• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.032 seconds

Analysis on the Acupuncture Contents of the Domestic Neck Pain and HIVD-Cervical Spine Clinical Studies : a literature review

  • Mo, Min Ju;Hwang, Doo Ree;Lee, Ju Hyeon;Kim, Dong Hoo;Hwang, Seon Hye;Sohn, Soo Ah;Hwang, Ji Hoo
    • Journal of Acupuncture Research
    • /
    • v.34 no.2
    • /
    • pp.113-125
    • /
    • 2017
  • Objectives : Cervical herniated intervertebral disc (HIVD) are common diseases. They can be managed with acupuncture, but the evidence for effectiveness is uncertain. This review analyzed the acupuncture studies of domestic neck pain and cervical HIVD; the purpose of this study was to provide basic data useful for future research. Methods : We investigated acupuncture treatments for neck pain and cervical HIVD by searching 5 Korean Internet databases. The keywords used were "neck pain", "HIVD-cervical spine", and "nuchal pain". A total of 53 research papers (17 case reports, 16 clinical data analyses, 11 randomized controlled trials, and 9 non-randomized controlled trials) were found and analyzed according to the publication year, type of study, treatment, use of filiform needles, and type of pharmacopuncture used acupoint. The effectiveness of acupuncture treatment was determined. Results : 1. Filiform needles have been primarily used in domestic research and were used in at least half of published pharmacopuncture studies. 2. In 51 papers using filiform needles, many studies used only local acupoints; few studies used only distant acupoints. 3. All studies using pharmacopuncture were performed using local acupoints. In particular, the studies based on A-shi point, trigger point, and radiologic lesion sites were useful for multiple purposes. Conclusion : In this study, we analyzed the acupuncture contents of the domestic neck pain and HIVD-cervical spine clinical studies. This study considers the assessment of the quality and efficacy of each study, which is likely to require research that reflects the future.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

The Design and Implementation of the Directory Service for the utilization of USN (USN 활용을 위한 계층형 서비스 설계 및 구현)

  • Roh, Changbae;Na, Wonshik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2014
  • Connotation and unlimited growth potential as the core infrastructure to implement the u-Korea RFID/USN is emerging to lead to a future Internet that can bring a huge transformation in the industry sector. On RFID/USN increase overall social interest of our country, if the world who want to dominate the market by securing the u-Korea vision and global RFID/USN technologies IT839 depending on the policy, has been active research on the USN and USN infrastructure in the future building is completed as quickly to take advantage of the USN. USN applications will increase. Of USN middleware and necessitate USN infrastructure-based application development in order to more easily USN middleware configuration directory service is one of the core services. USN infrastructure suitable for the directory service when considering the characteristics of WSN, such as the USN components, update existing directory services and search focused on the problem and receive, this paper can overcome this directory service design and implementation discussed.

  • PDF

The Character of Ethnic Make up by Observation of 21's Century Fashion Trend (21 세기 패션에 표현된 에스닉 메이크업의 특징에 관한 고찰)

  • Kim, Mi-Jung;Kim, Mi-Hyun
    • Korean Journal of Human Ecology
    • /
    • v.16 no.5
    • /
    • pp.1061-1068
    • /
    • 2007
  • The study has sought to explore how fashion emerges as a comprehensive tool of dress for increasing its brand appeal and express one's artistic sense and fashion by using everything from make-up to hair to trappings. Therefore, when it comes to fashion trends reflected in collections, the study is designed to improve understanding of make-up as one of the elements of total fashion and to help create diverse ideas in expressing creative and free make-up that can help perfect fashion concept in harmony with all the other elements. The study has pondered upon collection, trends and fashion make-up through literature study, and has gathered image data via the Internet. It also has conducted analysis of Ethnic style reconstructed combining past and the future, East and the West, and futurism style using asymmetrical forms without no defined patterns and hi-tech textures, which emerges as a result of post-modernism. The results of the study are as follows. Ethnic fashion that pursues strange and exotic beauty is characterized by its simple and idyllic images of traditional costume in Asia or primitive clothes in Africa. Make-up represent images of matt and pale skin, tanned yellow, glossy and thickly powered squeaky white skin. Point make-up highlighted eye lines, red chick, small and voluptuous red lips. Hair and accessory seeks diversity combining various ethnic styles together such as oriental, Indian, Islam and Africa. In addition, future-oriented fashion of the 21st century, twists in texture, various kinds of materials and changes in technique help give impressions of freedom and bizarreness.

