• 제목/요약/키워드: Internet applications

검색결과 2,461건 처리시간 0.027초

The Impact of Applications of Internet of Things on Practice of Knowledge Management in Organizations: the Mediating Role of Employees' Engagement

  • Hisham O., Mbaidin
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.19-28
    • /
    • 2022
  • The study aimed to identify the impact of Applications of Internet of things on practice of knowledge management in organizations: the mediating role of employees' Engagement. A quantitative questionnaire survey is conducted. The study population consisted of all senior and middle administrations in small and medium enterprises in Jordan. The study sample consisted of (350) senior and middle administrations. The study sample was selected by random stratified method. The results revealed that There is an impact of Applications of Internet of things on the practice of knowledge management at (α ≤ 0.05) in the small and medium enterprises in Jordan. Furthermore, there is an impact of Applications of Internet of things on the employees' Engagement. The current study provided some important insights into an issue that requires further research. Understanding the applications of the Internet of Things and their impact on improving knowledge management is of paramount importance in raising the quality of products and improving the company's image, as shown in this research.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

An Automatic and Scalable Application Crawler for Large-Scale Mobile Internet Content Retrieval

  • Huang, Mingyi;Lyu, Yongqiang;Yin, Hao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.4856-4872
    • /
    • 2018
  • The mobile internet has grown ubiquitous across the globe with the widespread use of smart devices. However, the designs of modern mobile operating systems and their applications limit content retrieval with mobile applications. The mobile internet is not as accessible as the traditional web, having more man-made restrictions and lacking a unified approach for crawling and content retrieval. In this study, we propose an automatic and scalable mobile application content crawler, which can recognize the interaction paths of mobile applications, representing them as interaction graphs and automatically collecting content according to the graphs in a parallel manner. The crawler was verified by retrieving content from 50 non-game applications from the Google Play Store using the Android platform. The experiment showed the efficiency and scalability potential of our crawler for large-scale mobile internet content retrieval.

Multicasting in the Internet

  • Chon, Kilnam
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1996년도 Proceedings International Workshop on New Video Media Technology
    • /
    • pp.57-59
    • /
    • 1996
  • The Internet offers multicasting applications for interactive multimedia applications. MBone and CU-SeeMe are notable systems, and are introduced here as examples of the multicasting systems on the Internet. They are available globally now, and numerous applications are appearing on these systems and others.

  • PDF

WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구 (A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service)

  • 천우성;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 춘계학술대회
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband)서비스는 우리나라에서 세계표준화한 4세대 통신이다. WiBro 통신기반을 사용한 인터넷기반 응용프로그램을 통한 서비스이용이 늘어나고 있다. WiBro 서비스에서 인터넷 기반 응용프로그램으로 서비스 이용할 때, 응용프로그램의 취약점을 분석할 필요가 있다. 본 논문에서는 WiBro 서비스에서 인터넷을 이용할 때 취약점을 분석하고, 인터넷기반 응용프로그램에 대한 해킹공격이 발생할 수 있는 취약점을 분석한다. WiBro 서비스와 응용프로그램의 취약점 분석을 통해 보안대책을 연구한다.

  • PDF

WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구 (A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service)

  • 천우성;박대우
    • 한국정보통신학회논문지
    • /
    • 제16권6호
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband)서비스는 우리나라에서 세계표준화한 4세대 통신이다. WiBro 통신기반을 사용한 인터넷기반 응용프로그램을 통한 서비스이용이 늘어나고 있다. WiBro 서비스에서 인터넷기반 응용프로그램으로 서비스 이용할 때, 응용프로그램의 취약점을 분석할 필요가 있다. 본 논문에서는 WiBro 서비스에서 인터넷을 이용할 때 취약점을 분석하고, 인터넷기반 응용프로그램에 대한 해킹공격이 발생할 수 있는 취약점을 분석한다. WiBro 서비스와 응용프로그램의 취약점 분석을 통해 보안대책을 연구한다.

AutoScale: Adaptive QoS-Aware Container-based Cloud Applications Scheduling Framework

  • Sun, Yao;Meng, Lun;Song, Yunkui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.2824-2837
    • /
    • 2019
  • Container technologies are widely used in infrastructures to deploy and manage applications in cloud computing environment. As containers are light-weight software, the cluster of cloud applications can easily scale up or down to provide Internet-based services. Container-based applications can well deal with fluctuate workloads by dynamically adjusting physical resources. Current works of scheduling applications often construct applications' performance models with collected historical training data, but these works with static models cannot self-adjust physical resources to meet the dynamic requirements of cloud computing. Thus, we propose a self-adaptive automatic container scheduling framework AutoScale for cloud applications, which uses a feedback-based approach to adjust physical resources by extending, contracting and migrating containers. First, a queue-based performance model for cloud applications is proposed to correlate performance and workloads. Second, a fuzzy Kalman filter is used to adjust the performance model's parameters to accurately predict applications' response time. Third, extension, contraction and migration strategies based on predicted response time are designed to schedule containers at runtime. Furthermore, we have implemented a framework AutoScale with container scheduling strategies. By comparing with current approaches in an experiment environment deployed with typical applications, we observe that AutoScale has advantages in predicting response time, and scheduling containers to guarantee that response time keeps stable in fluctuant workloads.

클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례 (Service Management for Cloud Marketplace : A Case of Internet2 NET+)

  • 권순범;안성만
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

Emerging Internet Technology & Service toward Korean Government 3.0

  • Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.540-546
    • /
    • 2014
  • Recently a new government has announced an action plan known as the government 3.0, which aims to provide customized services for individual people, generate more jobs and support creative economy. Leading on from previous similar initiatives, the new scheme seeks to focus on open, share, communicate, and collaborate. In promoting Government 3.0, the crucial factor might be how to align the core services and policies of Government 3.0 with correspoding technologies. The paper describes the concepts and features of Government 3.0, identifies emerging Internet-based technologies and services toward the initiative, and finally provides improvement plans for Government 3.0. As a result, 10 issues to be brought together include: Smart Phone Applications and Service, Mobile Internet Computing and Application, Wireless and Sensor Network, Security & Privacy in Internet, Energy-efficient Computing & Smart Grid, Multimedia & Image Processing, Data Mining and Big Data, Software Engineering, Internet Business related Policy, and Management of Internet Application.