• Title/Summary/Keyword: Mobile web

Search Result 1,286, Processing Time 0.031 seconds

A Qualitative Study on the Period-Specific Changes of Job Factors and Performance Features in Academic Libraries (질적 분석을 통한 대학도서관 업무의 시대별 수행 형태 및 요소 변화에 관한 연구)

  • Cho, Chul-Hyun;Noh, Dong-Jo
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.137-165
    • /
    • 2015
  • This study aimed to investigate the period-specific changes (Library 1.0, Library 2.0, Library 3.0 Period) of job factors and performance features in academic libraries. For this, the study categorized an academic library's job into five dimensions: 1) library administration 2) collection development and management 3) information organization 4) information services and 5) information system development and management, After the categorized library's job was defined in detail, the Delphi survey was conducted twice on librarians and professors of library and information science. The result showed that there were many changes in job factors and performance features in academic libraries towards the period of library 2.0 characterized by user participation, sharing and openness and into library 3.0 characterized by social network and semantic web. Library 3.0 is likely to bring about a significant change in user services with ever changing technological advances stemming from library 2.0, such as mobile services, RFID and NFC etc. The finding of the study suggest that library systems need to be continually upgraded in the period of library 3.0.

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

Asynchronous Message Pushing Framework between Android Devices using Remote Intent (Remote Intent를 이용한 안드로이드 장치 간 비동기식 메시지 푸싱 프레임워크)

  • Baek, Jihun;Nam, Yongwoo;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.517-526
    • /
    • 2013
  • When developing an android mobile application the androids intent is used as a mechanism to send messages between local equipment of androids application inner part and other applications. But the androids intent does not support sending messages via each android products intent. If there is a way to support each androids equipments to send messages, it will be easier to make non-stopping services. Non-stopping service is used when the user is using the android to do word or searching services and suddenly changes to a different android product but still maintains the progress what was currently being done without waiting the programs to be loaded. It is possible to send messages to each android products by using the socket, but the connection must be maintained stably which is the weak point. In this paper, I am suggesting a BRIF(Broadcasting Remote Intent Framework) framework to send messages to different android products. BRIF is a framework that uses the Googles C2DM service which services asynchronous transmissions to different android products. This is organized with the C2DM server, RemoteContext Api, web server and RISP(Remote Intent Service Provider) which is will be easy to be used for the developers since there are no big changes for coding compared to the intent code.

Dutch Touch : Mobile Application with Easy Dutch Pay (더치 터치: 더치페이를 쉽게 해주는 모바일 어플리케이션 구현)

  • Song, Yoojeong;Moon, Yeeun;Eom, Jiyeon;Lee, Jongwoo
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.11-18
    • /
    • 2018
  • The Dutch treat culture, which pays for the cost of having meetings with a large number of people, is located in the daily life of many modern people. In particular, the execution of Kim Young-ran is a more active Dutch treat. However, when going dutch, there is a case where the amount of money to be paid per person is not divided equitably and there is an ambiguous situation about who should pay more. Also if one person have to pay all of the payments because of the different payment method such as a cash or card, there is inconvenience to keep a record of the financial relationship each time. In this paper, we introduce an application that allows several people to easily calculate the amount of money to pay per person when eating together or calculating something. From our service, you can easily access with web-based service, manage the user's debts more conveniently through forming the group. In addition, we focused on convenient calculation of cost by setting remaining unit and reserve function which is a function to overcome the disadvantages of existing application. Also, we maintain fairness through games in situations where the users need to make a choice.

A Implementation of Electronic Measurement Datum Point Monitoring S/W based on Object-Oriented Modeling for Multi Purpose and High Availability (다목적 및 고활용성을 위한 객체지향 모델링 기반의 전자 측량기준점 모니터링 S/W 구현)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.99-112
    • /
    • 2015
  • Datum point for displaying location and altitude of point has being advantage usefully in various measurement parts. However, datum point has been increasing loss cases owing to weather changes and stratum changes and neglecting meaninglessly. In this paper, we design and implement a multi electronic measurement system monitoring software with functions such as include maximize utilization of existing measurement datum system as well as collected various environment data and detection stratum changes of surround area. Proposed software is implemented to support that reusability and extensibility of software using object oriented modeling method. Our software supports a GUI for electronic measurement datum point administrator as well as for web user and mobile user. Our system can support a graph GUI for various data analysis and reposition in realtime to database that measured location information and various sensing information to prevent loss of electronic measurement datum point and to detected stratum changes. In addition, we include a QR code and RFID recognition function. Finally, we suggest performance evaluation result to confirm stratum changes detection and GPS location error rate.

