• Title/Summary/Keyword: Internet based design

Search Result 3,042, Processing Time 0.025 seconds

A Design and Implementation for Registration Service of IoT Embedded Node using CoAP Protocol-based Resource Directory in Mobile Internet Environments (모바일 인터넷 환경에서 CoAP 프로토콜 기반의 RD를 이용한 IoT 임베디드 노드 등록 서비스 설계 및 구현)

  • Hang, Lei;Jin, Wenquan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.147-153
    • /
    • 2016
  • Recently, IETF (Internet Engineering Task) working group has adopted CoAP (Constrained Application Protocol) as a standard IoT proctocol. CoAP is a specialized web transfer protocol for use with constrained nodes and constrained environment such as small memory and low power networks. In this paper, we design and implement a registration service with CoAP protocol based on RD(Resource Directory) to connect IoT nodes in mobile Internet environments. The resource directory between the mobile terminal and IoT nodes provides to discover the IoT nodes and get the context data. The mobile terminal has as the CoAP client and embedded IoT nodes includes as the CoAP server so that it can conveniently manage the constrained IoT nodes to get the context data and control devices in a mobile environments.

Design and Implementation of IoT Middleware Using Data Refinement Scheme based on IETF CoAP (IETF CoAP 기반의 데이터 정제 기법을 이용한 IoT 미들웨어 설계 및 구현)

  • Wang, Jian;SaKong, June;Kwak, Ho-Young;Kim, DoHyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.123-128
    • /
    • 2015
  • Recently, a communication protocol for connectivity between various sensors and actuators is issue the key technology in IoT(Internet of Things). IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol) protocol supports the communication between things like sensors and actuator nodes in a limited environment. Smart-phone will work for the data processing of the sensors and the management of IoT nodes at the next generation communication environment. In this paper, we design the connection for smart-phone and IoT node based using IETF CoAP protocol, and implement the middleware with the proposed data refinement on smart-phone. The middleware detects and eliminates a error data and duplicated data using the proposed data refinement. The proposed data refinement scheme supports to transfer a reliability information in the constrained environment.

A Study on a Design Process Model for Mass-Customized Fashion Product (Part I) -On the Basis of Internet Shopping- (대량 맞춤형 의류상품을 위한 디자인 프로세스 모형 연구 (제1보) -인터넷 쇼핑 환경을 중심으로-)

  • Eun, Myung-Jin;Lee, Joo-Hyeon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.2 s.150
    • /
    • pp.187-197
    • /
    • 2006
  • The purpose of this study was to search for the effective mass customized fashion design process based on internet shopping, so that a total of fifteen models of mass customized fashion design processes which are different in the customized degree and in the composition of design elements was proposed in this study, and to compare their efficiencies and appropriateness with those of the existing fashion design process. The data was obtained from a survey of 180 Korean females in their twenties and thirties from Nov 17th to 29th, 2002. The results of this study were summarized as follows: First, more than half of the whole respondents appeared to prefer mass customized products. Therefore, the mass customized design process was considered to be applicable to some sectors in the present domestic clothing market. Second, Respondents generally preferred the designs by mass customized design process model to those by existing fashion design process. However, satisfaction on the designs done by the mass customized design process suggesting only one choice to prosumers was lower than that of existing fashion design process. This result suggested that mass customized fashion design process enabling at least two choices should be presented to prosumers in order to increase their design satisfaction. In addition, the design process models suggesting more that three choices presented higher satisfaction than existing fashion design process.

Purchase Behavior and Risk Perception in Cosmetics Purchases at Online Shopping Malls (인터넷 쇼핑몰에서 화장품 구매시 위험지각에 따른 구매행동에 관한 연구)

  • Kim, Ju-Hee;Ha, Jong-Kyung
    • Korean Journal of Human Ecology
    • /
    • v.19 no.6
    • /
    • pp.1003-1012
    • /
    • 2010
  • This study analyzed purchase behavior according to the risk perceptions when customers buy Cosmetics at Internet Shopping Malls. Participants were 232 women in their 20s and 30s with more than one buying experience at an internet fashion shopping mall. Data were analyzed using factor analysis, Cronbach's analysis, cluster analysis, one-way ANOVA and a Duncan test. Results were as follows. Firstly, five factors of risk perception were identified: These were the payment risk, service risk, quality risk, price risk and experience risk. Secondly, customers of internet shopping malls could be categorized into three groups: A low risk perception group, a payment risk perception group and a high risk perception group. Factor analysis showed significant differences between these groups( p<.001). Thirdly, purchase behavior based on the purchase standards, purchase items, information searching were investigated according to the different groups of risk perception of internet shopping malls and results again significant differences between groups (p<.05, p<.001).

