• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.034 seconds

Research on Military SNS Protection Profile for National defense (국방정보보호를 위한 군(軍) SNS 보호프로파일(PP) 개발에 관한 연구)

  • Yu, DeokHoon;Kim, SeungJoo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.1
    • /
    • pp.41-52
    • /
    • 2013
  • Social Network Service(SNS) have become very popular during the past few years. Also SNS, an current communication platform, greatly contributes to transmit the information rapidly and strengthen a sense of community and fellowship in military service. however it has vulnerable factors. For example, invasion of privacy, exposure of personal information and military data. In this particular case, it is a deathblow to the military service. Military Social Network Service require to protect the military security threats and disclosure of defense secrets. For such reasons we need the secure SNS that protects from any attacks or vulnerable factors. We present classification of functional type and analysis the SNS architecture. The goal of this work is propose military SNS security functional requirements for practical use safely.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

Influence of The Multimedia Function on Continue Using Intention of Smartphone (스마트폰의 멀티미디어 기능이 지속적 사용의도에 미치는 영향)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.201-203
    • /
    • 2015
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. Such extensibility, it is possible to use different applications through the Apps store. In addition, it is also possible various services which are location based service. In this research, we aim to analyze factors influencing of the multimedia function on continue using intention of Smartphone In addition, we aim to analyze the causal relationship from perceived value to continue using intention. This study suggests practical and theoretical implications based on the results.

  • PDF

Low Energy Motion Estimation Architecture using Energy Management Algorithm (에너지 관리 알고리즘을 이용한 저전력 움직임 추정기 구조)

  • Kim Eung-sup;Lee Chanho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.793-800
    • /
    • 2005
  • Computation of multimedia data increases in portable devices with the advances of the mobile and personal communication services. The energy management of such devices is very important for the battery-powered operation hours. The motion estimation in a video encoder requires huge amount of computation, and hence, consumes the largest portion of the energy consumption. In this paper, we propose a novel architecture that a low energy management scheme can be applied with several fast-search algorithms. The energy-constrained Vdd hopping (ECVH) technique reduces power consumption of the motion estimation by adaptively changing the search algorithm, the operating frequency, and the supply voltage using the remaining slack time within given power-budget. We show that the ECVH can be applied to the architecture, and that the power consumption can be efficiently reduced.

A Study on the Electrical Design of a Multi-Beam Large Antenna for S-band Satellite Payload (S-대역 위성 탑재용 다중 빔 대형 안테나의 전기적 설계 연구)

  • Yun, So-Heyun;Uhm, Man-Suk;Yom, In-Bok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.11
    • /
    • pp.1240-1247
    • /
    • 2010
  • This paper describes the study on the electrical design of a multi-beam large antenna for a satellite payload. This satellite antenna provides the universal communication and broadcasting services to personal portable terminals over the Korean Peninsula. The structure of the hybrid antenna fed by a feed array is proper to provide multi-beams. The amplitude and phase of each feed element should be optimized for a required beam and they can be obtained by GO (Geometrical Optics) and PO(Physical Optics) method. The number of feed elements are also optimized to meet the specification of EIRP(Effective Isotropically Radiated Power). The optimally designed antenna with the limited reflector size and minimum number of feed elements is shown in this paper.

A Study on Open Software based IP Network System Practice Platform and Practicing Scenario (공개 소프트웨어 기반 IP 네트워크 시스템 실습 플랫폼 및 실습 시나리오)

  • Kim, Tae-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.106-114
    • /
    • 2020
  • It is very important for beginners in networking to build, test, and operate an IP network system, which is the key infrastructure of the fourth industrial revolution. An IP network system consists of the IP network itself, covering both the internet and underlying layers, plus the basic network system supporting fundamental network services, with a DNS, the DHCP, email, WWW, and application service systems, such as VoIP. This paper suggests an open software-based practice platform with a minimal network configuration on which beginners can practice on nearly all of the IP network system, and it presents a practice scenario and results. In addition, it adds both IP address allocation and routing table manipulation functions to the network simulator software, which will allow beginners to learn table-based datagram routing schemes in advance. This platform may be useful for networking beginners in order to practice on an IP network system on their own personal computers without additional equipment and costs.

A Study on Security Measure of Step-Wise Project (단계별 프로젝트 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyeong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2459-2464
    • /
    • 2012
  • Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.

Implementation of u-Healthcare Security System by applying High Speed PS-LFSR (고속 병렬형 PS-LFSR을 적용한 u-헬스케어 보안 시스템 구현)

  • Kim, Nack-Hyun;Lee, Young-Dong;Kim, Tae-Yong;Jang, Won-Tae;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.99-106
    • /
    • 2011
  • The emerging of ubiquitous computing and healthcare technologies provides us a strong platform to build sustainable healthcare applications especially those that require real-time information related to personal healthcare regardless of place. We realize that system stability, reliability and data protection are also important requirements for u-healthcare services. Therefore, in this paper, we designed a u-healthcare system which can be attached to the patient's body to measure vital signals, enhanced with USN secure sensor module. Our proposed u-healthcare system is using wireless sensor modules embedded with NLM-128 algorithm. In addition, PS-LFSR technique is applied to the NLM-128 algorithm to enable faster and more efficient computation. We included some performance statistical results in term of CPU cycles spent on NLM-128 algorithm with and without the PS-LFSR optimization for performance evaluation.

A Review on Research Related Smartphone in Korea (우리나라의 스마트폰 관련 연구에 대한 문헌적 고찰)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.219-222
    • /
    • 2013
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. With the launch of Apple iPhone, there is an explosion of interest in Smartphone itself as well as Internet-based services using Smartphone are being revitalized. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. New information technology like Smartphone gives us a very important and interesting research issue that is to find and prove the factors influencing the purchase intention. At this point, study identifying on the influence factors to the behavioral intention of Smartphone is very important. This study was targeted a total of 99 research papers that are setting up the related Smartphone in among the research papers published in domestic academic journals since 2008. Empirical research related behavioral intention using was summarized on the papers 76.

  • PDF