• Title/Summary/Keyword: the internet

Search Result 29,419, Processing Time 0.065 seconds

The educational models using enhanced mathematics ICT in the Korean IT environments (21세기 선진형 ICT 수학 교육 방법론 모델)

  • Kim, Duk-Sun;Park, Jin-Young;Lee, Sang-Gu
    • Communications of Mathematical Education
    • /
    • v.22 no.4
    • /
    • pp.533-543
    • /
    • 2008
  • Recently, many advanced countries have used original ICT tools in their educational courses. But Korea didn't have any effective origin ICT tools in our mathematical education, compared with other countries which have developed various tools, for examples, Web-Mathematica and HP Calculator. Although we have the advanced IT environment, the educational environments in mathematics using ICT seems to be not promising. In this paper, we suggest a new mathematics education tools in ICT and the internet environments in Korea, and a teaching and studyingmodel for the teachers, students and classrooms. It is based on the Sage-Math and RPG. Sage-Math which is the software based on the web and RPG(Random Problem Generator) will give a good answer for the future of Korean mathematics ICT education.

  • PDF

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

A Study on Methods for Utilizing Digital Room in Public Library (공공도서관 디지털자료실 활성화 방안 연구)

  • Moon, Sung-Been;Kim, Pan-Jun;Lee, Mi-Kyeung
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.321-350
    • /
    • 2009
  • The purpose of this study is to find methods for utilizing digital room in public library and its efficient operation by analyzing the status quo of the digital rooms in public libraries, which had been built nation-widely about 5 years ago. It is found that it is urgent to supplement and improve the infrastructure of them. It is also required to build multi-functional digital rooms and an integrated operational system for digital rooms. Implementation of an integrated operational system, first of all, for applicable sections of digital room may be the best alternative. The multi-functional digital rooms can be built, which, in addition to its traditional function, can include a variety of original information resources and function of information creation using application programs, as well as functions such as education, information services, online/offline community creation, and activating information sharing. In the future, the digital rooms in public libraries must play a significant role as online/offline spaces, which are not the places for use and access to internet information resource, but for information/knowledge sharing and collaborative activities. It also must provide a communication channel between librarians and users as well as among users themselves.

Metadata production system based on MPEG-21 IPMP for protection and management of The Digital contents (디지털 콘텐츠 보호 관리를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu Kwang-Hee;Hong Hyen-Woo;Kim Kwang-Yong;Kim Jae-Gon;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.577-580
    • /
    • 2006
  • The rapidly growth of Internet is main factor that activates the Digital Contents market. However imprudent Digital Contents market could be shrunk by imprudent illegal copy and delivery. MPEG(Moving Picture Experts Group) proposed MPEG-21 Multimedia frameworks in order to solve these problem. IPMP is parts of MPEG-21 Multimedia Frameworks, when Digital Contents goes through production delivery consumption, which defines standard to keep the Digital Contents in safety. Currently IPMP defined by FCD(Final Committee Draft) level. Therefore development of system which applied to latest standard to protect and manage the Digital Contents is required. and the system consists of fourth organizations which means Metadata Production server, Tool server, License server, Consumption server. In this Paper, we made production server to parse REL(Rights Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

An Extended Negotiation Agent Using Multi-Issues under Time-Constraint Environment (시간제약 환경에서 다중 속성을 이용한 확장된 협상 에이전트)

  • 김현식;양성봉
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1208-1219
    • /
    • 2003
  • The Internet has become a part of our life and has changed our living environments dramatically. However, Electronic Commerce (EC) stays currently at a level that a buyer deals only with an one-sided condition (price) proposed by a seller or compares the proposed condition to find a better one. As the agent technology makes progress, EC requires negotiation that is not one-sided but is a way to maximize profits of both seller and buyer. Moreover, negotiation in EC should consider multiple issues rather than a single issue to replace the traditional commerce. In this paper we propose a negotiation model, which guarantees balanced profits between two agents through negotiation using multi-issues, and makes a deal successfully under time-constraint environment. The proposed negotiation model suggests strategies(alternative and simultaneous strategy) that change the value of issues with each agent has time for negotiation. In this paper, we also suggest a strategy that proposes an offer to each other. We compare the proposed negotiation model with another negotiation model. The experimental results show that dynamic conceder tactic and linear tactic showed balanced profits and a high percentage of deals for negotiation between two agents, and the sum of utilities of two agents is high, when the alternative strategy is used.

