• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.033 seconds

An Approach to Develop Fitness Management System Using VR Sports (VR스포츠를 활용한 사용자 피트니스 관리시스템의 개발 방법)

  • Lee, Yu-jeong;Moon, Mi-kyeong
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.978-984
    • /
    • 2018
  • Currently, virtual reality technology is actively applied in the entertainment and game fields, and development of professional programs is gradually increasing due to the rapid development of Internet and web technologies. As the current paradigm for healthcare changes from treatment to prevention, it is more important to take good care of it in advance so it doesn't get sick. This paper allows users to monitor the amount of exercise directly after using VR sports games. By using this system, users can exercise more interestingly and manage their own fitness by receiving an analyzed amount of exercise.

A Certificate Verification Method based on the Attribute Certificates (AC기반의 인증서 검증 모델)

  • Park ChongHwa;Kim JiHong;Lee ChulSoo;Kim Dongkyoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.15-24
    • /
    • 2004
  • Electronic commerce is widely used with the development of information communication technologies in internet using public key certificates. And the study for access control in Web application and DB system is also progressed actively. There are many verification method for PKC(Public Key Certificates), which are CRL, OCSP, SCVP and others. But their certificates verification methods for PKC cannot to be applied to PMI(Privilege Management Infrastructure) which is using AC(Attribute certificates) because of synchronization of PKC and AC. It is because AC has no public key, AC Verifier must get the PKC and verify the validity on PKC and AC. So in this paper we proposed the new AC-based certificate verification model. which provide the synchronization in two certificates(AC and PKC).

Accounting Education in the Era of Information and Technology : Suggestions for Adopting IT Related Curriculum (기술정보화(IT) 시대의 회계 교육 : IT교과와의 융합교육의 제안)

  • Yoon, Sora
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.91-109
    • /
    • 2021
  • Recently, social and economic environment has been rapidly changed. In particular, the development of IT technology accelerated the introduction of databases, communication networks, information processing and analyzing systems, making the use of such information and communication technology an essential factor for corporate management innovation. This change also affected the accounting areas. The purpose of this study is to document changes in accounting areas due to the adoption of IT technologies in the era of technology and information, to define the required accounting professions in this era, and to present the efficient educational methodologies for training such accounting experts. An accounting expert suitable for the era of technology and information means an accounting profession not only with basic accounting knowledge, competence, independency, reliability, communication skills, and flexible interpersonal skills, but also with IT skills, data utilization and analysis skills, the understanding big data and artificial intelligence, and blockchain-based accounting information systems. In order to educate future accounting experts, the accounting curriculum should be reorganized to strengthen the IT capabilities, and it should provide a wide variety of learning opportunities. It is also important to provide a practical level of education through industry and academic cooperation. Distance learning, web-based learning, discussion-type classes, TBL, PBL, and flipped-learnings will be suitable for accounting education methodologies to foster future accounting experts. This study is meaningful because it can motivate to consider accounting educational system and curriculum to enhance IT capabilities.

Development of AI-Based Condition Monitoring System for Failure Diagnosis of Excavator's Travel Device (굴착기 주행디바이스의 고장 진단을 위한 AI기반 상태 모니터링 시스템 개발)

  • Baek, Hee Seung;Shin, Jong Ho;Kim, Seong Joon
    • Journal of Drive and Control
    • /
    • v.18 no.1
    • /
    • pp.24-30
    • /
    • 2021
  • There is an increasing interest in condition-based maintenance for the prevention of economic loss due to failure. Moreover, immense research is being carried out in related technologies in the field of construction machinery. In particular, data-based failure diagnosis methods that employ AI (machine & deep learning) algorithms are in the spotlight. In this study, we have focused on the failure diagnosis and mode classification of reduction gear of excavator's travel device by using the AI algorithm. In addition, a remote monitoring system has been developed that can monitor the status of the reduction gear by using the developed diagnosis algorithm. The failure diagnosis algorithm was performed in the process of data acquisition of normal and abnormal under various operating conditions, data processing and analysis by the wavelet transformation, and learning. The developed algorithm was verified based on three-evaluation conditions. Finally, we have built a system that can check the status of the reduction gear of travel devices on the web using the Edge platform, which is embedded with the failure diagnosis algorithm and cloud.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

A Study on Big Data Processing Technology Based on Open Source for Expansion of LIMS (실험실정보관리시스템의 확장을 위한 오픈 소스 기반의 빅데이터 처리 기술에 관한 연구)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.161-167
    • /
    • 2021
  • Laboratory Information Management System(LIMS) is a centralized database for storing, processing, retrieving, and analyzing laboratory data, and refers to a computer system or system specially designed for laboratories performing inspection, analysis, and testing tasks. In particular, LIMS is equipped with a function to support the operation of the laboratory, and it requires workflow management or data tracking support. In this paper, we collect data on websites and various channels using crawling technology, one of the automated big data collection technologies for the operation of the laboratory. Among the collected test methods and contents, useful test methods and contents useful that the tester can utilize are recommended. In addition, we implement a complementary LIMS platform capable of verifying the collection channel by managing the feedback.

