• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.03 seconds

Web Server Application in The Operation of Chip Mounter (Chip Mounter 운영에서 Web Server 활용)

  • 임선종;김선호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.172-175
    • /
    • 2003
  • The enterprise find a solution to the problems such as a reduction of manufacturing period, accurate analysis for customer demand, improvement for customer service and rise of manufacture accomplishment. Internet is a good solution to such problems. Internet offers WWW(World Wide Web), remote control, file transfer and e-mail service. Among the services, WWW takes large portion because of convenient GUI, easy information search and unlimited information registration. Remote Monitoring Server(RMS) system that uses network service is constructed for chip mounter. Hardware base consists of RMS, chip mounter and C/S(Customer Service) server. Software includes DBMS and various modules in server home page. This provide product number, bad product number, trouble code, content and countermeasure in real-time information module, user information in setup module, detailed error information in fault diagnosis module, fault history in fault history module and customer information in customer service management module.

  • PDF

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

A Study on the Efficient Operation of the Intermediate Storage for Mail Delivery (우편물 중간 보관소의 효율적 운영 방안 연구)

  • Choi, Myoungjin;Yang, Jaekyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.3
    • /
    • pp.133-141
    • /
    • 2013
  • The revitalization of e-business via Internet brings big changes to the postal business, and leads to a tremendous increase of heavy and large sized postal mails with continuing growth of home delivery business. Thus, even though the number of intermediate storages for mail delivery that mailmen use for picking up mails in the middle of mail delivery has been being increased, it has still many problems such as insufficient number and size of the storages as well as avoidance of mail keeping of trust agents. It is necessary that safety of mail keeping, seamless mail delivery, and individual parcel pick-up process reestablishment should be made through an improved counter plan for the problems described previously. This study presents the efficient and right operational plan for the intermediate storage for mail delivery with providing the number and size of intermediate storages per mail delivery sequence according to four different types of post offices.

On China's Intellectual Property Rights Protection Online

  • Wang, Guo-An;Lim, Yong-Taek
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.237-247
    • /
    • 2004
  • Online people conduct all kinds of business activities, such as promoting the sales of products and services, reading newspapers, watching TV and movies, and sending business messages by e-mail, by e-voice and by e-fax. Computers with access to the Internet are defined by the United Nations as the fourth media characterized by instantaneousness, openness, limitlessness, boundlessness and globalization. With the development and popularization of the Internet and the advance of the information technology in China, Intellectual Property Rights (IPRs) violations online have frequently occurred in e-business activities. IPRs protection online has posed a great challenge not only for business managers and officials, but also for judges and lawyers because the rapid development of the Internet has created a legal vacuum governed by no laws in IPRs violation and protection online in China.. The paper at first classifies IPRs into several categories, then reveals China's serious problems and challenges of IPRs violations online and stresses the necessity of China's IPRs protection online. Finally it puts forward some suggestions concerning IPRs protection online.

  • PDF

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.

BeanFS: A Distributed File System for Large-scale E-mail Services (BeanFS: 대규모 이메일 서비스를 위한 분산 파일 시스템)

  • Jung, Wook;Lee, Dae-Woo;Park, Eun-Ji;Lee, Young-Jae;Kim, Sang-Hoon;Kim, Jin-Soo;Kim, Tae-Woong;Jun, Sung-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.247-258
    • /
    • 2009
  • Distributed file systems running on a cluster of inexpensive commodity hardware are being recognized as an effective solution to support the explosive growth of storage demand in large-scale Internet service companies. This paper presents the design and implementation of BeanFS, a distributed file system for large-scale e-mail services. BeanFS is adapted to e-mail services as follows. First, the volume-based replication scheme alleviates the metadata management overhead of the central metadata server in dealing with a very large number of small files. Second, BeanFS employs a light-weighted consistency maintenance protocol tailored to simple access patterns of e-mail message. Third, transient and permanent failures are treated separately and recovering from transient failures is done quickly and has less overhead.

A Study on Nonresponse Errors in the Internet Survey

  • Namkung, Pyong;Kim, Min Jung
    • Communications for Statistical Applications and Methods
    • /
    • v.9 no.3
    • /
    • pp.665-674
    • /
    • 2002
  • The advantage of internet survey compared to the traditional survey methods are speedy in data collection, cost-effective, high performed design and able to data process and analysis at the same time. The other side are difficult to select sample, come from serious nonresponse errors. We suggest the new internet survey method to the questionnaire design that have the high response rate, enough to advanced preparations and system stability.

Measurement of the Internet Banking Customer Satisfaction using Structured Equation Model

  • Choi, Kyung-Ho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.2
    • /
    • pp.301-311
    • /
    • 2005
  • This study has conducted to measure the internet banking customer satisfaction using structured equation model. Data was collected by e-mail system. Among survey panel who had experience of using Hanwha-Bank internet banking service, final samples were 2,848 respondents. The results showed that usage convenience and economy factor was most correlated with customer satisfaction. And we found that word-of-mouth behavior was affected customer satisfaction.

  • PDF

A Study on the Aesthetic Motive in e-Card Design (e카드 디자인의 미적 동인에 대한 연구)

  • 박성완
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.401-410
    • /
    • 2003
  • With increase of internet users, usage frequency of e-mail card is growing up. In addition to advantage of delivering message in real-time, e-mail card contains words, animation and sound. So users can enjoy it's multiple characters. For these reasons, there is a shift in preference from traditional card to e-mail card especially in young age. In character portal sites sewing users with e-mail card it is regarded as useful media for character promotion. After bizarre rabbit 'Mashimaro' wins a great success as Flash animation, Flash card has been treated as an important media in character business. As the study on the aesthetic motive in Flash card, this thesis analyzes what is the meaning existing in characteristic expression of Flash card and proposes that the meaning is related to tension reduction from the viewpoint of entropy principle. We can summarize that contents of animation are based on striving toward simplicity and expressions of animation are based on catabolism. Both lead to pleasure of tension reduction. We can draw conclusion that pleasure of tension reduction becomes one of major factors of the aesthetic motive felt in Flash card.

  • PDF

Design and Implementation of an XML based Web Mail System (XML 기반 웹메일 시스템의 설계 및 구현)

  • 박순영;임한규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.175-182
    • /
    • 2002
  • The email system is one of the most popular internet applications used to transmit and exchange personal information. However, the pattern of existing email system is fixed, and the system cannot be expanded or re-used. This thesis has proposed the system which can provide the users with better e-mail data which is flexible, re-usable, and expandable XML data on the web-mail. The process of change is as follows: First, make the XML data to have a tree structure using DOM API and then bring the received messages of the users with the CDONTS. Last, transform the received messages into the element and element value. When the e-mail data is transformed t the XML data, 'the data' and 'the presentation' can be distinguished, which enables the users to see messages according to each individual's unique need. With this system, the user can not only convert data to XML, but also can combine the data segments to a form of letter box in order to manage data conveniently and search the data.

  • PDF