• Title/Summary/Keyword: Web Tools

Search Result 692, Processing Time 0.026 seconds

A Study on Implementation and Operation Management of Virtual Programming Lab based on Cloud Computing (클라우드 컴퓨팅 기반의 가상 프로그래밍 실습 환경 구현 및 운영 관리 방안 연구)

  • Park, Jungho;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.578-580
    • /
    • 2013
  • In order to provide the virtual desktop service for computer programing training, User group to use the service should be created for each subject. And the management program to manage development tools, disk images, user account information, log data is required. In this study, we implemented the web-based operation management system to manage the virtual desktop service for computer programming training. We can provide rapid provisioning for the virtual desktop service by using the implemented system.

  • PDF

Information Professionals' Knowledge Sharing Practices in Social Media: A Study of Professionals in Developing Countries

  • Islam, Anwarul;Tsuji, Keita
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.6 no.2
    • /
    • pp.43-66
    • /
    • 2016
  • The primary objective of this study was to investigate the perception of informational professionals' knowledge sharing practices in social media platforms. The specific objectives of the study included learning professionals' perceptions and awareness of knowledge sharing using social media, understanding their opinions and beliefs, and gaining familiarity with and reasons for using these tools. Open & close ended web-based questions were sent out by email to the international training program (ITP) participants. Findings indicated that most of the respondents' were aware of using social media and that they used social media for knowledge sharing. Speed and ease of use, managing personal knowledge, easier communication with users and colleagues and powerful communication tool are the areas that motivated them to use it. It also stated some barriers like lack of support, familiarity, trust, unfiltered information and fear of providing information. The study was limited to the perceptual aspect of the issue, specifically from the individuals' opinions and sentiments.

An Algorithm to generate SMIL Documents from Temporal Scripts of Animation Component (애니메이션 컴포넌트의 시간적 스크립트로부터 SMIL 문서 생성 알고리즘)

  • Ha, Yan
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.111-118
    • /
    • 2003
  • The SMIL specification that is recently approved by the W3C and is meant to help deliver multimedia content to the Web, is widely used in these days and they have continuously emerged tools or softwares related with that. In this paper, I propose an algorithm to convert temporal scripts of RASP that is an experimental toolkit for computer animation that promotes interaction-based programming over time into a SMIL document. For making better use of SMIL documents, we can improve reusability of animation components. And, main contribution of this paper is that it verifies the sequence diagram generated for synchronization of documents by reconverting SMIL from UML sequence diagram.

Korean Medicine for Carpal Tunnel Syndrome: a Systematic Review of Literature Published in Korea (수근관 증후군의 한의학적 치료에 대한 논문 고찰 -국내 학술지를 중심으로-)

  • Lee, Jong Ho
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.29 no.1
    • /
    • pp.79-84
    • /
    • 2015
  • The aim of this review is to investigate studies of Korean medical treatment of carpal tunnel syndrome published in Korea and the evidence of it's effects in order to suggest a better research method in the future. Four Korean web databases were searched by using key words such as 'carpal', and checked relevant Korean journals. The papers were classified into the field of study, publish date, diagnostic methods, evaluation methods and analysed the study tendency. There are 9 case studies, 4 controlled studies. The paper was published almost every year more than once. Acupucture, pharmacopuncture, acupotomy, warm needle acupuncture, taping, etc. were used as treatment tools. The two most commonly used diagnostic method for carpal tunnel syndrome are Phalen's test and Tinel's sign. The two most commonly used evaluation method are VAS(Visual Analog Scale) and subjective symptoms. Korean medical treatment of carpal tunnel syndrome was effective in all studies. Korean medical treatment of carpal tunnel syndrome was effective in all studies. So it is possible that Korean medical treatment of carpal tunnel syndrome is useful as therapeutic medicine, but there are not sufficient evidence based papers, so there should be further studies.

