• Title/Summary/Keyword: broadcasting area

Search Result 607, Processing Time 0.021 seconds

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

The Virtual Model House System using Modeling-based Eyetracking (모델링 기반 시선추적을 이용한 가상모델하우스 시스템)

  • Lee, Dong-Jin;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.223-227
    • /
    • 2010
  • Since the most of existing virtual model house used non-immersive type virtual reality technology, it was made to control using direct input type device such as keyboard and mouse. But in this paper realized not only direct data entry method but also indirect data entry method using eyetracking technology through universal webcam for virtual model house based upon modeling. In this paper showed the position of pointer controlled according to the relative movement of pupils or the part of function related to the equipment entry called by comparing the value of gray after extracting the area of pupil in the user' video data received from webcam. Such a method provided the convenience of navigation and interface to the user.

Modeling of Fine Cracks using Fuzzy Mathematical Morphology (퍼지 수학적 형태학을 이용한 미세균열 모델링)

  • Park, In-Kyoo;Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.105-111
    • /
    • 2010
  • In this paper the elasticity of fault-detection algorithm based on fuzzy logic is proposed through lots of experiments, justifying its validity. The four mathematical morpholgical operators was defined to detect the cracks. The cracks was detected via center of area method with ${\lambda}$-fuzzy measure of fuzzy sets. However generally favorable, the result owes to how adequate the lighting device is designed in case of the so far fine crack of pieces. In an attempt to improve the response of the system, It is designed to minimize the use of memory via LookUp table in software.

Practical and Legal Challenges of Cloud Investigations (클라우드 환경에서 수사 실무와 법적 과제)

  • James, Joshua I.;Jang, Yunsik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2014
  • An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.

The Optimal Communication Method for Efficiency Improvement of an Integrated Operation System (통합운영시스템 운영효율 향상을 위한 통신방법 개선방안)

  • Lee, An-Kyu;Lee, Ho-Hyun;Lee, Dong-Hoon;Hong, Sung-Taek;Kim, Nam
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.187-193
    • /
    • 2009
  • My company currently is operating more than 30 numbers of wide area waterworks which are divided provincially into seven section and integrated operation system (hearafter IOS) in each center plan to operate several decades of waterworks facilities. Four of them, Jeonbuk, Metropolitan, Cheung Chong and JeonNam, has been completed and the others, Gyeongbuk, Gyeongnam and Gangwon, are under construction. Above all, the methods are reviewed, which have been applied in IOS system to be installed already. I propose the optimal way to communicate efficiently.

  • PDF

A Study on AES Extension for Large-Scale Data (대형 자료를 위한 AES 확장에 관한 연구)

  • Oh, Ju-Young;Kouh, Hoon-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.63-68
    • /
    • 2009
  • In the whole information technology area, the protection of information from hacking or tapping becomes a very serious issue. Therefore, the more effective, convenient and secure methods are required to make the safe operation. Encryption algorithms are known to be computationally intensive. They consume a significant amount of computing resources such as CPU time and memory. In this paper we propose the scalable encryption scheme with four criteria, the compression of plaintext, variable size of block, selectable round and software optimization. We have tested our scheme by c++. Experimental results show that our scheme achieves the faster execution speed of encryption/decryption.

  • PDF

Energy-Efficient Cluster Head Selection Method in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적 클러스터 헤드 선정 기법)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Ho-Jin;Shin, Dong-Ryeol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.25-30
    • /
    • 2010
  • Wireless sensor networks is composed of many similar sensor nodes with limited resources. They are randomly scattered over a specific area and self-organize the network. For guarantee of network life time, load balancing and scalability in sensor networks, sensor networks needs the clustering algorithm which distribute the networks to a local cluster. In existing clustering algorithms, the cluster head selection method has two problems. One is additional communication cost for finding location and energy of nodes. Another is unequal clustering. To solve them, this paper proposes a novel cluster head selection algorithm revised previous clustering algorithm, LEACH. The simulation results show that the energy compared with the previous clustering method is reduced.

Compatiblility analysis between DTV and WRAN systems (DTV와 WRAN 시스템 사이의 양립성 분석)

  • Choi, Jae-Hyuck;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.69-75
    • /
    • 2010
  • In this paper, we analyze an effect co-existence between digital television (DTV) and 802.22 wireless regional area network (WRAN) systems. We set DTV as an interfering system and 802.22 WRAN as a victim system. When they share the same spectrum, we calculate the minimum separation distance. In analysis, we compare a minimum coupling loss (MCL) with a transmission loss (TL) for determining whether there exists the potential interference or not. The minimum separation distance is determined when the TL is larger than the MCL. In this case, the DTV system does not affect any harmful effect to 802.22 WRAN.

Application Study applied to the Encryption at Virtualization Launcher (가상화 런처에서 암호화를 적용한 어플리케이션 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.87-92
    • /
    • 2014
  • Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

Korean Language Clustering using Word2Vec (Word2Vec를 이용한 한국어 단어 군집화 기법)

  • Heu, Jee-Uk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.25-30
    • /
    • 2018
  • Recently with the development of Internet technology, a lot of research area such as retrieval and extracting data have getting important for providing the information efficiently and quickly. Especially, the technique of analyzing and finding the semantic similar words for given korean word such as compound words or generated newly is necessary because it is not easy to catch the meaning or semantic about them. To handle of this problem, word clustering is one of the technique which is grouping the similar words of given word. In this paper, we proposed the korean language clustering technique that clusters the similar words by embedding the words using Word2Vec from the given documents.