• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.029 seconds

The Implementation of Real-Time Vital Sign Information Transmission Monitoring System using TMO (TMO를 이용한 실시간 생체정보 전송 모니터링 시스템 구현)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.33-40
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. It is able to apply to remote medical examination and treatment. Through the proper data exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

  • PDF

A Case Study on Mobile Advertisement Injection (모바일 광고 인젝션 사례 연구)

  • Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1049-1058
    • /
    • 2017
  • The rapid evolution of mobile technologies and proliferation of mobile devices have created a new channel for marketing by mobile advertising. As mobile advertising is a close relative to online advertising, it also has similar problems such as advertisement injections (Ad injections). Users are exposed to unwanted advertisements and redundant web traffic by injected ads can cause additional charges of mobile devices. Although mobile ad injection can cause many problems it has been merely studied. In this paper, we analyze ad injection activities by mobile applications that exploit a legitimate application (Naver mobile application). We reverse-engineered 2 mobile applications and find out characteristics of mobile ad injections. We compare mobile ad injections with online ad injections and suggest feasible mitigations.

EmXJ : A Framework of Configurable XML Processor for Flexible Embedding (EmXJ : 유연한 임베딩을 위한 XML 처리기 구성 프레임워크)

  • Chung, Won-Ho;Kang, Mi-Yeon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.467-478
    • /
    • 2002
  • With the rapid development of wired or wireless Internet, various kinds of resource constrained mobile devices, such as cellular phone, PDA, homepad, smart phone, handhold PC, and so on, have been emerging into personal or commercial usages. Most software to be embedded into those devices has been forced to have the characteristic of flexibility rather than the fixedness which was an inherent property of embedded system. It means that recent technologies require the flexible embedding into the variety of resource constrained mobile devices. A document processor for XML which has been positioned as a standard mark-up language for information representation on the Web, is one of the essential software to be embedded into those devices for browsing the information. In this paper, a framework for configurable XML processor called EmXJ is designed and implemented for flexible embedding into various types of resource constrained mobile devices, and its advantages are compared to conventional XML processors.

Analytic Approach to e-Transformation of Intermediary (중개유통기업의 e-트랜스포메이션: 분석적 접근)

  • Han, Hyun-Soo
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.1-21
    • /
    • 2003
  • In this paper, we investigate industrial product intermediary's transformation strategy by exploiting advantages afforded by web based information technologies. Our motivation for this research stems from exploring intermediary's responding strategy to cope with supplier's threatening to disintermediation. From transaction cost perspective, internet can induce both the vertical quasi-integration (electronic hierarchy) and outsourcing (electronic market). Our rationale on directing one of these bi-directional movements is specified on intermediary's value adding on the supply chain. As such, we investigated supply chain performance, IT effects on customer's requirement of channel functions, and channel power structure. Propositions to suggest contingent e-transforming strategic alternatives are logically derived from dyadic nature of supply chain characteristics such as efficiency versus customer services, and supplier dominant versus easy replaceability of suppliers. The contingent e-transformation framework developed from intermediary's perspective is reviewed through longitudinal industry case analysis. Implications from the industry case analysis give us insights for the effectiveness of the framework to combine supply chain characteristics with intermediary's e-transformation.

A Study on Developing the Courses and Librarians' Role for Educating Future Librarians (미래사서의 역할 및 교과목 개발에 관한 연구)

  • Noh, Young-Hee;Ahn, In-Ja;Choi, Sang-Ki
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.103-132
    • /
    • 2012
  • This study seeks to propose and develop library science courses required in the digital age by investigating overseas LIS courses and surveying field librarians. Such courses must help the future librarian develop familiarity and skill with emerging technologies. As a result, required courses in the digital era were found to be: 'Design and Management of Databases', 'Library Planning, Marketing, and Assessment', 'Understanding Information Technology for Managing Digital Collections', and 'Information and Communication in a Digital Age' in that order, and should therefore be offered as core courses. In addition, 'Service for Information Disadvantaged Users' and 'Organization and Utilization of Web resources' were derived. The study also recommends different required courses based on different librarian types and duties.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Visualization using Emotion Information in Movie Script (영화 스크립트 내 감정 정보를 이용한 시각화)

  • Kim, Jinsu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.69-74
    • /
    • 2018
  • Through the convergence of Internet technology and various information technologies, it is possible to collect and process vast amount of information and to exchange various knowledge according to user's personal preference. Especially, there is a tendency to prefer intimate contents connected with the user's preference through the flow of emotional changes contained in the movie media. Based on the information presented in the script, the user seeks to visualize the flow of the entire emotion, the flow of emotions in a specific scene, or a specific scene in order to understand it more quickly. In this paper, after obtaining the raw data from the movie web page, it transforms it into a standardized scenario format after refining process. After converting the refined data into an XML document to easily obtain various information, various sentences are predicted by inputting each paragraph into the emotion prediction system. We propose a system that can easily understand the change of the emotional state between the characters in the whole or a specific part of the various emotions required by the user by mixing the predicted emotions flow and the amount of information included in the script.

