• Title/Summary/Keyword: Internet store

Search Result 517, Processing Time 0.026 seconds

Design and Implementation of an Information System for Storing and Querying Context Information in Ubiquitous Smart Space (지능형 유비쿼터스 공간에서 상황 정보의 효과적인 저장 및 질의를 위한 정보 시스템의 설계 및 구현)

  • Lee, Ki-Hyeok;Han, Hyung-Jin;Choi, Won-Chul;Han, Kyoung-Hoon;Han, Ji-Yean;Shon, Kirack
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.15-23
    • /
    • 2008
  • This paper proposes a CIB framework implementing a ubiquitous smart space. In a ubiquitous smart space, a ubiquitous mobile device recognizes surrounding context, and infers the situation and provides services to users. Ubiquitous mobile devices have a RDF store to manage resources and relevant information efficiently on CIB framework. This store space is flexible on the operations such as addition, modification, deletion of information and response to query by SPARQL. In addition, it provides local information to other ubiquitous mobile devices in the from of XML and stores resource information from other ubiquitous mobile devices into local ubiquitous mobile device for the purpose of discovering external resources.

  • PDF

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

Clothing Expense, Consumer Innovativeness and Perceived Risk of Male and Female Customers of Various Fashion Retail Channels (주 이용 패션 소매 유통 경로에 따른 남녀 고객들의 의복 지출, 소비자 혁신성 및 구매 시 위험 지각 수준 비교)

  • Chung, Ihn Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.5
    • /
    • pp.714-727
    • /
    • 2015
  • This study investigated consumers' clothing expense, consumer innovativeness and perceived risk to the channel type they frequently purchase fashion products and compared the relationship between the variables. A survey of male and female college students was conducted and 367 responses were analyzed using descriptive statistics, chi-square analysis, two-way ANOVA, factor analysis, reliability analysis, and correlations. Female consumer clothing expenses were high compared to male consumers, and clothing expenses of consumers using department stores and independent banded stores were high compared to those using internet shopping malls. The sub-dimensions of consumer innovativeness were determined as adventure-oriented, unique-oriented, and change-oriented, and female consumers have characteristics more unique-oriented and change-oriented. In the case of female respondents, unique-oriented innovativeness was highest for department store customers, while the male customer of non-branded stores showed the highest unique-oriented innovativeness. Perceived risk indicated the highest score from the customers of internet shopping mall. Department stores were recognized as reliable by female department store customers. Clothing expenses and consumer innovativeness dimensions showed significantly positive correlations; in addition, the relation between clothing expense and perceived risks were significantly negative. Consumer innovativeness and perceived risks have positive relations.

Implementation of Pet Management System using Lora Module (LoRa 모듈을 이용한 반려동물 관리시스템 구현)

  • Park, Se-Jun;Choi, Eik-Hyeon;Yoo, Tae-Jun;Mo, Ji-Soo;Lee, Sang-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.275-281
    • /
    • 2018
  • Along with the growing market for pets and the increasing interest in pet management, the need for pet management systems is increasing. Development of IoT-related technologies has made it possible to develop the related systems. This paper implements a variety of functions through Bluetooth 4.0 and LoRa communication between devices using Arduino and Android applications depending on distances. In the paper, users can receive real-time location information through the communication between Android applications and devices attached to pets, store pet information, manage pet information, and store stroll courses more conveniently with the developed system.

A Micro-Webpage Stored in NFC Tag (NFC태그에 저장 가능한 마이크로 웹페이지)

  • Choi, BokDong;Eun, SeongBae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A Smartphone has an ability accessing Internet by URL stored in NFC(Near Field Communication) Tag for storing the information of items, blogs and web pages. Because the system works through the Internet with URL, however, it needs to pay some costs like communication fee and time. If we can store the web page on the tags, we can save the communication overhead. But they have too small memory to store it. In this paper, we introduce the Micro-Webpage technology which can be stored in NFC tag or QR(Quick Response) code. To make a Micro-Webpage, we remove control tags from the web page to leave a user original content. The removed control tags are stored in our smartphone application as a template. The user content is also compressed to a smaller one by an lossless compression algorithm. When a tag is read, the stored content is decompressed and, it is combined with the template to make the original web page. We have implemented a prototype of Micro-Webpage system on Android platform and confirmed that the prototype has reasonable performance improvements in saving memory and loading web page time.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Study on the Clothing Selection Criteria and Purchasing Satisfaction according to the Outdoor Wear Benefit (아웃도어 웨어 추구혜택에 따른 의복선택기준과 구매만족도에 관한 연구)

