• Title/Summary/Keyword: Time-sharing

Search Result 1,436, Processing Time 0.04 seconds

Web Content Loading Speed Enhancement Method using Service Walker-based Caching System (서비스워커 기반의 캐싱 시스템을 이용한 웹 콘텐츠 로딩 속도 향상 기법)

  • Kim, Hyun-gook;Park, Jin-tae;Choi, Moon-Hyuk;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.1
    • /
    • pp.55-60
    • /
    • 2019
  • The web is one of the most intimate technologies in people's daily lives, and most of the time, people are sharing data on the web. Simple messenger, news, video, as well as various data are now spreading through the web. In addition, with the emergence of Web assembly technology, the programs that run in the existing native environment start to enter the domain of the Web, and the data shared by the Web is now getting wider and larger in terms of VR / AR contents and big data. Therefore, in this paper, we have studied how to effectively deliver web contentsto users who use Web service by using service worker that can operate independently without being dependent on browser and cache API that can effectively store data in web browser.

WiCoin : Wireless LAN Sharing Using Block Chain Technology (와이코인 : 블록체인 기술을 이용한 무선랜 공유)

  • Kim, Woo-Seong;Ryu, Kyoung-Ho;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.195-201
    • /
    • 2019
  • This paper proposes a blockchain system to share Wireless Local Area Network (WLAN) that recently suffers from mutual interference among increasing devices using unlicensed bands. Blockchain technology can induce cooperation from users by incentivizing them with cryptocurrency like shown in Bitcoin example. In this paper, we describe Blockchain based access mechanism in WLAN instead of conventional authentication based access. Here, users can access any WLAN access point by paying through smart contract while they also receive payment from others. In order to support real-time transaction, we apply proof-of-authority that is realized by Byzantine fault tolerant protocol instead of well-known proof-of-work that requires huge computing power and delay.

The Efficacy of Using a Learning-App in a Zoom-Based English Class in the Untact Era (언택트 시대 줌 기반 영어 수업에서 학습 앱 활용의 효율성)

  • Kim, Hye-Jeong
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.171-177
    • /
    • 2021
  • This study examined how the use of learning apps in Zoom-based classes affects learners' English achievement and assessed the efficiency of app use in Zoom-based English classes. The study utilized the English Central (EC) app to induce learners to actively participate in zoom-based classes. To assess the app's efficiency, two rounds of achievement tests and an open-ended questionnaire were administered. The two tests showed that Zoom-based EC app utilization classes positively affected learners' English achievement and the questionnaire revealed that the learners were highly satisfied with using the EC app in Zoom-based classes. The participants praised this approach for "complementing insufficient class content" and facilitating "immediate feedback" (on the EC app), "English practice," and "real-time communication and sharing of opinions" (on Zoom-based classes), describing it as "not boring" and "4 skill training in English." Instructors should strive to efficiently use such new teaching tools in the evolving environment of the untact era.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Psychosocial support interventions for women with gestational diabetes mellitus: a systematic review

  • Jung, Seulgi;Kim, Yoojin;Park, Jeongok;Choi, Miyoung;Kim, Sue
    • Women's Health Nursing
    • /
    • v.27 no.2
    • /
    • pp.75-92
    • /
    • 2021
  • Purpose: This study aimed to analyze the content and effectiveness of psychosocial support interventions for women with gestational diabetes mellitus (GDM). Methods: The following databases were searched with no limitation of the time period: Ovid-MEDLINE, Cochrane Library, Ovid-Embase, CINAHL, PsycINFO, NDSL, KoreaMed, RISS, and KISS. Two investigators independently reviewed and selected articles according to the predefined inclusion/exclusion criteria. ROB 2.0 and the RoBANS 2.0 checklist were used to evaluate study quality. Results: Based on the 14 selected studies, psychosocial support interventions were provided for the purpose of (1) informational support (including GDM and diabetes mellitus information; how to manage diet, exercise, stress, blood glucose, and weight; postpartum management; and prevention of type 2 diabetes mellitus); (2) self-management motivation (setting goals for diet and exercise management, glucose monitoring, and enhancing positive health behaviors); (3) relaxation (practicing breathing and/or meditation); and (4) emotional support (sharing opinions and support). Psychosocial supportive interventions to women with GDM lead to behavioral change, mostly in the form of self-care behavior; they also reduce depression, anxiety and stress, and have an impact on improving self-efficacy. These interventions contribute to lowering physiological parameters such as fasting plasma glucose, glycated hemoglobin, and 2-hour postprandial glucose levels. Conclusion: Psychosocial supportive interventions can indeed positively affect self-care behaviors, lifestyle changes, and physiological parameters in women with GDM. Nurses can play a pivotal role in integrative management and can streamline the care for women with GDM during pregnancy and following birth, especially through psychosocial support interventions.

