2025 (115)
2024 (171)
2023 (137)
2022 (114)
2021 (105)
2020 (99)
2019 (49)
2018 (54)
2017 (40)
2016 (50)
2015 (40)
2014 (10)
2013 (10)
2012 (10)
2011 (10)
2010 (10)
2009 (8)
Systematic Literature Review on Cloud Adoption
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.1-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
While many organizations believe that cloud computing has the potential to reduce operational cost by abstracting capital assets like data storage center and processing systems into a readily on demand available and affordable operating expenses, still many of these organizations are not aware of the factors determining the performance of cloud computing technology. This paper provides a systematic literature review focusing on the factors determining the performance of cloud computing. In trying to come up with this review, the following sources were searched for relevant articles: ScienceDirect, Scientific.Net, ACMDigital Library, IEEE Xplore, Springer, World Scientific Journal, Wiley Online Library, Academic Search Premier (via EBSCOHost) and EdITLib (Education & Information Technology Digital Library). In first search strategy, approximately 100 keywords related to the research domain like; "Cloud Computing" and "Cloud Services" were used. In second search strategy, 65 keywords more related to the research domain were selected. In the third search strategy, the primary materials were identified and classified according to the paper types (Journal or Conference), year of publication and so on. Based on this study, twenty (20) factors were found that determine the performance of cloud computing. The IT organization needs to consider these twenty (20) factors in order to adopt cloud computing.
Comparison of the Frequency Bands for the Wireless Sensor Networks in the Building Environment
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.23-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, for the pratical building envoronments, the propagation properties of the electromagnetic waves of the sub-1GHz bands, including the 447MHz, 868MHz, and 715MHz, and the 2.4GHz band are experimentally observed in therms of the received signal strength indicator (RSSI) value. The compasion of the frequency bands can be utilized to efficiently construct the wireless sensor networks (WSN) for the building automation control. In order to measure the RSSI values in the building, an RSSI measurement system is first designed, in which the master part can transmit data packets and measure the corresponding RSSI values, and the slave part can respond the received data packets. Using the measurement system, the RSSI values are then experimentally measured at four types of building enviroments. From the experimental result analysis, we could notice that the sub-1GHz, especially the 447MHz band, showd a good communication performance for the building environment and could provide an efficient WSN construction when the data rate is relatively low.
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.31-37
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
History documentaries in Korea have developed various forms of production techniques to overcome the limits of insufficient historical records and videos, and dramatic elements that make the viewers immersed. Through diverse production techniques, history documentaries can maximize the factuality, vividness, and informativeness, allowing the viewers to understand and share the historical events. This paper analyzed the “immersion and experience” techniques of the programs that have been the main turning points of the history documentary so far and produced and realized the virtual reality through utilizing “Uigwe”, a 3D history documentary broadcasted on KBS which showed the possibility of applying the virtual reality technique as a new broadcasting contents format.
Face Recognition Authentication Scheme for Mobile Banking System
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.38-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose 3-factor mobile banking authentication scheme applied to face recognition techniques with existing certificate and OTP. An image of the user's face is captured by smart phone camera and its brightness processing of the contour of a face and background by n of X and Y points. Then, distance between the point of eyes, nose and mouth from captured user’s face are compared with stored facial features. When the compared results corresponding to the data that stored in a face recognition DB, the user is authenticated.
A Study on Usefulness of Convergent Education Curriculum for Gifted Children in IT
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.43-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the present knowledge and information society, knowledge and use of information and communication technology(ICT) is very important for every citizen. Also, for national power of a nation, IT-related industries need to be supported since those industries can be reconstructed in a short period of time unlike other industries. In this sense, identification and education of gifted children in IT become a serious national issue. Since 2013, gifted education has been conducted as a form of convergent education by government policy. However, there have been controversies on convergent education for gifted education. The purpose of this paper is to analyze the usefulness of convergent curriculum for gifted education in IT. For this purpose, gifted children in IT in a gifted education center are analyzed. By comparing the entrance ranking and graduation ranking, it is concluded that the current convergent gifted curriculum may not be efficient.