  • Je, Eun-Suk
    • Journal of Fashion Business
    • /
    • v.16 no.4
    • /
    • pp.1-12
    • /
    • 2012
  • This study made an analysis on the relation and influence between outdoor wear benefit, clothing selection criteria and purchasing satisfaction. Survey was conducted targeting 20s-30s males and females who have experience of purchasing outdoor wear and 335 sheets of questionnaire were used for final analysis. And statistics package SPSS16.0 was used for analysis of collected materials. A group seeking the trendy brand turned out to give considerable thought to the brand and trend and purchase less than 100,000won at the discount outlet. A group pursuing functional practicality puts an emphasis on the activity and use, and purchases at the internet shopping mall or department store. Regarding material, function, design, style and color as important, a group pursuing individuality and appearance turned out to purchase clothing at various places such as discount outlet, specialty store and internet. A group that is indifferent to clothing appeared not to care about specific elements when selecting outdoor wear. The result of study showed that consumers of outdoor wear show purchasing satisfaction in respect of design, style, color or trend.

Method to Analyze Information Leakage Malware using SSL Communication in Android Platform

  • Cho, Gilsu;Kim, Sangwho;Ryou, Jaecheol
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2018
  • Widely used around the world, smartphones contain many features and can store content such as contacts, photos, and videos. Information that can be leaked in proportion to the information that the smartphone can store has also been increased. In recent years, accidents such as personal information leakage have occurred frequently. Personal information leakage is happening in the Android environment, which accounts for more than half of the smartphone operating system market share. Analyzing malicious apps that leak information can tell you how to prevent information leakage. Malicious apps that leak information will send importantinformation to the hacker's (C & C) server, which will use network communication. Malicious apps that are emerging nowadays encrypt and transmit important information through SSL communication. In this case, it is difficult to knowwhat kind of information is exposed to network. Therefore, we suggest a method to analyze malicious apps when leak important information through SSL communication. In this paper, we identify the way malicious apps leak information. And we propose a method for analyzing information leaked by SSL communication. Data before encryption was confirmed in the device through SSL hooking and SSL Strip method.

Relaying Protocols and Delay Analysis for Buffer-aided Wireless Powered Cooperative Communication Networks

  • Zhan, Jun;Tang, Xiaohu;Chen, Qingchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3542-3566
    • /
    • 2018
  • In this paper, we investigate a buffer-aided wireless powered cooperative communication network (WPCCN), in which the source and relay harvest the energy from a dedicated power beacon via wireless energy transfer, then the source transmits the data to the destination through the relay. Both the source and relay are equipped with an energy buffer to store the harvested energy in the energy transfer stage. In addition, the relay is equipped with a data buffer and can temporarily store the received information. Considering the buffer-aided WPCCN, we propose two buffer-aided relaying protocols, which named as the buffer-aided harvest-then-transmit (HtT) protocol and the buffer-aided joint mode selection and power allocation (JMSPA) protocol, respectively. For the buffer-aided HtT protocol, the time-averaged achievable rate is obtained in closed form. For the buffer-aided JMSPA protocol, the optimal adaptive mode selection scheme and power allocation scheme, which jointly maximize the time-averaged throughput of system, are obtained by employing the Lyapunov optimization theory. Furthermore, we drive the theoretical bounds on the time-averaged achievable rate and time-averaged delay, then present the throughput-delay tradeoff achieved by the joint JMSPA protocol. Simulation results validate the throughput performance gain of the proposed buffer-aided relaying protocols and verify the theoretical analysis.

Purchasing Behavior and Evaluation Criteria on Hat Products (모자 제품의 구매 행동과 평가 기준)

  • Kim, Cha-Hyun;Park, Jae-Ok
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.6
    • /
    • pp.1068-1082
    • /
    • 2009
  • The purpose of this study was to investigate empirically the consumer behavior regarding the purchase of millinery items in relation to their evaluation criterion and demographic characteristics. The survey was carried out to 395 individuals in their 20s and over who were quota sampled according to age and gender. The collected data were statistically treated with the SPSS 12.0 program in terms of descriptive statistics, cross tabulation, t-test, one-way ANOVA, factor analysis, Cronbach's $\alpha$ coefficient and Duncan-test. The 20s and 50s over were more interested in hat products than other ages. Female consumers obtained the most information about hat products from store visits, TV and magazines. On the other hand, male consumers had it from the acquaintances and internet. Younger consumers more often utilized internet to have it. Their main purchase location was department stores. The younger purchased it more in traditional market, the older purchased it more in mega wholesale market or discount store. The consumers of hat products considered the intrinsic classification most when buying hats. The evaluation criteria employed by them were aesthetics, quality, and external attributes. Hat consumers were more concerned about aesthetics attributes than the other two criteria. Female consumers and consumers who are more interested in the hat and have a higher level of education and income considered aesthetics attributes most important.

  • PDF