• Title/Summary/Keyword: Internet Uses

Search Result 1,469, Processing Time 0.027 seconds

Relationship between internet addiction and health in dental hygiene students (일개 치위생과 대학생의 인터넷 중독과 건강 관련성)

  • Kang, Hyun-Joo;Lee, Jung-Hwa
    • Journal of Korean society of Dental Hygiene
    • /
    • v.15 no.1
    • /
    • pp.91-99
    • /
    • 2015
  • Objectives: The purpose of the study was to investigate the relationship between internet addiction and health in dental hygiene students. Methods: A self-reported questionnaire was completed by 216 dental hygiene students in Daegu from June 9 to 13, 2014. Data were analyzed by descriptive statistics, t-test, and ANOVA using SAS 9.2 program. The instruments included Korean internet addiction scale(K scale) and Korean version of the general health questionnaire. General characteristics consisted of grade, religion, residential types, economic condition, place of internet use, duration, purpose, and time of use. Physical characteristics consisted of subjective physical condition, smoking, alcohol drinking, exercise above twice per week, musculoskeletal disease, and location of physical symptoms. Psychiatric scale and 6 questions of physical characteristics were consulted by the statistician of preventive medicine department. Results: Internet users over 4 hours manifested the poor mental health, while those who uses internet under 2 hours showed good mental health(F = 1.41, p < 0.01). The students having good physical condition showed better mental health than those with poor physical condition(t = -2.81, p < 0.01). The students exercising at least twice a week showed better mental health than those who do not exercise(t = -3.10, p < 0.01). Those who having musculoskeletal symptoms showed higher index of internet addiction score than those who do not(t = 4.21, p < 0.01). Those who have no musculoskeletal symptoms tended to have better mental health than those who have musculoskeletal symptoms(t = 2.28, p < 0.05). The variables correlated to mental health were internet addiction, subjective physical condition, and exercise at least twice a week. The severity level of internet addiction leads to poor mental health(r = 0.26, p < 0.001). Conclusions: Internet addiction is closely related to mental health. So the students must know the danger of internet addiction. Proper health education is necessary for the prevention of addiction symptoms.

A Study on the Practical Use of Rich-Media in the Internet Advertisement (인터넷 광고에서의 리치미디어 활용에 관한 연구)

  • 임은정;손은미;이현주
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.187-196
    • /
    • 2001
  • Today's internet advertisement market is growing rapidly placing great importance on banner advertisements. Still, banner advertisements are being ignored by the users because most of these banners are exaggerated, visually distracted and they usually interfere with internet surfing. These banners make the agents and the users feel displeased and furthermore, make internet market unstable. 'Rich-Media'came in sight as the new way of advertising means in the internet market as the users demand for more dynamic and interactive media. In Rich-Media, sound and animation interact with former animated banner advertisements. Internet advertising businesses inducing web agencies have positive views about Rich-Media, because more information and ideas are shared through aural and visual integration and it is very effective way to draw attentions from the users. In this study, we have examined the effects of Rich-Media advertisements through surveys. As a result, Rich-Media advertisements are superior to ordinary banner advertisements in visual effect, leading interests of users, inducing mouse did(s and providing of information. The recent uses of Rich-Media is just a mere beginning, but we expect to make the Rich-Media an essential medium of internet advertisement as we continue studying the uses and effects of Rich-Media.

  • PDF

Joint Demosaicing and Super-resolution of Color Filter Array Image based on Deep Image Prior Network

  • Kurniawan, Edwin;Lee, Suk-Ho
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.13-21
    • /
    • 2022
  • In this paper, we propose a learning based joint demosaicing and super-resolution framework which uses only the mosaiced color filter array(CFA) image as the input. As the proposed method works only on the mosaicied CFA image itself, there is no need for a large dataset. Based on our framework, we proposed two different structures, where the first structure uses one deep image prior network, while the second uses two. Experimental results show that even though we use only the CFA image as the training image, the proposed method can result in better visual quality than other bilinear interpolation combined demosaicing methods, and therefore, opens up a new research area for joint demosaicing and super-resolution on raw images.