Health Consciousness and Health Information Orientation on Health Information Searching Behaviors of Middle-Aged Adults (중년층의 건강관심도와 건강정보추구도가 인터넷 건강정보 검색행동에 미치는 영향)

  • Lee, Hawyoung;Oh, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.73-99
    • /
    • 2021
  • The purpose of this study is to analyze the health information use experience of middle-aged people in their 40s and 50s and to observe and analyze their health information search behaviors according to health consciousness and health information orientation. This study uses Information Foraging Theory with the concept of information scents which leads users to detect and collect cues in information searching. Types and contents of information cues that middle-aged people use when searching for health information were investigated. Also, how their health consciousness and health information orientation affected using information cues were analyzed. Three methods of research were used; (1) pre-interviews, (2) search experiments, and (3) post-interviews. Thirty-two middle-aged people participated in the study. Their performance on health information searching was recorded and referred to in the post-interviews using a think-aloud protocol. Findings presented that middle-aged people's health consciousness and health information orientation affected the perception of information scents in health information search; those with high health consciousness and health information orientation consider the text made by the government office the most critical information cues. We believe findings from this study could be used for public libraries or non-profit institutions to understand middle-aged people's health information behaviors to design education programs for information retrieval considering users' health consciousness and health information orientation. Findings could also contribute to Internet portal site or health-related web site designers developing strategies for middle-aged users to access health information effectively.

Project Management for the Productivity Improvement of Small and Medium-sized Enterprises (SMEs): Industrial Machinery and Equipment Manufacturing Enterprises (중소기업 생산성 향상을 위한 기계설비 제작 프로젝트 관리: 산업기계설비 제조기업을 중심으로)

  • Song, Youngmin;Jeong, Jongpil;Park, Byungjun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • In this paper, it was found that most of the machinery facilities problems generated by clients could be prevented in advance by systematically managing the mechanical equipment production process of small and medium enterprises (SMEs) that produce machinery facilities. Major point of this process is to establish an operating system that corresponds to reality of facility manufacturers as it represents 63% of machinery facilities problems that occur in customers and is a task that needs to be solved most intensively. Technical issues account for 23% of machinery facilities problems occurring at the client's companies and should be approached from a long-term perspective as they are directly related to the technical capabilities of the manufacturers. Organizational problems account for 14% of machinery facilities problems occurring in customer companies, and can change depending on the relationship of members and the nature of the human being, such as morality and motivation. In addition, we propose the establishment of an Internet-based production process management platform for smooth and efficient transfer of information between customers and machinery facilities manufacturers.

A Functional Analysis of NEIS School Affairs Business System : From the Records Management Perspective (교무업무시스템의 기록관리 기능 분석 - 학교생활기록부를 중심으로 -)

  • Lim, Mi-Suk
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.91-138
    • /
    • 2008
  • A fast foot of information communication technology is appearing as expansion of prompt administrative service desire and national participation desire regarding administration. This is following again by government innovation and demand of customer-oriented governmental implementation with information technology. The Ministries of Education and Human Resources Development proceeded with National Education Information System(NEIS) for the aim of educational informatization at a highest global level. NEIS that was operated from 2003 established a system in Educational Offices in 16 cities/province and the Ministry of Education and Human Resources Development, and connected all educational administration organizations and primary and middle schools with Internet. Thus, NEIS processes electronically the general administration affairs in educational administration organizations each unit school. The NEIS school affairs business system that is newly enforced is producing an important documentation (of semi-permanent level) such as personal information and grade of students including School Human Document with electronic methods. However, we need to guarantee authenticity, integrity, reliability and usability of documentation because school affairs business system is producing important documentation under poor circumstances. According to this necessity, school affairs business system analyzed how many a record management function includes by the ISO 15489 that was an international record managerial standard. On the basis of these analyses, I will present a plan for management of a school documentation in this study. These researches are meaningful in electronically analyzing a record management function of the National Education Information System(NEIS) and in documentarily approaching management plan. I expect theses researches to be able to used as useful data for documental management plan preparations regarding a productive documentation of all kinds of business systems using in public institutions as well as National Education Information System(NEIS).

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.