• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.053 seconds

Design and Implementation of Multi Platform Wire.Wireless Messaging System Using J2ME (J2ME를 이용한 멀티 플랫폼 유.무선 메시징 시스템 설계 및 구현)

  • 김응곤;문유미;최완규;이성주
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.6
    • /
    • pp.543-548
    • /
    • 2001
  • In the case of mobile internet service using WAP it was connected to http protocol using WAP Gateway, So users take increased cost of mobile internet service. And it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language Which is independant of platform and low cost and intensely security an downloadable application. Additional , Using socket connection. Wire.Wireless Messaging system(WWMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation of multi-platform wire.wireless messaging use J2Me. It will be foundation do develop various mobile application in the future.

  • PDF

Design and Implementation of Data Sharing Support System for Integrated Data Environment of Electronic Commerce for Business to Business (기업간 통합 데이터 환경을 위한 데이터공유 지원 시스험의 설계 및 구현)

  • Yun, Sun-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1043-1054
    • /
    • 2004
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. In recent days network computing technologies have been developed rapidly and the extended use of Internet applications for enterprises such as intranet/extarnet in and between enterprises has been increased enormously. Therefore the business in the future will be executed by Electronic Commerce based on Business to Business(B2B). <중 략) This paper introduce the design and implementation of the data sharing support system that can be accessed data transparently by the users of participated enterprises in the integrated data environment supporting B2B Electronic Commerce. The system uses Java/CORBA technology in Web environment, relational and object-oriented database system, Object Query Language (OQL) to process the queries of the file information.

  • PDF

A Study on the technical application of VoIP Service in e-Trade (전자무역의 VoIP 서비스기술 활용에 관한 연구)

  • Jeong Boon-Do
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1339-1346
    • /
    • 2006
  • This thesis outlines a preparation plan for e-Trade business service regarding tendency development in super-highway information network including internet, cable, and wireless communication. It also explains two perspectives in e-Trade market: changes of circumstances and consumerism, and revitalization devices of Von(Voice over Internet Protocol) service technology for creating new market in rapidly changing IP(Internet Protocol) environment. Plus it illustrates what core competence and progress business organizations must have in current situation, forecasts turns of future e-Trade market, and analyzes technological applications of VoIP service in an extended viewpoint of corporate strategy.

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

Isolation Schemes of Virtual Network Platform for Cloud Computing

  • Ahn, SungWon;Lee, ShinHyoung;Yoo, SeeHwan;Park, DaeYoung;Kim, Dojung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2764-2783
    • /
    • 2012
  • Network virtualization supports future Internet environments and cloud computing. Virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable cloud services. Owing to several advantages such as low cost, high flexibility, and better manageability, virtualization has been widely adopted for use in network virtualization platforms. Among the many issues related to cloud computing, to achieve a suitable cloud service quality we specifically focus on network and performance isolation schemes, which ensure the integrity and QoS of each virtual cloud network. In this study, we suggest a virtual network platform that uses Xen-based virtualization, and implement multiple virtualized networks to provide variable cloud services on a physical network. In addition, we describe the isolation of virtual networks by assigning a different virtualized network ID (VLAN ID) to each network to ensure the integrity of the service contents. We also provide a method for efficiently isolating the performance of each virtual network in terms of network bandwidth. Our performance isolation method supports multiple virtual networks with different levels of service quality.

The Contribution of Internet-Based Information Systems to the MS Education Performance - An Extension to the Revised Technology Acceptance Model and Self Efficacy - (인터넷 기반의 정보시스템이 경영과학 교육성과에 미치는 영향에 관한 연구 - 수정된 정보기술수용모형과 자기효능을 중심으로 -)

