• Title/Summary/Keyword: Internet Uses

Search Result 1,491, Processing Time 0.026 seconds

A Development of Integrated Prototype Model for Risk Management of Construction Projects (건설공사의 리스크관리를 위한 통합전산모형 구축)

  • Kim, Chang-Hak;Park, Seo-Young;Kang, In-Seok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.469-480
    • /
    • 2006
  • The results of the study include a computerized system and a systematic process model for risk management and analysis. This study analyzes the present status of risk management in the construction industry, and then suggests reasonable methods for improved risk management plans. This study defines risk management procedures as preparation, identification, analysis, response and management to manage potential risks in the construction project. The modules for computerizing in this system consist of planning, construction, application of WBS (Work Breakdown Structure) and RBS (Risk Breakdown Structure), and risk analysis. The methodology for analyzing construction risk uses fuzzy theory, and the scope of developed system is focused to the contractors. The risk management system suggested in this study operates on the Internet, for providing contractors with a useful risk management tool by online system, with web-based menus that is helpful for practical application.

Changes in Research Paradigms in Data Intensive Environments

  • Minsoo Park
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.98-103
    • /
    • 2023
  • As technology advanced dramatically in the late 20th century, a new era of science arrived. The emerging era of scientific discovery, variously described as e-Science, cyberscience, and the fourth paradigm, uses technologies required for computation, data curation, analysis, and visualization. The emergence of the fourth research paradigm will have such a huge impact that it will shake the foundations of science, and will also have a huge impact on the role of data-information infrastructure. In the digital age, the roles of data-information professionals are becoming more diverse. As eScience emerges as a sustainable and growing part of research, data-information professionals and centeres are exploring new roles to address the issues that arise from new forms of research. The functions that data-information professionals and centeres can fundamentally provide in the e-Science area are data curation, preservation, access, and metadata. Basically, it involves discovering and using available technical infrastructure and tools, finding relevant data, establishing a data management plan, and developing tools to support research. A further advanced service is archiving and curating relevant data for long-term preservation and integration of datasets and providing curating and data management services as part of a data management plan. Adaptation and change to the new information environment of the 21st century require strong and future-responsive leadership. There is a strong need to effectively respond to future challenges by exploring the role and function of data-information professionals in the future environment. Understanding what types of data-information professionals and skills will be needed in the future is essential to developing the talent that will lead the transformation. The new values and roles of data-information professionals and centers for 21st century researchers in STEAM are discussed.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

Method of Generating Information Signals in the System Industrial Internet of Things

  • Aleksandr Serkov;Nina Kuchuk;Bogdan Lazurenko;Alla Horiuskina
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.206-210
    • /
    • 2024
  • Industrial facilities that use modern IT technologies require the ensured reliability and security of information in automated enterprise management. Concurrently, so as to ensure a high quality of communication, it is necessary to expand the bandwidth of communication channels, which are limited by the physical parameters of the radio frequency spectrum. In order to overcome this contradiction, we propose the application of technology fundamental to ultra-wideband signals, in which the ratio between the bandwidth and its central part is greater than "one". For this reason, the information signal is emitted without a carrier frequency - simultaneously within the entire frequency band - provided that the signal level is lower than the noise level. For the transmission of information content, the method of positional-time coding is used, in which each information bit is encoded by hundreds of ultrashort pulses that arrive within a certain sequence. Mathematical models of signals and values observed in wireless communication systems with autocorrelation reception of modulated ultra-wideband signals are furthermore recommended. These assist in identifying features of the dependence of the error probability on the normalized signal-to-noise ratio and the signal base. Comparative analysis has shown that the best noise immunity of the systems considered in this paper is the communication system, which uses the time separation of the reference and information signals. During the first half of the bit interval, the switch closes the output of the transmitter directly to the generator of the ultra-wideband signal - forming a reference signal. In the middle of the bit interval, the switch alternates the output to one of two possible positions depending on the encoding signal - "zero" or "one", forming the information part of the ultra-wideband signal. It should also be noted that systems with autocorrelation reception and separate transmission of reference and information signals, provide a high level of structural signal secrecy. Furthermore, they provide the reliable transmission of digital information, especially in interference conditions.

The Effect of Privacy Policy Awareness on the Willingness to Provide Personal Information in Electronic Commerce (전자상거래의 프라이버시 정책 인식이 개인정보제공의도에 미치는 영향)

  • Jongki Kim;Dawoon Oh
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.185-207
    • /
    • 2016
  • This study investigated the relationship between privacy policy awareness and willingness to provide personal information. Online privacy policies published on the Internet aim to build the trust of consumers and reduce their concerns about the provision of providing personal information. This study uses FIP(FIP; Fair Information Practices) principles to measure awareness of privacy policy. The result of the survey indicates significant relationships among awareness of privacy policy of e-commerce websites, privacy trust, and privacy risk. Privacy policy aims to improve transparency of collection and use of personal information. A high level of privacy trust is related to a high level of willingness to provide personal information on an e-commerce website. A low level of privacy risk is related to a high level of willingness to provide personal information on an e-commerce website. This study found that disposition to trust moderates the relationship between privacy policy awareness and privacy trust. This study contributes to further research on the relationships among privacy policy awareness, privacy trust, and privacy risk. The result of this study can be used by companies that aim to build privacy trust and reduce privacy risk.

