• Title/Summary/Keyword: Internet Computing

검색결과 3,571건 처리시간 0.027초

Automatically Registering Schedules from SMS Messages on Handheld Devices (휴대전화에서 단문 메시지로부터 일정 자동 등록)

  • Kim, Jae-Hoon;Kim, Hyung-Chul
    • Korean Journal of Cognitive Science
    • /
    • 제22권1호
    • /
    • pp.1-18
    • /
    • 2011
  • With rapid spread of handheld devices like cellular or smart phones, a short message service (SMS) comes on the public as a communication means. SMS is very cheap and can be easily written down on the storage in order not to forget it, hence it is widely used to inform schedules (time and place). In this paper, we develop a system for automatically registering schedules extracted from SMS text messages. SMS text messages are very short and concise, but include a lot of Internet words like slangs and abbreviations. These have made it difficult to extract information on schedules from them. Also handheld devices have some limitations on computing power and storage and then applying general natural language processing modules like morphological analysis to the devices are somewhat hard. To relax these burdens, we extract schedule informations from SMS messages using machine learning methods like condition random field (CRF) without using any language processing modules and register the informations on the schedule management system of handheld devices. Our proposed automatic schedule registration system has implemented on Samsung Omnia phone for experiments.

  • PDF

Development and Application of Analysis & Design Methodology for Web-based System (웹 기반 시스템의 분석 및 설계 방법론 개발과 적용)

  • Jung, Byung-Kwon;Kim, Dong-Soo;Song, Jae-Hyeong;Hwang, Chong-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제8권2호
    • /
    • pp.155-166
    • /
    • 2002
  • Even the short history of the Web system, the technology related to the Web system has been developed rapidly. Yet, the quality of the Web-based application software has not been improved that much. For this reason, the efficient method to develop the Web-based application software is needed. This paper describes the items necessary to develop the Web-based application software. On the basis of ISO/IEC 12207-Software Life Cycle Processes this paper mainly suggests the analysis and design stage of the Web-based model for developing software. Also, this paper describes the methods to define the process and the entity for applying contents to Web-based application software. With the web-based model suggested in this paper the Web-RoadMap Methodology of KCC Information & Communication, a system provider in Korea, has been applied to the public-domain projects. Through the application, Web-RoadMap Methodology has been proved to be an applicable model for analyzing and designing the systems based on the web environments.

A Personalized Service System based on Distributed Heterogeneous Internet Shopping Mall Environment (분산 이기종 인터넷 쇼핑몰 환경에서의 벡터 모델 기반 개인화 서비스 시스템)

  • Park, Sung-Joon;Kim, Ju-Youn;Kim, Young-Kuk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제8권2호
    • /
    • pp.206-218
    • /
    • 2002
  • In this paper, we design and implement a system that presents a method for selecting and providing personalized services independently without unifying the existing system platform with shopping malls joined in the hub site. This system provides a mechanism for gathering information left behind by many clients visiting Web sites for analysis of customers property, vector model for selecting personalized services, and mechanism for providing them to customers who visited in a shopping mall joined to the hub site. In a position of shopping mall site, this kind of personalization system can provide target advertisement, point marketing, and point share service etc. without changing existing shopping mall's environment through wrapper web server. Hub site customers can get personalized services from many shopping mall sites with only once registration for the hub site.

Macroscopic Treatment to Unknown Malicious Mobile Codes (알려지지 않은 악성 이동 코드에 대한 거시적 대응)

  • Lee, Kang-San;Kim, Chol-Min;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제12권6호
    • /
    • pp.339-348
    • /
    • 2006
  • Recently, many researches on detecting and responding worms due to the fatal infrastructural damages explosively damaged by automated attack tools, particularly worms. Network service vulnerability exploiting worms have high propagation velocity, exhaust network bandwidth and even disrupt the Internet. Previous worm researches focused on signature-based approaches however these days, approaches based on behavioral features of worms are more highlighted because of their low false positive rate and the attainability of early detection. In this paper, we propose a Distributed Worm Detection Model based on packet marking. The proposed model detects Worm Cycle and Infection Chain among which the behavior features of worms. Moreover, it supports high scalability and feasibility because of its distributed reacting mechanism and low processing overhead. We virtually implement worm propagation environment and evaluate the effectiveness of detecting and responding worm propagation.

