• Title/Summary/Keyword: Computer/Internet Use

Search Result 1,590, Processing Time 0.028 seconds

A case study on verification of internet survey (인터넷 설문조사의 검증에 관한 사례연구)

  • Ryu, Gui-Yeol;Moon, Young-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.1
    • /
    • pp.11-18
    • /
    • 2014
  • The object of study is to verify the accuracy of internet survey by comparing database data and internet survey. Internet survey was conducted on August, 2012. Respondents were subscribers of KISTI NDSL. Variables were age, organization as demographic variables, number of use, and period of use as attitude variables. Mismatch rates of age, organization, number of use, and period, are 7.5%, 5%, 92%, and 55% respectively. We could estimate the mismatch rate for age as 3% as a pessimistic point of view, and 1% as an optimistic point of view by detail verification. The mismatch rates of organization are 4.5% as a pessimistic point of view, and 2% as an optimistic point of view. The mismatch rates for the frequency of use, the period of use are very high, because measurement error, problems in memory, and internet attitude, etc. Implication of this study is that data of internet survey could be reliable. Many further researches are needed for verification of internet survey.

Design and Implementation of Data Sharing Support System for Integrated Data Environment of Electronic Commerce for Business to Business (기업간 통합 데이터 환경을 위한 데이터공유 지원 시스험의 설계 및 구현)

  • Yun, Sun-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1043-1054
    • /
    • 2004
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. In recent days network computing technologies have been developed rapidly and the extended use of Internet applications for enterprises such as intranet/extarnet in and between enterprises has been increased enormously. Therefore the business in the future will be executed by Electronic Commerce based on Business to Business(B2B). <중 략) This paper introduce the design and implementation of the data sharing support system that can be accessed data transparently by the users of participated enterprises in the integrated data environment supporting B2B Electronic Commerce. The system uses Java/CORBA technology in Web environment, relational and object-oriented database system, Object Query Language (OQL) to process the queries of the file information.

  • PDF

Classification of network packets using hierarchical clustering (Hierarchical Clustering을 이용한 네트워크 패킷의 분류)

  • Yeo, Insung;Hai, Quan Tran;Hwang, Seong Oun
    • Journal of Internet of Things and Convergence
    • /
    • v.3 no.1
    • /
    • pp.9-11
    • /
    • 2017
  • Recently, with the widespread use of the Internet and mobile devices, the number of attacks by hackers using the network is increasing. When connecting a network, packets are exchanged and communicated, which includes various information. We analyze the information of these packets using hierarchical clustering analysis and classify normal and abnormal packets to detect attacks. With this analysis method, it will be possible to detect attacks by analyzing new packets.

A SURVEY OF QUALITY OF SERVICE IN MULTI-TIER WEB APPLICATIONS

  • Ghetas, Mohamed;Yong, Chan Huah;Sumari, Putra
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.238-256
    • /
    • 2016
  • Modern web services have been broadly deployed on the Internet. Most of these services use multi-tier architecture for flexible scaling and software reusability. However, managing the performance of multi-tier web services under dynamic and unpredictable workload, and different resource demands in each tier is a critical problem for a service provider. When offering quality of service assurance with least resource usage costs, web service providers should adopt self-adaptive resource provisioning in each tier. Recently, a number of rule- and model-based approaches have been designed for dynamic resource management in virtualized data centers. This survey investigates the challenges of resource provisioning and provides a competing assessment on the existing approaches. After the evaluation of their benefits and drawbacks, the new research direction to improve the efficiency of resource management and recommendations are introduced.

Bridging the Connectivity Gap Within a PLC-Wi-Fi Hybrid Networks

  • Shafi Ullah Khan;Taewoong Hwang;In-Soo Koo
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.395-402
    • /
    • 2023
  • The implementation of a hybrid network utilizing Power Line Communication (PLC) and Wi-Fi technologies has been demonstrated to improve signal strength and coverage in areas with poor connectivity due to internet shadow areas. In this study we strategically positioned Wi-Fi relays and utilized the capabilities of PLC technology to significantly improve signal strength and coverage in areas with poor connectivity. We also analyzed the effects of metallic obstacles on Wi-Fi signal propagation and proposed a solution to strengthen the signal enough to pass through them. Our experiment demonstrated the feasibility and potential of using this hybrid network in industrial scenarios for real-time data transmission. Overall, the results suggest that the use of PLC and Wi-Fi hybrid networks can be a cost-effective and efficient solution for overcoming internet connectivity challenges and has the potential to provide high-speed internet access to areas with unreliable signals.

Relationship between Communication Stance and Characteristics of Internet Use (청소년에서의 인터넷 중독 정도 조사 및 이에 따른 의사소통 유형과의 관계)

  • Lee Moon-Soo;Choo Chung-Sook;Joung Yoo-Sook;Hong Sung-DoDavid;Lee Hyeon-Soo;Nam Min;Song Hyoung-Seok
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.17 no.2
    • /
    • pp.141-148
    • /
    • 2006
  • Objectives : Internet became essential component in these days. This study primarily tried to find out the characteristics of high risk internet users through using the communication scale. Methods : We investigated levels of internet addiction using Internet Addiction Scale in 1,193 high school and middle school students. Participants were divided into 3 groups (high risk user group, potential risk user group, normal user group) according to the results from internet addiction scale. We additionally surveyed characteristics of internet use, and patterns of communication and Communication Scale based on Satir theory in 614 from 1,193 participants. Results : Boys showed higher tendencies for internet addiction than girls in internet addiction scale. There were significant differences in mean computer using time especially during weekends among 3 internet user groups. The distribution of communication types in each internet user group was similar and this finding coincided with previous study results. However high risk user group showed higher scores in each inadequate communication pattern such as placating, blaming, super-reasonable and irrelevant stance. Conclusion : These results suggest that adolescents who use internet in addictive patterns may have more problematic communication styles and these may be associated with poor interpersonal relationships.

  • PDF

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN;Ismail KIRBAS
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.77-86
    • /
    • 2024
  • Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

A Study on the Real Time Analysis of Plastic Deformation Process using WWW(World Wide Web) (웹을 이용한 실시간 소성가공의 해석에 관한 연구)

  • 이상돈;최호준;방세윤;임중연;이호용
    • Transactions of Materials Processing
    • /
    • v.12 no.2
    • /
    • pp.110-115
    • /
    • 2003
  • This paper is concerned with the compression test and forming process of flange by using virtual reality and analysis(simulation) program. This virtual manufacturing can be carried out one personal computer without any expensive devices for experiment. The virtual manufacturing composed of three modules such as the imput, calculation and the output modules on internet. Internet user can give the material's property and process parameters to the sever computer at the input module. On the calculation module, a simulator computes the virtual manufacturing process by analysis program and stores the data as a file. The output module is the program in which internet user can confirm virtual manufacturing results by showing tables, graphs, and 3D animation. This programs is designed by an internet language such as HTML, CGI, VRML and JAVA ,while analysis programs use the finite increasing, the virtual manufacturing technique will substitute many real experiments in the future.

A Study of Flow Influence on Web Information Management of Tourists (플로우가 관광객의 인터넷 정보처리에 미치는 영향에 관한 연구)

  • 김윤숙
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.5
    • /
    • pp.557-568
    • /
    • 2002
  • This paper is to find out that the concept of Flow has been a key role on the use of internet by using the pre-test and analysis. As the internet has been used as the key way of communication on the marketing, we discuss that the new paradigm of the effective marketing on internet is taken to consideration and analyze tourism of jejudo to prove that paradigm. if the internet the convenient and fast information communication, is widely used for tourist, the managers of tourism company will have the chance to reduce the cost and the expectation to grow.

  • PDF