• Title/Summary/Keyword: Internet Web Sites

Search Result 476, Processing Time 0.026 seconds

A Study on the Development of Web Based VE Management System (웹기반 VE 관리시스템 개발)

  • GOH IL-DU
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.143-148
    • /
    • 2001
  • Digital documentation is now becoming a must throughout a building process including design, construction, inspection, procurement and even facility management. The Internet is a backbone of such process, and web-based information exchange is the standard among other mainstream technologies. The current information management techniques, however, is heavily dependant on the server-side processing, which naturally results in the overload of the overall system. This paper proposes an XML-based approach in order to resolve such problems. A VE system was developed to demonstrate the efficiency of the XML solution, in term of efficient VE data management and fast decision making. also in this paper suggests 1) introduce XML based DBMS to improve data management efficiency and 2) introduce Mobile Computing to improve data accessibilities on sites.

  • PDF

Development of Integrated System for Motif and Domain Search (모티프 및 도메인 검색을 위한 통합 시스템 개발)

  • Jung Min-Chul;Park Wan;Kim Ki-Bong
    • Journal of Life Science
    • /
    • v.14 no.6 s.67
    • /
    • pp.991-996
    • /
    • 2004
  • This paper deals with an integrated system that facilitates researchers to do motif and domain search effectively and systematically. The system we developed is constructed on the basis of the integration of various resources related to motif, domain, and protein family. Those resources that can be classified into databases and search programs are dispersed to be available in Internet. In order to develop this system, we extracted core contents of diverse databases, which are required to analyze the protein function in terms of motifs or domains, to construct local databases and installed motif or domain search programs on our server, which corresponding database has as its own search program. Diverse utilities and CGI (Common Gateway Interface) programs make the databases and the search programs interlocked and web-based graphical user interfaces integrate all the components of our system. Employing our integrated system, end-users can receive its one-stop service to do protein function analysis systematically and effectively, without surfing many sites in Internet and wasting time over integrating search results.

Design and Implementation of a Forwarding Server for Using the Logical URL (논리적 URL 사용을 위한 포워딩 서버의 설계 및 구현)

  • 양희재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.239-249
    • /
    • 2003
  • A lot many WWW sites are come into the world more and more as Web is considered as the unified Internet information tool. The location of each site or resource is usually specified by a physical URL, which is often too long to remember and tends to raise difficulty to show the aim of the site intuitively by seeing it. Since any person or organization can get his/her own domain name easily, it is more desirable to use a logical URL with the domain name which can be chosen more compact to remember and meaningful to represent the ultimate intention of the site. This paper presents an implementation of a URL forwarding server which forwards a URL to another, so that a WWW site can use a logical URL instead of a physical one. The server consists of a domain mapper which uses the redirection transaction of the HTTP protocol, and a name server based on the HIND. The paper shows how the interaction between the domain mapper and the name sever can make forwarding possible and describes its implementation in detail. Experimental results shows that the overhead incurred by URL forwarding is negligible compared to the typical delay of current Internet traffic condition.

Study on the Tourism Information System using UCC (UCC를 이용한 관광정보시스템 연구)

  • Yang, Sung-Soo;Huh, Hyang-Jin;Choi, Byung-Kil;Park, Si-Sa
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.230-236
    • /
    • 2007
  • It is widely recognized that tourism information can be defined as useful and reliable reference which significantly influences the traveler's decision making. As the tourism organizations with online network, along with information system offer an array of information to the public, the passengers more frequently seek and search needed information via internet. However, currently existing tourism contents are mainly designed for suppliers, being viewed by customers perspective, those contents do not reflect the clients inquiries and needs. With the advent of consumer based technology and favorable environment, current tourism-related web sites show some changes from tourism suppliers to User-Created Contents(UCC). The major purpose of this research is to identify the tourism contents provided by both supplier and tourists themselves. Additionally, this paper also indicates research issues for further study.

Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation (타원곡선 디피헬만 기반 검증 토큰인증방식 구현 연구)

  • Choi, Cheong H.
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.55-66
    • /
    • 2018
  • Since existing server-based authentications use vulnerable password-based authentication, illegal leak of personal data occurs frequently. Since this can cause illegal ID compromise, alternative authentications have been studied. Recently token-based authentications like OAuth 2.0 or JWT have been used in web sites, however, they have a weakness that if a hacker steals JWT token in the middle, they can obtain plain authentication data from the token, So we suggest a new authentication method using the verification token of authentic code to encrypt authentication data with effective time. The verification is to compare an authentication code from decryption of the verification-token with its own code. Its crypto-method is based on do XOR with ECDH session key, which is so fast and efficient without overhead of key agreement. Our method is outstanding in preventing the personal data leakage.