Security Framework for Improving the Performance of the Malicious Process Control System (악성 프로세스 제어 시스템의 성능 향상을 위한 보안 프레임워크)

  • Kim, Iksu;Choi, Jongmyung
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.61-71
    • /
    • 2013
  • Until now, there have been various studies against Internet worms. Most of intrusion detection and prevention systems against Internet worms use detection rules, but these systems cannot respond to new Internet worms. For this reason, a malicious process control system which uses the fact that Internet worms multicast malicious packets was proposed. However, the greater the number of servers to be protected increases the cost of the malicious process control system, and the probability of detecting Internet worms attacking only some predetermined IP addresses is low. This paper presents a security framework that can reduce the cost of the malicious process control system and increase the probability of detecting Internet worms attacking only some predetermined IP addresses. In the proposed security framework, virtual machines are used to reduce the cost of control servers and unused IP addresses are used to increase the probability of detecting Internet worms attacking only some predetermined IP addresses. Therefore the proposed security framework can effectively respond to a variety of new Internet worms at lower cost.

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Development of Web-based Telemedicine using Satellite Internet Communication System (위성인터넷통신을 이용한 Web 기반 원격의료시스템 개발)

  • Hwang, Seon-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.95-104
    • /
    • 2000
  • In general cases, the conventionl Internet connected to a terrestrial network is too slow to transmit large medical images. To overcome this low speed problem of the Internet, we have developed asymmetric satellite data communication system (ASDCS) as a fast satellite Internet communication method. The ASDCS uses a receive-only satellite link for dat delivery and a terrestrial network for control communication. The satellite communication link we implemented showed the very high-speed performance compared to the terrestrial link. Using ASDCS, the satellite Internet communication was 10-30 times faster than the conventional terrestrial Internet link. Also we have developed a Web-based Telemedicine system that can access every permitted server of hospital via the Internet. Java programming techniques were used to make our system and it can access and retrieve medical information and images through only public web browser such as Netscape TM without additional specific tools. To increase the transmitting speed of our Telemedicine system, JPEG method was used. In conclusion, we were able to develop a fast and public Telemedicine system using the proposed ASDCS and Web technology. ASDCS technology increased the speed of the conventional Internet and Web technology extended the scope of use for Telemedicine system from intrahospital to public use.

  • PDF

Research on China's Internet Financial Risk Supervision and Countermeasures (중국 인터넷 금융 리스크 관리 및 대책 연구)

  • Yuan, Zhao;Sim, Jae-Yeon
    • Industry Promotion Research
    • /
    • v.7 no.4
    • /
    • pp.109-119
    • /
    • 2022
  • In recent years, China's Internet finance industry is hot. There is no doubt that Internet finance has been fully integrated into China, forming a new form of financing, and rapidly becoming a new channel for investment and financing in China, shouldering the responsibility of inclusive financing and building China's real economy. However, with investment, there are risks. Based on the panel data of China's Internet financial platform, this paper uses the random effect model to study the influencing factors of Internet financial risks, and draws three conclusions: (1) The user funds and platform funds of the financial platform will be managed separately by the bank, which can effectively reduce the risk of financial transactions on the Internet; (2) The risk of Internet financial transactions can be effectively reduced by avoiding the concentration of platform funds in the hands of a few borrowers through regulatory policies; (3) The liquidity control of funds effectively reduces the risk of Internet financial transactions. Based on the conclusions, we propose optimization strategies for regulatory policies to achieve the healthy and sustainable development of Internet finance.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Empirical Study on Internet Users' Information Privacy Concerns and Information Protection Behavior (인터넷 사용자의 정보프라이버시 염려와 정보보호 활동에 대한 실증연구)

  • Um, Myoung-Yong;Rhee, Moon-Ki;Kim, Tae-Ung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.1
    • /
    • pp.69-79
    • /
    • 2015
  • This research aims to empirically explore the antecedents that could impact on internet users' information protection behavior. 282 of sample data collected from internet users was used to test the hypotheses. The results of this research reveal that the internet users' information privacy concerns has a significant impact on self-efficacy, perceived usefulness, and information protection behavior. In addition, we found that perceived usefulness and information protection behavior are significantly influenced by self-efficacy. However, contrary to expectations, perceived usefulness has no statistically significant effect on information protection behavior. These findings provide significant implications for online companies and internet uses as well as educational stakeholders that give educations about information protection.

Study on Enhancing Security Architecture in Internet of Things Environment (사물인터넷 환경에서의 강화된 보안 아키텍처에 대한 연구)

  • Lee, Jong-won;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.300-302
    • /
    • 2017
  • The Internet of Things allows you to connect everything around you to your network and make it easy to reach anytime, anywhere. The Internet of Things uses various devices such as smart devices and wireless sensors connected to the network. When any small information about command or result is exposed to the outside during communication between each terminal, there is a serious risk. The Internet has a characteristic that it is much weaker than general network in terms of security because it has limited hardware performance. In this paper, I propose an enhanced security architecture of Internet of Things considering the limitation of hardware.

  • PDF