• Title/Summary/Keyword: Web-browser's

Search Result 189, Processing Time 0.024 seconds

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

Implementation and Application of Fairy-Tale Book of an Augmented Reality Based on Smartphone and Web browser (웹과 스마트폰 기반의 증강현실 동화책 구현 및 적용)

  • Lee, Jae-Inn;Yoo, Seoung-Han
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.2
    • /
    • pp.201-209
    • /
    • 2012
  • The 2009 revised curriculum has been revised to increase the time allocated to creative discretion. Accordingly, in many schools, discretionary activities have been replaced by reading and essay writing. However, these activities do not differ from existing classes and student's interest in those activities is minimal. This study has applied two kind of the AR program, which is designed and implemented using Smartphone in the classroom, to increase student's interest. A browser-based AR, created by Junaio and QCAR-authored Smartphone-based AR fairy tale book, are easy to use in class by the students themselves. We applies to Fourth grade student in reading education this AR programs. As a result of test, the students in actual reading classes responded that their interest in the lesson and their understanding of fairy tales has increased.

  • PDF

Coarse grained Simulation Model for Web Application Performance Analysis (웹 애플리케이션 성능 분석을 위한 대략적 시뮬레이션 모델)

  • Kim, Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.25-31
    • /
    • 2008
  • The web has been evolving as an indispensable part of our lives since Berners Lee introduced the first web sever and browser in 1990. From the web end user's point of view, the response time is a matter of concern. Moreover the throughput is an important factor to consider for the system manager's point as well. It's not easy to estimate the performance of a web application because it depends on various elements comprising the whole operational environment of the Internet from networking, client and server computing powers, DBMS and OS capabilities, to application itself. This paper suggests a coarse grained simulation model for web application performance estimation based on the data measured by Buch and Pentkowski [1] and the analytical model proposed by Gunther [2]. The result of the simulation model almost coincides with the measured data and estimates the performance of a new environment.

  • PDF

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Mobile App Strategy: An Empirical Study on the Effect of the Mobile Shopping App Usage (모바일 애플리케이션 전략: 모바일 쇼핑 앱 사용 효과 실증 연구)

  • Choe, Jin Seon;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.169-183
    • /
    • 2019
  • The growth of mobile commerce (m-commerce) has been accelerated around the world. Why do e-retailers have to put a great deal of effort for the distribution of their mobile apps? The literature has paid little attention to the influence of the introduction of an e-commerce app on shopping behaviors of consumers. By analyzing the dataset of 2,342 users in Korea, this study aims to broaden our understanding of mobile shopping app usage across competing e-retailers and different channels. We found that a user's prior usage of a specific e-commerce mobile app increases her subsequent usage of its website through a mobile web browser. Thus, mobile apps do not cannibalize the mobile web channel, and there could be a complementary relationship. We also found that a user's usage of competitors' apps is positively associated with her subsequent usage of a specific e-commerce app. Because many consumers search products and compare prices across multiple e-retailers, having a mobile app helps an e-retailer be exposed to more potential consumers. This study is among the first to study the role of mobile apps in e-commerce by showing the dynamics of cross-channel and cross-vendor usage by a user.

The Standard Development on Interworking Profile of Video Conference Systems Based on HTML5 (HTML5기반의 영상회의시스템 간 상호연동 표준개발)

  • Min, J.H.;Choi, D.K.;Lee, R.H.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1035-1038
    • /
    • 2015
  • The video conference system which enables multiple users even at places away from each other proceed with the work at the same time is required to establish a convenient and efficient smart work environment. The conventional S/W-based video conference system is developed by the different implementation methods using provider's own technology and as a separate program for each OS type of user. On the other hand, the video conference system using HTML5 and WebRTC provides features of video conference system through a web browser that support HTML5 and WebRTC functions without installing any programs In this paper, in order to activate a HTML5-based video conference system in the domestic market, we propose the standard for the interworking functions that need to be supported in each system to ensure the interoperability among different HTML5-based video conference systems.