  • Kim, Jin-Sung
    • Korean Management Science Review
    • /
    • v.19 no.2
    • /
    • pp.25-39
    • /
    • 2002
  • This study suggests a revised TAM (Technology Acceptance Model)-based performance evaluation model in MS (management science) education. Recently, many MS education programs are developed on the basis of computer and Internet communication technology. Previous researchers used TAM as an individual performance evaluation model, and proved that perceived usefulness and perceived ease of use are the substantive successful factors. This study provides a revised TAM-based conceptual framework for understanding what is involved in improving university MS education and what might be implied by conducting research on its improvement. It is argued in this research that three sets of forces and conditions have a direct and indirect impact on MS education ; first, each student has self efficacy and it is a critical determinant of behavior next, the use of Internet-based information system at MS education affects on the renewal of MS education : and finally, perceived usefulness and perceived ease of use have impacts on behavioral intention and actual system usage. This research concludes with suggestions for which direction this framework provides for future research on the premise and limits of efforts to renew MS education in university.

The Daily Us (vs. Them) from Online to Offline: Japan's Media Manipulation and Cultural Transcoding of Collective Memories

  • Ogasawara, Midori
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.49-67
    • /
    • 2019
  • Since returning to power in 2012, the second Abe administration has pressured Japanese mainstream media in various ways, from creating the Secrecy Act to forming close relationships with media executives and promoting anti-journalism voices on social media. This article focuses on the growth of a jingoist group called the 'Net-rightists' ('Neto-uyo' in the Japanese abbreviation) on the Internet, which has been supporting the right-wing government and amplifying its historical revisionist views of Japanese colonialism. These heavy Internet users deny Japan's war crimes against neighboring Asian countries and disseminate fake news about the past, which justifies Prime Minister Shinzo Abe's hostile diplomatic policies against South Korea and China. Over the past years, the rightist online discourses have become powerful to such an extent that the editorials of major newspapers and TV reports shifted to more nationalist tones. Who are the Neto-uyo? Why have they emerged from the online world and proliferated to the offline world? Two significant characteristics of new media are discussed to analyze their successful media manipulation: cultural transcoding and perpetual rewriting of collective memories. These characteristics have resulted in constructing and reinforcing the data loops of the 'Daily Us' versus Them, technologically raising current diplomatic tensions in East Asia.

Comparison of Learning Immersion Experiences According to Cognitive Style in Online Edu-games (온라인 교육용 게임에서의 인지양식에 따른 학습 몰입경험 비교)

  • Kang, Eun-Kyougn;Kim, Han-Il
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.4
    • /
    • pp.61-68
    • /
    • 2010
  • One often thinks that those doing any activity on the Internet are likely to be addicted to it so that they tend to rather restrain the educational use of what the Internet can provide. However, the online edu-games deserve a good learning material which can not only provoke learners' interest but also draw out a smoother interaction between teachers and learners. Even the preliminary study on immersion verified that the Internet could work positively for the learners. Considering that online edu-games can be a useful tool for individual learning, more studies on immersion should be conducted focusing on the individualization in the future. This paper shows the differences among the components of learning immersion depending on the different individual cognitive styles in the online edu-games.

  • PDF

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.

The Effect of Computer and Internet Use on the Happiness, Hopes and Optimisim in Past and Future Encounters of Various Age Groups : The Turkish Experience

  • Gurol, Mehmet Ali
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.3
    • /
    • pp.31-39
    • /
    • 2011
  • The weakening of the traditional cultures is becoming more evident from the final quarter of the last century, a period of time where the world starts to look like a "small village" in all means. A substantial cause of cultural deterioration shows to be the growing use of information and communication technologies widening the views, mentalities, and perspectives of people. Today the adolescent groups frequently owning, utilizing and consequently being charmed by the electronic equipment such like computers, internet and cellular phones have developed a unique tradition/practice in sensing and meaning life triggering larger generation gap and fading of established cultures. The main focusing of the paper is on the correlation between computer and internet use and life satisfaction, level of hope, personal development assessments and expectations of the adolescent groups in Turkey. Interpretation of the survey findings indicates that this group grading highest in use of that shows to be the happiest, most hopeful and optimistic ones among other groups. Methodologically, the study is based on data analysis and a review of recent key literature. For more dependable results a further study comparing similar tendencies of the similar groups of other nationalities is recommended.