• Title/Summary/Keyword: Internet Information Technology

Search Result 6,800, Processing Time 0.033 seconds

A Review on Application of Internet Agent in Healthcare Service (의료서비스에서의 인터넷 에이전트 활용에 대한 고찰)

  • 김민철
    • Health Policy and Management
    • /
    • v.11 no.4
    • /
    • pp.21-37
    • /
    • 2001
  • The purpose of this study is to examine internet agent of IT(Information Technology) in health care industry Since IT is essential for corporate strategy in service management, this section examines IT in health care service, especially from the view of 'Agent Technology' that has been recently issued. Intelligent agent is a new paradigm for developing software applications. More than this, agent-based computing has been hailed as 'the next significant break-through in software development' and 'the new revolution in software'. And health care service is a non-mechanic, human-based service. This paper reviewed what possible suggestions or advices can be made to the health care service. Since many health care services using internet have been attempted over the recent years, this study will hopefully be able to come up with good suggestions from many aspects. Thus, information inequality between producer(physician) and consumer(patient) in health care service will be decreased through the introduction of agent technology.

  • PDF

Design of Architectures and API between MPLS Protocol and Network OS (MPLS 프로토콜 지원을 위한 네트워크 OS의 구조 및 API 설계)

  • Park, Jae-Hyung;Kim, Young-Hee;Lee, Dong-Gill;Jang, Jong-Hyun;Choi, Wan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1571-1574
    • /
    • 2002
  • 최근 인터넷 환경에서는 고속의 패킷 처리 능력 및 새로운 프로토콜에 대한 요구들은 또한 인터넷 통신 시스템인 라우터의 개발에도 많은 요구를 가하고 있다. 전송 속도의 초고속화와 다양한 서비스를 지원하여야 하는 라우터의 개발에 있어서 효율성 및 프로토콜의 이식성을 높이는 방법을 요구한다. 이와 같은 요구사항에 발맞추어 네트워크 운영체제(Network Operating System) 개념이 등장하였다. 본 논문에서는 이런 특징을 갖는 네트워크 OS에 MPLS 관련 프로토콜을 이식하기 위한 요구사항을 분석하여 네트워크 응용 프로그램 인터페이스(API)를 설계하고자 한다.

  • PDF

LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications

  • Roy, Siddhartha;Roy, Saptarshi;Biswas, Arpita;Baishnab, Krishna Lal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4122-4144
    • /
    • 2021
  • In this fast-paced technological world, the Internet of Things is a ground breaking technology which finds an immense role in the present electronic world which includes different embedded sensors, devices and most other things which are connected to the Internet. The IoT devices are designed in a way that it helps to collect various forms of data from varied sources and transmit them in digitalized form. In modern era of IoT technology data security is a trending issue which greatly affects the confidentiality of important information. Keeping the issue in mind a novel light encryption strategy known as LCB is designed for IoT devices for optimal security. LCB exploits the benefits of Feistel structure and the architectural benefits of substitution permutation network both to give more security. Moreover, this newly designed technique is tested on (Virtex-7) XC7VX330T FPGA board and it takes much little area of 224 GE (Gate Equivalent) and is extremely fast with very less combinational path delay of 0.877 ns. An in-depth screening confirms the proposed work to promise more security to counter cryptographic attacks. Lastly the Avalanche Effect (AE) of LCB showed as 63.125% and 63.875% when key and plaintext (PT) are taken into consideration respectively.

The Effect of Technostress on the Utilization of Internet Information in Woman Farmers - Mediating Effect on Information Service Acceptability - (여성농업인의 테크노 스트레스가 인터넷 정보활용에 미치는 영향 - 정보서비스 수용성에 대한 매개 효과 -)

  • Kim, Hyun Young;Choi, Jung Shin;Choi, Yoon Ji;Jeong, Jin Yi
    • Journal of Agricultural Extension & Community Development
    • /
    • v.28 no.1
    • /
    • pp.25-39
    • /
    • 2021
  • This study aims to identify the causation effect between technostress and utilization of Internet information and meditation effect of information service acceptability between technostress and Internet information utilization. The data were collected from 503 woman farmers aged 20 to 65 across the country. The analysis performed a three-stage mediated regression of Bron, & Kenny (1986), using the SPSS 21.0 statistical package. The importance of accepting information services has been identified in the Sobel test. According to the analysis of the medium effect on information service acceptability, information service acceptability has a partial medium effect on the technological stress of woman farmers and the level of Internet information utilization. In order to lower the technology of woman farmers in the future, it is necessary to find ways to improve new perceptions of information technology and increase acceptability of information services.

