• Title/Summary/Keyword: Internet-based Collaboration

Search Result 179, Processing Time 0.027 seconds

iPlace : A Web-based Collaborative Work System Using Enterprise JavaBeans Technology (iPlace:EJB 기술을 이용한 웹 기반 협업시스템)

  • An, Geon-Tae;Jeong, Myeong-Hui;Lee, Geun-Ung;Mun, Nam-Du;Lee, Myeong-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.735-746
    • /
    • 2001
  • As collaborative works have been spread over the internet, the need for information systems providing virtual workspaces has grown rapidly. Through virtual workspaces, the members participating in those collaborative works share and exchange their information effectively. It is desirable that these systems can be extended according to various requests of users, providing reliable services. In this paper, we describe a group of components for supporting collaboration and the iPlace (internet workPlace) system developed with those components. The iPlace system provides effective sharing and reusing of information among the members of collaborative groups through personal workspaces-the private spaces on the Web for each user and shared workspaces-the shared spaces for each of those groups. In addition, implemented with EJB technology, it provides highly scalable and reliable services.

  • PDF

Development of a Web Platform System for Worker Protection using EEG Emotion Classification (뇌파 기반 감정 분류를 활용한 작업자 보호를 위한 웹 플랫폼 시스템 개발)

  • Ssang-Hee Seo
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.37-44
    • /
    • 2023
  • As a primary technology of Industry 4.0, human-robot collaboration (HRC) requires additional measures to ensure worker safety. Previous studies on avoiding collisions between collaborative robots and workers mainly detect collisions based on sensors and cameras attached to the robot. This method requires complex algorithms to continuously track robots, people, and objects and has the disadvantage of not being able to respond quickly to changes in the work environment. The present study was conducted to implement a web-based platform that manages collaborative robots by recognizing the emotions of workers - specifically their perception of danger - in the collaborative process. To this end, we developed a web-based application that collects and stores emotion-related brain waves via a wearable device; a deep-learning model that extracts and classifies the characteristics of neutral, positive, and negative emotions; and an Internet-of-things (IoT) interface program that controls motor operation according to classified emotions. We conducted a comparative analysis of our system's performance using a public open dataset and a dataset collected through actual measurement, achieving validation accuracies of 96.8% and 70.7%, respectively.

An empirical study on RFM-T model for market performance of B2B-based Technology Industry Companies (B2B 중심의 기술 산업 기업의 수익성 성과를 위한 RFM-T 모형 실증 연구)

  • Miyoung Woo;Young-Jun Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.167-175
    • /
    • 2024
  • Due to the Fourth Industrial Revolution, ICT(Information and Communication Technology) industry is becoming more important and sophisticated than ever. In B2B based ICT industry demand forecasting by analyzing the previous customer data is so important. RFM, one of customer relationship management models is a marketing technique that evaluates Recency, Frequency and Monetary value to predict customers behavior. RFM model has been studied focusing on the B2C based industry. On the other hand there is a lack of research on B2B based technology industry. Therefore this study applied it to B2B based high technology industry and considered T(technology collaboration) value, which are identified as important factors in the technology industry. To present an improved model for market performance in B2B technology industry, an empirical study was conducted on comparing the accuracy of the traditional RFM model and the improved RFM-T model. The objective of this study is to contribute to market performance by presenting an improved model in B2B based high technology industry.

Strategic Plan for Improvement of Citizen Service using Ubiquitous Technology on Public Area: Geospatial Web based Service (유비쿼터스 기술을 이용한 다중집합장소의 시민서비스 고도화 방안 : 지리공간 웹 기반 서비스 제공을 중심으로)

  • Kang, Young-Ok;Kim, Hee-Won
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.79-99
    • /
    • 2008
  • Enterprises as well as central and local governments have tried to apply ubiquitous technology to the actual life on the various types of business and projects. In this paper we develop strategic plan to provide public service on public areas based on needs analysis of public services as well as trend analysis of ubiquitous and web technology. Ubiquitous service model should be based on geospatial web which can incorporate participation and collaboration concepts, as the wire/wireless network system develop rapidly. To achieve this purpose, we suggest the following projects; 1), construction of internet map based on geospatial web technology, 2), development of web contents based on geospatial web, 3), installing ubiquitous equipment, and 4), upgrade Seoul Metropolitan Government's homepage and internet system which can incorporate web 2.0 concepts. Ubiquitous service model should be based on not only development of ubiquitous technology but also needs of consumer such as citizen, enterprises, and public sectors which have an interest in that place. Geospatial web will be the core of development of ubiquitous service models.

  • PDF

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.

