• Title/Summary/Keyword: the internet

Search Result 29,296, Processing Time 0.058 seconds

The Item Distribution Method for the Party System in the MMORPG Using the Observer Pattern (Observer 패턴을 적용한 MMORPG의 파티 시스템 아이템 배분 방법)

  • Kim, Tai-Suk;Kim, Shin-Hwan;Kim, Jong-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1060-1067
    • /
    • 2007
  • We need various methods to develop MMORPG that is game genre which many users use among various game genre using Internet. Specially, to heighten efficiency of distributing work, Object-oriented language such as C++ is used and we need design techniques that can take advantage of enough object-oriented concept when making large-scale game. There is various pattern that can apply in software breakup design in GoF's design pattern for these design techniques. If you apply Observer pattern to Party System Design for forming community between game users, you can easily add new class and maintain system later. Party Play is one of the important system that is used to form game users' community in MMORPG games. The main point that must be considered in Party-Play-System is to divide evenly experience value and acquisition that is got by Party-Play among users according to each user's level. To implement Party Play System that consider maintenance of system, in this paper, we propose a method using GoF's Observer-Pattern, showing you that proposed method which has advantage to dynamic memory allocation and to virtual method call can be used usefully to change object to real time at program run and to add new class and to maintain system new.

  • PDF

A Network Module and a Web Server for Web-based Remote Control of Embedded Systems (웹 기반 원격 제어를 위한 내장형 시스템용 네트워크 모듈 및 웹 서버)

  • 선동국;김성조;이재호;김선자
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.231-242
    • /
    • 2004
  • Remote control and monitoring of information appliances require RTOS and TCP/IP network module to communicate each other. Traditional TCP/IP protocol stacks, however, require relatively large resources to be useful in small 8 or 16-bit systems both in terms of code size and memory usage. It motivates design and implementation of micro TCP/IP that is lightweight for embedded systems. Micro embedded web server is also required to control and monitor information appliances through the Web. In this paper, we design and implement micro TCP/IP and Web server for information appliances. For this goal, we investigate requirements for the interoperability of embedded systems with the Internet and the Web-based control of embedded systems. Next, we compare our micro TCP/IP protocol stack with that of RTIP and QPlus in terms of object code size and performance. The size of micro TCP/IP protocol stack can be reduced by 3/2 and 1/4, respectively, comparing with that of RTIP and QPlus. We also show that the performance of our micro TCP/IP is similar to that of RTIP and QPlus since it handles 2.9Mbps when delayed ACK is not adapted.

Relationship between SNS addiction proneness and interpersonal satisfaction among undergraduate students (대학생들의 SNS중독경향성과 대인관계 만족도의 상관관계)

  • Kim, So-Yeon;Park, Mi-Ji;Park, Bu-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.454-462
    • /
    • 2018
  • This study was conducted to examine SNS addiction proneness and interpersonal satisfaction among undergraduate students and the relationships between these two variables, as well as to establish baseline data for appropriate intervention of SNS addiction prevention. The participants of this study were 316 undergraduate students in D and K city, and data were collected between June 30 and July 30, 2017. Data were collected by a self-administered online survey and analyzed by descriptive statistics, t-tests, and Pearson's correlation coefficients using SPSS. The results showed that SNS addiction proneness and interpersonal satisfaction were negatively correlated (r=-0.57, p<0.01), indicating students with higher SNS addiction had lower interpersonal satisfaction. There were no significant differences in SNS addiction proneness and interpersonal satisfaction by gender (t=0.05, p=0.963), number of SNS networks (t=0.66, p=0.513), or number of SNS-only networks (t=-1.24, p=0.216). Students who used SNS for data collection showed significantly higher interpersonal satisfaction (t=3.02, p=0.030); however, there was no significant differences in SNS addiction proneness among purposes for using SNS (t=0.39, p=.759). The results of this study will be useful baseline data for developing an intervention to improve interpersonal satisfaction and prevent SNS addiction among undergraduate students.