Discovering News Keyword Associations Using Association Rule Mining (연관규칙 마이닝을 활용한 뉴스기사 키워드의 연관성 탐사)

  • Kim, Han-Joon;Chang, Jae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.63-71
    • /
    • 2011
  • The current Web portal sites provide significant keywords with high popularity or importance; specifically, user-friendly services such as tag clouds and associated word search are provided. However, in general, since news articles are classified only with their date and categories, it is not easy for users to find other articles related to some articles while reading news articles classified with categories. And the conventional associated keyword service has not satisfied users sufficiently because it depends only upon user queries. This paper proposes a way of searching news articles by utilizing the keywords tightly associated with users' queries. Basically, the proposed method discovers a set of keyword association patterns by using the association rule mining technique that extracts association patterns for keywords by focusing upon sentences containing some keywords. The method enables users to navigate the space of associated keywords hidden in large news articles.

Design and Implementation of an Education Information Search System for Children Using Information Gathering Agents (정보 수집 에이전트를 사용한 어린이 교육 정보 검색 시스템의 설계 및 구현)

  • 전진욱;배인한
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.97-108
    • /
    • 2002
  • A user with a specific information need will often need to query several search engines before finding relevant documents. To address the problem of navigating the search engines, agents are used. In general, an agent is a program that can perform a particular task automatically, when appropriate or upon request by another program. In this paper, we design and implement the education information search system for children: using Information gathering agent that is called Edulnfo4k. The information gathering agent periodically visits several portal web sites for children: Ggureogi of Yahoo Korea, Junior of Naver and Gaegujaengi of Hanmir, collects the education or learning information for children, stores the collected information into database. Then, causal users can search the education information for children from database through a uniform user interface, conveniently. As the result, we know that Edulnfo4k provides integrated search without query in several search engines.

  • PDF

Vulnerability Analysis on the CNG Crypto Library (CNG 암호 라이브러리의 보안 취약점 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.838-847
    • /
    • 2017
  • CNG which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft is constructed with individual modules based on the plug-in architecture, this means CNG is exceedingly helpful in the cost of development as well as the facility of extension. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, a research on security assurance is strongly required in the environment of distributing and utilizing the CNG library, hence, we analyze possible security vulnerabilities on the CNG library. Based on analyzed vulnerabilities, proof-of-concept tools are implemented and vulnerabilities are verified using them. Verified results are that contents of mail, account information of mail server, and authentication information of web-sites such as Amazon, E-bay, Google, and Facebook are exposed in Outlook program and Internet Explorer program using CNG library. We consider that the analyzed result in this paper can improve the security for various applications using CNG library.

A Study on Space Organization for the Hybrid Library - An Application to the Central Library of Kyushu University - (하이브리드도서관을 위한 공간구성에 관한 연구 - 일본 큐슈대학 중앙도서관의 적용 사례 -)

  • Ryu, Byeong-Jang
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.141-163
    • /
    • 2010
  • It's getting popularized to collect information connecting web sites with massive information through the internet and advanced search engines. Users can handle digital materials like E-book wherever the internet is available and they will demand digital information increasingly. This study analyzes literature investigation, statistics analyses of the attached library of Kyushu University, drawings and field investigation to suggest a new model of a library which handles traditional paper-formed materials and digital-formed materials at one place with growing importance of digital materials. It results that a library performs a important role like a learning space and functions as a sociocultural communication space. Also it shows that it is required to basically reinvestigate the role of 'space' in the library with a great importance of digital materials. In the hybrid library combined with subjects and reorganized at one place, One-stop services like library materials and manpower can be provided for users staying at the same area.

A Protection Profile for E-Document Issuing System (온라인증명서 발급시스템 보호프로파일에 관한 연구)

  • Lee, Hyun-Jung;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.109-117
    • /
    • 2011
  • We can use document issuance services provided by a school, bank, hospital, company, etc. either by visiting those facilities or by simply visiting their Web sites. Services available through the Internet allow us to use the same services as we do by actually going to those facilities at home or office any time. As much as it saves us time and money, there also arises a problem of information being forged on the Internet or on a printed document. There has to be security functions to deal with the problem. This paper intends to think of the possible security threats and draw out the necessary security functions that an on-line document issuance system should have based on the CC v3.1, so that anyone can use it as reference when they evaluate or introduce the system.