• Title/Summary/Keyword: Web-browser's

Search Result 189, Processing Time 0.032 seconds

Implementation of a Mouse with an OLED display for a Customized Advertisement Based on the Internet (인터넷 기반 수요자 맞춤형 광고를 위한 OLED 디스플레이 장착 마우스의 구현)

  • Lee, Sun-Hwan;Lee, Hyuek-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.1
    • /
    • pp.50-55
    • /
    • 2011
  • In this paper, we propose and demonstrate an effective video advertising method for on-line shopping malls. For the Internet advertising, we make a mouse with a small OLED display that can communicate with PC's Internet network. Without displaying the teasing Pop-ups on the PC's monitor, the advertising for a shopping mall is directly sent to the OLED display on the mouse. Also, the proposed method has merits of sending the advertising based on customer's preference by using IP multicasting, which the customer can select an advertising category in advance. When the customer want to buy an item on the OLED display, the detail advertising can be immediately accessed through a Web browser on PC's monitor by pushing a special button on the mouse.

Design and Implementation of Quality Broker Architecture to Web Service Selection based on Autonomic Feedback (자율적 피드백 기반 웹 서비스 선정을 위한 품질 브로커 아키텍처의 설계 및 구현)

  • Seo, Young-Jun;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.223-234
    • /
    • 2008
  • Recently the web service area provides the efficient integrated environment of the internal and external of corporation and enterprise that wants the introduction of it is increasing. Also the web service develops and the new business model appears, the domestic enterprise environment and e-business environment are changing caused by web service. The web service which provides the similar function increases, most the method which searches the suitable service in demand of the user is more considered seriously. When it needs to choose one among the similar web services, service consumer generally needs quality information of web service. The problem, however, is that the advertised QoS information of a web service is not always trustworthy. A service provider may publish inaccurate QoS information to attract more customers, or the published QoS information may be out of date. Allowing current customers to rate the QoS they receive from a web service, and making these ratings public, can provide new customers with valuable information on how to rank services. This paper suggests the agent-based quality broker architecture which helps to find a service providing the optimum quality that the consumer needs in a position of service consumer. It is able to solve problem which modify quality requirements of the consumer from providing the architecture it selects a web service to consumer dynamically. Namely, the consumer is able to search the service which provides the optimal quality criteria through UDDI browser which is connected in quality broker server. To quality criteria value decision of each service the user intervention is excluded the maximum. In the existing selection architecture, the objective evaluation was difficult in subjective class of service selecting of the consumer. But the proposal architecture is able to secure an objectivity with the quality criteria value decision where the agent monitors binding information in consumer location. Namely, it solves QoS information of service which provider does not provide with QoS information sharing which is caused by with feedback of consumer side agents.

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce (안전하고 신뢰성있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현)

  • Choi Sung-Wook;Kim Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.55-62
    • /
    • 2006
  • It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.

Design and Implementation of Computer Architecture's Web based Learning System for Self-directed Learning (자기 주도 학습을 위한 컴퓨터 구조론의 웹 기반 학습시스템 설계 및 구현)

  • Kim, Kyung-Tae;Lim, Dong-Kyun;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.287-292
    • /
    • 2010
  • The flow gradually into the Information age to the Information age has changed, leading to the development of computer and communication technology was very important for the value. Of these the most used in computer communication using the Internet, and this proportion accounts for the development of the Internet, the information was established as a means of interaction. In this paper, to improve these problems without the constraints of time and space to allow two-way interactions using web based learning system to enable Computer Architecture were learning. Learn how Computer Architecture using Camtasia the learner, without limitation of time and place of the browser through the Internet to enable real-time learning and assessment appropriate to individual learners and teaching - learning process in conjunction with individual learners can be self-directed learning will play a role in that.

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF

Design and Implementation of a Web-based educational CPU Scheduling Simulator (웹 기반의 교육용 CPU 스케줄링 시뮬레이터의 설계 및 구현)

  • Koh, Jeong-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1653-1659
    • /
    • 2015
  • Operating Systems is a discipline which handles abstract concepts and techniques. However, most of OS courses have been textbook-oriented theoretical classes. Theoretical classes lead to the decline in the understanding of a lecture and hurt their concentration. Many instructors have tried various ways to help students understand lectures and arouse interests. This paper describes the design and implementation of a web-based educational CPU scheduling simulator which enables learners to set up various situations and simulate scheduling processes using a web browser or a smart-phone. After utilizing the implemented simulator for the class, the survey result for 2014's students shows that it is useful as an educational tool which enhances the understanding of a lecture and develops their problem solving skills.

The Design and Implementation of a Remotely-Sensed Image Processing System using Internet (인터넷 상에서의 원격탐사 영상처리 시스템의 설계와 구현)

  • 윤희상;김성환;신동석;이흥규
    • Korean Journal of Remote Sensing
    • /
    • v.13 no.1
    • /
    • pp.31-46
    • /
    • 1997
  • In recent years, as remotly-sensed image processing technologies have been improved and spread widely in the application areas, many new requirements for the image processing technologies have arisen. However, it is difficult and costly to access remotely-sensed image processing systems. Moreover, these systems have thier own processing facilities which are not easily accessible for general users. In this paper, those problems are challenged by adopting Internet as a universal information network for accessing remotly-sensed image DBMS and by allowing users to work remotely on the image processing. A remotly-sensed image processing system which can be accessed via Internet was designed and implemented. This system can be used to manipulate images over remote DBMS. The Illustra object-oriented relational DBMS with CGI(Common Gateway Interface) web interface was used in this project. The client consists of a WWW(World Wide Web) Netscap$e^{TM}$ browser, and the server consists of HTTPD(Web daemon), Illustra DBMS and Java modules in order to process the image being displayed. The developed system was tested on LAN environment and the service response time met the requirements.

Design and Implementation of Students Information Management System using XML (XML을 이용한 학생 정보 관리 시스템의 설계 및 구현)

  • Lee, Jae-Dong;Kim, Jae-Yoeng
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.47-57
    • /
    • 2000
  • Many people have been building HTML documents due to rapid spread and growth of web. However, HTML has limits in satisfying user's requirements, so that XML has emerged. In this paper, we design and implement student information management programs and presentation methods for maintaing the general student life archives and the analysis of results of examinations using XML and web browser. We define a XML DTD for general student life archives, and build XML documents. A private student life archive is printed from XML documents on the web using XMLDOM, DATA-BINDING, and XSL. Also, personal items and a roll book of a class can be printed and searched. In order to analyze the result of examinations we define DTD and build XML documents according to the DTD.

  • PDF

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.