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

Correlation Study of Knowledge and Behavior Regarding Breast Care among Female Undergraduate Students in China

  • Liu, Meng-Xue;Li, Jian;Geng, Yun-Long;Wang, Yan-Chun;Li, Jie;Chen, Yu-Juan;Ali, Gholam;Tarver, Siobhan L.;Wen, Yu-Feng;Sun, Wen-Jie
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10943-10947
    • /
    • 2015
  • Background: This study aimed to understand the relationship between knowledge level and behavior on breast care in Chinese students, so as to provide strategies for improving the health education of breast care and subsequently for aiding in breast cancer prevention. Materials and Methods: A self-designed questionnaire was used to evaluate breast care knowledge level and characterize related behavior. Correlation analysis was conducted for the knowledge level and behavior. The study was carried out using 597 female undergraduate students in medical and non-medical colleges in Wuhu, China. Results: The average score of breast care knowledge was $5.32{\pm}1.68$ ($5.62{\pm}1.68$ and $5.00{\pm}1.68$ for medical and non-medical students, respectively), with a greater score value for sophomores ($5.59{\pm}1.72$) than freshmen ($5.18{\pm}1.65$). The average score of breast care behavior was $2.21{\pm}1.13$, again with a greater value in sophomores ($2.37{\pm}1.15$) than freshmen ($2.21{\pm}1.13$). A significant positive correlation (r=0.231, p<0.01) between knowledge scores and behavior scores was observed. In addition, various factors, including paying attention to breast care information, receiving breast self-examination guidance, TV program and Internet, were found to influence breast care knowledge. Conclusions: In general, female undergraduate students lack of self-awareness of breast care with a low rate of breast self-examination. It is necessary to carry out health education to improve early detection of breast cancer.

A Survey of the Safety in Seasoned Dried Fishes (조미건어포류의 안전성에 대한 조사연구)

  • Yoon, Mi-Hye;Hong, Hae-Geun;Lee, In-Sook;Park, Min-Jung;Yun, Su-Jung;Park, Jeong-Hwa;Kwon, Yeon-Ok
    • Journal of Food Hygiene and Safety
    • /
    • v.24 no.2
    • /
    • pp.143-147
    • /
    • 2009
  • A survey of food preservatives, sulfur dioxide and microbial contamination levels was conducted on 73 seasoned dried fishes(41 squids, 17 filleted fish, 6 Alaska pollack, 9 others) collected from domestic markets and internet. Among preservatives, only sorbic acid was detected in 25 samples including 23 seasoned dried squids, 1 seasoned filleted fish and 1 seasoned dried Alaska pollack with a range $0.01{\sim}0.92g/kg$. Sulfur dioxide was detected from one sample(seasoned dried squid) and its content was 10.5 mg/kg. All samples were contaminated by total aerobic bacteria, and the degree was $3.00{\sim}6.45\;log_{10}$ CFU/g(average level was $5.09\;log_{10}$ CFU/g). Escherichia coli, Salmonella spp. and Staphylococcus aureus were not detected in all samples. On the basis of the results above, most of the seasoned dried fishes were appropriate for Korea food standard, yet biological hygiene control will be needed constantly.

An Improvement of User Interface for Design Idea Generation System based on WEB2.0 (WEB2.0 기반 디자인 아이디어 발상 시스템의 사용자 인터페이스 개선)

  • Choi, Eun-Suk;Chung, Seung-Ho;Kim, Dea-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.37-45
    • /
    • 2010
  • WEB or Internet has given mankind an unprecedented experience in indefinite sharing of online content by original means of digitalized information, but it comes to face an empirical issue of unreasonable informational superfluity as well as a practical issue of collapsed dot.com bubble economy in 2001. Instead, a latest networking concept called 'WEB 2.0' or 'Semantic WEB' becomes embodied as a new approach to entities such as end users and content. The concept of WEB 2.0 for creating a platform on the basis of openness and collaboration has made such a technological setting that we can effectively resolve and manage unreasonable data maintenance and interface inherent in Creative Group Thinking System (CGTS), a WEB-based computer-aided idea generation system developed in 2003. Concerning decreased usability and difficulties with data maintenance due to certain issues of CGTS as a part of WEB R&D platform, such as complex display composition and inefficient data processing system, this study seeks to simplify and streamline data structure by means of AJAX and DOM as WEB2.0-based technologies, and integrate interface structure of WEB platform to focus on end users, so that it can improve interface of conventional CGTS for the purpose of realizing end user's participation through improving usability.