A Study on Contents-based Retrieval using Wavelet (Wavelet을 이용한 내용기반 검색에 관한 연구)

  • 강진석;박재필;나인호;최연성;김장형
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제4권5호
    • /
    • pp.1051-1066
    • /
    • 2000
  • According to the recent advances of digital encoding technologies and computing power, large amounts of multimedia informations such as image, graphic, audio and video are fully used in multimedia systems through Internet. By this, diverse retrieval mechanisms are required for users to search dedicated informations stored in multimedia systems, and especially it is preferred to use contents-based retrieval method rather than text-type keyword retrieval method. In this paper, we propose a new contents-based indexing and searching algorithm which aims to get both high efficiency and high retrieval performance. To achieve these objectives, firstly the proposed algorithm classifies images by a pre-processing process of edge extraction, range division, and multiple filtering, and secondly it searches the target images using spatial and textural characteristics of colors, which are extracted from the previous process, in a image. In addition, we describe the simulation results of search requests and retrieval outputs for several images of company's trade-mark using the proposed contents-based retrieval algorithm based on wavelet.

  • PDF

Efficient Web Document Search based on Users' Understanding Levels (사용자의 이해수준에 따른 효율적인 웹문서 검색)

  • Shim, Sang-Hee;Lee, Soo-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제15권1호
    • /
    • pp.38-46
    • /
    • 2009
  • With the rapid increase in the number of Web documents, the problem of information overload is growing more serious in Internet search. In order to ease the problem, researchers are paying attention to personalization, which creates Web environment fittingly for users' preference, but most of search engines produce results focused on users' queries. Thus, the present study examined the method of producing search results personalized based on a user's understanding level. A characteristic that differentiates this study from previous researches is that it considers users' understanding level and searches documents of difficulty fit for the level first. The difficulty level of a document is adjusted based on the understanding level of users who access the document, and a user's understanding level is updated periodically based on the difficulty of documents accessed by the user. A Web search system based on the results of this study is expected to bring very useful results to Web users of various age groups.

Performance Evaluation in Combination of Wired and Wireless Mesh Networks (메쉬 네트워크 기반의 유무선 통합망 성능 평가)

  • Han, Jin-Young;Jung, Hee-Dong;Im, Young-Bin;Lee, Jeong-Keun;Ryu, Ji-Ho;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제14권8호
    • /
    • pp.778-782
    • /
    • 2008
  • The performance in combination of wired and wireless mesh network which will be a main access network in future internet is directly linked with service quality to users. In this paper, we evaluate variant TCP performance and analyze traffic characteristics on Wireless (Seoul National University Mesh testbed) - Wired (KOREN/Abilene) - Wireless (HP Mesh testbed in the USA) Network. We found that RTT is proper in this network to serve a VoIP service. Also we propose an enhanced TCP protocol which can perform well in both wireless network which has many packet losses and wired network which has high bandwidth and long delay.

An Offloading Decision Scheme Considering the Scheduling Latency of the Cloud in Real-time Applications (실시간 응용에서 클라우드의 스케줄링 지연 시간을 고려한 오프로딩 결정 기법)

  • Min, Hong;Jung, Jinman;Kim, Bongjae;Heo, Junyoung
    • KIISE Transactions on Computing Practices
    • /
    • 제23권6호
    • /
    • pp.392-396
    • /
    • 2017
  • Although mobile device-related technologies have developed rapidly, many problems arising from resource constraints have not been solved. Computation offloading that uses resources of cloud servers over the Internet was proposed to overcome physical limitations, and many studies have been conducted in terms of energy saving. However, completing tasks within their deadlines is more important than saving energy in real-time applications. In this paper, we proposed an offloading decision scheme considering the scheduling latency in the cloud to support real-time applications. The proposed scheme can improve the reliability of real-time tasks by comparing the estimated laxity of offloading a task with the estimated laxity of executing a task in a mobile device and selecting a more effective way to satisfy the task's deadline.

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • 제23권6호
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • 제14권2호
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF