• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.036 seconds

XML Key Information Service Modeling for Secure Electronic Commerce (안전한 전자상거래를 위한 XML 키 정보 서비스 모델링)

  • 박남제;문기영;송유진
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.241-257
    • /
    • 2003
  • XML is a global standard for the Internet and e-business, and its use is growing in proportion to the spreading speed of e-Commerce. Thus, a policy for providing more safe security service for exchanging e-documents within e-Commerce is necessary. XKMS, one of XML security specification, defines the protocol for distributing and registering public keys for verifying electronic signatures and enciphering e-documents of e-Commerce applications with various and complicate functions. In this paper, we propose X-KISS service reference model and implement service component based on standard specification. Also describes the analysis and security of XML key information service for safe e-Commerce, paying attention to the features of XML based security service. This reference model supported include public key location by given identifier information, the binding of such keys to identifier information. The client service component controls the number of locate threads and validate threads to analyze the minimum requirements of real-time key retrievals. This service modeling offers the security construction guideline for future domestic e-business frameworks.

  • PDF

A Study on Project Performance in Cloud Computing : Focus on User Experience of GoogleDocs (클라우드 컴퓨팅 환경에서의 프로젝트 수행 성과에 관한 연구 : GoogleDocs 사용 경험을 중심으로)

  • Woo, Hyeok-Jun;Shim, Jeong-Hyun;Lee, Jung-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.71-100
    • /
    • 2011
  • There are expectations about future internet technology with IT development by end-users. Cloud computing is attracted to satisfy those demands. However, adoption of cloud computing is not active that much. Therefore, this study verified how cloud computing environment affects performance of team project. We conducted empirical study on performance of team project with cloud computing as technology tool focusing on Task-Technology Fit Model. We collected samples that were undergraduate and graduate school students and had experience on initial cloud computing such as Google-Docs and Webhard when they conducted team project for assignment. We focused on accessibility and reliability as task-technology fit and those variables treated as first order factor. Result showed that cloud computing is suitable technology tool for team project. This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.

A Design and Implementation of MathML-based Math Equation Generating Website (MathML에 기반한 수학식 생성 웹사이트의 설계 및 구현)

  • Park, Jeong-Hee;Lee, Mee-Jeong
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.3
    • /
    • pp.173-183
    • /
    • 2003
  • E-learning education methodology using the web has been as much activated with the introduction of the internet to our society. As for the web-based education, there is no exception in case of mathematics. However, when it comes to representing math equations by using HTML image tags, a type of web marked-up language, it can be hard to represent math equations that have structural features, and to do the search, resulting in the difficulty in reusing math related applications. Therefore, based on MathML and using ActiveX control technology, a math equation generating website was designed and implemented in this study. Since this system employed ActiveX control technology, it is possible to generate math equations without the limit of time and place on the web, and to manage the program with the most up-to-dale version. And in this system, it is also possible to save the math equations generated in this system to be referred to for their reuse in the future.

  • PDF

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

The Implementation Directions and an Analysis of Assistive Devices and Alternative Formats to Improve Accessibility for Disabled People (장애인 접근성 향상을 위한 보조기기 및 대체자료 분석과 구현 방향)

  • Rim, Myunghwan;Gil, Younhee;Jeon, Gwangil
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.664-673
    • /
    • 2015
  • The assistive devices for disabled people are being highlighted even in industrial aspects through the policy and support for disabled people, enactment of regulation for the improvement of accessibility of disabled, technological innovation and product development. Recently, internet access with the sense of touch and hearing and utilizing electronic publishing contents and e-mailing are being convenient through the product of ICT development such as screen reader for visually impaired people, braille display, screen enlarger, text converter and others. Even so, in rapidly changing digital media smart era, the accessibility of visually impaired people is still poor and assistive devices and alternative formats are in need of improvement. Therefore, in aspect of the research and development innovation, this study proposes the implementation directions for improvement of accessibility by analyzing the current situation and structure of alternative formats and assistive devices for visually impaired people. As a result, in the future, various types of digital information are expected to be converted into a customized and realistic forms and distributed through a dedicated disability products or smart devices.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

Throughput and Delay of Single-Hop and Two-Hop Aeronautical Communication Networks

