• Title/Summary/Keyword: User Internet

Search Result 4,231, Processing Time 0.025 seconds

The Design and Implementation of Internet Outlet with Multiple User Interface Using TCP/IP Processor (TCP/IP프로세서를 이용한 다중 사용자 인터페이스 지원 인터넷 전원 콘센트의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.103-112
    • /
    • 2012
  • Recently, the infrastructure to be connected to the internet is much provided, there is more and more need to connect electric or electronic products to the internet to monitor or control them remotely. However, most of the existing products lack the network interface, so it was very inconvenient to be connected to the internet. Therefore, this article designs and realizes the internet outlet allowing real-time scheduling that can control the power remotely on the internet by using the hardware TCP/IP processor. The realized product consumes low production cost because it can be realized by using the hardware TCP/IP processor and the 8-bit small microprocessor. In addition, the product can be used widely in both wired and wireless environments with a variety of user interface, including the dedicated control program which provides the environment configuration functions; embedded web service that enables the webpage to be saved on the external flash memory; Android smartphone application; motion recognition control environment that uses the OpenCV computer vision library, etc.

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments

  • Bok, Kyoungsoo;Lim, Jongtae;Ahn, Minje;Yoo, Jaesoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.744-768
    • /
    • 2016
  • As various pieces of information can be provided through the web, schemes that provide search results optimized for individual users are required in consideration of user preference. Since the existing social search schemes use users' profiles, the accuracy of the search deteriorates. They also decrease the reliability of a search result because they do not consider a search time. Therefore, a new social search scheme that considers temporal information as well as popularities and user preferences is required. In this paper, we propose a new mobile social search scheme considering popularities and user preferences based on temporal information. Popularity is calculated by collecting the visiting records of users, while user preference is generated by the actual visiting information among the search results. In order to extract meaningful information from the search target objects that have multiple attributes, a skyline processing method is used, and rank is given to the search results by combining the user preference and the popularity with the skyline processing result. To show the superiority of the proposed scheme, we conduct performance evaluations of the existing scheme and the proposed scheme.

A hidden anti-jamming method based on deep reinforcement learning

  • Wang, Yifan;Liu, Xin;Wang, Mei;Yu, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3444-3457
    • /
    • 2021
  • In the field of anti-jamming based on dynamic spectrum, most methods try to improve the ability to avoid jamming and seldom consider whether the jammer would perceive the user's signal. Although these existing methods work in some anti-jamming scenarios, their long-term performance may be depressed when intelligent jammers can learn user's waveform or decision information from user's historical activities. Hence, we proposed a hidden anti-jamming method to address this problem by reducing the jammer's sense probability. In the proposed method, the action correlation between the user and the jammer is used to evaluate the hiding effect of the user's actions. And a deep reinforcement learning framework, including specific action correlation calculation and iteration learning algorithm, is designed to maximize the hiding and communication performance of the user synchronously. The simulation result shows that the algorithm proposed reduces the jammer's sense probability significantly and improves the user's anti-jamming performance slightly compared to the existing algorithms based on jamming avoidance.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

A Clustering based Wireless Internet Proxy Server (클러스터링 기반의 무선 인터넷 프록시 서버)

  • 곽후근;우재용;정윤재;김동승;정규식
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • As different from wired internet, wireless internet has limitations due to the following characteristics; low bandwidth, frequent disconnection, low computing power, small screen in user terminal, and user mobility. Also, wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. Wireless proxy servers are used for the wireless internet because their caching and transcoding functions are helpful to overcome the above limitation. TranSend was proposed as a clustering based wireless proxy server but its scalability is difficult to achieve because there is no systematic way to do it. In this Paper. we proposed a clustering based wireless internet proxy server which can be scalable in a systematic way. We performed experiments using 16 PCs and experimental results show 32.17% performance improvement of the proposed system compared to TranSend system.

Development of X-internet frame work based on FLASH (플래시 기반의 X-인터넷 프레임워크 개발)

  • Ko Dae-Sik
    • Journal of Digital Contents Society
    • /
    • v.6 no.3
    • /
    • pp.143-147
    • /
    • 2005
  • In this paper, we developed X-internet framework based on Flash and API for this framework. Proposed X-internet framework based on Flash enables to obtain design with dynamic user interface compare to web application and enables to reduce development time. Since this framework use the API that we developed in this study art flash player, this framework does not need server module. In analytical results, it has been shown that proposed x-internet framework have efficient characteristics such as network traffic, low development cost and dynamic user interface implementation. Since this X-internet framework can operate in environment of current developer friendly, it is useful for development of various new application programs.

  • PDF

A Grounded Theory Approach on the User‘s Experience with Consulting the Internet for Health Problems (건강문제 해결을 위한 인터넷 사용에 관한 근거이론 연구 - 30대 성인 소비자를 대상으로 -)

  • Lee, Sook-Kyung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.15 no.2
    • /
    • pp.244-254
    • /
    • 2009
  • Purpose: This research was conducted to explore the experience of using Internet to solve health problems and to develope a grounded theory. Method: There were 15 subjects in their 30s who had experience using Internet to solve health problems for themselves and their families. Results: 114 concepts, 31 subcategories, and 9 categories were derived from the analysis by using approaches by Strauss & Corbin. Central phenomenon was "Primary healthcare information" and the core category was "Selecting ways to solve health problems". The participants' experiences were conceptualized into two perspectives: reliability of the information and tendency of preference among the sites. Conclusion: All of the processes found on Internet that solved health problems required the assistance of a health professional such as a nurse. It was judged that there are some differences in the degree of usage regarding health-related information, which was primarily in accordance with the confidence and attitude of the user with respect to Internet information. We presented a strategy that could operate with professionals and nonprofessionals. Therefore, we can be satisfied by the fact that this study suggests a complimentary nursing strategy to the healthcare on Internet.

  • PDF

The Effects of the Characteristics of Internet Communities and Individuals on User Loyalty (인터넷 커뮤니티의 특성과 개인 특성이 사용자 충성도에 미치는 영향)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.13 no.2
    • /
    • pp.1-21
    • /
    • 2003
  • Although the internet community(IC) has been recognized as an increasingly important for better understanding and relationships with customers, few evidence has been accumulated what factors influence IC success. This study posits the characteristics and individual characteristics as key determinants of IC success, and related hypotheses were tested using 230 data. Using user loyalty as a surrogate of IC success, this study found that the three key characteristics of IC-focus, interactivity, and cohesion levels-significantly influence the community user's loyalty. In addition, individual characteristics including personal value propositions(e.g, challenge/ambitious value, economic/rational value) and absorption tendency(e.g., flow level) affect their loyalty levels. This study also found that the determinents of IC user's loyalty defer with different types of community such as entertainment, relationships, and information/opinion sharing communities. These findings are hopefully helpful for the successful and contingent management of IC buildings and operations.

An Improved Smart Card-based User Authentication Scheme with Session Key Agreement for Telecare Medicine Information System

  • Yang, Hyungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu's authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie's smart card-based authentication scheme, and we have shown that Lee-Lie's authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie's authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.