• Title/Summary/Keyword: Internet Over-Dependency

Search Result 24, Processing Time 0.023 seconds

Weekday Internet Game Times and Domestic Factors of Middle & High School Students (중고등학생의 평일 인터넷 게임시간과 가정환경 요인)

  • Kim, Eun Yeob;Lee, Jee Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5326-5336
    • /
    • 2012
  • Most middle and high school students in Korea use internet for gaming and recreation. This study aimed to classify middle and high school students according to amount of time they spend playing games and analyze relationship domestic factors. Weekday game times and environmental factors of the adolescents in Korea. The group with average game time of 30 min, 0:30-1:30 hours, 1:30-3:00 hours, over 4:00 hours. Subjects in this study were 6,487 middle and high school students. For the category "thoughts about game characters", the group with average game time of 1:30~3:00 hours replied "not at all" but the group with average game time of over 4:00 hours replied "sometimes", which was significantly different from the previous group. Similarly, for the category "lack of time for homework", the group with average game time of 1:30~3:00 hours replied "not at all", which significantly differed from the "sometimes" response from the group with average game time. For satisfaction with interest, "average" was the most frequent response from all the groups. Analyzing correlation of factors influencing game addiction in subjects with game time showed that factors related to game addiction diagnosis and academic performance were especially different in the group with average game time of over 4:00 hours compared to other groups. Nowadays internet has taken a large and significant part of our life such that a life without internet is hard to imagine, and our dependency on internet has risen at the same time. Accordingly, education on appropriate utilization and correct usage of internet to youths who lack self-control and judgment is very needed.

Impacts of Social Media (Facebook) on Human Communication and Relationships: A View on Behavioral Change and Social Unity

  • Joo, Tang-Mui;Teng, Chan-Eang
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.7 no.4
    • /
    • pp.27-50
    • /
    • 2017
  • The impact of social networking is varied from good to bad. Online activities have also been categorized into pros and cons of social networking, either as reported as hiding Internet activities among teenagers or killing loneliness among elderly. In terms of relationships, there have been argument over its closeness and quality of an online relationship in Internet settings. Looking at the contradiction in an innovative interaction between classic community communication and social media, there is an unknown scent of the future struggling and challenging both human communication and relationships in the presence of digital culture. This research uses Diffusion of Innovation to study the wide and continuous spread of digital culture in human communication; and, Media Dependency in learning and structuring the cognitive, affective and behavioral effects of social media on each person uses the media in different ways. This research will be using online survey to gain opinions from a social network site as an update of views and reflection of self-awareness to all levels of people. Social media like Facebook (FB) is perceived as a good tool of communication that it is able to bring closeness among the family members. The results show that social media like FB brings positive impact towards family members; it would help to build a better and harmonic society; and, relationships among family members and communication shall be improved and enhanced to the level of a united society.

An Effective Orientation-based Method and Parameter Space Discretization for Defined Object Segmentation

  • Nguyen, Huy Hoang;Lee, GueeSang;Kim, SooHyung;Yang, HyungJeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3180-3199
    • /
    • 2013
  • While non-predefined object segmentation (NDOS) distinguishes an arbitrary self-assumed object from its background, predefined object segmentation (DOS) pre-specifies the target object. In this paper, a new and novel method to segment predefined objects is presented, by globally optimizing an orientation-based objective function that measures the fitness of the object boundary, in a discretized parameter space. A specific object is explicitly described by normalized discrete sets of boundary points and corresponding normal vectors with respect to its plane shape. The orientation factor provides robust distinctness for target objects. By considering the order of transformation elements, and their dependency on the derived over-segmentation outcome, the domain of translations and scales is efficiently discretized. A branch and bound algorithm is used to determine the transformation parameters of a shape model corresponding to a target object in an image. The results tested on the PASCAL dataset show a considerable achievement in solving complex backgrounds and unclear boundary images.