An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment (소셜 네트워크 서비스 환경에서 개인정보보호를 위한 OpenAPI기반 보안 프레임워크)

  • Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1293-1300
    • /
    • 2012
  • With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

Complete Genome Sequencing and Infectious cDNA Clone Construction of Soybean Mosaic Virus Isolated from Shanxi

  • Wang, Defu;Cui, Liyan;Zhang, Li;Ma, Zhennan;Niu, Yanbing
    • The Plant Pathology Journal
    • /
    • v.37 no.2
    • /
    • pp.162-172
    • /
    • 2021
  • Soybean mosaic virus (SMV) is the predominant viral pathogen that affects the yield and quality of soybean. The natural host range for SMV is very narrow, and generally limited to Leguminosae. However, we found that SMV can naturally infect Pinellia ternata and Atractylodes macrocephala. In order to clarify the molecular mechanisms underlying the cross-family infection of SMV, we used double-stranded RNA extraction, rapid amplification of cDNA ends polymerase chain reaction and Gibson assembly techniques to carry out SMV full-length genome amplification from susceptible soybeans and constructed an infectious cDNA clone for SMV. The genome of the SMV Shanxi isolate (SMV-SX) consists of 9,587 nt and encodes a polyprotein consisting of 3,067 aa. SMV-SX and SMV-XFQ008 had the highest nucleotide and amino acid sequence identities of 97.03% and 98.50%, respectively. A phylogenetic tree indicated that SMV-SX and SMV-XFQ018 were clustered together, sharing the closest relationship. We then constructed a pSMV-SX infectious cDNA clone by Gibson assembly technology and used this clone to inoculate soybean and Ailanthus altissima; the symptoms of these hosts were similar to those caused by the virus isolated from natural infected plant tissue. This method of construction not only makes up for the time-consuming and laborious defect of traditional methods used to construct infectious cDNA clones, but also avoids the toxicity of the Potyvirus special sequence to Escherichia coli, thus providing a useful cloning strategy for the construction of infectious cDNA clones for other viruses and laying down a foundation for the further investigation of SMV cross-family infection mechanisms.

Policy Achievements and Tasks for Using Big-Data in Regional Tourism -The Case of Jeju Special Self-Governing Province- (지역관광 빅데이터 정책성과와 과제 -제주특별자치도를 사례로-)

  • Koh, Sun-Young;JEONG, GEUNOH
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.579-586
    • /
    • 2021
  • This study examines the application of big data and tasks of tourism based on the case of Jeju Special Self-Governing Province, which used big data for regional tourism policy. Through the use of big data, it is possible to understand rapidly changing tourism trends and trends in the tourism industry in a timely and detailed manner. and also could be used to elaborate existing tourism statistics. In addition, beyond the level of big data analysis to understand tourism phenomena, its scope has expanded to provide a platform for providing real-time customized services. This was made possible by the cooperative governance of industry, government, and academia for data building, analysis, infrastructure, and utilization. As a task, the limitation of budget dependence and institutional problems such as the infrastructure for building personal-level data for personalized services, which are the ultimate goal of smart tourism, and the Personal Information Protection Act remain. In addition, expertise and technical limitations for data analysis and data linkage remain.