A Case Study on the Brand Development of Odor-reducing Feed Additives

  • Gok Mi Kim
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.194-200
    • /
    • 2024
  • In the past, antibiotics and antimicrobial substances have been used for the purpose of promoting the growth of livestock or treating livestock, but various problems such as the presence of livestock products or resistant bacteria have emerged. Recently, regulations on the use of antibiotics have been strengthened worldwide, and probiotics are attracting attention as an alternative. Probiotic microorganisms have already been used for human use, such as intestinal abnormal fermentation, diarrhea, and indigestion. In livestock, beneficial microorganisms are increasing in use for the purpose of improving productivity, such as promoting livestock development and preventing diarrhea. Therefore, it is advisable to understand livestock probiotics in deeper and think about effective uses. The role of probiotics in the livestock sector is made with microorganisms themselves, so it is a substance that promotes livestock growth and improves feed efficiency by settling in the intestines of livestock, suppressing the growth of other harmful microorganisms, helping digestion and absorption of ingested feed, and helping to synthesize other nutrients. There is a need for a probiotic that suppresses intestinal bacteria by supplying probiotics used as a means to minimize the effects of stress in livestock management, thereby suppressing disease outbreaks by maintaining beneficial microorganisms and suppressing pathogenic microorganisms. The purpose of this paper is to develop a brand of feed additive probiotics to improve health conditions due to increased feed intake, improve the efficiency of use of feed nutrients, inhibit the decomposition and production of toxic substances, increase immunity, reduce odor in livestock, and improve the environment. We investigated and analyzed feed additive probiotics already on the market, and developed the naming and logo of suitable feed additive probiotic brands in livestock. We hoped that the newly developed product will be used in the field and help solve problems in the livestock field.

Multimedia Technologies for Teaching Musical Art under Present-day Conditions

  • Svitlana Huralna;Nataliia Demianko;Nataliia Sulaieva;Viktoriia Irkliienko;Tetiana Horokhivska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.165-171
    • /
    • 2024
  • The processes of society's informatization and digitalization necessitate the widespread use of new pedagogical technologies. Through these technologies, comprehensive disclosure of didactic functions of new methods of educational activity and the realization of the potential and creative potential. The use of information and computer multimedia technologies in teaching music art is especially relevant in the intensification of the development of interactive technologies, the transition to mixed forms of learning, and a period of socio-economic and sociopolitical upheavals. The study aims to substantiate the theoretical and applied principles of the analysis of multimedia technology learning musical art in modern conditions and assess the status and trends in their use in conducting educational activities. The study uses general scientific and unique methods of economic analysis, in particular, analysis and synthesis, analogy and comparison, generalization and systematization, and graphic ways. Regarding the results of the study of multimedia technologies for teaching musical art in current conditions, it was found that they contribute to the development of the seeker's creative, creative, and cognitive activity, have a positive impact on learning material, and diversify the educational process. Multimedia technologies such as presentations, programs for watching a video, listening to audio, music and singing karaoke, electronic encyclopedias, and Internet resources are proven to be the most used in music education. They have several qualitative and quantitative advantages, manifested in the possibilities of audio-visual presentation of educational material and significantly higher information density. It is suggested to strengthen the use of such computer programs as Microsoft Word, Ahead Nero, Finale, Adobe Audition, Sound Forge, and Microsoft PowerPoint for musical art classes.

Knowledge-Based Smart System for the Identification of Coronavirus (COVID-19): Battling the Pandemic with Scientific Perspectives

  • Muhammad Saleem;Muhammad Hamid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.127-134
    • /
    • 2024
  • The acute respiratory infection known as a coronavirus (COVID-19) may present with a wide range of clinical manifestations, ranging from no symptoms at all to severe pneumonia and even death. Expert medical systems, particularly those used in the diagnostic and monitoring phases of treatment, have the potential to provide beneficial results in the fight against COVID-19. The significance of healthcare mobile technologies, as well as the advantages they provide, are quickly growing, particularly when such applications are linked to the internet of things. This research work presents a knowledge-based smart system for the primary diagnosis of COVID-19. The system uses symptoms that manifest in the patient to make an educated guess about the severity of the COVID-19 infection. The proposed inference system can assist individuals in self-diagnosing their conditions and can also assist medical professionals in identifying the ailment. The system is designed to be user-friendly and easy to use, with the goal of increasing the speed and accuracy of COVID-19 diagnosis. With the current global pandemic, early identification of COVID-19 is essential to regulate and break the cycle of transmission of the disease. The results of this research demonstrate the feasibility and effectiveness of using a knowledge-based smart system for COVID-19 diagnosis, and the system has the potential to improve the overall response to the COVID-19 pandemic. In conclusion, these sorts of knowledge-based smart technologies have the potential to be useful in preventing the deaths caused by the COVID-19 pandemic.

