• Title/Summary/Keyword: Internet Penetration

Search Result 81, Processing Time 0.028 seconds

Development of Web Accessibility Evaluation Algorithm-Based upon Table Element (웹 접근성 평가 알고리즘 개발-Table 요소 중심으로)

  • Park, Seong-Je;Kim, Jong-Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.81-87
    • /
    • 2013
  • Due to the development of IT technologies and the Internet penetration, the importance of Web accessibility has greatly increased and accordingly been studied a lot. This study noticed that the current evaluation algorithm for "Table Elements," which are used for data and layout tables, has many problems. Based on the Web Accessibility Guidelines, this study presents an improved evaluation algorithm for "Table Elements" and verifies its validity.

Optimizing of Intrusion Detection Algorithm Performance and The development of Evaluation Methodology (침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발)

  • Shin, Dae Cheol;Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.125-137
    • /
    • 2012
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. For such reason, lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

Global Diffusion of Online Social Network Services : A Cross-Country Study (온라인 소셜 네트워크 서비스의 글로벌 확산에 관한 연구)

  • Son, In-Soo;Oh, Jin-Hee;Lee, Dong-Won
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.305-323
    • /
    • 2012
  • This study examines online social media diffusion across different countries that will help to provide a picture of current global online social network services (SNSs). Analyzing country-level data drawn from 78 nations, we find that non-technological factors such as culture and language as well as technological factors including Internet penetration rate and smartphone adoption rate have significant effects on online social media diffusion. These findings, derived from a broad range of different countries, not only provide theoretical insights into understanding critical factors that enable successful global expansion of online social media services but also help practitioners plan their marketing strategies more effectively in a global context.

The Nexus among Globalization, ICT and Economic Growth: An Empirical Analysis

  • Liu, Ximei;Latif, Zahid;Xiong, Daoqi;Yang, Mengke;Latif, Shahid;Wara, Kaif Ul
    • Journal of Information Processing Systems
    • /
    • v.17 no.6
    • /
    • pp.1044-1056
    • /
    • 2021
  • Globalization has integrated the world through interaction among countries and people with the help of information and telecommunication technology (ICT). The rapid mode of globalization has put a new life in ICT and economic sector. The key focus of this study is to examine the nexus among the globalization, ICT and economic growth. This study uses autoregressive distributed lag model (ARDL), vector error correction model (VECM) and econometric method spanning from 1990 to 2015. The empirical result highlights that the globalization stimulates economic growth of a country. In addition, both the internet penetration and the mobile phone usage contribute to the economic growth. Lastly, this article contributes important policy lessons on strengthening the economy by utilizing ICT with the rapid globalization.

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

Development of DCPT Equipment based on IoT for Rod Tamping in Smart Construction (스마트건설 토공사 다짐 측정을 위한 IoT 기반의 DCPT 기술개발)

  • Park, Hong-Gi;Bae, Kyoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.501-509
    • /
    • 2020
  • Earthwork in the construction field is a core process of construction, and it is used in almost all processes and is connected to the safety of the structure directly. Therefore, it is essential to analyze and confirm the road tamping through a plate bearing test and a field density test. The current analog measurement methods for road tamping measurement is difficult to check in real-time, accurate location information, time information, and the history management of workers in the field. Therefore, IoT (Internet of Things)-based DCPT (Dynamic Cone Penetration Test) was developed for a smart construction environment with a solution to the problem. The Smart DCPT system operated in a smartphone environment is IoT-based. The Smart DCPT system can apply various applications and has advantages of flexibility, low cost, and high efficiency. The IoT-based DCPT records the digital road tamping information, location information, time information, and worker information per measurement count. In addition, the various information is transmitted in real-time to the management center through a smartphone. This system is expected to contribute to the management of the construction process.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

Design of Software Quality Evaluation Model for IoT (IoT 기반 SW 품질평가 모델)

  • Chung, Su-min;Choi, Jae-hyun;Park, Jea-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1342-1354
    • /
    • 2016
  • As Internet, and hardware technology are in rapid process, using rate and penetration rate of Internet of Things are increasing. Internet of Things is the physical objects with network which embedded with electronics, software, sensors, and network. Smart Home-kit to operate refrigerators, washing machines, light bulbs, and such internet of things by a smartphone has been realized. However, it is difficult to use a good quality of software based on IoT. It is because that the study related to quality evaluation of software based on IoT is deficient compared with increase amount of IoT devices. Software based on IoT includes mobility, transportability, real time accessibility and hardware characteristics. Therefore, it is necessary to have differentiated quality standards and quality model. Software quality evaluation model for IoT is proposed to satisfy these needs. Evaluation model is mapped by characteristics of IoT software based on ISO/IEC 25000's quality characteristics. Scenario based studies were applied to quality model for verification.

Implementation of an Embedded System for Image Tracking Using Web Camera (ICCAS 2005)

  • Nam, Chul;Ha, Kwan-Yong;;Kim, Hie-Sik
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1405-1408
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. In the past, user interface products with simple functions were commercialized .but now user demands are increasing and the system has more various applicable fields due to a high penetration rate of the Internet. Therefore, the demand for embedded system is tend to rise In this paper, we Implementation of an embedded system for image tracking. This system is used a fixed IP for the reliable server operation on TCP/IP networks. A real time broadcasting of video image on the internet was developed by using an USB camera on the embedded Linux system. The digital camera is connected at the USB host port of the embedded board. all input images from the video camera is continuously stored as a compressed JPEG file in a directory at the Linux web-server. And each frame image data from web camera is compared for measurement of displacement Vector. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The embedded board utilized the S3C2410 MPU Which used the ARM 920T core form Samsung. The operating system was ported to embedded Linux kernel and mounted of root file system. And the stored images are sent to the client PC through the web browser. It used the network function of Linux and it developed a program with protocol of the TCP/IP.

  • PDF

Development of Application-Based Point Management System (앱 기반 포인트 관리 시스템 개발)

  • Shin, Dong Jin;Moon, Jin Yong;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.179-186
    • /
    • 2018
  • Currently, apps that run point management systems can accumulate, use, and view points, but there are no apps that present gifts to other users or pay a Dutch fee for points. In addition, although the penetration rate of smartphones is increasing, it is inconvenient to put point-related cards into wallets rather than using apps. Of course, to run your app's services, It requires a lot of research and development, but it has the advantage of being convenient to customers. Therefore, the point app management system to be mentioned in this paper can alleviate user inconvenience and feel the convenience of point management. Point management The configuration of the app system allows you to launch an app using an Android device and manage the points of all services. You can also perform functions such as earning, using, and viewing points related to points.