• Title/Summary/Keyword: Invisible Web

Search Result 13, Processing Time 0.03 seconds

The Effectiveness of the Invisible Web Search Tools (Invisible Web 탐색도구의 성능 비교 및 분석)

  • Ro, Jung-Soon
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.3
    • /
    • pp.203-225
    • /
    • 2004
  • This study is to investigate the characteristics of the Invisible Web and many search services designed to serve as gateways to the Invisible Web and to evaluate searching the Invisible Web in the Services. The four services for searching the Invisible Web were selected to search the Invisible Web with 11 queries, that are Google as portals, ProFusion and Search.com as Invisible Web meta search engines, and IncyWincy as Invisible Web search engines. It was found that the effectiveness of Google's Invisible Web searching was better compared with the three Invisible Web search tools but the difference between the four systems was not significant((${\alpha}$=.055) The Invisible Web meta searching was better than the Web meta searching in the three search tools at the statistically significant level. The effectiveness measurement based on the ranks and relevance degree(quality) of relevant documents retrieved seemed appropriate to the ranked search results.

A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments (안전한 웹 서버 환경을 위한 시큐어코딩 도구, 웹쉘 탐지도구 간의 상호연동 시스템 설계)

  • Kim, Bumryong;Choi, Keunchang;Kim, Joonho;Suk, Sangkee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.

뉴스라인 / '보이지 않는' 콘텐츠를 찾아라. 새로운 검색엔진 '인비지블 웹'

  • MaLee, -Dan
    • Digital Contents
    • /
    • no.3 s.94
    • /
    • pp.81-85
    • /
    • 2001
  • 많은 검색 엔진들이 등장하고 나름대로 장단점을 가지고 있다. 하지만 그 어느 것 하나도 완벽이라는 칭송을 듣기에는 미흡하다. 여기에 새로운 검색엔진을 소개하고자 한다. '보이지 않는' 콘텐츠가 검색엔진으로 가능하다는 인비지블웹닷컴(InvisibleWeb.com)이다. 하지만 이 역시 완벽이라는 칭송을 받기에는 부족하다. 불필요한 것들이 검색되거나 전혀 무관한 것들이 검색된다는 점에서는 오히려 기존 검색 엔진보다 단점이 많을 수 있다. 하지만 다른 검색엔진으로는 검색 불가능한 것들이 검색된다는 점에서 주목을 받고 있으며 단점을 보완한다면 좋은 검색엔진으로 발전 가능성이 있기에 소개하고자 한다.

  • PDF

The Effect of Web-Aided Laboratory on Molecular Dynamics of High School Physics Course (고등학교 물리의 기체 분자 운동론에서 웹 활용 모의실험이 학습에 미치는 효과)

  • Roh, Hack-Kie;Kong, Youn-Sig;Park, Chang-Young;Chung, Ki-Soo
    • Journal of The Korean Association For Science Education
    • /
    • v.25 no.5
    • /
    • pp.547-554
    • /
    • 2005
  • A developed Web-aided laboratory program visualized invisible gas. In the Web-aided laboratory temperature and pressure were controlled and the resultant findings were presented as types of graphs, disclosed in the form of an analyzed report. A Web-aided laboratory experiment and traditional experiment group(2 classes) were assembled from a farming village co-educational high school and taught the motion of molecule lesson for 2 class hours. Before actual class instruction, to survey learner motivation characteristics, the short-version GALT, the test of attitudes toward science instruction, was administered. After instruction, student learning achievement, TOSRA, and IMMS, were administered to the two groups. To analyze data ANCOVA was administrated. Result found that attitudes towards science instruction did not significantly differ, but learning motivation and achievement were significantly altered.

Analysis of Icon Design Used in Web as a Mark (표지로서 웹에 활용하는 아이콘 디자인 분석)

  • 김경조;신수길
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.143-150
    • /
    • 2003
  • An icon which is used in website as a role of a mark is an important device, what is called, to find the contents The users get satisfied with their internet surfing when visualization of icon has exactly the right content. Therefore, visualization of contents - performing more fast and more convenient functions in searching a right content which a user want - becomes much more important. In this study, we researched the expressive ways of con indicating the common contents in the website, we divided into a visible and an invisible content, analysed the cases in symbolic situation and finally suggested the most appropriate method of visualization in each type.