Decision Tree Generation Algorithm for Image-based Video Conferencing

  • Yunsick Sung;Jeonghoon Kwak;Jong Hyuk Park
    • Journal of Internet Technology
    • /
    • v.20 no.5
    • /
    • pp.1535-1545
    • /
    • 2019
  • Recently, the diverse kinds of applications in multimedia computing have been developed for visual surveillance, healthcare, smart cities, and security. Video conferencing is one of core applications among multimedia applications. The Quality of Service of video conferencing is a major issue, because of limited network traffic. Video conferencing allow a large number of users to converse with each other. However, the huge amount of packets are generated in the process of transmitting and receiving the photographed images of users. Therefore, the number of packets in video conferencing needs to be reduced. Video conferencing can be conducted in virtual reality by sending only the control signals of virtual characters and showing virtual characters based on the received signals to represent the users, instead of the photographed images of the users, in real time. This paper proposes a method that determines representative photographed images by analyzing the collected photographed images of users, using KMedoids algorithm and a decision tree, and expresses the users based on the analyzed images. The decision tree used for video conferencing are generated automatically using the proposed method. Given that the behaviors in the decision tree is added or changed considering photographed images, it is possible to reproduce the decision tree by photographing the behavior of the user in real-time. In an experiment conducted, 63 consecutively photographed images were collected and a decision tree generated by using the silhouette images of the photographed images. Indices of the silhouette images were utilized to express a subject and one index was selected using a decision tree. The proposed method reduced the number of comparisons by a factor of 3.78 compared with the traditional method that uses correlation coefficient. Further, each user's image could be outputted by using only the control image table of the image and the index.

A Study of Domain Name Disputes Resolution with the Korea-U.S. FTA Agreement (한미자유무역협정(FTA)에 따른 도메인이름 분쟁해결의 개선방안에 관한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.167-187
    • /
    • 2007
  • As Korea has reached a free trade agreement with the United States of America, it is required to provide an appropriate procedure to ".kr" domain name disputes based on the principles established in the Uniform Domain Name Dispute Resolution Policy(UDRP). Currently, Internet address Dispute Resolution Committee(IDRC) established under Article 16 of the Act on Internet Address Resources provides the dispute resolution proceedings to resolve ".kr" domain name disputes. While the IDRC's proceeding is similar to the UDRP administrative proceeding in procedural aspects, the Domain Name Dispute Mediation Policy that is established by the IDRC and that applies to disputes involving ".kr" domain names is very different from the UDRP for generic Top Level Domain (gTLD) in substantial aspects. Under the Korea-U.S. Free Trade Agreement(KORUS FTA), it is expected that either the Domain Name Dispute Mediation Policy to be amended to adopt the UDRP or the IDRC to examine the Domain Name Dispute Mediation Policy in order to harmonize it with the principles established in the UDRP. It is a common practice of cybersquatters to warehouse a number of domain names without any active use of these domain names after their registration. The Domain Name Dispute Mediation Policy provides that the complainant may request to transfer or delete the registration of the disputed domain name if the registrant registered, holds or uses the disputed domain name in bad faith. This provision lifts the complainant's burden of proof to show the respondent's bad faith because the complainant is only required to prove one of the three bad faiths which are registration in bad faith, holding in bad faith, or use in bad faith. The aforementioned resolution procedure is different from the UDRP regime which requires the complainant, in compliance with paragraph 4(b) of the UDRP, to prove that the disputed domain name has been registered in bad faith and is being used in bad faith. Therefore, the complainant carries heavy burden of proof under the UDRP. The IDRC should deny the complaint if the respondent has legitimate rights or interests in the domain names. Under the UDRP, the complainant must show that the respondent has no rights or legitimate interests in the disputed domain name. The UDRP sets out three illustrative circumstances, any one of which if proved by the respondent, shall be evidence of the respondent's rights to or legitimate interests in the domain name. As the Domain Name Dispute Mediation Policy provides only a general provision regarding the respondent's legitimate rights or interests, the respondent can be placed in a very week foundation to be protected under the Policy. It is therefore recommended for the IDRC to adopt the three UDRP circumstances to guide how the respondent can demonstrate his/her legitimate rights or interests in the disputed domain name. In accordance with the KORUS FTA, the Korean Government is required to provide online publication to a reliable and accurate database of contact information concerning domain name registrants. Cybersquatters often provide inaccurate contact information or willfully conceal their identity to avoid objection by trademark owners. It may cause unnecessary and unwarranted delay of the administrative proceedings. The respondent may loss the opportunity to assert his/her rights or legitimate interests in the domain name due to inability to submit the response effectively and timely. The respondent could breach a registration agreement with a registrar which requires the registrant to submit and update accurate contact information. The respondent who is reluctant to disclose his/her contact information on the Internet citing for privacy rights and protection. This is however debatable as the respondent may use the proxy registration service provided by the registrar to protect the respondent's privacy.

  • PDF