• Title/Summary/Keyword: Internet Explorer

Search Result 71, Processing Time 0.024 seconds

Automatic Contents Tracking on Closed-type OSP for Copyright Protection (저작권 보호를 위한 폐쇄형 OSP 콘텐츠 자동 검색 방법)

  • Park, Kyoung-Soo;Kim, Won-Gyum;Kim, Sang-Jin;Yu, Won-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1449-1452
    • /
    • 2011
  • 본 논문에서는 디지털 콘텐츠의 저작권 보호를 위해 인터넷상의 웹하드나 P2P와 같은 폐쇄형 OSP(Online Service Provider)에서 불법으로 유통되고 있는 콘텐츠를 자동으로 검색하고 다운로드 하는 방법을 제안한다. OSP의 웹 페이지를 파싱(Parsing)하여 태그(Tag)와 유일한(Unique)한 속성 정보를 이용하여 필요로 하는 콘텐츠의 게시 정보를 얻거나 액션을 취해 웹 페이지를 제어한다. 또한, IE(Internet Explorer) 이벤트(Event) 함수에 포함되는 URL 정보를 이용하여 각 제어 단계의 성공 여부를 판단한다. 윈도우 기반 어플리케이션은 해당 윈도우의 컨트롤ID 및 기타 윈도우 속성 정보를 이용하여 제어한다.

A Study on the Rollover Behavior of SUV and Collision Velocity Prediction using PC-Crash Program (PC-Crash를 이용한 SUV의 전복사고 거동 및 충돌속도 예측에 관한 연구)

  • Choi, Yong-Soon;Baek, Se-Ryong;Jung, Jong-Kil;Cho, Jeong-Kwon;Yoon, Jun-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.227-235
    • /
    • 2018
  • Along with the recent increase in traffic volume of vehicles, accidents involving rollover of vehicles have been rapidly increased, resulting in an increase casualties. And to prevent this, various technologies such as vehicle crash test equipment and analysis program development have been advanced. In this study, the applied vehicle model is FORD EXPLORER model, and PC-Crash program for vehicle collision analysis is used to predict the rollover accident behavior of SUV and the collision velocity. Compared with the actual rollover behavior of SUV through the FMVSS No 208 regulations, the analysis results showed similar results, the characteristics of the collision velocity and roll angle showed a tendency that the error rate slightly increased after 1000 msec. Then, as a result of considering using the database of NHTSA, it is shown that the rollover accident occur most frequently in the range of the collision velocity of 15~77 km/h and the collision angle of $22{\sim}74^{\circ}$. And it is possible to estimate the vehicle speed and collision time when the vehicle roof is broken by reconstructing the vehicle starting position, the roof failure position and the stop position by applying the actual accident case.

A Comparative Study on Mashup Performance of Large Amounts of Spatial Data and Real-time Data using Various Map Platforms (다양한 맵 플랫폼을 이용한 대용량 동적정보와 공간정보의 매쉬업 성능 비교 연구)

  • Kang, Jin-Won;Kim, Min-Soo
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.49-60
    • /
    • 2017
  • Recently, the use of mashup that integrates real-time data with spatial data such as tiled map and satellite imagery has been increased significantly. As the use of mashup has been extended to various fields of O2O, LBS, Smart City, and Autonomous Driving, the performance of mashup has become more important. Therefore, this study aims to compare and analyze the performance of various map platforms, when large amounts of real-time data are integrated with spatial data. Specifically, we compare the performance of most popular map platforms available in Korea, such as Google Maps, OpenStreetMap, Daum Map, Naver Map, olleh Map, and VWorld. We also compare the performance using most common web browsers of Chrome, Firefox and Internet Explorer. In the performance analysis, we measured and compared the initialization time of basic map and the mashup time of real-time data for the above map platforms. From analysis results, we could find that Google Maps, OpenStreetMap, VWorld, and olleh Map platforms showed a better performance than the others.

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

An Interactive Search Agent based on DotQuery (닷큐어리를 활용한 대화형 검색 에이전트)

  • Kim Sun-Ok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.271-281
    • /
    • 2006
  • Due to the development of Internet, number of online documents and the amount of web services are increasing dramatically. However, there are several procedures required, before you actually find what you were looking for. These procedures are necessary to Internet users, but it takes time to search. As a method to systematize and simplify this repetitive job, this paper suggests a DotQuery based interactive search agent. This agent enables a user to search, from his computer, a plenty of information through the DotQuery service. which includes natural languages. and it executes several procedures required instead. This agent also functions as a plug-in service within general web browsers such as Internet Explorer and decodes the DotQuery service. Then it analyzes the DotQuery from a user through its own program and acquires service results through multiple browsers of its own.

  • PDF

Development of Convertor supporting Multi-languages for Mobile Network (무선전용 다중 언어의 번역을 지원하는 변환기의 구현)

  • Choe, Ji-Won;Kim, Gi-Cheon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.293-296
    • /
    • 2002
  • UP Link is One of the commercial product which converts HTML to HDML convertor in order to show the internet www contents in the mobile environments. When UP browser accesses HTML pages, the agent in the UP Link controls the converter to change the HTML to the HDML, I-Mode, which is developed by NTT-Docomo of Japan, has many contents through the long and stable commercial service. Micro Explorer, which is developed by Stinger project, also has many additional function. In this paper, we designed and implemented WAP convertor which can accept C-HTML contents and mHTML contents. C-HTML format by I-Mode is a subset of HTML format, mHTML format by ME is similar to C-HTML, So the content provides can easily develop C-HTML contents compared with WAP and the other case. Since C-HTML, mHTML and WML are used under the mobile environment, the limited transmission capacity of one page is also similar. In order to make a match table. After that, we apply conversion algorithm on it. If we can not find matched element, we arrange some tags which only can be supported by WML to display in the best shape. By the result, we can convert over 90% contents.

