• Title/Summary/Keyword: Internet Address

Search Result 904, Processing Time 0.03 seconds

Perception of Students with disabilities and their WBI personnel about Web accessibility and its effective instructional design strategies (장애 학습자와 웹 기반 교수자의 웹 접근성에 대한 인식도와 이를 위한 효과적인 교수설계전략)

  • Roh, Seak-Zoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.117-135
    • /
    • 2007
  • There are two purposes of this study; 1) to identify the perception about Web accessibility of students with disabilities and their Web-based Instructional personnel (WBI personnel) in higher education, and 2) to find out effective WBI design strategies actually used by WBI personnel to design and develop accessible Web-Based instruction for students with disabilites. Sixteen students with disabilites and their WBI personnel at a mid-western university in US were recruited for individual interviews. The results showed that WBI personnel did not know about Web accessibility and were not well prepared to make their WBI accessible. They have to provide the equality and quality of life to students with disabilites by making their instruction accessible. They felt that they could not guarantee whether their WBI was accessible even after meeting current standards and guidelines. WBI personnel also suggested that they had to provide students with disabilites with various methods and use appropriate instructional design strategies in order to address their needs. Finally, some effective instructional design used by WBI personnel in order to make WBI accessible were listed.

  • PDF

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A Study on Machine Learning-Based Real-Time Gesture Classification Using EMG Data (EMG 데이터를 이용한 머신러닝 기반 실시간 제스처 분류 연구)

  • Ha-Je Park;Hee-Young Yang;So-Jin Choi;Dae-Yeon Kim;Choon-Sung Nam
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.57-67
    • /
    • 2024
  • This paper explores the potential of electromyography (EMG) as a means of gesture recognition for user input in gesture-based interaction. EMG utilizes small electrodes within muscles to detect and interpret user movements, presenting a viable input method. To classify user gestures based on EMG data, machine learning techniques are employed, necessitating the preprocessing of raw EMG data to extract relevant features. EMG characteristics can be expressed through formulas such as Integrated EMG (IEMG), Mean Absolute Value (MAV), Simple Square Integral (SSI), Variance (VAR), and Root Mean Square (RMS). Additionally, determining the suitable time for gesture classification is crucial, considering the perceptual, cognitive, and response times required for user input. To address this, segment sizes ranging from a minimum of 100ms to a maximum of 1,000ms are varied, and feature extraction is performed to identify the optimal segment size for gesture classification. Notably, data learning employs overlapped segmentation to reduce the interval between data points, thereby increasing the quantity of training data. Using this approach, the paper employs four machine learning models (KNN, SVC, RF, XGBoost) to train and evaluate the system, achieving accuracy rates exceeding 96% for all models in real-time gesture input scenarios with a maximum segment size of 200ms.

Governance research for Artificial intelligence service (인공지능 서비스 거버넌스 연구)

  • Soonduck Yoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.15-21
    • /
    • 2024
  • The purpose of this study is to propose a framework for the introduction and evaluation of artificial intelligence (AI) services not only in general applications but also in public policies. To achieve this, the study explores AI service management and governance toolkits, providing insights into how to introduce AI services in public policies. Firstly, it offers guidelines on the direction of AI service development and what aspects to avoid. Secondly, in the development phase, it recommends using the AI governance toolkit to review content through checklists at each stage of design, development, and deployment. Thirdly, when operating AI services, it emphasizes the importance of adhering to principles related to 1) planning and design, 2) the lifecycle, 3) model construction and validation, 4) deployment and monitoring, and 5) accountability. The governance perspective of AI services is crucial for mitigating risks associated with service provision, and research in risk management aspects should be conducted. While embracing the advantages of AI, proactive measures should be taken to address limitations and risks. Efforts should be made to efficiently formulate policies using AI technology to create high value and provide meaningful societal impacts.

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

An Empirical Study of Knowledge Sharing Behavior of the SNS: A Case Study of "Sina Weibo"

  • Lu, Jinku;Kim, Jongki
    • Asia pacific journal of information systems
    • /
    • v.26 no.3
    • /
    • pp.367-384
    • /
    • 2016
  • Social networking services (SNS) have become a significant platform for Internet users to obtain knowledge and information. Users can share messages mutually via this platform. This kind of sharing enables users to exchange and gain useful information. However, in recent years, the crisis of stickiness has appeared in SNS, calling attention to the social network industry. Relevant professionals explain that the interest of users in sharing knowledge on SNS websites and applications may gradually decrease, eventually leading to users giving it because the platforms utilize simple and uninteresting methods to attract active participation from users. However, factors affecting the knowledge sharing on SNS websites and applications should be identified clearly through studies. Sina Weibo is one of the largest SNS platforms in the world, and studies on the factors affecting knowledge sharing of users could be valuable in addressing this issue. This paper establishes the theoretical analysis model of knowledge sharing in SNS sites and applications, analyzes the factors affecting knowledge sharing on these sites, and proposes the corresponding strategies to address the issues. Using questionnaire surveys on Sina Weibo users, this article will discuss the factors affecting knowledge sharing, and analyze these factors on SNS as well as improve the stickiness of users to achieve the aim of SNS platforms enabling the expansion of the range of users. The study will discuss theoretical foundations and the hypotheses that arise. The method of study will also be discussed. The study concludes with theoretical implications, practical implications, limitations, and future research opportunities. The results of this study could aid researchers in understanding the underlying reasons for social network activities as well as for SNS developers in improving SNS services.