Research on Key Success Factors of Social Authoring system : Focused on Linux and Wikipedia (리눅스와 위키피디아를 중심으로 분석한 소셜 저작 시스템의 성공요소에 대한 연구)

  • Lee, Seo-Young;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.73-82
    • /
    • 2012
  • The worldwide increase of cognitive surplus leads to successful social authoring projects. In this research, social authoring mechanisms used in Linux and Wikipedia projects were analyzed to identify the key success factors. In addition, tools used in the recent successful social media such as Facebook and Ushahidi were evaluated to extract components which may be applied in social authoring systems. Based on these analyses, the improvement factors in the design of social authoring projects were suggested. The social authoring projects are expected to be more successfully achieved by providing the core components proposed in this article.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

Design and Implementation of Multiplex Certification System Using XML Signature For WBI (WBI에서 XML 전자 서명을 이용한 다중 인증 시스템 설계 및 구현)

  • Won, Eom-Ki;Kim, Jung-Jae;Jun, Moon-Seuck
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.457-464
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. But using these are main contents that users have to pay about Certification service to get CA certificate from 2004 me. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

A design and implement of web standard e-book content authoring tools platform based on 3D interaction (3차원 상호작용기반 웹 표준 e-book 콘텐츠 저작도구 플랫폼 설계 및 구현)

  • Kim, Tae-Kyeom;Jang, Hyeon-Joong;Hong, Seong-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.985-988
    • /
    • 2015
  • 최근 다양한 ICT기술의 발전으로 인간의 사회, 문화, 교육 등의 많은 분야에 변화가 일어나고 있으며, 많은 기술들이 인간 삶의 영역에 적지 않은 영향을 미치고 있다. 그 중에서도 인터넷 웹 표준 기술의 발전은 e-book 시장과 교육용 콘텐츠의 변화가 많을 것으로 예측하고 있다. 따라서 본 논문에서는 N-Screen 지원과 반응형 웹 기술 지원을 위한 3차원 상호작용기반의 e-book 콘텐츠 저작도구 플랫폼 설계를 연구하였으며, 6가지 영역의 상호작용 콘텐츠 개발이 웹 표준에 의해 저작될 수 있는 저작도구 모형을 연구 개발 하였다. 본 논문에서 제안한 e-book의 저작 형태는 웹 표준 기술 HTML5와 ePub3.0 표준을 기반으로 제작할 수 있도록 콘텐츠 플랫폼을 설계 하였으며, 사용자와의 상호작용, 시뮬레이션 등의 기능을 쉽고 빠르게 제작할 수 있는 사용자 인터페이스를 연구 적용하였다. 향후 본 연구의 결과로 전자책 산업 발전과 교육 분야의 활용 향상을 기대하고 있으며, 지식의 체계를 좀 더 다양하게 제공 할 수 있는 e-book 콘텐츠 연구의 원천이 되기를 기대한다.

Secure Coding guide support tools design for SW individual developers (SW 개인 개발자를 위한 Secure_Coding 가이드 지원 도구 설계)

  • Son, Seung-wan;Kim, Kwang-seok;Choi, Jeong-won;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.595-598
    • /
    • 2014
  • The cyber attacks of recent attacks that target zero-day exploit security vulnerabilities before the security patch is released (Zero Day) attack, the web site is without the Lord. These attacks, those that use the vulnerability of security that is built into the software itself is in most cases, cyber attacks that use the vulnerability of the security of the source code, in particular, has a characteristic response that are difficult to security equipment. Therefore, it is necessary to eliminate the security vulnerability from step to implement the software to prevent these attacks. In this paper, we try to design a Secure Coding Guide support tool to eliminate the threat of security from the stage of implementation.

  • PDF

STADIUM: Species-Specific tRNA Adaptive Index Compendium

  • Yoon, Jonghwan;Chung, Yeun-Jun;Lee, Minho
    • Genomics & Informatics
    • /
    • v.16 no.4
    • /
    • pp.28.1-28.6
    • /
    • 2018
  • Due to the increasing interest in synonymous codons, several codon bias-related terms were introduced. As one measure of them, the tRNA adaptation index (tAI) was invented about a decade ago. The tAI is a measure of translational efficiency for a gene and is calculated based on the abundance of intracellular tRNA and the binding strength between a codon and a tRNA. The index has been widely used in various fields of molecular evolution, genetics, and pharmacology. Afterwards, an improved version of the index, named specific tRNA adaptation index (stAI), was developed by adapting tRNA copy numbers in species. Although a subsequently developed webserver (stAIcalc) provided tools that calculated stAI values, it was not available to access pre-calculated values. In addition to about 100 species in stAIcalc, we calculated stAI values for whole coding sequences in 148 species. To enable easy access to this index, we constructed a novel web database, named STADIUM (Species-specific tRNA adaptive index compendium). STADIUM provides not only the stAI value of each gene but also statistics based on pathway-based classification. The database is expected to help researchers who have interests in codon optimality and the role of synonymous codons. STADIUM is freely available at http://stadium.pmrc.re.kr.