Logical Design of Video Security System over Internet (인터넷 화상 방범 시스템 논리 설계)

  • 장명수;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.439-447
    • /
    • 2000
  • 현재 방범 시스템은 적외선, 초음파 둥의 I-지기의 신호에 의존하여 외부로부터의 침입을 감지하고 있으나 방범 시스템이 설치된 환경에 따라 이런 감지기의 정확성이 달라지므로 오 동작의 가능성을 포함하며 신뢰성이 저하되고 있다. 실제 외부로부터의 침입을 확인하기 위해서는 화상과 음성 그리고 감지기의 신호를 조합하여 정확한 판단이 가능하지만 화상을 전송하기 위해서는 고가의 회선비용을 부담해야만 한다. 하지만 인터넷을 이용하여 화상을 전송하는 제품들이 출시되면서 Real-time 화상감시가 가능해졌다. 이런 화상감시 제품들은 Netscape, MS Explorer와 같은 표준 Web Browser을 통해 Real-time으르 전세계 어디서나 화상을 감시할 수 있다는 장점을 가지고 있다. 적용분야는 호텔주변, 관광지의 여러 명소에 설치 후 홈페이지에 링크시켜 홍보용으로 사용하거나 공장 주요시설, 교통상황 둥의 중요지역의 Monitoring에 활용하고 있다. 그러나 방범 시스템에 적용하기에는 감지기의 확장성, 방범 관제센터 시스템과의 연동이 부족하여 본 고에서는 현재 출시된 화상감시 시스템과 기존 방범시스템을 Integration하여 방범의 최종 목표인 화상과 감지기 신호의 조합에 따른 정확한 방범시스템의 구현에 대해서 기술하고자 한다. 화상방범시스템의 구현은 크게 두 가지로 나누어지며 첫째는 화상감시 시스템과 방범시스템간의 통신을 설계하는 것으로 기존 대부분의 방범시스템이 사용하는 RS-485 통신 프로토콜을 재설계하여 화상감시 시스템과의 통신을 설계하였으며 둘째는 화상감시시스템과 관제센터 시스템간의 통신을 설계하는 것으로 현재 화상감시 시스템의 TCP/IP 프로토콜을 이용한 socket 통신으로 관제센터 시스템과의 실시간 데이터 전송을 가능하게 했다. 이 시스템을 활용할 경우 고객들은 반드시 관제센터시스템의 인증을 거쳐야 하므로 고객의 DataBase를 축적할수 있으며 이 정보를 활용하여 인터넷 화상방범 서비스 Potal Site구축이 가능하다는 장점이 있다.

  • PDF

InfoFlow: A Web-based Workflow Management System

  • Kim, Yeong-Ho;Kang, Suk-Ho;Kim, Dong-Soo;Heo, Won-Chang;Ko, Young-Myoung;Lee, Sang-Jin;Joo, Kyoung-Jun
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.587-596
    • /
    • 1999
  • In this paper, we introduce the design and development of a web-based workflow management system. The goal of the developed system is to manage business processes occurring in the CITIS (Contractor Integrated Technical Information Services) environment. The system is composed of three main modules: Process Designer, Workflow Engine, and Client modules. The Process Designer is a module that provides the environment for the build-time function, which generates the specifications of processes. The module presents the capability of defining nested process models, which is powerful in particular for designing complex processes. Since the other two modules are implemented using pure Java technology, the Workflow Engine can be implemented on any platform and the Client programs can be accessed via the WWW interface. This indicates that there is no need to install any client programs at the client-sides. Users who has a connection to the internet with web browsers, such as Internet Explorer and Netscape Navigator, and has a proper right of access can utilize the normal client, monitoring client, and system administration client programs. Communications between the workflow engine and the clients are implemented using the java servlet mechanism. The workflow system can serve as the underlying platform of process management tool in CALS and CITIS environments. An example scenario of using the system is presented.

  • PDF

The Effects of e-WOM's Information Characteristics and Reliability of e-WOM's Information on e-WOM's Perceived Usefulness and Acceptance (온라인 구전정보특성과 정보신뢰성이 지각된 정보유용성과 정보수용성에 미치는 영향)

  • Kim, Young Hun
    • Culinary science and hospitality research
    • /
    • v.24 no.1
    • /
    • pp.151-163
    • /
    • 2018
  • Today, the development of internet brings many changes in formation exploration and acceptance. Not only the customers can come into contact much information about the firm and its product by quick and easy search, but also they produce information by themselves or can spread the information via the internet. Nowadays, customers are progressive information explorer and producer on online. In this sense, this study examined the effects of e-word-of-mouth information characteristics on the consumer's perceived usefulness and perceived acceptance of e-word-of-mouth information in the food service industry in order to suggest directions to enhances marketing strategies for marketer. The research model for this study was designed based on the hypothesis that the characteristics of e-word-of-mouth information and credibility of the information influenced both the user's perceived usefulness and acceptance. Based on total 277 customers obtained from the empirical research, this study reviewed validity, reliability and fitness of research model. The analysis results on these factors are as follow. First, the characteristics of e-word-of-mouth information; vividness, consensus, direction had an influence on the customer's perceived usefulness. Second, the characteristics of e-word-of-mouth information; vividness, consensus, direction had an influence on the customer's perceived acceptance. Third, the reliability of information had an influence on the customer's perceived usefulness and the credibility of e-word-of-mouth information perceived acceptance. Fourth, the customer's perceived usefulness had an influence on the customer's perceived acceptance.