  • PDF

The Construction of MSDS Service using World Wide Web Server (World Wide Web Server를 이용한 MSDS 자료검색 시스템의 구축)

  • 이광희;송종훈;김응식
    • Journal of the Korean Society of Safety
    • /
    • v.12 no.1
    • /
    • pp.140-145
    • /
    • 1997
  • 안전측면에서 볼 때 각종 유해위험물질 정보분석은 산업현장의 교육자료 및 기초자료로 활용할 수 있고 이러한 사전 교육을 통해 예비지식을 습득함으로써 유해위험물질로 인해 발생 가능한 사고를 미연에 방지할 수 있어 유용하다. 이로 인해 각종 유해위험물질 정보를 제공하고자 1994년 말에 한국산업안전공단에서 제시한 "화학물질의 위험특성 조사 및 MSDS의 제도화 연구 보고서"에서 물질안전보건자료(MSDS)를 검색하는 도스용 프로그램이 개발되었고 국내에서는 통신을 이용한 서비스로는 KISCO-NET의 물질안전보건자료를 검색하는 대화형 방식의 서비스가 있다. 최근 들어 국외에서는 하이퍼텍스트 포맷을 사용한 그래픽환경의 클라이언트 프로그램인 웹 브라우저(Web Browser)로 World Wide Web 서버에 구축되어진 물질안전보건자료를 검색하는 사이트(site)가 늘어나고 있다. 이는 웹 서버가 단순히 문서만 전송하는 것이 아닌 멀티미디어 서비스를 지원하고 있을 뿐만 아니라 그래픽 환경의 클라이언트 프로그램으로 자료의 검색이 손쉽다는 점에서 웹상의 데이터 베이스화는 늘어가고 있는 추세이다. 하지만 현재까지 국내에는 물질안전보건자료를 웹상에서 검색할 수 있도록 한 웹 서버 구축사례는 없다. 따라서 1995년 초부터 작업을 시작하여 물질안전 보건자료를 검색하는 웹 서버를 국내에서 처음으로 구축하였으며 현재 거의 완성단계에 이르러 시범운전을 하고 있다.운전을 하고 있다.

  • PDF

Developing a Viewer for Raster Map with Vector Information in the Web Environment (웹 환경에서 벡터 정보를 갖는 래스터 지도 뷰어의 개발)

  • 부기동;전일수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.143-148
    • /
    • 1999
  • This paper presents a method which enables raster maps to be used like vector maps in the wed environment and develops a raster map viewer which can be executed in the wed browser. Through the preprocessing process the coordinates attached to each object in the raster map can be used as vector information. The raster map viewer makes the spatial analysis possible using the attribute database connected to the coordinates of each object, This map viewer makes the Web GIS can be constructed at the lower cost because the viewer uses the characteristics of raster map. And the map viewer has merit point of easily developing a component for spatial analysis.

  • PDF

Design and Implementation of Web Browser based on J2ME (J2ME를 기반으로 한 웹 브라우저 설계 및 구현)

  • Cho, Young-Seob;Choi, Young-Keun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1543-1546
    • /
    • 2002
  • PCS폰으로 Web service를 제공받으려면, 접속하는 서버측에 WML, HDML, CHTML, MIDP 등의 형식으로 작성된 문서가 있어야 한다. 따라서, 서버측에 HTML로 작성된 컨텐츠는 볼 수가 없었다. 이러한 문제점을 해결하기 위하여 플랫폼이 독립적이고 유 무선 지원과 보안이 강화된 어플리케이션 개발을 위하여 자바언어와 J2ME를 기반으로 CHMS를 설계하였다. CHMS(Converting HTML to MIDP System)는 ASP, JSP, Servlet 등으로 작성된 HTML형식의 문서를 J2ME Client(J2ME플렛폼)가 제공받게 한다. 또한 유 무선으로 서버측의 문서를 공동으로 접근, 관리하는 것이 가능하다. 본 논문은 무선을 지원하기 위해 기존의 많은 웹사이트들의 문서를 변형하는 어려움을 해결 할 수 있을 것이다.

  • PDF