Effects of an Empowerment Education Program in the Prevention of Internet Games Addiction in Middle School Students (중학생의 인터넷게임중독 예방을 위한 임파워먼트교육프로그램의 효과)

  • Joo, Ae-Ran;Park, In-Hyae
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.2
    • /
    • pp.255-263
    • /
    • 2010
  • Purpose: The purpose of this study was to determine effects of an empowerment education program (EEP) on internet games addiction, empowerment, and stress in middle school students. Methods: The EEP used in this study was based on the Freire' Empowerment Education Model. The research design of this study was a non-equivalent control group pretest-posttest design for 48 middle school students, who were conveniently assigned to an experimental group or a control group. The data were collected from May 29 to June 19, 2005. Data were analyzed using SPSS/PC program with frequencies, $\chi^2$-test, Fisher exact test, t-test, mean, standard deviation and ANCOVA. Results: 1) The first hypothesis that, "the experimental group would have higher empowerment scores than the control group. "was supported. 2) The second hypothesis that, "the experimental group would have lower internet games addiction scores than the control group."was supported. 3) The third hypothesis that, "the experimental group would have lower stress scores than the control group." was supported. Conclusion: We suggest, therefore, that the EEP should be used with adolescent to help them control their stress, internet games addiction and to increase their empowerment.

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Design and Implementation of SIP UA for CPL process (CPL 처리를 위한 SIP UA 확장 설계 및 구현)

  • 이일진;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.758-761
    • /
    • 2002
  • Voice of U(VoIP) technology Provides voice service as well as data service via Internet. It has been a promising technology as Internet grows fast and the requirements are increasing. Recently, serveral protocols have been created to allow telephone calls to be made over IP networks, notably, SIP and H.323. Due to introducing SIP and H.323, There are many change at internet telephony service. Internet telephony enables a wealth of new service possibility Users can control telephony service directly. In this paper, we design and implementation CPL client based on SIP system.

  • PDF

A Study on a Design of Subject Classification Schemes for Internet Bookstores (인터넷 서점의 주제별 분류체계 설계에 관한 연구)

  • Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.3
    • /
    • pp.17-34
    • /
    • 2001
  • It is very important to organize materials at intemet bookstores. It is time for us to develop a subject classification scheme as a tool for increasing the effectiveness of information retrieval with ease of subject access. The purpose of this study is to examine the subject features of internet bookstores in order to suggest the effective design of the subject scheme for them. Nine internet bookstore websites are analyzed at the aspect of the subject classification of the materials. Based upon the results of this study, an effective subject classification for internet bookstores is suggested to provide a better subject access.

  • PDF

Design and Evaluation of the Program on the Internet for Sexuality Education of Adolescences (사춘기 청소년의 성교육 활성화를 위한 인터넷기반 교수-학습 프로그램의 내용설계 및 평가도구 개발)

  • Kang, Nam-Mi;Kim, Young-Ran;Park, Young-Sook;Sohn, In-Sook;Lee, Sung-Ho
    • Women's Health Nursing
    • /
    • v.8 no.4
    • /
    • pp.595-607
    • /
    • 2002
  • Sexuality education in the period of adolescents need much care and attention. The programs of sexual education through the Internet are excellent resources for adolescents to gain the information related to their sexual health. And systematic program which is necessary for adolescents to manage their sexual health has been rarely found in Korea. The purpose of this study was to offer valuable database for program design and evaluation on sexual education of middle school students through the Internet. Needs assessment for the information of sexual education on the internet among middle school students were carried out. A questionnaire survey was conducted with respondents of 602 middle school students from January to March in 2002. In the sexual counseling center for middle school students, counseling cases through internet were analyzed and evaluated from October, 2001 to September, 2002, We have selected 16 Sexual educational websites in Seoul confirmed Korean Educational Human Resource. Contents which was illustrated in 16 sexual educational websites were analyzed and evaluated by 12 sexual counselors. Design and evaluation of the program on the internet for sexuality education of adolescences was conducted on the basis of this study results by middle school expert teachers, sexual counselors, sexuality education professionals. Data was statistically analyzed using dBSTAT 4.0 for Windows. The extent and phase of the teaching-learning program of the sexuality education on the internet was seen as follows : 1. We evaluated to need for sexuality education on the internet by middle school student. 2. We assessed the properness of sexuality education curriculum on the internet frequently used by middle school students. 3. We designed teaching strategy and learning program for sexuality education of the middle school students. 4. We developed the assessment method for the teaching-learning program of the sexuality education in adolescences on the internet. Middle school students responded that sexual education through Internet is needed in the order of programs related to acquaintances with opposite sex, Sexual culture and ethics, Sexual health, Reproductive health structure and development, Marriage and family, Psychology of Sexuality, Pregnancy and birth. In the internet counseling, cases on the 'reproductive health structure and development' was ranked as the top. In short we have found the most needs as follows; Meaning of the marriage life and having family, Sexes and Love, Human relation, Sexual Culture.We recommend as follows on the basis of this study results: 1. It is necessary for sexuality education program on the internet to specify according to age and target the specific individual needs. 2. Sexual educators have to employ various educational materials such as flash, cartoon, multimedia in order to provide effective sexuality education. 3. Internet based sex education need to be evaluated regularly through reassessment of the effectiveness of sexuality education for content quality and richness.

  • PDF

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.