• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.029 seconds

Transforming an Entity-Relationship Model into a Temporal Object Oriented Model Based on Object Versioning (객체 버전화를 중심으로 시간지원 개체-관계 모델의 시간지원 객체 지향 모델로 변환)

  • 이홍로
    • Journal of Internet Computing and Services
    • /
    • v.2 no.2
    • /
    • pp.71-93
    • /
    • 2001
  • Commonly to design a database system. a conceptual database has to be designed and then it is transformed into a logical database schema prior to building a target database system. This paper proposes a method which transforms a Temporal Entity-Relationship Model(TERM) into a Temporal Object-Oriented Model(TOOM) to build an efficient database schema. I formalize the time concept in view of object versioning and specify the constraints required during transformation procedure. The proposed transformation method contributes to getting the logical temporal data from the conceptual temporal events Without any loss of semantics, Compared to other approaches of supporting various properties, this approach is more general and efficient because it is the semantically seamless transformation method by using the orthogonality of types of objects, semantics of relationships and constraints over roles.

  • PDF

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.

A Study on the Characteristics of Active Information and Opinion Giver in the Interactive-Public Communication Space of Internet: Focused on the Characteristics of Opinion Leader (인터넷의 양방향.공개 커뮤니케이션 장을 창출한 적극적 발신행위자의 속성에 관한 연구: 오피니언 리더의 속성을 중심으로)

  • Kim, Kwan-Kyu
    • Korean journal of communication and information
    • /
    • v.31
    • /
    • pp.51-84
    • /
    • 2005
  • The purpose of this paper is to investigate characteristics of active information and opinion giver in the interactive-public communication space of internet. More specifically, this study explores that the active information and opinion giver have the same traits with opinion leader, which are personal attributes (topic involvement and individuation), social activity, source of information and influentials, and socio-demographic attributes. The research consisted of a questionnaire, which was administered using e-mail, and 175 replies were returned. The results show that higher activity of sending information and opinion is associated with characteristics of opinion leader. First, It was found that higher activity group in sending information and opinion have higher degree of topic involvement and individuation than lower group. Second, the former is more active behavior than the latter in social activity. Third, it was examined that behaviors of sending and giving information and opinion with interpersonal communication channel was connected with those of the interactive-public communication space in internet. Also, the result of analysis with mass communication channel was found the distinction in three different kinds of magazines which is related with specific media. Finally, characteristics of socio-demography were not different between two group, with the exception of gender.

  • PDF

Trend Analysis of ICT Accessibility and Utilization Levels of Korean Students based on OECD PISA Data (OECD PISA 자료를 활용한 우리나라 학생들의 ICT 접근 및 활용 수준 추이 분석)

  • Kim, Hye-Sook;Kim, Han-Sung;Kim, Jin-Sook;Shin, An-Na
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.17-43
    • /
    • 2017
  • The purpose of this study is to investigate the directions of information and communication technology(ICT) education in K-12 based on the analysis of ICT accessibility and utilization levels of Korean students. To this end, we analyzed the trends of Korea and OECD countries by survey period, focusing on the OECD PISA 'ICT familiarity survey' conducted in 2009, 2012 and 2015. The surveyed subjects were 15 year-old students and the analysis method was calculated based on the sampling weights. The results of the analysis of Korean students are as follows: First, ICT accessibility at home increased from 2009 to 2015, but was consistently lower than the OECD average. Second, the overall Internet usage time was lower than the OECD average. The Internet usage time on weekdays increased from 2012 to 2015, but on weekends decreased. Third, the ICT accessibility in schools decreased from 2009 to 2012, and increased in 2015, but was lower than the OECD average in 2015. Fourth, the student age ratio of first time computer usage increased from 2012 to 2015 and the average age for computer usage began before age 6, but was below the OECD average. Lastly, student use of digital devices for items such as Internet searches for entertainment and SNS activity has increased from 2012 to 2015, but the level of everyday use such as e-mail, online chat, program downloading, and reading Internet news has decreased. Based on these results, this study suggested policy plans for the improvement of ICT education for elementary and secondary school students in Korea.

