• Title/Summary/Keyword: Computer and internet

Search Result 7,358, Processing Time 0.032 seconds

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Information Analyses of Child Who Needs Protection in Busan (요보호아동의 정보화 실태 분석: 부산지역을 중심으로)

  • 김옥희
    • Journal of Families and Better Life
    • /
    • v.20 no.5
    • /
    • pp.149-166
    • /
    • 2002
  • In this study, 1 have analyzed the state of the use of information technology by the at-risk children who are residing in Husan metropolitan area. The ultimate goal of this study is to help ensure the healthy development of the children and improve the quality of their lives in this information-oriented society. For this research, 1 surveyed 183 children living in an institution or a low-income family in Busan metropolitan area. The survey questionnaire was designed to obtain information on the respondents, socio-demographic characteristics, computer-related conditions of the immediate and social environments, patterns of computer and Internet use, their experience and degree of so called, Net-generation syndrome, Internet addiction disorder, changes in social and familial life caused by Internet use, and exposure to pornographic materials. The results show that 95.9 % of at-risk children in Husan own a computer, 60.9 % of those computers being Pentium Ⅲ. A majority of the children (74.9 %) are connected to Internet at a high-speed, using such devices as LAN, ADSL or cables. About seventy-six percent of the children have used a PC and Internet less than two years. In other words, a majority of them have not used those for a long period of time. The main results of the research are summarized in the following: There is a significant difference among at-risk children in terms of experiences in computer and Internet use according to their grade levels. There is a gender difference in the amount of time spent on computer and Internet. Boys spend more time every week on computer and Internet than girls do. There is a significant difference in the pattern of computer and Internet use, according to the type of their risk, and grade level. The so-called 'Net Generation Syndrome' is not serious in this group. A majority of the at-risk children think that Internet is more interesting than TV. They hardly shop on Internet, and they don think the advertisements on Internet are a serious problem. Also, unlike many people assumptions, their desire to communicate through on-line chatting was very low. They do not tend to buy computer game programs, and Internet Addiction Disorder was not pronounced among them. The at-risk children rarely had an exposure to pornographic materials in the cyber space. However, the exposure was more frequent for institutionalized children than children in low-income families. These results point to a need for a policy to improve the welfare of at-risk children and guarantee their right to information.

Using Status of Computer and Internet in University Students (대학생들의 컴퓨터 및 인터넷 이용 실태)

  • Roh, Hyol-yun
    • Journal of Korean Clinical Health Science
    • /
    • v.4 no.2
    • /
    • pp.566-570
    • /
    • 2016
  • Purpose. The purpose of this study was to determine the using state of computers and internet in university students. Method. This research conducts a survey of 50 university students. Researcher personally visited lecture room to explain the purpose of research. The questionnaire was made by the researcher and consists of seven questions. Result. In this study, university students of 74% using computer more than one hour per day. The most of purpose of internet use was internet surfing and writing a document. University students of 42% were play games with internet. Conclusion. The continuous tracking is need of computer and internet use and need to be healthy for the use of guidance of university students.

Analysis of Attitude on Clothing Information from Internet Site in College Students -Daegu.Kyungpook Area - (인터넷 의생활 정보에 대한 대학생들의 태도 분석 - 대구.경북 지역을 중심으로 -)

  • 은영자
    • The Research Journal of the Costume Culture
    • /
    • v.10 no.2
    • /
    • pp.186-199
    • /
    • 2002
  • This study is carried out to examine the purpose of utilization and the degree of satisfaction on the information collected from the Internet site for the understanding of the reality of clothing information for college students. The results are as fellows; 1 . Three primary factors have been abstracted for the satisfaction of information. 2. The difference in the purpose of utilizing information, depending on the individual characteristic of students and the features related to computer, was shown in the difference of major and school year, number of the internet connection per day, capability of using computer, period of using computer, and frequency of information searching. The more the number of internet connection per day, the less the capability of using computer, and searching for information when required, internet can be utilized for study and work. 3. The difference in the degree of information satisfaction, depending on the individual characteristic of students and the features related to computer, was shown in the difference of major, school year, opportunity to take computer-related course, frequency of searching information, and etc. More positive and satisfactory response was derived from these not majoring in clothing rather than those majoring, those taking computer course related to clothing, and those searching for clothing information periodically. 4. The primary factors affecting the satisfaction on the overall information of clothing show difference in terms of sex and frequency of searching information. Female students show lower degree of satisfaction than male students and more satisfaction on the information searched as the frequency of searching becomes less.

  • PDF

Impact Analysis of Internet Addiction on Students' Academic Performance

  • Seong-Hoon Lee;Dong-Woo Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.248-253
    • /
    • 2023
  • Nowadays, with the spread of the Internet and the emergence of high-performance computers and various peripheral devices, our society is undergoing great changes. In the field of education, various types of education using smart education infrastructure are being conducted. The spread of the Internet and the development of various devices have problems that can lead to addiction due to excessive Internet use. Most of the problems that appear in adolescence are immersed in games, which can affect academic achievement. Therefore, in this study, the effect of excessive Internet use on students' academic achievement was studied. The survey for the study was conducted through a questionnaire survey, and the subjects of the survey were high school students majoring in humanities. As a result, the relationship between academic achievement and Internet addiction was low in the middle, upper, and lower groups in the general user group. Also, in the highrisk user group, it appeared high in the order of middle, low, and high.

Knowledge-Based Control via the Internet

  • Tang, Kok-Zuea;Goh, Han-Leong;Tan, Kok-Kiong;Lee, Tong-Heng
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.2
    • /
    • pp.207-219
    • /
    • 2004
  • This paper presents the development of a knowledge-based control system operating via the Internet. With the synergy provided by the Internet, the central expert controller with its knowledge-base has the potential to serve a multitude of front-end clients located anywhere in the world provided they have Internet access. In this way, the operational span of the knowledge-based control system can be expanded to virtually anyplace within the reach of the Internet. This configuration has positive implications in improving the efficiency of distributed operations, thereby enabling plantwide optimization and costs savings. Datasocket technology is adopted to facilitate a more efficient data exchange between the knowledge-based central server and the front-end clients. A specific application in the remote monitoring and fault diagnosis of machines using the proposed control configuration is presented in the paper.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

  • Li, Wei;Zhang, Wenwen;Gu, Dawu;Tao, Zhi;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.793-810
    • /
    • 2015
  • The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

A Case of Implementation of Agricultural Information System and the Role of Extension Educator (농업정보화를 위한 추진 사례와 농촌지도사의 역할)

  • Kim, Yeong- Sig;Chun, Eun-Kyung
    • Journal of Agricultural Extension & Community Development
    • /
    • v.7 no.2
    • /
    • pp.321-325
    • /
    • 2000
  • There are many opportunities for Agricultural Technology Centers and for local communities to benefit from the computer and internet and compete in the information age. However, many rural communities appeared to lack human and financial resources required to enable access to the computer and internet. A case of implementation process of establishing agricultural information system at Asan Agricultural Technology Center during the last 10 years were presented. Extension educators took leadership role in facilitating the educational needs of farmers in terms of related resources for the computer and internet extension. To better prepare communities for the information age, community access was critical for promoting the technology and improving proficiency of local community members in its use, extension educators need to take leadership role in assessing community ability to provide internet access points for people without computers. Extension educators at city/county Agricultural Technology Centers may initiate to attract people with internet needs. computer resources, technological experience, and know-how for setting up internet access points in community locations.

  • PDF