• Title/Summary/Keyword: Internet data

Search Result 10,076, Processing Time 0.035 seconds

Implementation of an Internet Telephony Service that Overcomes the Firewall Problem (방화벽 문제를 극복한 인터넷 전화 서비스의 구현)

  • 손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.65-75
    • /
    • 2003
  • The internet telephony service is one of the successful internet application services. VoIP is the key technology for the service to come true. VoIP uses H.323 or SIP as the standard protocol for the distributed multimedia services over the internet environment, in which QoS is not guaranteed. VoIP carries the packetized voice by using the RTP/UDP/IP protocol stack. The UDP-based internet services cause the data transmission problem to the users behind the internet firewall. So does the internet telephony service. The users are not able to listen the voices of the counter-parts on the public internet or PSTN. It makes the problem more difficult that the internet telephony service addressed in this paper uses only one UDP port number to send the voice data of all sessions from gateway to terminal node. In this paper, two schemes including the usage of dummy UDP datagrams, and the protocol conversion are suggested. The implementation of one of the schemes, the protocol conversion, and the performance evaluation are described in detail.

A Study on Effective Internet Data Extraction through Layout Detection

  • Sun Bok-Keun;Han Kwang-Rok
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.5-9
    • /
    • 2005
  • Currently most Internet documents including data are made based on predefined templates, but templates are usually formed only for main data and are not helpful for information retrieval against indexes, advertisements, header data etc. Templates in such forms are not appropriate when Internet documents are used as data for information retrieval. In order to process Internet documents in various areas of information retrieval, it is necessary to detect additional information such as advertisements and page indexes. Thus this study proposes a method of detecting the layout of Web pages by identifying the characteristics and structure of block tags that affect the layout of Web pages and calculating distances between Web pages. This method is purposed to reduce the cost of Web document automatic processing and improve processing efficiency by providing information about the structure of Web pages using templates through applying the method to information retrieval such as data extraction.

  • PDF

Impulsivity and Self-efficacy according to Internet Addiction (청소년의 인터넷 중독, 충동성, 자기효능감)

  • Suh, Boo-Deuk;Choi, Yeon-Hee
    • Research in Community and Public Health Nursing
    • /
    • v.19 no.2
    • /
    • pp.310-316
    • /
    • 2008
  • Purpose: The purpose of this study was to examine impulsivity and self-efficacy according to Internet addiction in adolescents. Method: Subjects were middle and high school students in Daegu (N=486). Data were collected by a self-rating questionnaire including demographic data, a Korean version of Internet addiction, impulsivity and self-efficacy. Result: Impulsivity and self-efficacy according to Internet addition were significantly different (F=22.909. p<.001). There were significant correlations between Internet addiction and impulsivity (r=.280. p<01), between Internet addiction and self-efficacy(r=-.288. p<.01) and between impulsivity and self-efficacy (r=-.665. p<.01). Conclusion: These results indicate that the more addictive to the Internet the more impulsive and the less self-efficacious. Therefore, further studies are needed to generalize these results and examine the effects of Internet addiction more broadly.

  • PDF

A Study on the Internet and Teenagers' Culture

  • Jang, Jung-Min;Cho, Hyun-Soo;Jung, Hye-Jung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.511-523
    • /
    • 2003
  • Internet has become an important part of teenagers' life and has changed the life style of teenagers. Internet can be an useful tool for educating teenagers and also can be misused as a cyberspace for social problems. Recognizing that teenagers spend most of their free time enjoying internet and they form their own new life culture, it is needed to develop practical strategies for maximizing the positive effect of internet on the teenagers' culture. The purpose of this research is to suggest a desirable way for forming teenagers' healthy internet-based culture. The research was conducted by the survey of teenagers in the city of Pyongtaek on their use of internet and their problems The survey shows that most of teenagers are using internet in order to release the stress and most of them are hooked on it. It also indicates that cyber police and volunteer groups should be formed to help the desirable teenagers' internet-based culture.

  • PDF

A Qualitative Research about the Purchase Behavior of Internet Shoppers (인터넷 쇼핑몰 이용자의 구매행동에 관한 질적연구)

  • 고은주;김성은
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.1
    • /
    • pp.153-166
    • /
    • 2004
  • The purpose of this study was to examine the internet shoppers' new purchase behavior, to examine the general purchase behavior(i.e., purchase pattern, preference), and to examine the related factors to promotion strategies(i.e., e-mail, event) of internet shopping mall. Focus group interviews were done with 40 internet shopping-mall users on May, 2003 for the data collection. Data were analyzed by content analysis and descriptive statistics(i.e., frequency, percent). The results of this study were as following. First, competitive price, accurate product and service information and convenience were considered as important factors in the new purchase behavior among internet shoppers. Second, the more frequent purchasing time through the internet shopping mall were on weekdays rather than weeekends and the most preferred information search engine were category type, item type, and price type in order. Third, e-mails from internet shopping mall were most likely opened by internet shoppers, that is to say, e-mail can be the efficient communication tool as well as the possible promotion strategies. Specifically, the title of email was considered as an important factor to approach the target consumers.

Stress and Social Support According to Internet Addiction (청소년의 인터넷 중독, 스트레스와 사회적 지지)

  • Choi, Yeon-Hee;Suh, Boo-Deuk;Choi, Eun-Hee
    • Research in Community and Public Health Nursing
    • /
    • v.18 no.3
    • /
    • pp.452-459
    • /
    • 2007
  • Purpose: The purpose of this study was to examine stress and social support according to Internet addiction in juveniles. Method: Subjects were middle and high school students in Daegu (N=492). Data were collected using a self-rating questionnaire including demographic data, which was the Korean versions of an Internet addiction scale, a stress scale and a social support scale. Results: Stress and social support were significantly different according to Internet addition. Significant correlations were observed between Internet addiction and stress and between Internet addiction and social support. Conclusion: These results indicate that the more addictive to the Internet a student is, the more stress and the less social support he/she has. Therefore, further studies are needed to generalize these results and examine widely the effects of Internet addiction.

  • PDF

The Usefulness Perception and The Use Degree about Internet Shopping of Housewives (주부의 인터넷 쇼핑에 대한 유용성 인지정도와 활용정도)

  • 박미석;이유리
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.4
    • /
    • pp.163-177
    • /
    • 2000
  • The purposes of this study were to examine the perception of usefulness and the use degree of search and purchase about internet shopping of housewives. Specifically, this study analyzes the trend of the perception of usefulness and the use degree of internet shopping, and closely examines the influential factors. The major findings are follows: (1) Those who are college-educated, employed, positive about household informationalization, internet-educated, highly capable of the internet, and comfortable with an issue of an effluence of personal data showed high perception of usefulness of internet shopping. (2) Those who are young, college-educated, and employed showed the high use degree of search. Those who are age 20 to 30, college-educated, employed, and at the early stage of family life cycle showed the high use degree of purchase. In addition, those who are positive about household informationalization high in the tendency of innovation and the awareness of time constaints, exposed to the internet education, high in the internet capability, and low in a burden of the internet bills and the effluence of personal data showed the high use degree of search and purchase.

  • PDF

Shopping Propensity for Clothes Consumers in the Internet Shopping Mall - Focused on university students in Busan -

  • Jhun, Mi-Ran;Beum, Su-Gyun;Choi, Seung-Bae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.3
    • /
    • pp.775-788
    • /
    • 2008
  • In this study, the consumers were classified into Risk Avoidance Group, Enjoyment and Economy Group, Low Involving Group and High Involving Group by shopping propensity of the consumers and investigated the difference in their evaluation criteria and purchasing intention. The samples used in this study are 214 university students in Busan area who visited the internet shopping mall or had an experience to buy clothes through an internet. The purpose of this study is to identify how the internet university students' clothes shopping propensity and demographical factors affect the evaluation criteria and purchasing intention for clothes. And based on the results, the implications for internet clothes shopping mall are suggested and post research subject is provided as well.

  • PDF

A Study on the Office Environmental Design of Monitoring Center (모니터링 센터의 사무 환경 디자인에 관한 연구)

  • 김형년
    • Korean Institute of Interior Design Journal
    • /
    • no.33
    • /
    • pp.46-53
    • /
    • 2002
  • The development of data communication and network technology has brought a change to various communications through the internet. Regarding the stable internet service, corporations and Individuals came to require an internet data center in which there is computer equipment and network devices available 24 hours everyday. The internet data center is now on a large scale in its structure and facility, suitable for the internet environment that is under development in various dimensions, and effective for task support, stable facility, capable of space expansion and flexibility, and easiness in ease of maintenance and management, etc. The monitoring center of the data center which is one of the core facilities in the center, special space elements and functions as well as a function of task space are to be put into consideration additionally. This study was to present a proposal for the space elements and environmental design of a monitoring center, which could create an efficient and comfortable room.

Applying Asymmetric Key Encryption to Secure Internet based SCADA

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2012
  • As an acronym for Supervisory Control and Data Acquisition, SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. In current times, there are also demands of connecting SCADA through the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, we discuss web SCADA and its connectivity along with the issues regarding security and suggests a web SCADA security solution using asymmetric-key encryption.