Japanese Expressions that Include English Expressions

  • Murata, Masaki;Kanamaru, Toshiyuki;Nakamoto, Koichirou;Kotani, Katsunori;Isahara, Hitoshi
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2007.11a
    • /
    • pp.330-339
    • /
    • 2007
  • We extracted English expressions that appear in Japanese sentences in newspaper articles and on the Internet. The results obtained from the newspaper articles showed that the preposition "in" has been regularly used for more than ten years, and it is still regularly used now. The results obtained from the Internet articles showed there were many kinds of English expressions from various parts of speech. We extracted some interesting expressions that included English prepositions and verb phrases. These were interesting because they had different word orders to the normal order in Japanese expressions. Comparing the extracted English and katakana expressions, we found that the expressions that are commonly used in Japanese are often written in the katakana syllabary and that the expressions that are not so often used in Japanese, such as prepositions, are hardly ever written in the katakana syllabary.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

Development of Criteria to Assess the Quality of Food and Nutrition Information on Internet (인터넷 식생활 정보 사이트의 질적 평가기준 개발 연구)

  • 이심열;김지혜;백희영;지근억;피재은;황윤경;김수희
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.12
    • /
    • pp.51-63
    • /
    • 2001
  • With the development of information technology, more and more internet sites are available to consumers. Increasing on the interests of diet and health in modem society, there are numerous internet sites dealing with food, nutrition and health. Considering the importance and expected roles of internet sites in information dissemination in the future world, it is important to put more efforts to encourage internet sites with more accurate an useful information. Up to present, not much work has been done on quality analysis and evaluation of the internet information. This study aimed to develop a model to evaluate and rank the internet information according to its quality so that consumers can be guided toward correct information source. Three models were adapted from the literature for pilot study to develop a model suitable for evaluation of contents of sites related to food and nutrition information. From the pilot study, a evaluation model was developed with criteria more relevant to Korean internet site by expert panel. Evaluation criteria of the model is authority, accuracy, objectivity, coverage, and user-friendliness. For the objective and systematic evaluation, scores were assigned totaling maximum 100 point to each evaluation criteria factors. The model developed in this study could be used as one for other internet sites in area other than food and nutrition.

  • PDF

A Study on the Legal Issues of Insurance Transaction by Internet (인터넷을 통한 보험거래의 효력과 제문제점)

  • Kwon, O
    • The Journal of Information Technology
    • /
    • v.5 no.3
    • /
    • pp.1-17
    • /
    • 2002
  • This paper analyzes the legal issues concerning formation of insurance contracts by Internet. Electronic commerce has been growing very rapidly and internet insurance has begun to appear. This paper focuses on the features of internet insurance and current status of internet insurance in Korea. For now, internet insurance constitutes a relatively small portion of the whole insurance market. However it makes a great contribution to the insurance industry as a whole by providing customer with board information, and by learning to the creation of a new market.

  • PDF

The Study on the Mobile internet proliferation in Korea (한국에서의 모바일인터넷활용에 관한 연구)

  • Kim, Kyung-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.147-148
    • /
    • 2016
  • The purpose of this paper is to investigate the diffusion process of mobile internet use in Korea and to explore the determinants driving MIU. A survey was conducted to collect data to empirically assess the research model. In total, 543 usable responses were collected using a questionnaire derived from previous research. Both the structural equation model and partial least squares were used to study the model concerning different user groups. Findings, The results indicate that there are significant differences in the users' perceptions of mobile internet usage during its different innovation diffusion stages. Of the determinants, perceived enjoyment is the most important predictor of mobile internet use. In addition to motivating users by making services more enjoyable, the findings suggest that practitioners should take the differences of adopter groups into account. Making the mobile internet easy to use and compatible with users' lifestyles would promote the use of technology as well.

  • PDF

An Exploratory Study on the Usage of Internet Technologies and Tools in Educational Working Environment of Developing Countries: A Case of Pokhara University in Nepal

  • Shrestha, Deepanjal;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2015
  • $21^{st}$ century has seen a tremendous advancement in the field of Information and Communication Technology. The commercial utilization of Internet tools and technologies has brought change in the traditional working environment. The functioning in an electronic environment is far more complicated than working in traditional environment and this brings many challenges, threats and potential problems. In this paper we analyze the challenges, threats and potential problems in the working environment of Pokhara University due to application of Internet tools and technology. We have chosen four basic areas on the basis of use that include web resources, electronic mails, social sites and P2P technologies. The main focus is to analyze the impact on work place productivity, social interaction, use and abuse of technology and legal issues associated with them. We, finally summarize the findings and offer solutions and recommendations from the observed data based on direct survey conducted in Pokhara University, Nepal.