RTI Model and Its Applicability in Educational Settings for Students with Achievement of Below Basic Proficiency Level

  • Jun, Myongnam;Kim, Namok;Yang, Myonghee;Kwon, Daehoon;Hong, Daewoo;Choi, Hyeonah
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.79-83
    • /
    • 2015
  • The Response to Intervention(RTI) approaches is the method to help students who are at risk for learning difficulties in advance and provide an appropriate level of intervention. In this article, the characteristics of model RTI were reviewed for students with achievement of below basic proficiency level. We considered RTI as supporting system to document students' progress and its applicability for the general educational setting in Korean school. The tier of RTI make it possible the evidence based individual instruction and counseling, differentiated step-by step approach for students with achievement of below basic proficiency level. In conclusion, RTI can be used as educational tools for dealing with improvement of academic subjects learning, behavioral and emotional problem for students with achievement of below basic proficiency level. For building high quality implementing for RTI it is needed the collaboration of teachers, counselors and learning consultants and related educators.

A Workflow Enactment Model supporting Internet-scale Collaboration (인터넷 규모의 협업 지원을 위한 워크플로우 수행 모델)

  • 이이섭;박수현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.662-673
    • /
    • 2003
  • This paper proposed a workflow enactment model to provide process management functions for the next generation Internet service environment such as Web Service and Grid Computing. The existing enterprise workflow enactment models could not meet the scalability and reliability requirements for aforementioned environments. To satisfy these requirements, this study addressed on applying P2P model to the workflow enactment model. Mathematical description and proof were employed to show the recovery based on set theory and we also showed performance enhancement through simulations, which demonstrated a comprehensive result giving more than 100 times fast response time than the existing centralized model on the same resources.

Study on Machine Learning Techniques for Malware Classification and Detection

  • Moon, Jaewoong;Kim, Subin;Song, Jaeseung;Kim, Kyungshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4308-4325
    • /
    • 2021
  • The importance and necessity of artificial intelligence, particularly machine learning, has recently been emphasized. In fact, artificial intelligence, such as intelligent surveillance cameras and other security systems, is used to solve various problems or provide convenience, providing solutions to problems that humans traditionally had to manually deal with one at a time. Among them, information security is one of the domains where the use of artificial intelligence is especially needed because the frequency of occurrence and processing capacity of dangerous codes exceeds the capabilities of humans. Therefore, this study intends to examine the definition of artificial intelligence and machine learning, its execution method, process, learning algorithm, and cases of utilization in various domains, particularly the cases and contents of artificial intelligence technology used in the field of information security. Based on this, this study proposes a method to apply machine learning technology to the method of classifying and detecting malware that has rapidly increased in recent years. The proposed methodology converts software programs containing malicious codes into images and creates training data suitable for machine learning by preparing data and augmenting the dataset. The model trained using the images created in this manner is expected to be effective in classifying and detecting malware.

Korean Multinational Corporations' Global Expansion Strategies in Manufacturing Sector: Mother Factory Approach

  • Yong Ho Shin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.269-279
    • /
    • 2024
  • The study explores the evolving landscape of overseas expansion strategies by Korean corporations, focusing on recent geopolitical tensions, the COVID-19 pandemic, and disruptions in global supply chains. It emphasizes the challenges faced by industries producing high-value products and delves into the concept of "Friend-Shoring" policies in the United States, leading major Korean companies to invest in local semiconductor, battery, and automotive factories. Recognizing the potential fragmentation of Korea's manufacturing sector, the paper introduces the "Mother Factory" strategy as a policy initiative, inspired by Japan's model, to establish core production facilities domestically. The discussion unfolds by examining the cases of major companies in Japan and the United States, highlighting the need for Korea to adopt a mother factory strategy to mitigate risks associated with friend-shoring policies. Inspired by Intel's "Copy Exactly" approach, the paper proposes a Korean mother factory model integrating smart factory technology and digital twin systems. This strategic shift aims to enhance responsiveness to geopolitical challenges and fortify the competitiveness of Korean high-tech industries. Finally, the paper proposes a Korean Mother Factory based on smart factory concepts. The suggested model integrates smart factory technology and digital twin frameworks to enhance responsiveness and fortify competitiveness. In conclusion, the paper advocates for the adoption of a comprehensive Korean Mother Factory model to address contemporary challenges, foster advanced manufacturing, and ensure the sustainability and competitiveness of Korean high-tech industries in the global landscape. The proposed strategy aligns with the evolving dynamics of the manufacturing sector and emphasizes technological advancements, collaboration, and strategic realignment.

Subjectivity Study on Cloud-based Smart Work Service of a Quasi-Governmental Agency (준 정부기관 C공단의 클라우드 기반 스마트워크 서비스 유형화 연구)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.113-123
    • /
    • 2014
  • Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. The purpose of this study is to propose Improvement plans on cloud-based smart work service of a quasi-governmental agency based on the view point of preference and tendency. To discover three types of cloud-based smart work issues and interpret theoretical definitions of those, we conducted a subjectivity analysis through qualitative methodology. At the result, the study draws three elements of typology: convenience type, concentration type, and collaboration type, and provides directions to strategic-policy studies for future cloud-based smart work services of quasi-governmental agency.