• Title/Summary/Keyword: World wide Web

Search Result 647, Processing Time 0.027 seconds

Internet Revolution in Bangladesh

  • Rahman, Mizanoor
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.65-72
    • /
    • 2004
  • The Internet is a social and economic foundation, apparently destined for human communication and interaction. It is supposed to allow for more interactive and innovative ways for people to do what they do in 'real lift'. There is no shilly-shallying to say that at present, Internet has become a commanding and useful tool for empowerment and income making in developing countries. It is very difficult to say that at present internet has turned into a popular and useful thing among the Bangladeshi people like students, doctors, engineers, businessmen, researchers as well as politician who are being logged into the internet for getting information what they want. Though the Internet was invented in 1970 but it came late in Bangladesh through UUCPs (Unix-to-Unix copy) email connectivity in 1993 and IP connectivity in 1996. Having launched Internet, on June 1996 National polls result were broadcast through the using of World Wide Web (WWW) that was the first ever practice trial in Bangladesh. On June 1996, the government has approved to allow VSAT (Very Small Aperture Terminal) in the country's private sector to operate as Internet Service Provider (ISPs). At the end of year, there were only two ISPs in the country and number of users near about one thousand only. But next year in 1997, the total number of ISPs was more than a dozen and the clientele growth was ten times higher than that of the previous year. From then, the number of Internet users and ISPs are increasing significantly in Bangladesh. About 40 ISP are providing internet service among as many as 3, 20,000 users at present out of almost 130 license holder ISP provider but among the ISPs, most of the ISPs are placed in Dhaka and few are working in Comilla, Sylhet, Rajshahi, Chittagong and Khulna. It should be mention that currently, broadband internet (Radio, Cable) connection is working side by side dial -up connection where broadband accounts 10,000. This paper will have a comprehensive discussion on the current situations of Internet and some of the contemporary issues in the matter concerned.

  • PDF

XSLT document editing for XML document conversion in WYSIWYG environment (WYSIWYG 환경에서 XML 문서 변환을 위한 XSLT 문서편집 시스템)

  • 차원준;박주상;이용준;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.500-503
    • /
    • 2003
  • XML been using extensively by standard of data exchanging in the Internet is observed by a technology to replace existent document creation language of HTML etc. Biggest characteristic of this XML is that logic information and physical information that express style of document that do that express structural substance of document were detached. Hereupon, W3C advised XSL that oner style function of form similar to HTML for XML's style and data conversion. Also, XSL's conversion function offers function that change XML document to other data format, and can describe style information through conversion of various document format. But, a XML document conversion technology that use XSLT know-how in domestic is unprepared real condition, and necessity about solution that can edit XSLT document efficiently is putting. This paper does XML document so that conversion and output are available in various document format. And offered research of XSLT document editing system that can edit and create XSLT document efficiently under WYSIWYG environment.

  • PDF

Design of the UCM(United CGI Management) System for WWW Database Interface (WWW 데이터베이스 인터페이스를 위한 UCM(United CGI Management) 시스템의 설계)

  • Kim, Eun-Gyeong;Hwang, Byeong-Yeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.1989-1999
    • /
    • 1999
  • Many people are the latest interested in the integration of the WWW and database systems. The UCM(United CGI Management) system, which is proposed on this study, is based on the method using CGI that does not change existing servers and clients to integrate the WWW and database system. Since the CGI executable architecture executes a CGI program whenever the database is accessed, the system performance is reduced greatly when many request to the database are made simultaneously. However, the UCM system improves the system performance since it uses the integrated CGI running a daemon process. Moreover, the proposed system can use the WWW database more economically and doesn't use the SQL because it does not use a DBMS. In UCM system, we define the extended HTML tags to implement the WWW database interface and use the EXODUS storage manager for accessing the database.

  • PDF

Review on the Potential Therapeutic Roles of Nigella sativa in the Treatment of Patients with Cancer: Involvement of Apoptosis - Black cumin and cancer -

  • Mollazadeh, Hamid;Afshari, Amir R.;Hosseinzadeh, Hossein
    • Journal of Pharmacopuncture
    • /
    • v.20 no.3
    • /
    • pp.158-172
    • /
    • 2017
  • Nigella sativa (N. sativa, family Ranunculaceae) is a medicinal plant that has been widely used for centuries throughout the world as a natural remedy. A wide range of chemical compounds found in N. sativa expresses its vast therapeutic effects. Thymoquinone (TQ) is the main component (up to 50%) in the essential oil of N. sativa. Also, pinene (up to 15%), p-cymene (40%), thymohydroquinone (THQ), thymol (THY), and dithymoquinone (DTQ) are other pharmacologically active compounds of its oil. Other terpenoid compounds, such as carvacrol, carvone, 4-terpineol, limonenes, and citronellol, are also found in small quantities in its oil. The main pharmacological characteristics of this plant are immune system stimulatory, anti-inflammatory, hypotensive, hepatoprotective, antioxidant, anti-cancer, hypoglycemic, anti-tussive, milk production, uricosuric, choleretic, anti-fertility, and spasmolytic properties. In this regard, we have searched the scientific databases PubMed, Web of Science, and Google Scholar with keywords of N. sativa, anti-cancer, apoptotic effect, antitumor, antioxidant, and malignancy over the period from 2000 to 2017. The effectiveness of N. sativa against cancer in the blood system, kidneys, lungs, prostate, liver, and breast and on many malignant cell lines has been shown in many studies, but the molecular mechanisms behind that anti-cancer role are still not clearly understood. From among the many effects of N. sativa, including its anti-proliferative effect, cell cycle arrest, apoptosis induction, ROS generation, anti-metastasis/anti-angiogenesis effects, Akt pathway control, modulation of multiple molecular targets, including p53, p73, STAT-3, PTEN, and $PPAR-{\gamma}$, and activation of caspases, the main suggestive anti-cancer mechanisms of N. sativa are its free radical scavenger activity and the preservation of various anti-oxidant enzyme activities, such as glutathione peroxidase, catalase, and glutathione-S-transferase. In this review, we highlight the molecular mechanisms of apoptosis and the anti-cancer effects of N. sativa, with a focus on its molecular targets in apoptosis pathways.

