• Title/Summary/Keyword: web communication

Search Result 2,333, Processing Time 0.04 seconds

The Application of Digital-Diagrams as Infographic Material in Multimedia Design (멀티미디어디자인에서 인포그래픽 도구로서 디지털다이어그램 활용에 관한 연구)

  • 류시천
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.133-146
    • /
    • 2004
  • Diagrams have been deeply and widely used for supporting effective communication relating to design information and knowledge in most design fields. The results show that their role expands to "developmental design material" increasing the principle and method of design process. It's recent trend that Digital-Diagrams are aggressively used in multimedia design fields such as web contents, interactive movies and DVD Titles in order to support user's information understanding more effectively and to stimulate user's participation in information acquiring process. This study aims to clarify the essence of digital diagram corresponding to infographic material in multimedia design and application of multimedia contents development process . This study purpose leads to argue the substance of Digital-Diagrams as one of infographic types and identity of Digital-Diagrams which is relatively compared to existing Diagrams. Eventually, this study examines the application issues of Digital-Diagrams in multimedia design process. Regarding the identity of Digital-Diagrams, they are functionally utilized depending on hypertext based on language forms and interactivity based on graphical forms as core attributes. Therefore, they semantically enlarge user s information understanding by segmenting hierarchy of information expression and rather support user s acquisition of information control ability. Relating to multimedia design process, Digital-Diagrams are used by information designers and navigation designers as method for ‘modeling for realization based on information acquisition support for information-users. Especially, the study results show that the applications of Digital-Diagrams are performed for information representing methods for information designers and embodiment of useful functional factors of interface for navigation designersgation designers.

  • PDF

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Study of the Applications of Introduction of Computer Engineering Class using PBL (PBL을 이용한 컴퓨터공학입문 수업의 실제적 적용에 관한 연구)

  • Lee, Keun-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6303-6309
    • /
    • 2014
  • In this thesis, PBL was applied to the subject for improving students' many skills that modern industrial society demands. Our engineering school developed PBL problems for PBL use, applied the problems to classes and confirmed the effectiveness of PBL. The study subjects were 63 freshman students in H University who took the 'Introduce of computer engineering'. We applied 5 PBL problems for 15 weeks. They wrote and submitted a reflective journal when they finished the every given PBL activity. In addition, they completed a class evaluation form after the activity of 5th PBL Problem ended. The study showed that the students experienced the effectiveness of PBL, such as the comprehension of the studied contents, the comprehension of the cooperative learning, authentic experience, creative problem-solving skills, presentation skills, communication ability, self-directed study ability and confidence. Some difficulties in gathering together and spending much time were also encountered. The students realized that the PBL learning activities were important methods because the students could develop into future intelligent engineers that modern industrial society demands through PBL learning activities. The main goal of an engineering school is to produce specialists with creative problem solving ability so that the effects of this study are quite promising for our engineering school.

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

A Parsing Method for an Incomplete XML (불완전 XML을 위한 파싱 방법)

  • Cho, Kyung-Ryong;Cho, Sung-Eon;Park, Jang-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2153-2158
    • /
    • 2008
  • XML is one of standard web languages. XML has a syntax architecture consisted of tags, which are used to descript contents and structures of a XML document. In XML documents, missing of markup tag is one of common factors generating incomplete inputs. Usually, editors will recognize incomplete inputs as syntax errors. And so, when editors find them, they will highlight lines in which syntax errors happened, and execute appropriate error handling routines. But, there are no more parsing actions. In this paper, we propose a method to recognize incomplete input strings and keep parsing phases going. To recognize pars missed grammatically in incomplete inputs and create them newly, we use an expanding parsing table. It includes additional parsing actions for newly generated input symbols. Through the information, incomplete inputs will be completed and parsing steps will be finished successively. Therefore, users can be assured that they make always correct XML documents, even if inputs are incomplete, and can not be nervous about input faults.

Design and Implementation of the Digital Photo Frame based on Ubiquitous (유비쿼터스 기반 전자액자의 설계 및 구현)

  • Lee, Joa-Hyoung;Park, Chong-Myung;Heo, Nan-Sook;Jo, Young-Tae;Kwon, Young-Wan;Han, Woo-Ram;Seon, Ju-Ho;Kim, Jong-Wook;Yoo, Jae-Wook;Lee, Kang-Hee;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1703-1710
    • /
    • 2008
  • As the performance of digital camera keeps going on, the digital camera becomes into wide use recently so that the number of digital images taken by digital camera is increased rapidly. Given the augmentation of digital images, the digital photo frame has appeared for storing and enjoying the digital image and receives attention as the price of digital frame becomes down. However, users with the existing digital frame only could display the digital images and stream media stored in local disk. In the paper, we design and implement a new digital photo frame baled on ubiquitous which could provide a more variety of service to the user. With the proposed digital photo frame, the user could obtain the environment information and the digital image from multimedia sensor network. The users also could enjoy the various stream media stored in the remote streaming server seamlessly. In addition, the user could update the digital image through the web site at anywhere.

A Study on SNS Records Management (기록관리 대상으로서 SNS 연구)

  • Song, Zoo-Hyung
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.101-138
    • /
    • 2014
  • This study examined the influence and meaning of SNS as the hot topic of our time from the archival perspective and also studied the 'SNS records management'. The many users mean a high accessibility and utilization of SNS, which increase the influence and value of SNS as a record. Politically, SNS is a tool that strengthens the communication among the voters, politicians and the public while economically, it is a window to accept the complaints of the customers and a marketing tool. In addition, the voices of social minorities are also recorded unlike in the traditional media, which makes the SNS record a method to gain the social variety and diversity. SNS is a place of formation of collective memory and collective memory itself. Furthermore, it can play the role of public sphere. It also is a place for generation of 'big data' in an archival sense. In addition, this study has classified the SNS records management into primary and secondary management that include record management entities, subjects, periods, methods, and causes. This study analyzed the history, status, and the meaning of SNS to assess the values and meanings as the preliminary study for the future SNS record management studies.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability (피싱 방지 및 가용성 개선을 위한 PKI기반의 모바일 OTP(One Time Password) 메커니즘에 관한 연구)

  • Kim, Tha-Hyung;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.15-26
    • /
    • 2011
  • The development of IT technology and information communication networks activated to online financial transactions; the users were able to get a variety of financial services. However, unlike the positive effect that occurred on 7 July 2009 DDoS(Distribute Denial of Service) attacks, such as damaging to the user, which was caused negative effects. Authentication technology(OTP) is used to online financial transaction, which should be reviewed to safety with various points because the unpredictable attacks can bypass the authentication procedure such as phishing sites, which is occurred. Thus, this paper proposes mobile OTP(One Time Password) Mechanism, which is based on PKI to improve the safety of OTP authentication. The proposed Mechanism is operated based on PKI; the secret is transmitted safely through signatures and public key encryption of the user and the authentication server. The users do not input in the web site, but the generated OTP is directly transmitted to the authentication server. Therefore, it is improvement of the availability of the user and the resolved problem is exposed from the citibank phishing site(USA) in 2006.