Social Factors Affecting Internet Searches on Cyber Bullying in Korea and America Using Social Big Data and Google Search Trends (소셜 빅데이터와 Google 검색트렌드를 활용한 한국과 미국의 사이버불링 검색에 영향을 미치는 요인 분석)

  • Song, Tae-Min;Song, Juyoung;Cheon, Mi-Kyung
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.67-75
    • /
    • 2016
  • The study analyzed big data extracted from Google and social media to identify factors related to searches on cyber bullying in Korea and America. Korea's cyber bullying analysis was conducted social big data collected from online news sites, blogs, $caf{\acute{e}}s$, social network services and message for between January 1, 2011 and March 31, 2013. Google search trends for the search words of stress, exercise, drinking, and cyber bullying were obtained for January 1, 2004 and December 22, 2013. The main results of this study were as follows: first, the significant factors stress were cyber bullying that Korea more than America. Secondly, a positive relationship was found between stress and drinking, exercise and cyber bullying both Korea and America. Thirdly, significant differences were found all path both Korea and America. The study shows that both adults and teenagers are influenced in Korea. We need to develop online application that if cyber bullying behavior was predicted can intervene in real time because these actual cyber bullying-related exposure to psychological and behavioral characteristic.

  • PDF

A Study on Vector-based Converting Method for Hydrological Application of Rainfall Radar Image (레이더 영상의 수문학적 활용을 위한 벡터 변환방법 연구)

  • Jee, Gye-Hwan;Oh, Kyoung-Doo;An, Won-Sik
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.7
    • /
    • pp.729-741
    • /
    • 2012
  • Among the methods of precipitation data acquisition, a rain gauge station has a distinctive advantage of direct measurement of rainfall itself, but multiple stations should be installed in order to obtain areal precipitation data required for hydrological analysis. On the other hand, a rainfall radar may provide areal distribution of rainfall in real time though it is an indirect measurement of radar echoes on rain drops. Rainfall radars have been shown useful especially for forecasting short-term localized torrential storms that may cause catastrophic flash floods. CAPPI (Constant Altitude Plan Position Indicator), which is one of the several types of radar rainfall image data, has been provided on the Internet in real time by Korea Meteorological Administration (KMA). It is one of the most widely available rainfall data in Korea with fairly high level of confidence as it is produced with bias adjustment and quality control procedures by KMA. The objective of this study is to develop an improved way to extract quantitative rainfall data applicable to even very small watersheds from CAPPI using CIVCOM, which is a new image processing method based on a vector-based scheme proposed in this study rather than raster-based schemes proposed by other researchers. This study shows usefulness of CIVCOM through comparison of rainfall data produced by image processing methods including traditional raster-based schemes and a newly proposed vector-based one.

Channel Assignment and Routing using Traffic Profiles in Wireless Mesh Networks (무선 메쉬 네트워크에서 트래픽 프로파일을 고려하는 채널 할당 및 라우팅)

  • Park, Sook-Young;Lee, Sang-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.374-385
    • /
    • 2010
  • Wireless mesh networks can be deployed for various networks from home networking to last-mile broadband Internet access. Wireless mesh networks are composed of mesh routers and mesh clients. In these networks, static nodes form a multi-hop backbone of a large wireless access network that provides connectivity to end-users' mobile terminals. The network nodes cooperate with each other to relay data traffic to its destinations. In order to increase connectivity and better performance, researchers are getting interested in multi-channel and multi-interface wireless mesh networks. In these networks, non-overlapping multiple frequency channels are used simultaneously to increase the aggregate bandwidth available to end-users. Recently, researches have focused on finding suitable channel assignments for wireless network interfaces, equiped in a mesh node, together with efficient routing to improve overall system throughput in wireless mesh networks. This goal can be achieved by minimize channel interference. Less interference among using channels in a network guarantees more aggregated channel capacity and better connectivity of the networks. In this thesis, we propose interference aware channel assignment and routing algorithms for multi-channel multi-hop wireless mesh networks. We propose Channel Assignment and Routing algorithms using Traffic Profiles(CARTP) and Routing algorithms allowing detour routing(CARTP+2). Finally, we evaluate the performance of proposed algorithms in comparison to results from previous methods using ns-2 simulations. The simulation results show that our proposed algorithms can enhance the overall network performance in wireless mesh networks.