  • Wang, Yufeng;Erturk, Mustafa Cenk;Liu, Jinxing;Ra, In-ho;Sankar, Ravi;Morgera, Salvatore
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.58-66
    • /
    • 2015
  • Aeronautical communication networks (ACN) is an emerging concept in which aeronautical stations (AS) are considered as a part of multi-tier network for the future wireless communication system. An AS could be a commercial plane, helicopter, or any other low orbit station, i.e., Unmanned air vehicle, high altitude platform. The goal of ACN is to provide high throughput and cost effective communication network for aeronautical applications (i.e., Air traffic control (ATC), air traffic management (ATM) communications, and commercial in-flight Internet activities), and terrestrial networks by using aeronautical platforms as a backbone. In this paper, we investigate the issues about connectivity, throughput, and delay in ACN. First, topology of ACN is presented as a simple mobile ad hoc network and connectivity analysis is provided. Then, by using information obtained from connectivity analysis, we investigate two communication models, i.e., single-hop and two-hop, in which each source AS is communicating with its destination AS with or without the help of intermediate relay AS, respectively. In our throughput analysis, we use the method of finding the maximum number of concurrent successful transmissions to derive ACN throughput upper bounds for the two communication models. We conclude that the two-hop model achieves greater throughput scaling than the single-hop model for ACN and multi-hop models cannot achieve better throughput scaling than two-hop model. Furthermore, since delay issue is more salient in two-hop communication, we characterize the delay performance and derive the closed-form average end-to-end delay for the two-hop model. Finally, computer simulations are performed and it is shown that ACN is robust in terms of throughput and delay performances.

A technique for Auto find the way of 3-D spatial aviation images contents environment (3차원 공간 동영상 콘텐츠 환경에서의 자동 길 찾기 기법연구)

  • Yeon, Sang-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.417-420
    • /
    • 2006
  • Recently we could generation of 3-D simulation image by use of various image contents, so I tried advanced methods very easily leads to the location on the GIS environments. Its used basically air photos and satellite sensor images for them. For the generate 3-D spatial be suitable to matching map coordinates using elevation data from digital topographic files, and matching to 3D spatial image contents through perspectives view condition composed to move according to fixed roads until arrive to location. Through this new system which tourists are able to simulate the interest paths or locations and to visit the cultural inheritance was proposed by combining various spatial data with the multimedia contents. This system provides people with guidance to locate the cultural assets in the Web environments. The developed system which is more convenient to provide tourists with the information and they are able to access automatically to location easily. In the future, the visitors are able to use easily the 3d image contents on the Internet or from the public tour information desk by using the simulation images.

  • PDF

A Study on the Women Image Expressions of Cosmetic Advertisements through the Digital Media

  • Han, Chung-Ah
    • Journal of Fashion Business
    • /
    • v.8 no.3
    • /
    • pp.70-83
    • /
    • 2004
  • The female image has been changed incessantly with age and has been eminently represented in cosmetic advertisement. The female images are changed from the classical images to the active and professional images with the historical current of cyber, digital, and fusion. These changes in the expression of female image are largely due to the spread of post-modernism, feminism, de-construction (Kim, 1994), digital information revolution, and increase of income. The female images in cosmetic advertisement have been expressed very variously with fashion, marketing target, and characteristics of articles. (Im, 1997) The cosmetic advertisements of pure and graceful images were popular in the past. But nowadays individual image, womanly image, and unchanged beautiful image are in vogue. Individual image is very popular in young generation with very short fashion period. Active career woman image represents passion and beauty with extension of women' social roles. Unchanged beautiful image in modern industrial pollution stands for the desire of keeping the beauty in youth. Brand is very important factor to consumers in purchasing. Brand is no larger the simple concept in the past, and accepted as reflection of the image, social status, service, and life-style(Lee, 1998) consumers are very favorable to foreign cosmetics with the increase of overseas travels and import. This phenomenon is considered as very natural, especially in young generation. To create a successful brand image, the harmony of quality, psychological preference, advertisement, and reasonable price are required. According to the questionnaire research implemented by the subject of college women students in five universities in Seoul, the majority of college women students purchase domestic cosmetic brands in cosmetic specialty stores and depend on the tips of acquaintances. Quality, skin-trouble, and brand are considered as special regards for purchasing. Especially, internet shopping in purchasing marks high growth rate and preference for foreign cosmetics is very ardent. It can be expected that the 21st century is the epoch of various small production different from the mass-production in the 20th century. Female image will be probably expressed with individual, emotional, and professional image in the media of digital, fusion, cyber, and technology culture. It can be said that the tendency of cosmetic purchasing in the future will be more focused on brand image and life style.

Correlation of Jacques Lacan's Mirror Stage and the process of Remediation on Image Media (쟈크 라캉의 거울단계와 영상미디어의 매개과정과의 연관성)

  • Ahn, Sang-Hyuk
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.147-154
    • /
    • 2005
  • In this paper, I am going to analyze a correlation of Jacques Lacan's Mirror Stage and the process of remediation on image media. It is because the remediation process of various digital media is letting people pass through one time of mirror stage again. Remediation for the Internet of traditional media, conflict with the virtual world and real world, identification that a virtual image changes a practical image is for it to be caused a remediation process by mutual link of various image media. The Narcissism which occurs in the relation a self with a idealized self searches a new own expression and forms a skillful mania culture. Reflexivity of active mania culture same as a Jacques Lacan's Mirror Stage is to be the possibility becoming the feature of media culture of today. However, if digital media culture generation spends extremely wasting time from the image media, these image media generations cannot grow into new future-type man. According to this, it is necessory to have a study on Visual Literacy that it is related to a Jacques Lacan's Mirror Stage.

  • PDF