A Study on Participatory Digital Archives (참여형 디지털 아카이브 활성화 방안 연구)

  • Park, Jinkyung;Kim, You-seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.2
    • /
    • pp.219-243
    • /
    • 2017
  • This study aims to provide alternative strategies for promoting active engagement of users in participatory archives. It focuses on users and their active participation in digital archives beyond providing simple participation opportunities. In doing so, the study reviewed relevant literature that analyzes interpretation and development of participatory digital archives. Moreover, it examined several cases of participatory digital archives as to how they apply for user participation, policy, and service. As a general property, main participants, duration, and technology were examined. Technology was further subdivided into open source software, availability of Open API, availability of mobile web, and offline archives. Participation method was divided into active participation, hub participation, and passive participation according to degree of user participation, and the participation functions provided by each archive were compared and analyzed. In policy area, terms of use, personal information processing policy, copyright policy, collection policy, major collections, scope of collections, classification methods, and descriptive elements of each archive were discussed. Services were divided into content, search, and communication area. Based on such analysis, this study proposed ways for promoting active engagement of users in participatory digital archives in terms of participation, policy, content service, and communication service.

Optimal Release Problems based on a Stochastic Differential Equation Model Under the Distributed Software Development Environments (분산 소프트웨어 개발환경에 대한 확률 미분 방정식 모델을 이용한 최적 배포 문제)

  • Lee Jae-Ki;Nam Sang-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7A
    • /
    • pp.649-658
    • /
    • 2006
  • Recently, Software Development was applied to new-approach methods as a various form : client-server system and web-programing, object-orient concept, distributed development with a network environments. On the other hand, it be concerned about the distributed development technology and increasing of object-oriented methodology. These technology is spread out the software quality and improve of software production, reduction of the software develop working. Futures, we considered about the distributed software development technique with a many workstation. In this paper, we discussed optimal release problem based on a stochastic differential equation model for the distributed Software development environments. In the past, the software reliability applied to quality a rough guess with a software development process and approach by the estimation of reliability for a test progress. But, in this paper, we decided to optimal release times two method: first, SRGM with an error counting model in fault detection phase by NHPP. Second, fault detection is change of continuous random variable by SDE(stochastic differential equation). Here, we decide to optimal release time as a minimum cost form the detected failure data and debugging fault data during the system test phase and operational phase. Especially, we discussed to limitation of reliability considering of total software cost probability distribution.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Design and Implementation of HD-Class VOD Content Management System Based on H.264 (H.264 기반 HD급 VOD 콘텐츠관리시스템 설계 및 구현)

  • Min, Byoung-Won;Oh, Yong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.18-30
    • /
    • 2009
  • Recently, although the requirement of quality of VOD content has been transferred upto the class of HD, conventional management systems characterized by OS dependency are truly limited in quality of video image, stability, and compatibility of network environments. In addition most of the content management systems realize very limited capabilities for the real affairs of content management and distribution services in such an OS dependent environment. In this paper, we propose a new scheme of HD-Class VOD Content Management System to solve these problems. We design and implement the proposed system based on open sources by using H.264 video compression method. The proposed system offers high quality content management method based on opened systems and independent on-line distribution method so that it can be realized as an integrated management scheme for VOD contents. Moreover, our system solves the problems of occasional cutting-down video, small screen, and poor image quality that exist in the conventional wmv-type CMS. According to the result of performance evaluation, our system maintains sufficient performance and tolerence for the case of large scale HD content operations or fabrications. We expect that the proposed integrated DB scheme will especially be effective when the content management applications are changed from Internet Web environments to mobile terminal environments.

Comparative Research on Global Policy in ICT Accessibility for Vulnerable Groups -Focusing on Implementation of Legislative System- (취약계층을 위한 정보통신 접근성 정책에 대한 국가 간 비교 연구 -관련제도 중심으로-)

  • Kim, Jung-Yeon;Park, Sung-Woo;Kang, Byung-Gwon;Son, Chang-Yong;Jung, Bong-Keun
    • 재활복지
    • /
    • v.20 no.1
    • /
    • pp.131-150
    • /
    • 2016
  • This study aims to compare global policies on ICT accessibility and to suggest possible solutions that help to enhance ICT accessibility for socially disadvantaged groups. The results indicated that related laws and standards in Korea are relatively well established than Asian countries' whereas they need improvements when compared to the US or the UK. Particularly, in spite of rapid development in information communication technology industry, incorporating the definition of newly developed technologies into existing laws related to ICT accessibility seemed slow that caused reluctancy of related parties to address accessibility issues the new technologies create. In addition, Korean government seems less effortful to develop policies and standards apart from web and mobile application accessibility. In order to resolve the problems, firstly, the period or process of enacting and amending laws can be shorten. Next, a government affiliated research institute can be established to do research and develop ICT accessibility related to user scenarios so that effective policies and standards could be readily provided. Even though other possible solutions can be suggested, what is more important than that is that any interested parties should sustainably make efforts to provide equal opportunities for the underserved populations.