Construction of the Scientific Effective Learning System on Web-Based Instruction (웹을 이용한 효과적인 과학학습체제의 구축 및 태도 변화 -중학교 지구과학 내용을 중심으로 -)

  • Choi, Young-Hee;Yoon, Ill-Hee
    • Journal of the Korean earth science society
    • /
    • v.21 no.3
    • /
    • pp.208-218
    • /
    • 2000
  • The popularization and the common use of internet are realizing these days thanks to the development of web. Using the web as a teaching instrument is the Web Based Instruction(WBI). WBI, along with constructivism, has a great influence on the present educational society. However, many problems were found in learners' using the numerous WBI programs in cyber space. Above all, the interaction between teachers and learners is not enough, and searching for the materials on web is not easy. It's very difficult for a teacher to design and construct a WBI program in school teaching. But It is not so difficult to design and construct a WBI program based on interaction. Therefore, if a teacher familiar to students in school makes a web page and provides a cyberspace, the students will interact very easily them in the cyberspace. They can use the e-mail, bulletin board or discuss and chat. The cyberspace will make up for the insufficient interaction in school life. But because this program needs all students have proper material condition, there will be another kind of estranged learners. Thus, this problem can be solved by the cheap-popular PC offering movement backed by the government, and other types of projects systematically.

  • PDF

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.

A Study on the Public Library As a Place of ICT Literacy Training (ICT 리터러시 교육 활용 공간으로서의 공공도서관)

  • Chang, Yunkeum;Jeong, Haengsoon;Lee, Hyeyoung;Jeon, Kyungsun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.273-294
    • /
    • 2016
  • This research is part of the Korean-ASEAN Official Development Assistance (ODA) project, specifically exploring the possibility of using public libraries as a place for Information and Communication Technology (ICT) literacy training for women from ASEAN (Association of Southeast Asian Nations) countries. Women from ASEAN countries are often minorities in ICT capacity building. A survey of 1,000 female public library users - 100 people from each of the ten ASEAN countries - and in-depth interviews with librarians from national libraries were conducted. The survey results showed that 68.8% of respondents perceived public libraries as a suitable place for ICT literacy training. 27.5% of respondents visited libraries for ICT-related activities, including information retrieval, e-mail, SNS, etc., Meanwhile, findings from the interviews highlighted the importance of having up-to-date ICT infrastructure - computers, Internet, professional ICT skill training for librarians, strategic planning for policies, budgets, and cooperation with other related institutions - in public libraries in order to provide effective ICT training.

Balanced Strategy, Coordinating and Learning Mechanism, and Performance of Hospitals (의료기관의 균형적 경영전략, 조정 및 학습 기전의 경영성과에 대한 영향)

  • Noh, Yeon-Joo;Ryu, See-Won;Kim, Young-Rhang
    • Korea Journal of Hospital Management
    • /
    • v.14 no.4
    • /
    • pp.1-24
    • /
    • 2009
  • The purpose of this study was to find out the differences and relationships among balanced strategy, coordinating and learning mechanism, and perceived performance of hospitals in Korea, and provide some directions to establish effective strategic management of hospital. Measure items on balanced strategy, coordinating and learning mechanism, and perceived performance were developed from previous studies. Questionnaire was sent and received through Internet site and e-mail during May, 2008. Data were collected from key informant in each institutions, and analyzed using frequency analysis, T-test, ANOVA, correlation and regression analysis. The major findings of this study were as follows: 1. The level of strategic selection and external learning mechanism of private hospital was lower than that of medical corporation, and others corporation hospital. 2. There was little difference between hospitals in metropolitan and those in small cities. 3. Hospitals that have under 100 beds were statistically lower level in strategic selection and external learning mechanism than hospitals has over 100 beds. 4. Formal coordinating and external learning mechanism, and foundation form(medical corporation) were significantly influenced on profitability from specialized field. 5. Strategic selection and adaptation mechanism were significantly affected on total profitability. 6. Strategic selection and external learning mechanism were significantly influenced on competitive power around its local market. Hospitals that are to be competitive by specialization should have to establish mechanism for management such as balanced strategy, coordinating and learning mechanism.

  • PDF

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.

A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment (PKI환경에서 ElGamal 방식의 ECC를 이용한 안전한 메신저 설계에 관한 연구)

  • Park Su-Young;Choi Kwang-Mi;Jung Choi-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1443-1448
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.