• Title/Summary/Keyword: Access site

Search Result 595, Processing Time 0.022 seconds

A Study on the Commercialization Characteristics of 2nd Class Residential District in Inner-city Railway Station Area (역세권 제2종 일반주거지역 상업화 확산과 특성 분석)

  • Yoon, Yong-Suk;Yang, Woo-Hyun
    • Journal of the Korean housing association
    • /
    • v.23 no.2
    • /
    • pp.25-36
    • /
    • 2012
  • The purpose of this study is to find out the commercialization characteristics of 2nd class residential district in innercity railway station area as basic research to protect urban residential area against the pressure of commercialization. Through the research that are based on literature, field survey and urban planning map, it analysed the commercialization characteristic of selected three sites under similar urban condition; to be a nearby subway station and to be a famous commercial street in site, etc. The consequences of this study are summarized as follows; First it finds the commercialized lots in all blocks that adjoin blocks of upper class zoning. Second it is in inverse proportion between the commercialization of lots and the distance from subway station to residential block. Third, the corner lot of a block and the access road directly connected collector road are very important factors to spread commercialization to residential area. Finally, it finds the difference of the commercialization degree of 2nd class residential zone according to arrange main commercial street and the 2nd class residential block; vertical arrangement and horizontal arrangement.

A study of access control using fingerprint recognition for Electronic Medical Record System (지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구)

  • Baek, Jong Hyun;Lee, Yong Joon;Youm, Heung Youl;Oh, Hae Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

A Study on Christian Website Indexing (기독교 관련 웹 사이트 내 색인에 관한 연구)

  • Yoo, Yeong-Jun
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.4
    • /
    • pp.257-276
    • /
    • 2007
  • Back-of-book-style indexes have a similar function as back-of-book indexes. The best advantage o4 back-of-book-style indexes for Information access on the web is to give direct access to specific subjects of interest. Though back-of-book-style indexes are alphabetically arranged as back-of-book indexes, they have linked index entries to contents on the site by using a anchor tag of HTML. In this research, I have created back-of-book-style indexes in two separated ways, by hand-crafted and semi-automatic Indexing. We have utilized back-of-book-style indexes, that is similar to back-of-book index of traditional information organization method of library and information science, in library circumstances.

  • PDF

A Framework for Developing Distributed Application with Web-Tier Object Modeling (웹계층 오브젝트 모델링을 통한 분산 애플리케이션 개발 프레임웍크)

  • Cheon, Sang-Ho;Kwon, Ki-Hyeon;Choi, Hyung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1143-1148
    • /
    • 2004
  • To develop multi-tier model or distributed architecture based distributed application needs to consider various aspects such as division of role between web-designer and software developer, defining entity and its usage, database connection and transaction processing etc. This paper presents DONSL(Data Server of Non SQL-Query) architecture that provides solution to above aspects through web-tier object modeling. This is the architecture that guarantees the transaction processing and performance between web-tier and DBMS through simplified usage of query logic property. This new conceptual framework also solves enterprise site implementation problems simplifying tier, and removing DAO(Data Access Object) and entity.

A Study on the Optimal Acquisition Site of STM Information Resources in KISTI (국내외 과학기술정보 수집규모의 최적화 연구 - 한국과학기술정보연구원을 대상으로 -)

  • 윤희윤
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.2
    • /
    • pp.95-117
    • /
    • 2003
  • In the context of the emerging knowledged-based economy, innovations and capacity of the national information system to collect disseminate, and preserve the most important information resources are becoming increasingly fundamental determinants of national prosperity and survival. It is essential that the scholarly or scientific communication system provides cost-effectiveness access to information in support of research and development in Korea. The KISTI is the first instance and last resort for access and preservation of scientific and technical information in Korea. The primary purpose of this study is to optimize an acquisition size of STM information resources for the KISTI, based on its SWOT analysis.

  • PDF

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

Implementation of Low-Power Ubiquitous Health System based on Real-Time Embedded Linux using ZigBee wireless communication (ZigBee를 이용한 실시간 임베디드 리눅스 기반의 저전력형 U-Health 시스템 구현)

  • Kwon, Jong-Won;Ayurzana, Odgerel;Park, Yong-Man;Koo, Sang-Jun;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.436-438
    • /
    • 2007
  • As the sensors and communication technology get advance, the remote health diagnosis for patients and senior persons at home are possible now without visiting doctors in hospitals. A low-power ubiquitous health check device was developed adapting Real-Time Embedded Linux is developed. This ubiquitous device is consisted of three sensors. The wrist type health checking terminal acquires periodically the health data by using a blood pressure sensor, a pulse sensor and a body temperature sensor. It transmits the health data to the access point located at the home center through the ZigBee wireless communication modem. This health data collector or access point device sends the data again to the main server operated in a hospital or health care organization. The health server control continuously the input data and sends an alarm signal to the assigned. doctor and responsible persons using cellular SMS when any dangerous events occur. This wrist type health check device has an embedded linux OS using Intel PAX255 MPU. The developed U-Health system is applicable for checking patients health in remote at home. And their family or related persons in remote site can check the patients health status at any time. They can be assured by receiving SMS record and alarm of emergency case which is transmitted from the health server.

  • PDF

A Study on Consumer Satisfaction according to Fashion Life Style on the Internet Shopping (인터넷상에서 패션 라이프스타일에 따른 소비자 만족요인에 관한 연구)

  • Jeong, Yu-Jeong;Park, Ok-Lyun
    • Korean Journal of Human Ecology
    • /
    • v.13 no.1
    • /
    • pp.123-133
    • /
    • 2004
  • To investigate the factors that contribute to consumer satisfaction with the purchase of clothing, questionnaires were distributed and then consumer groups were classified according to their fashion life style on the internet shopping. The results were as follows: 1. Consumers groups were classified into trendy, Indifferent, brand inclined, conservative, and practicality- minded group by the fashion life style of the internet users. 2. From the analysis of the satisfaction factors on the internet clothing shopping, the factors were product variety, shopping convenience, customer service, confidence in order filling. 3. The most important consumer satisfaction factors according to the fashion life style were as follows: the trendy group considered the variety of clothing design most important. As for the Indifferent group, the tn, diversified collection of the products, and the convenience of unlimited time and space access that the internet site provided, were highly appreciated. With regard to the brand-inclined group, the presentation of product information and the convenience of unlimited time and space factors were highly appreciated. For the conservative group, the time and space factor were highly regarded, As far as the practicality-minded group was concerned, product price and size, the convenience of unlimited time and space access, and punctual delivery schedule were focused.

  • PDF

Design and Implementation of Customer Personalized System Using Web Log and Purchase Database

  • Lee Jae-Hoon;Chung Hyun-Sook;Lee Sung-Joo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.1
    • /
    • pp.21-26
    • /
    • 2006
  • In this paper, we propose a customer personalized system that presents the web pages to users which are customized to their individuality. It analyzes the action of users who visit the shopping mall, and preferentially supplies the necessary information to them. When they actually buy some items, it forecasts the user's access pattern to web site and their following purchasable items and improves their web page on the bases of their individuality. It reasons the relation among the web documents and among the items by using the log data of web server and the purchase information of DB. For reasoning, it employs Apriori algorithm, which is a method that searches the association rule. It reasons the web pages by considering the user's access pattern and time by using the web log and reasons the user's purchase pattern by using the purchase information of DB. On the basis of the relation among them, it appends the related web pages to link of user's web pages and displays the inferred goods on user's web pages.

Tools for Web-Based Security Management Level Analysis (웹기반 보안 관리 수준 분석 도구)

  • Kim, Jeom-Goo;Choi, Kyong-Ho;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.85-92
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.