• 제목/요약/키워드: Internet user's

검색결과 1,901건 처리시간 0.029초

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

ID 연계 기반의 인터넷 ID Management System: e-IDMS (Internet ID Management System based on ID Federation: e-IDMS)

  • 조영섭;진승헌;문필주;정교일
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.104-114
    • /
    • 2006
  • 인터넷 서비스를 이용하기 위해서 사용자는 일반적으로 가입절차를 수행하고 서비스를 위한 id(identifier)를 등록하게 된다. 그러나 인터넷의 활용이 증가함에 따라, 사용자는 많은 id를 가지게 되었으며 이것은 사용자가 인터넷 서비스를 이용할 때마다, 매번 인증을 받아야 한다는 문제를 발생시키고 있다 또한 여러 사이트에 산재되어 관리되지 않은 id들은 사용자 개인정보의 침해 가능성을 높이고 있다. 본 논문에서는 이와 같은 문제를 해결하기 위해 ETRI에서 개발한 ID(IDentity) 연계 기반의 인터넷 ID 관리 시스템인 e-IDMS에 대하여 기술한다. e-IDMS는 ID 연계를 기반으로 복합 인증, 인터넷 SSG, ID 정보 관리, ID 정보 공유, 개인정보 보호 및 대화형 질의 기능을 제공한다. e-IDMS는 공공기관 통합 ID 관리 시스템 구축에 활용되고 있다.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

허약아(虛弱兒) 증상 연구를 통한 인터넷 중독의 한의학적 접근 (Oriental Medical Research about Internet Addiction by Study of the Weak Children Symptoms)

  • 김현지;박은정
    • 대한한방소아과학회지
    • /
    • 제22권2호
    • /
    • pp.51-67
    • /
    • 2008
  • Objectives : The purpose of this study is to research the internet addiction and the Weak children. Methods : Total 400 of 5th and 6th grade JeonJu Elementary student children consisted with 203 men, 197 women were chosen for this study. They answered questionnaires of the internet addiction and the Weak children on June 12th, 2008. Results : 75% were general internet user, latent danger user group was 14.7%, high danger user group was 10.3%. The mean of the general weak children was the highest and then the group of children who had Heart, the Lung, the Liver, the Spleen, the Kidney problems were followed. These showed the relationships with living styles, especially eating patterns and parents' concerns about children's internet use. The more serious internet addiction was, the more the weaker children symptoms were answered significantly. The heart weak children symptoms were found in latent-high danger internet user group. Conclusions : In conclusion, the physical and psychological symptoms of the internet addiction children were resulted by the disturbance of Qi and the pathological change of internal organs.

  • PDF

자동 입찰정책 스켈줄링을 이용한 인터넷 경매 에이전트 시스템 설계 및 구현 (Design and Implementation of an Internet Auction Agent System using Scheduling for Auto-bidding Policy)

  • 이종희;김태석;이근왕;오해석
    • 한국정보처리학회논문지
    • /
    • 제7권5S호
    • /
    • pp.1620-1628
    • /
    • 2000
  • Existing internet auction systems have adopted the form which gives a win to the auction bidder who proposes the top bid price for the goods posted on the auction board. But they haven't been satisfying the automatical one-step processing for user's convenience because they must require continuous care of user for bidding and checking as well as neglecting the convenience of user interface while participating in the electronic bidding system. The AuctionBot system of Michigan Univ. is known as the representative internet auction system. It has merit allowing the various kids of bidding. But it does not support automatic a process which can replaces what user has to do using an agent. To improve this kind of user interface, we propose an automatic bidding price strategy algorithm which composes the auction system using agent and design for auto-bidding system using agent so that I can replace user's bidding activity. This mechanism gives an auction system the efficient bidding price strategy.

  • PDF

A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement

  • An, Younghwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권3호
    • /
    • pp.41-49
    • /
    • 2016
  • Recently, many biometrics-based user authentication schemes for telecare medicine information systems (TMIS) have been proposed to improve the security problems in user authentication system. In 2014, Mishra et al. proposed an improvement of Awasthi-Srivastava's biometric based authentication for TMIS which is secure against the various attacks and provide mutual authentication, efficient password change. In this paper, we discuss the security of Mishra et al.'s authentication scheme, and we have shown that Mishra et al.'s authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to remove these security problems of Mishra et al.'s authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved biometric based authentication scheme is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack and provides mutual authentication between the user and the telecare system.

