• Title/Summary/Keyword: information provider

Search Result 1,244, Processing Time 0.03 seconds

Real-time Roadmap Generation and Updating Method between Heterogeneous Navigation Systems for Unknown Roads in Cloud Computing Environment (클라우드 환경에서 이기종 네비게이션간 새로운 지도 정보 추출 및 업데이트 방법)

  • Lee, Seung-Gwan;Choi, Jin-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.179-187
    • /
    • 2011
  • Multiple roadmap DB providers are already available in these days, and try to reduce unknown roads in their own roadmaps. However, cooperation models or Win-Win approaches between roadmap providers are not considered yet. Thus, In this paper, We proposed a cloud-oriented real-time roadmap generation and update method between heterogeneous navigation systems for unknown roads. With the proposed method, the roadmap DB providers update the own roadmap DB for navigation systems in real time. Also, they can provide the complete roadmap without unknown roads to users instantly. Therefore, the proposed method can reduce the costs of an actual traveling test and the maintenance for the roadmap DB provides. Thus, the cloud-oriented roadmap generation method can more efficiently update the unknown road information.

An Suggestion of the Software Industry Structure Improvement in Korea : Focusing on the IT Service and Solution Provider Firms (국내 소프트웨어 산업 구조의 개선에 대한 제안 : IT서비스 및 솔루션 기업을 중심으로)

  • Ahn, Yeon S.;Moon, Song Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.1
    • /
    • pp.165-176
    • /
    • 2014
  • This paper was tried to show the improvement model for software industry structure in Korea regarding to have the global level of competence in Korean software firms. To suggest the improvement model for software industry structure, the detailed status about software industry which as in the supply and demand perspectives and comparativeness dimension were analysed. Also to this model the special survey results from the 35 professionalists in the software industry were included. This improvement model suggests the big software firms have to consider the economy of the scale, and to enter global IT market, the other SMEs have to pursuit themselves as a specified technology firms. So it is good for the oversea project collaboration with the solution provider firms and IT service firms. And it is desirable to make a the economy of scale regarding as the solution venture startup, M&A, networking the software firms as supply chain. Also the development of new business model for new market and firms with the high-tech business competency will be required.

An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment (모바일 환경에서 인증과 음성인식을 위한 웹 서비스 구현)

  • Oh Jee-Young;Kim Yoon-Joong;Ko You-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.225-232
    • /
    • 2005
  • A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.

  • PDF

Critical Factors Affecting the Choice of Logistics Service Provider: An Empirical Study in Vietnam

  • TRAN, The Tuan;DO, Quang Hung
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.145-150
    • /
    • 2021
  • The trend of globalization leads an increased need for international freight transportation and accelerates the development of the international logistics industry. The objective of this paper is to identify the critical factors that affect the choice of logistics service provider (LSP). The data sample was collected through a questionnaire, responded by 218 companies that outsource logistics services. The analysis uses descriptive statistics; exploratory factor analysis (EFA) and regression analysis were conducted with SPSS. The role of capabilities, customer service, and company reputation were evaluated and tested. Our findings show that capabilities and customer service have a considerable impact on the choice of LSP. The findings also indicate that company reputation do not have significant impact on the choice of LSP. They also showed that the capabilities is the variable that has the most significant effect on the choice of LSP. An implication of this study is that the competition should not only focus on pricing, but should be extended to improving enterprises capabilities, i.e., upgrading human resources, modernizing the modes of transportation, expanding business geographically and developing new technologies. Our study provides LSP managers with insights into how to meet customer expectations in the competitive logistics service sector.

Manipulation of the Windows Interface Based on Haptic Feedback (촉각 기반 윈도우 인터페이스)

  • Lee, Jun-Young;Kyung, Ki-Uk;Park, Jun-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.366-371
    • /
    • 2008
  • In this paper, we suggest a haptic interface and a framework of interaction with haptic feedback based Windows graphical user interface (GUI) in a computing device with touch screen. The events that occur during a user interacts with Windows interfaces through a touch screen are filtered out by the Windows Interface Message Filter (WIMF) and converted into appropriate haptic feedback information by the Haptic Information Provider (HIP). The haptic information are conveyed to users through a stylus-like haptic interface interacting with a touch screen. Major Windows interaction schemes including button click, menu selection/pop-up, window selection/movement, icon selection/drag & drop and scroll have been implemented and user tests show the improved usability since the haptic feedback helps intuition and precise manipulation.

  • PDF

Auto Detection System of Personal Information based on Images and Document Analysis (이미지와 문서 분석을 통한 개인 정보 자동 검색 시스템)

  • Cho, Jeong-Hyun;Ahn, Cheol-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.183-192
    • /
    • 2015
  • This paper proposes Personal Information Auto Detection(PIAD) System to prevent leakage of Personal informations in document and image files that can be used by mobile service provider. The proposed system is to automatically detect the images and documents that contain personal informations and shows the result to the user. The PIAD is divided into the selection step for fast and accurate retrieval images and analysis which is composed of SURF, erosion and dilation, FindContours algorithm. The result of proposed PIAD system showed more than 98% accuracy by selection and analysis steps, 267 images detection of 272 images.

Global Healthcare Information System

  • Singh, Dhananjay;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.365-368
    • /
    • 2008
  • This paper presents a new concept of IP-based wireless sensor networks and also introduces a routing protocol that is based on clustering for global healthcare information system. Low-power wireless personal area networks (LoWPANs) conform the standard by IEEE 802.15.4-2003 to IPv6 that makes 6lowpan. It characterized by low bit rate, low power, and low cost as well as protocol for wireless connections. The 6lowpan node with biomedical sensor devices fixed on the patient body area network that should be connected to the gateway in personal area network. Each 6lowpan nodes have IP-addresses that would be directly connected to the internet. With the help of IP-address service provider can recognize or analysis patient biomedical data from anywhere on globe by internet service provider equipments such as cell phone, PDA, note book. The system has been evaluated by technical verification, clinical test, user survey and current status of patient. We used NS-2.33 simulator for our prototype and also simulate the routing protocols. The result shows the performance of biomedical data packets in multi-hope routing as well as represents the topology of the networks.

  • PDF

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

Key Management Server Design for Providing Cryptographic Service in Cloud Computing Environment (Services in a Cloud Environment)

  • Jung, Ki Hyun;Shin, Seung Jung
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.26-31
    • /
    • 2016
  • In a cloud computing environment, a cryptographic service allows an information owner to encrypt the information and send it to a cloud server as well as to receive and decode encrypted data from the server which guarantees the confidentiality of shared information. However, if an attacker gains a coded data and has access to an encryption key via cloud server, then the server will be unable to prevent data leaks by a cloud service provider. In this paper, we proposed a key management server which does not allow an attacker to access to a coded key of the owners and prevents data leaks by a cloud service provider. A key management server provides a service where a server receives a coded public key of an information user from an owner and delivers a coded key to a user. Using a key management server proposed in this paper, we validated that the server can secure the confidentiality of an encryption key of data owners and efficiently distribute keys to data users.