  • PDF

A Study on a Logo Extraction Algorithm for Copyright Protection of Digital Contents (디지털 컨텐츠의 저작권 보호를 위한 로고 검출 알고리즘에 관한 연구)

  • 최준기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.124-129
    • /
    • 2003
  • Recently, on the internet, we need the protection methods of digital contents. To Protect web contents, we inserted a visible watermark but it could be removed easily and covered some place of original contents. In this paper, we proposed a logo detection algorithm that it insert an invisible logo watermark and extract after attacks. Previous works, it didn't show clearly. Experimental results show that it can be extracted all logo images after an attack. And it is proved that proposed scheme is an appropriate algorithm.

  • PDF

A systematic review of the accuracy and efficiency of dental movements with Invisalign®

  • Galan-Lopez, Lidia;Barcia-Gonzalez, Jorge;Plasencia, Eliseo
    • The korean journal of orthodontics
    • /
    • v.49 no.3
    • /
    • pp.140-149
    • /
    • 2019
  • We are currently living in an era where the use of computer-aided design/computer-aided manufacturing has allowed individualized orthodontic treatments, but has also incorporated enhanced digitalized technology that does not permit improvisation. The purpose of this systematic review was to analyze publications that assessed the accuracy and efficiency of the $Invisalign^{(R)}$ system. A systematic review was performed using a search strategy to identify articles that referenced $Invisalign^{(R)}$, which were published between August 2007 and August 2017, and listed in the following databases: MEDLINE, Embase, Cochrane Library, Web of Knowledge, Google Scholar, and LILACS. Additionally, a manual search of clinical trials was performed in scientific journals and other databases. To rate the methodological quality of the articles, a grading system described by the Swedish Council on Technology Assessment in Health Care was used, in combination with the Cochrane tool for risk of bias assessment. We selected 20 articles that met the inclusion criteria and excluded 5 due to excess biases. The level of evidence was high. Although it is possible to treat malocclusions with plastic systems, the results are not as accurate as those achieved by treatment with fixed appliances.

An Optimization Strategy for Vector Spatial Data Transmission onover the Internet (인터넷을 통한 벡터 공간 데이타의 효율적 전송을 위한 최적화 기법)

  • Liang Chen;Chung-Ho Lee;Hae-Young Bae
    • Journal of KIISE:Databases
    • /
    • v.30 no.3
    • /
    • pp.273-285
    • /
    • 2003
  • Generally, vector spatial data, with richer information than raster spatial data enabledata, enables a mere flexible and effective manipulation of the data sets. However, one of challenges against the publication of vector spatial information on the Internet is the efficient transmission of the big and complex vector spatial datadata, which is both large and complex, across the narrow-bandwidth of the Internet. This paper proposes a new transmission method, namely, the Scale-Dependent Transmission method, with the purpose of improving the efficiency of vector spatial data transmission on the narrow-bandwidthacross the Internet. Simply put, its nam idea is “Transmit what can be seen””. Scale is regarded as a factor naturally associated with spatial features so that not all features are visible to users at a certain scale. With the aid of the Wavelet-Wavelet-based Map Generalization Algorithm, the proposed method filters out invisible features from spatial objects according to the display scale and then to transmit onlytransmits only the visible features as athe final answer for an individual operation. Experiments show that the response times ofan individual operation has been reducedoperations were substantially by the usage of reduced when using the proposed method.

Implementation of the knowledge management system to effectively utilize human and intellectual resources of the universities (대학의 인적.지적 자원의 효과적 활용을 위한 지식 관리 시스템 구현)

  • 최재원;박진규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.473-476
    • /
    • 2002
  • In this paper by realizing the knowledge base on the web, for example, the information of the technology and human resources of the universities, which is the mecca of the knowledge management, technology information in various segment, education information, visible anti invisible knowledge information like technical advice, etc, and scholaristic knowledge like basic science technologies, economic theories which are verified by experts of the field, and pragmatic knowledge like technical patent, software, data base, also, hands on experience and knowledge like field technology, customer service, front line management. All those related information provides easy access to anyone who need of. This system is also designed for the utilization of the study, company activities, and professionals of the basic science technology which enables not only professor to exchange the research results but also, general public, companies, students can effectively share and exchange the information.

  • PDF