• Title/Summary/Keyword: Internet Uses

Search Result 1,491, Processing Time 0.024 seconds

A Study on Object Detection in Region-of-Interest Algorithm using Adjacent Frames based Image Correction Algorithm for Interactive Building Signage

  • Lee, Jonghyeok;Choi, Jinyeong;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.74-78
    • /
    • 2018
  • Recently, due to decrease hardware prices and the development of technology, analog signage has been changing to digital signage for providing content such as advertisements, videos. Furthermore, in order to provide advertisements and contents to users more effectively, technical researches are being conducted in various industries. In addition, including digital signage that uses displays, it can be seen that it provides advertisements and contents using diverse devices such as LED signage, smart pads, and smart phones. However, most digital signage is installed in one place to provide contents and provides interactivity through simple events such as manual content provision or touch. So, in this paper, we suggest a new object detection algorithm based on an adjacent frames based image correction algorithm for interactive building signage.

Implementation of Remote Control System of Robot using Web Browser (웹 브라우져를 이용한 원거리 로봇 조작 시스템 구현)

  • 선상준;이동옥;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.288-291
    • /
    • 2000
  • In this paper we implement a robot system consisted of mobile tole robot to be controlled by client through web browser Newly Internet is connected to all network of the whole world. If client uses the network like this, client can control direction of a robot that is selected in free place. In this study, system is embodied in using robot that can move freely in plan place and cod camera that can grab robot image. System transmit image data of cod camera to java server that is placed in web server of internet that is used by client. Java server display incoming data in home page using java applet. Then web browser offer robot image to client and client send remote control signal to robot. Control signal is transmitted to robot by java server and robot receiving signal moves toward direction wanted by client.

  • PDF

The Study on the educational technology utilization of E-learning (E-learning의 교육적 기술의 활용에 관한 연구)

  • Kim, Kyung-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.189-191
    • /
    • 2014
  • This paper provides an overview of the E-learning service education on the last decade, In the early 2000's the emphasis of educational technology was on interactive multimedia- stand alone packages on computer hard disks or portable memory, which integrated a range of media forms in the lately. Customers handle finding the best sources of content.The system then uses social signals such as those coming from Facebook, Twitter, LinkedIn, delicious as well as clicks and views. The SNS and network infrastructure is sufficiently mature that the focus should shift to how to use the technology most appropriately to facilitate learning. As we study environmental conditions of the traditional internet and the mobile internet users in some ways. In this paper, analyze the nature of learning, role of educational and suggest alternative policy, innovation of e-learning service and effective e-learning environment in developing technology.

  • PDF

The effect of learning management system quality and self-regulated learning strategy on effectiveness of an e-Learning

  • Lee Jong-Ki;Lee Jang-Hyung
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.109-116
    • /
    • 2005
  • With the increasing use of the Internet improved Internet technologies as well as web-based applications, the uses of e-Learning have also increased the effectiveness of e-Learning has become one of the most practically and theoretically important issues in both Educational Engineering and Information Systems. This study suggests a research model, based on an e-Learning success model, the relationship of the e-learner's self-regulated learning strategy and the quality perception of the e-Learning environment. This research model focuses on the learning environment and on the learners' self-efficacy. The former consists of LMS, learning contents and interaction that are provided by e-Learning and the latter refers to the learners' self-regulated learning strategy. In this study, academic performance was measured by student's real record. We will show the validity of the model empirically, and most of the hypotheses suggested in this model were accepted.

  • PDF

A Research on the Generalization of the Construction of an Attribute Grammar Using One Attribute (하나의 속성을 사용하는 속성 문법 작성의 일반화에 대한 연구)

  • Chung, Yong-Ju
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.171-176
    • /
    • 2011
  • An attribute grammar is a set of semantic rules added to the syntax rules. This attribute grammar uses two attributes. It is difficult to write by its additional rules to the existing syntax rules with two attributes understanding the parsing steps. So this paper analyses attributes and an attribute grammar to construct the attribute grammar easily proposing three definitions and shows a possibility that an attribute grammar can be written with only one attribute in some cases.

An Energy efficient protocol to increase network life in WSN

  • Kshatri, Dinesh Baniya;Lee, WooSuk;Jung, Kyedong;Lee, Jong-Yong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.62-65
    • /
    • 2015
  • Wireless Sensor Network consists of several sensor nodes, these nodes loss some of their energy after the process of communication. So an energy efficient approach is required to improve the life of the network. In case of broadcast network, LEACH protocol uses an aggregative approach by creating cluster of nodes. Now the major concern is to built such clusters over WSN in an optimized way. This work presents the improvement over LEACH protocol. Hence we have different work environments where the network is having different capacities. The proposed work shows how the life time of the network will improve when the number of nodes varies within the network.

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

An Energy Efficient MAC Protocol Providing Guaranteed Service for Wireless Sensor Network

  • Kim, Dong-Won;Park, Tae-Geon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.123-140
    • /
    • 2011
  • In this paper, we propose an Energy Efficient Media Access Control (EE-MAC) protocol for wireless sensor networks. The proposed scheme is designed to save power consumption and guarantee quality-of-service for real-time traffic. EE-MAC uses the superframe structure which is bounded by the transmission of a beacon frame and can have an active and an inactive portion. The active period is divided into the contention free period (CFP) for real-time traffic transmission and the contention access period (CAP) for non-real-time traffic transmission. We propose the exclusively allocated backoff scheme which assigns a unique backoff time value to each real-time node based on bandwidth allocation and admission control. This scheme can avoid collision between real-time nodes by controlling distributed fashion and take effect a statistical time division multiple access. We also propose the algorithm to change the duty cycle adaptively according to channel utilization of media depending on network traffic load. This algorithm can prolong network lifetime by reducing the amount of energy wasted on idle listening.

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.

Network Security Situation Assessment Method Based on Markov Game Model

  • Li, Xi;Lu, Yu;Liu, Sen;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2414-2428
    • /
    • 2018
  • In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the core, and uses the 4 levels data fusion to realize the evaluation of the network security situation. In this process, the Nash equilibrium point of the game is used to determine the impact on the network security. Experiments show that the results of this method are basically consistent with the expert evaluation data. As the method takes full account of the interaction between the attackers and defenders, it is closer to reality, and can accurately assess network security situation.