Handling Of Sensitive Data With The Use Of 3G In Vehicular Ad-Hoc Networks
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.49-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Data delivery is very challenging in VANETs because of its unique characteristics, such as fast topology change, frequent disruptions, and rare contact opportunities. This paper tries to explore the scope of 3G-assisted data delivery in a VANET within a budget constraint of 3G traffic. It is started from the simple S_Random (Srand) and finally reached the 3GSDD, i.e., the proposed algorithm. The performance evaluation of different algorithms is done through the two metrics delivery ratio and average delay. A third function utility is created to reflect the above two metrics and is used to find out the best algorithm. A packet can either be delivered via multihop transmissions in the VANET or via 3G. The main challenge is to decide which set of packets should be selected for 3G transmissions and when to deliver them via 3G. The aim is to select and send those packets through 3G that are most sensitive and requiring immediate attention. Through appropriate communication mechanism, these sensitive information are delivered via VANET for 3G transmissions. This way the sensitive information which could not be transmitted through normal VANET will certainly find its destination through 3G transmission unconditionally and with top priority. The delivery ratio of the packets can also be maximized by this system.
A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.55-65
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks , we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.
A Study of WiMAX Security threats and Their Solution
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.66-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this study, we have discussed and illustrated the security issues of WiMAX technology including vulnerabilities, threats and some security solution. Both physical layer and data link layer have been considered. Jamming is a major threat in physical layer, and in data link layer we study an authentication problem and see the problem of some unencrypted messages leading to lack of confidentiality. Some of these vulnerabilities have been solved in the recent amendment of 802.16 and some still remain. Moreover WiMax is a new technology yet.
What is meaning of internet game to the University students?
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.75-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Objectives : The objective of this study is to examine the experiences of Internet game experience targeting to University students in Korea. Research topics was “ What is meaning of internet game to the University students?” Methods : Classical phenomenology underpinned this study. Seven qualitative studies of University students were conducted between 20 and 23 years old. Semi-structured interviews were conducted. Interviews were audio recorded and transcribed verbatim. Phenomenological thematic analysis of data was undertaken. Results : The findings pivot around three interconnected themes :[Expectations for the emotional needs], [Spend time in the cyberspace], [Relieve stress throughout the game], [Instead of satisfaction from virtual reality], [Internet gaming repeat and desires]. The basic need for getting into internet game was [satisfaction from virtual reality was identified]. While internet games was eliminated stress, [Expectations for the emotional needs] and [Spend time in the cyberspace] were the catalyst that makes them repeatedly getting into Internet the game. Based on the result, I suggest that Internet gaming should be recognized as a tool to relieve stress for college students, But it is not satisfied with the reality in virtual space. Therefore, the strategy must be to recognize reality accompanying. And Using a lot of time in cyberspace make them cause of internet game addiction. Therefore, it requires a systematic strategy for the Internet using time limits. Also the emotional needs met were motivated to repeat an Internet game. So another way to meet the emotional needs to college students should be sought.
A Study on Correlation between Age and Information Ethics Using Information Culture Index
국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.2 2016.05 pp.81-85
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Information ethics is very essential for everyone in the current knowledge-based society. Every citizen in modern society can enjoy various benefits of recent internet technologies. In the meanwhile, everyone also is exposed to the various side effects of information and communication technologies. The typical side effects include copyright violation, cyber crimes, cyber bullying, internet addiction, and so on. The purpose of this paper is to identify correlation between age and information ethics. For this purpose, 3-year national survey works Information Culture Index are analyzed. After thorough statistical analysis work, it is concluded that there is a meaningful correlation between age and information ethics. In other words, the older people are, the higher information ethics they recognize and observe.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.