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF

An online learning system for evaluating learner's activities and study level (수준별 학습과 학습 관심도를 고려한 학습평가시스템)

  • Kim, Hye-Em;Yu, Seok-Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.69-76
    • /
    • 2008
  • The biggest strength of the Internet is to enable to access information without any limitation of time and space. As the Internet and IT technologies have been developed, various kinds of teaching ways in education field such as remote lectures, video lectures, and CAI(Computer Adapted Instruction) have emerged. In terms of education, evaluation can be a basic foundation to help teach students in the next learning stage according to each student's level. In addition, it is able to give the information of students'abilities and provides proper learning programs to teach students on a case-by-case basis. The purpose of the paper is to establish evaluation system on the WWW(World Wide Web) that can reflect learning activities part of students in their evaluation scores based on the two important learning theories, Behaviorism and constructivism, which are mainly used in evaluation procedures to judge learning ability of students. This system will give information about learners, and analyze the learning interest of learners. The proposed system enables teachers to evaluate learning ability of students through various kinds of information of learners, and to execute level-based education.

  • PDF

Social Motivational Factors Influencing the Intention to Use of Blog (블로그 사용의도에 영향을 미치는 사회 동기적 요인)

  • Hong, Seok-In;Choi, Hee-Jae;Lee, Zoon-Ky
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • Blogs are a new type of media that have recently become popular on the World Wide Web and have influence throughout society. The purpose of this study is to examine social motivations influencing intention of blog usage. Based on Technology Acceptance Model and Motivation Theory, this study considered perceived usefulness, perceived ease of use, reputation, reciprocity, enjoyment of helping, social identity as the determinants of influencing the intention to use of blog. The suggested model was empirically evaluated using online survey data collection from 342 users of popular blog site in Korea (NAVER Blog, Cyworld minihompy, Daum Blog, and Yahoo Blog). The results revealed that perceived usefulness, perceived ease of use, reciprocity, and social identity affect directly the intention of blog usage. Furthermore, social identity has moderate effect via reciprocity and enjoyment of helping on blog usage. This study contributes to a theoretical understanding of the factors as social motivation that affects the usage of blogs. Also, the results of this study provide blog service providers useful strategic insights and service guidelines to enhance user's intention of blogs practically.

Implementation of A Networked Collaboration Engine for Virtual Architectural Bngineering Application (가상 건축 엔지니어링 응용을 위한 네트워크 공유작업 엔진의 구현)

  • Song, Gyeong-Jun;Go, Dong-Il;Kim, Jong-Seong;Maeng, Seong-Hyeon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.12
    • /
    • pp.642-652
    • /
    • 2001
  • Recently, the advent of World-Wide-Web(WWW) and the explosive popularity of the Internet gave birth to collaborative applications which were enabled by computers and networks as their primary media. The progress of 3D computer graphics enabled collaborative application with 3D virtual environments or distributed virtual environments. In this paper, we explain our implementation of the Share collaboration engine which is for collaboration applications based on a distributed virtual environment. We introduce Virtual Architectural Engineering 2000 (VAE2000) that is our pilot application implemented with the Share collaboration engine. The Share collaboration engine proposes a new Share network architecture for management of participants, and it provides some synchronization methods for 3D objects in virtual collaboration. VAE2000 is an experimental application that tries to prevent wastes of human, material and time resources in networked virtual collaboration.

  • PDF

A Study on Removal Request of Exposed Personal Information (노출된 개인정보의 삭제 요청에 관한 연구)

  • Jung, Bo-Reum;Jang, Byeong-Wook;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • Although online search engine service provide a convenient means to search for information on the World Wide Web, it also poses a risk of disclosing privacy. Regardless of such risk, most of users are neither aware of their personal information being exposed on search results nor how to redress the issue by requesting removal of information. According to the 2015 parliamentary inspection of government offices, many government agencies were criticized for mishandling of personal information and its leakage on online search engine such as Google. Considering the fact that the personal information leakage via online search engine has drawn the attention at the government level, the online search engine and privacy issue needs to be rectified. This paper, by examining current online search engines, studies the degree of personal information exposure on online search results and its underlying issues. Lastly, based on research result, the paper provides a sound policy and direction to the removal of exposed personal information with respect to search engine service provider and user respectively.

Design of an Avatar Assembly System based on a Commercial Game Engine (상용 게임엔진 기반의 아바타 조립 시스템의 설계)

  • Kim, Byung-Cheol;Roh, Chang Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.489-494
    • /
    • 2016
  • Developing 3D games of quality is getting easier as commercial game engines have significantly evolved. It is still difficult, however, for entry-level developers to create various avatars which could affect the entire game because it requires expertise in 3D design and programming. We propose a design of an avatar assembly system based on a commercial game engine, Unity. It includes the assembly, customization, and management of avatars. It also provides an avatar update mechanism via the World Wide Web(WWW) provided by Unity's asset system so that various avatars can be supplied after the initial game distribution.