A Study on Evaluating Digital Illusion Level of Public Library (공공도서관의 디지털 통합 수준 평가에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.167-203
    • /
    • 2015
  • This study tends to apprehend how much public library contributes to a role of upbuilder of digital integrated local society through a survey. For this, I performed the survey on 935 organization of public library in the whole country registered in national library statistical system. As a result, firstly, it's apprehended that equipment infra, Internet infra, etc like computer, laptop, scanner, tablet PC, etc are in relatively high level. Secondly, service or resource like electronic book, digital and virtual reference service, library service mobile App, etc that users can use are in relatively high level but software supporting cooperation and group task, fusibility of participating space, etc are shown very low level. Thirdly, the rate of literacy training relating to technology were only 22.4%, education subject focused on resource searching subject and somewhat future-oriented technical education like directions of video conference technique, cloud computing application education, etc wasn't conducted. Finally, we should consider expansion of providing technology and equipment and provision of future-oriented service and education according to a flow of the time that needs to seek change in various roles of library as enjoying culture space or creative space.

Mobility Management for ILNP-based Tactical Network (전술 네트워크를 위한 ILNP 기반 환경에서의 이동성 관리 기술)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2020
  • In the future Network Centric Warfare(NCW), changing to IPv6 based network environment is required to enable various future technologies such as the Internet of Things(IoT) and cloud technology which are expected to be introduced to the tactical network evolution. With the change to the IPv6 network, an ID/LOC(Identifier/Location) separation protocol that decomposes context of the IP address to location and identifier can enhance network capacity of increasing number of device and provide efficient mobility management in the tactical network that changes topology dynamically. In this paper, we choose ILNP(Identifier-Locator Network Protocol) as an ID/LOC separation for tactical network environment. In addition to ILNP-based tactical network design, this paper proposes a network-based mobility management scheme for providing efficient mobility management. Through numerical performance analysis, we show that the proposed scheme can reduce network loads more effectively than the conventional IP-based mobility management scheme and common handover procedure in ILNP.

Research about Factor Affecting the Continuous Use of Cloud Storage Service : User Factor, System Factor, Psychological Switching Cost Factor (클라우드 스토리지 서비스의 지속적 사용의도에 영향을 미치는 요인 연구 : 사용자 요인, 시스템 요인, 심리적 전환비용)

  • Jun, Chang-Joong;Lee, Jung-Hoon;Jeon, In-Sook
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.15-42
    • /
    • 2014
  • Cloud storage service has the potential to be a core infrastructure for the future mobile and Internet service; thus related service providers have been investing in it and trying to attract as many users as possible. In addition, those need to find out what motivates the users to keep using their service not only to attract new customers but also to secure their subscribers. Therefore, this study will examine its relationship with user's motivation based on the extended TAM model with external variables for objective research about continuous use of cloud storage service. As a result, it was found that personal innovativeness, self efficacy, functional attributes, and psychological switching cost influence the continuous use of cloud storage service. Also, it is expected they can guide service providers to the right track when setting up their business strategy in the future.

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.

Forecasting Technique of Line Utilization based on SNMP MIB-II Using Time Series Analysis (시계열 분석을 이용한 SNMP MIB-II 기반의 회선 이용률 예측 기법)

  • Hong, Won-Taek;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2470-2478
    • /
    • 1999
  • In this paper, algorithm is proposed to forecast line utilization using SNMP MIB-II. We calculate line utilization using SNMP MIB-II on TCP/IP based Internet and suggest a method for forecasting a line utilization on the basis of past line utilization. We use a MA model taking difference transform among ARIMA methods. A system for orecasting is proposed. To show availability of this algorithm, some results are shown and analyzed about routers on real environments. We get a future line utilization using this algorithm and compare it ot real data. Correct results are obtained in case of being few data deviating from mean value. This algorithm for forecasting line utilization can give effect to line c-apacity plan for a manager by forecasting the future status of TCP/IP network. This will also help a network management of decision making of performance upgrade.

  • PDF

A Study on Video Content Application Based on Mobile Device Platform in China (중국의 Mobile Device Platform 기반 영상콘텐츠 Application 연구)

  • ShI, Yu;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.433-438
    • /
    • 2019
  • In this paper, the write analysis the application of basic video content of Mobil Device Platform in China and studies the future development scheme. According to the survey, as of 2019, 78% of Chinese total population is the Internet service users and application software users. Mobile Device Platform is independently developed to provide video content application services, which already have 640 million video application users from 2013 to the present. 65% of users install and use more than two video content applications. In China TikTok, Kuai Shou, MeiPai and other video content applications, not only can easily achieve simple user interface and users can directly shoot video content. These production functions is different from YouTube, a famous video platform in the United States. In the video platform market, the core competitiveness is content creation. In the future, the integration of video content of VR, AR and other video projects will expecte to further activate the video platform market.