Packet Output and Input Configuration in a Multicasting Session Using Network Coding

  • Marquez, Jose;Gutierrez, Ismael;Valle, Sebastian;Falco, Melanis
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.686-710
    • /
    • 2019
  • This work proposes a model to solve the problem of Network Coding over a one-session multicast network. The model is based on a system of restrictions that defines the packet flows received in the sink nodes as functions of the outgoing flows from the source node. A multicast network graph is used to derive a directed labeled line graph (DLLG). The successive powers of the DLLG adjacency matrix to the convergence in the null matrix permits the construction of the jump matrix Source-Sinks. In its reduced form, this shows the dependency of the incoming flows in the sink nodes as a function of the outgoing flows in the source node. The emerging packets for each outgoing link from the source node are marked with a tag that is a linear combination of variables that corresponds to powers of two. Restrictions are built based on the dependence of the outgoing and incoming flows and the packet tags as variables. The linear independence of the incoming flows to the sink nodes is mandatory. The method is novel because the solution is independent of the Galois field size where the packet contents are defined.

Remote Controlled Robot System using Real-Time Operating System (실시간 운영체제를 탑재한 원격 제어 로봇 시스템)

  • Lee, Tae-Hee;Cho, Sang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.689-695
    • /
    • 2004
  • This paper presents a robot system that combines computer network and an autonomous mobile robot where RTOS is installed. We propose a wireless communication protocol, and also implement it on the RTOS of the robot system. Main controller of the robot processes the control program as a task type in the real-time operating system. Peripheral devices are driven by the device driver functions with the dependency of the hardware. Because the client and server program was implemented to support the multi-platforms by Java SDK and Java JMF, it is easy to analyze programs, maintain system, and correct the errors in the system. End-user can control a robot with a vision showing remote sight over the Internet in real time, and the robot is moved keeping away from the obstacles by itself and command of the server received from end-user at the local client.

An Unequal Protection FEC Scheme for Video over Optical Access Networks

  • Cao, Yingying;Chen, Xue;Wang, Liqian;Li, Xicong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1463-1479
    • /
    • 2013
  • In this paper, we propose an unequal protection physical coding sub-layer (PCS) forward error correction (FEC) scheme for efficient and high-quality transmission of video data over optical access networks. Through identifying and resolving the unequal importance of different video frames and passing this importance information from MAC-layer to PCS, FEC scheme of PCS can be adaptive to application-layer data. Meanwhile, we jointly consider the different channel situations of optical network unit (ONU) and improve the efficiency of FEC redundancy by channel adaptation. We develop a theoretical algorithm and a hardware method to achieve efficient FEC assignment for the proposed unequal protection scheme. The theoretical FEC assignment algorithm is to obtain the optimal FEC redundancy allocation vector that results in the optimum performance index, namely frame error rate, based on the identified differential importance and channel situations. The hardware method aims at providing a realistic technical path with negligible hardware cost increment compared with the traditional FEC scheme. From the simulation results, the proposed Channel and Application-layer data Adaptation Unequal Protection (CAAUP) FEC scheme along with the FEC ratio assignment algorithm and the hardware method illustrates the ability of efficient and high-quality transmission of video data against the random errors in the channel of optical access networks.

Cyber Security Attacks and Challenges in Saudi Arabia during COVID-19

  • Nourah Almrezeq;Mamoona Humayun;Madallah Alruwaili;Saad Alanazi;NZ Jhanjhi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.179-187
    • /
    • 2023
  • The outbreak of COVID-19 had affected almost every part of the world and caused disastrous results, the number of reported COVID-19 cases in past few months have reached to more than 29 million patients in the world globally. This pandemic has adversely affected all the activities of life, ranging from personal life to overall economic development. Due to the current situation, routinely turned to online resources, and people have relied on technology more than they have been before. Since cybercriminals are an opportunist and they utilized this entirely, by targeting the online services for all sectors of life. This fortnight online dependency of the community over the internet opened several easy doors for the cybercriminals. This causes exponential attacks over internet traffic during this epidemic situation. The current Covid-19 pandemic situation appeared at once, and no one was ready to prevail this. However, there is an urgent need to address the current problem in all means. . KSA is among one of the countries most affected by these CA and is a key victim for most cyber-crimes. Therefore, this paper will review the effects of COVID-19 on the cyber-world of KSA in various sectors. We will also shed light on the Saudi efforts to confront these attacks during COVID -19. As a contribution, we have provided a comprehensive framework for mitigating cybersecurity challenges.

