Computer Science, Engineering, Agriculture, Telecommunications, Chemistry, Environmental Sciences Ecology, Material Science, Instruments Instrumentation, Science Technology Other Topics, and Physics are top 10 research areas. Fourth, it is 'machine learning', 'smart farming', 'internet of things', 'precision agriculture', 'deep learning', 'agriculture', 'big data', 'machine', 'smart' and 'smart agriculture' that are the top 10 keywords composing authors' keywords in the articles in machine learning and smart farm from 2013 to 2023.

Research of Guochao Style in Chinese Virtual Idol Design

  • Lyu Yin;Lee Yong-ki;Wang Kaixing
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.85-97
    • /
    • 2024
  • In recent years, the Guochao style of virtual idols has proliferated, and the virtual idol market in China has witnessed gradual growth. As Guochao combines traditional Chinese culture with modern aesthetics, it shapes a distinctive visual identity for Chinese virtual idols. We address the current research gap by exploring the characteristics of Guochao style in virtual idol design through literature analysis, semiotics, and comparative studies. We examine how Guochao virtual idols represent the convergence of Chinese culture and modern technology, reflecting cultural characteristics of the era. Through our analysis of virtual idol design, we identify key design features of Guochao virtual idols, bridging a theoretical void in this area. We propose recommendations to foster a more dynamic and culturally enriched virtual idol industry in China. Our research provides new insights into integrating Guochao elements into virtual idol design as an approach to differentiate amid competition while promoting traditional Chinese culture through digital media. We demonstrate how this design approach enhances the uniqueness and cultural value of Chinese virtual idols, contributing to the field's theoretical foundation and practical applications.

A Study on the Cremation Status of Public Cremation Facilities By Jurisdiction Area and Outside of the Jurisdiction Area Targeting Users of E-Haneul Funeral Information System in Jeollabuk-do

  • Choi, Jae-sil;Kim, Jeong-lae
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.187-197
    • /
    • 2021
  • We present following research summary and implications through the analysis of the research. First, the before the opening of public cremation facilities compared to new opening of those, the number of the corpse cremation increases to annual average of 5.5% of the rate, and it has a positive effect on increasing rate of the cremation. Therefore, a policy of expanding the supply of public cremation facilities should be pursued to improve cremation rate in the area of uninstalled public cremation facilities. Second, the before the opening of public cremation facilities compared to new opening of those, the number of the corpse cremation has increased to the annual average 3,623 people(56.9%) at jurisdiction area, while it has decreased to 949 people (28.3%) at the out of the jurisdiction area. The active efforts and building the funding expansion should be made to establish public cremation facilities of the central and local governments to improve convenience of the use of public cremation facilities. Third, since the before and after opening of public cremation facilities at Jeongeup City lead to great effect on demand of jurisdiction area and out of the jurisdiction area, the cremation demand should be reduced through the supply expansion of public cremation facilities and differentiation strategy to control cremation demand at the out of the jurisdiction area, focusing on metropolitan areas with high cremation demand, such as metropolitan areas or metropolitan cities.

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.