• Title/Summary/Keyword: User Internet

Search Result 4,231, Processing Time 0.03 seconds

The measurement temperature and analysis used embedded system by internet explorer (인터넷 익스플로러를 통한 임베디드 시스템 기반의 온도 측정 및 분석)

  • 김희식;김영일;설대연;남철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1003-1006
    • /
    • 2004
  • In this paper have developed a system for monitoring and processing the real time sensor data in remote site through network. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is connected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server programworking on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be apply for many parts of industry and living.

  • PDF

Automatic Measurement of Temperature in Real Time by Using an Internal and Data Processing System (인터넷을 이용한 원격 실시간 온도 계측 모니터 및 계측데이터 자동처리 시스템)

  • Kim, Hui-Sik;Kim, Yeong-Il;Seol, Dae-Yeon;Nam, Cheol;O, Heung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.99-102
    • /
    • 2003
  • In this paper, we have developed a system for monitoring and processing the real time sensor data in remote site through Internet. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is corrected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server program working on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be applly for many parts of industry and living.

  • PDF

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

RIA based Personalized Search with Widget Implementation (RIA 기반 개인화 검색을 위한 Widget 응용의 구현)

  • Park, Cha-Ra;Lim, Tae-Soo;Lee, Woo-Key
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.402-406
    • /
    • 2007
  • Rich Internet Application(RIA) is one of the Web 2.0 technologies and is expected to be a next generation user interface technique which allows flexible and dynamic manipulation for Web searches. This paper addresses a personalization mechanism for advanced Web search using RIA for abundant user interactions. We devised a dynamic and graphical user interface instead of previous text-based searches and a client side application for storing personal preference information. In this research, we implemented the graphical personalized search manager using Yahoo web search API and widget, and demonstrated its effectiveness by performing some experiments with various query terms and representative predicates.

Implementation and Design of Smart Reading Room Desk using IoT (IoT를 활용한 스마트 독서실 책상의 설계 및 구현)

  • Ha, Hye-Ju;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.71-76
    • /
    • 2020
  • Recently, the market of private study room continues to grow due to increased usage of private study room. However, old study room operators often have problems with cleanliness and theft, and cannot handle them in real time. Also, there is a problem of wasting power since users usually leave their desk for a long time with the lights on. Thus, in this paper, we intended to design a service which can prevent theft, clean up the user's desk, and adjust lighting system according to the user's condition based on Arduino system. Also, we tried to design a system which sends notifications from information of android-based IoT(Internet of Things), to the terminal when other people approach to the user's desk or try to steal user's item.

Improving Device-to-Device Connectivity with Responsive Web Technology

  • Park, Minsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.25-30
    • /
    • 2022
  • Since Tim Berners-Lee introduced the idea of the web to the world in the late 1980s, the way information is produced, accessed and used has been constantly changing. This was once again an era of upheaval after Apple's Steve Jobs introduced the smartphone to the world in the mid-2000s. Before the advent of smart devices, web browsing was mainly done using desktops. After the advent of this device, the era of solving almost all human needs with a small PC in the palm of your hand has arrived. The necessity of seamless connectivity between devices, which are constantly emerging and evolving, asks our attention more than ever. In this study, we will discuss a case of design and development of a national open access website, which is optimized for dynamic online user behaviors with diverse devices. Our goal is to provide one true web for people to use in their environment. Device makers need to provide products identical to the desktop environment as much as possible. Service providers should also provide services optimized for each device in hyper-connected environments. Providing a web, optimized for user's online context, will eventually result in a sustainable user experience.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Analysis for Channel Change Minimization Scheme of Mobile IPTV Service in LTE-Advanced Systems (LTE-Advanced 시스템에서 모바일 IPTV 서비스 채널 변경 최소화 방법에 대한 분석)

  • Lee, HyeungWoo;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.77-85
    • /
    • 2015
  • This paper presents our performance evaluation after the way of minimizing waiting times between channel switching for eMBMS(evolved Multimedia Broadcast/Multicast Services) technique in LTE-Advanced systems. Existing composition of MBMS using IGMP(Internet Group Management Protocol) transfers the data with Multicast from BM-SC(Broadcast Multicast Service Center) to eNB(evolevd Node B) and with Broadcast from eNB to UE(User Equipment). Therefore, in case of channel switching, IGMP Join report should be transferred to BM-SC and then wait user's contents to be retransferred from eNB. To achieve this, Subscriber Channel technique of priorities is used for minimizing waiting times between channel switching as UE broadcasts favorite channels in advance.

User-Created Contents Business : Taxonomy and its Implications (UCC 비즈니스 유형 및 활성화 장애요인 연구)

  • Um, Myoung-Yong;Kim, Eun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.120-129
    • /
    • 2007
  • As the Internet is more embedded in people's lives, users draw on new Internet applications to express themselves through user-created contents(UCC). UCC is defined as content that is made publicly available over the Internet, reflects a certain amount of creative effort and is created outside of professional practices. This study describes the rapid growth of UCC as well as its increasing role in network-based communication. Based on the definition of UCC and the structure of emerging value chain, a taxonomy of UCC businesses is presented : UCC e-marketing business, UCC publishing business, UCC e-retailing business, and UCC development software business. This paper concludes with implications for platform and internet access providers.