사용자 이용 행태를 고려한 VoD 서버 부하 분산 방법 (A VoD Load Balancing Algorithm Based on User's Behaviors)

  • 이강용;장욱;조기성
    • 인터넷정보학회논문지
    • /
    • 제11권5호
    • /
    • pp.9-17
    • /
    • 2010
  • 인터넷의 확산과 멀티미디어 콘텐츠의 활성화로 인해 최근 방송과 통신의 융합 서비스인 IPTV가 인터넷 서비스의 새로운 모델로 주목 받고 있다. 특히, IPTV 환경에서는 기존의 실시간 방송이나 주문형 비디오 (Video-on-Demand) 뿐만 아니라 양방향 멀티미디어 서비스나 고품질 디지털 콘텐츠 등과 같은 다양한 서비스를 제공한다. 하지만, IPTV 가입자수의 폭발적인 증가와 방대한 콘텐츠에 따른 트래픽의 증가는 IPTV 환경에서의 효과적인 네트워크 자원 관리에 어려움을 발생시키고, 결과적으로 품질 저하를 초래하게 된다. 본 논문에서는 IPTV 환경에서 네트워크 자원을 보다 효율적으로 이용하기 위해 사용자의 VoD 서비스 이용 행태를 고려하여 향후 잠재적인 서버의 부하 및 대기 시간에 대한 예상치를 계산하고 이를 서버 부하 분산에 적용하는 알고리즘을 제안한다.

A hidden anti-jamming method based on deep reinforcement learning

  • Wang, Yifan;Liu, Xin;Wang, Mei;Yu, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3444-3457
    • /
    • 2021
  • In the field of anti-jamming based on dynamic spectrum, most methods try to improve the ability to avoid jamming and seldom consider whether the jammer would perceive the user's signal. Although these existing methods work in some anti-jamming scenarios, their long-term performance may be depressed when intelligent jammers can learn user's waveform or decision information from user's historical activities. Hence, we proposed a hidden anti-jamming method to address this problem by reducing the jammer's sense probability. In the proposed method, the action correlation between the user and the jammer is used to evaluate the hiding effect of the user's actions. And a deep reinforcement learning framework, including specific action correlation calculation and iteration learning algorithm, is designed to maximize the hiding and communication performance of the user synchronously. The simulation result shows that the algorithm proposed reduces the jammer's sense probability significantly and improves the user's anti-jamming performance slightly compared to the existing algorithms based on jamming avoidance.

웹사이트에서의 직관적 유희성 증대에 관한 연구 -촉각적 사용자 경험을 활용한 인터넷 쇼핑몰 디자인을 중심으로- (A Study on the Increase of Intuitive Play in Web Site - Especially on the Internet Shopping Mall Design using Tactile User Experience)

  • 황선영;서종환
    • 디자인학연구
    • /
    • 제16권3호
    • /
    • pp.23-32
    • /
    • 2003
  • 웹사이트는 이제 단순한 정보전달의 차원을 넘어서 사용자들의 유희성 증대를 위한 다양한 방법으로의 접근을 필요로 한다. 이에 촉각의 자극은 타 분야에서의 활발한 연구를 통해 그 중요성이 입증되고 있으며 이러한 촉각을 웹사이트에도 적용을 한다면 큰 효과가 있을 것으로 기대된다. 본 연구는 웹사이트에서의 직관적 유희성 증대를 위해 직관을 위한 경험과 유희성 증대에 대하여 분석하고 촉각의 중요성에 대해서 살펴보았다. 이러한 촉각을 통한 사용자 경험은 디자이너와 사용자 사이의 보다 풍부한 커뮤니케이션과 사용자의 직관적 유희성 증대를 가져온다. 따라서 웹사이트에서의 촉각적 사용자 경험요소의 분석과 그의 활용에 대해 고찰해 보고 이러한 요소들을 인터넷 쇼핑몰에 적용해 보았다. 그 후 실험을 실시하여 촉각적 사용자 경험요소가 적용된 인터넷 쇼핑몰 사이트에서의 사용자 반응분석을 조사하였다.

  • PDF

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.