Action Realization of Modular Robot Using Memory and Playback of Motion (동작기억 및 재생 기능을 이용한 모듈라 로봇의 다양한 동작 구현)

  • Ahn, Ki-Sam;Kim, Ji-Hwan;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • In recent years, robots have been actively used for children's creativity learning and play, but most robots have a stereotyped form and have a high dependency on the program, making it difficult to learn creativity and play. In order to compensate for these drawbacks, We have created a robot that can easily and reliably combine each other. The robot can memorize the desired operation and execute the memorized operation by using one button. Also, in case multiple modules are combined, pressing the button once on any module makes it possible to easily adjust the operation of all the combined modules. In order to verify the actual operation, two, three, and five modules are combined to demonstrate the usefulness of the proposed structure and algorithm by implementing a gobbling motion and a walking robot. It is required to study intelligent modular robots that can control over the Internet by supplementing the wireless connection method.

Computer Literacy Skills as a Determinant of Electronic Reference Sources Utilization among Selected Secondary School Students in Ado-Odo Ota Local Government, Ogun State, Nigeria

  • Elizabeth Bukunola Lateef;Opene Sunday Ozonuwe;Adesanmi Mathew Farukuoye
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.81-97
    • /
    • 2024
  • The study investigated computer literacy skills as a determinant of electronic reference sources utilization among selected secondary school students in Ado-Odo Ota Local Government, Ogun State, Nigeria. Four specific objectives with conforming research questions guided the study. Descriptive survey research design was adopted for the study. The population of the study comprises of SSS3 students of the three selected Community Secondary Schools in Ado Odo Ota. A sample size of 150 was used for the study. The instrument for data collection was a self-developed structured questionnaire. Data collected was analyzed using frequency and percentages. Findings of the study revealed that majority of secondary school students were not aware of the availability of electronic reference sources. It also revealed that the level of their computer literacy skills was below average. Majority of them have never used computer before and the few of them that have used computer before used it in their homes, their friend's homes or in the cyber café. It was found that lack of formal training on the use of electronic reference sources, lack of access to computer, lack of awareness of availability of electronic reference sources, lack of funds for internet subscriptions, over dependency on printed reference sources and lack of motivation to use electronic reference sources were the major hindrances to the use of electronic reference sources among secondary school students. It was recommended that the school librarians and teachers should play a role in creating awareness among secondary school students about the availability of online/ electronic reference sources among others.

Packet Loss Concealment Algorithm Based on Speech Characteristics (음성신호의 특성을 고려한 패킷 손실 은닉 알고리즘)

  • Yoon Sung-Wan;Kang Hong-Goo;Youn Dae-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.691-699
    • /
    • 2006
  • Despite of the in-depth effort to cantrol the variability in IP networks, quality of service (QoS) is still not guaranteed in the IP networks. Thus, it is necessary to deal with the audible artifacts caused by packet lasses. To overcame the packet loss problem, most speech coding standard have their own embedded packet loss concealment (PLC) algorithms which adapt extrapolation methods utilizing the dependency on adjacent frames. Since many low bit rate CELP coders use predictive schemes for increasing coding efficiency, however, error propagation occurs even if single packet is lost. In this paper, we propose an efficient PLC algorithm with consideration about the speech characteristics of lost frames. To design an efficient PLC algorithm, we perform several experiments on investigating the error propagation effect of lost frames of a predictive coder. And then, we summarize the impact of packet loss to the speech characteristics and analyze the importance of the encoded parameters depending on each speech classes. From the result of the experiments, we propose a new PLC algorithm that mainly focuses on reducing the error propagation time. Experimental results show that the performance is much higher than conventional extrapolation methods over various frame erasure rate (FER) conditions. Especially the difference is remarkable in high FER condition.