A Study on Next Generation HTTP-based Adaptive Streaming Transmission Protocol for Realistic Media (실감미디어 전송을 위한 차세대 HTTP 기반 적응적 스트리밍 전송 프로토콜 연구)

  • Song, Minjeong;Yoo, Seong-geun;Park, Sang-il
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.602-612
    • /
    • 2019
  • Various streaming technologies are being studied to guarantee the QoE of viewers due to the development of realistic media. HTTP adaptive streaming is a typical example, and it is based on HTTP / 1.1 and TCP. These protocols have become one of the causes of delaying the image delay and increasing the waiting time of web pages. Therefore, in this paper, we propose a QUIC-DASH system applying the UDP-based transmission protocols QUIC and HTTP / 2 to the MPEG-DASH system after analyzing various transmission protocols and development process of HTTP. Through experiments, the QUIC-DASH system confirmed the possibility of providing optimal performance in terms of transmission speed of LTE environment than existing system. We also suggest various future studies for better performance.

Preferences of ICT among Patients with Chronic Kidney Disease Undergoing Hemodialysis: An Ecuadorian Cross-Sectional Study

  • Cherrez-Ojeda, Ivan;Felix, Miguel;Mata, Valeria L.;Vanegas, Emanuel;Gavilanes, Antonio W.D.;Chedraui, Peter;Simancas-Racines, Daniel;Calderon, Juan Carlos;Ortiz, Fabian;Blum, Guillermina;Plua, Angela;Gonzalez, Gino;Moscoso, Grace;Morquecho, Walter
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.292-299
    • /
    • 2018
  • Objectives: The aim of the present study was to assess the frequency of use, and preferences regarding information and communication technologies (ICTs) among Ecuadorian patients with chronic kidney disease (CKD) undergoing hemodialysis. Methods: We conducted an anonymous cross-sectional survey-based study from January 2016 to April 2017, involving 393 patients with end-stage renal disease from 9 hemodialysis centers, in which they rated their use and preferences of various ICTs through a modified version of the Michigan Questionnaire. The questionnaire collected information regarding demographics, patients' interest in obtaining health-related information through ICTs, and interest in using ICTs as a potential way to communicate with their healthcare providers. A chi-square test for association and adjusted regression analyses were performed. Results: Among all patients who participated, 64.3% reported owning a cellphone, with less than a third reporting active Internet connection. The most used ICT for obtaining information about CKD and/or hemodialysis was web-based Internet, followed by YouTube. SMS was rated the highest to receive and seek health-related information, followed by Facebook. Younger age and higher levels of education were associated with a higher overall usage of ICTs. Finally, more than half of the patients reported interest in using WhatsApp for communicating with their healthcare providers. Conclusions: Understanding the preferences of ICTs among patients with CKD undergoing hemodialysis could help to improve their outcomes through the potential uses and benefits of ICTs. Further research is needed to assess their role in improving the care of patients with chronic diseases.

Mobile-based Big Data Processing and Monitoring Technology in IoT Environment (IoT 환경에서 모바일 기반 빅데이터 처리 및 모니터링 기술)

  • Lee, Seung-Hae;Kim, Ju-Ho;Shin, Dong-Youn;Shin, Dong-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.1-9
    • /
    • 2018
  • In the fourth industrial revolution, which has become an issue now, we have been able to receive instant analysis results faster than the existing slow speed through various Big Data technologies, and to conduct real-time monitoring on mobile and web. First, various irregular sensor Data is generated using IoT device, Raspberry Pi. Sensor Data is collected in real time, and the collected data is distributed and stored using several nodes. Then, the stored Sensor Data is processed and refined. Visualize and output the analysis result after analysis. By using these methods, we can train the human resources required for Big Data and mobile related fields using IoT, and process data efficiently and quickly. We also provide information that can confirm the reliability of research results through real time monitoring.