Food Security through Smart Agriculture and the Internet of Things

  • Alotaibi, Sara Jeza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.33-42
    • /
    • 2022
  • One of the most pressing socioeconomic problems confronting humanity on a worldwide scale is food security, particularly in light of the expanding population and declining land productivity. These causes have increased the number of people in the world who are at risk of starving and have caused the natural ecosystems to degrade at previously unheard-of speeds. Happily, the Internet of Things (IoT) development provides a glimmer of light for those worried about food security through smart agriculture-a development that is particularly relevant to automating food production operations in order to reduce labor expenses. When compared to conventional farming techniques, smart agriculture has the benefit of maximizing resource use through precise chemical input application and regulation of environmental factors like temperature and humidity. Farmers may make data-driven choices about the possibility of insect invasion, natural disasters, anticipated yields, and even prospective market shifts with the use of smart farming tools. The technical foundation of smart agriculture serves as a potential response to worries about food security. It is made up of wireless sensor networks and integrated cloud computing modules inside IoT.

Bibliographic and network analysis of environmental impacts to animal contagious diseases

  • Jee-Sun, Oh;Sang-Joon, Lee;Sang Jin, Lim;Yung Chul, Park;Ho-Seong, Cho;Yeonsu, Oh
    • Korean Journal of Veterinary Service
    • /
    • v.45 no.4
    • /
    • pp.253-262
    • /
    • 2022
  • The applications of artificial intelligence (AI) can provide useful solutions to animal infectious diseases and their impact on humans. The advent of AI learning algorithms and recognition technologies is especially advantageous in applied studies, including the detection, analysis, impact assessment, simulation, and prediction of environmental impacts on malignant animal epidemics. To this end, this study specifically focused on environmental pollution and animal diseases. While the number of related studies is rapidly increasing, the research trends, evolution, and collaboration in this field are not yet well-established. We analyzed the bibliographic data of 1191 articles on AI applications to environmental pollution and animal diseases during the period of 2000~2019; these articles were collected from the Web of Science (WoS). The results revealed that PR China and the United States are the leaders in research production, impact, and collaboration. Finally, we provided research directions and practical implications for the incorporation of AI applications to address environmental impacts on animal diseases.

Towards Semantic Healthcare with Interoperable Processes (시맨틱 헬스케어를 위한 상호정보교환 프로세스)

  • Khan, Wajahat Ali;Hussain, Maqbool;Khattak, Asad Masood;Lee, Sung-Young;Gu, Gyo-Ho;Lee, Young-Koo
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.414-415
    • /
    • 2011
  • Due to heterogeneity in Data and Processes, healthcare systems are facing the challenge of interoperability. This heterogeneity results in different healthcare workflows of each individual organization. The compatibility of these heterogeneous workflows is possible when standards are followed. HL7 is one of the standards that is used for communicating medical data between healthcare systems. Its newer version V3 is providing semantic interoperability which is lacking in V2. The interoperability in HL7 V3 is only limited to data level and process level interoperability needs to be catered. The process level interoperability is achieved only when heterogeneous workflows are aligned. These workflows are very complex in nature due to continuous change in medical data resulting in problems related to maintenance and degree of automation. Semantic technologies plays important role in resolving the above mentioned problems. This research work is based on the integration of semantic technology in HL7 V3 standard to achieve semantic process interoperability. Web Service Modeling Framework (WSMF) is used for incorporating semantics in HL7 V3 processes and achieves seamless communication. Interaction Ontology represents the process artifacts of HL7 V3 and helps in achieving automation.

A Study on the Developing the Digital Library for Children and Youth (어린이.청소년 디지털도서관 설계에 관한 연구)

  • Kwak, Seung-Jin;Kang, Ji-Hei
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.18 no.1
    • /
    • pp.45-59
    • /
    • 2007
  • The purpose of this study is to show important considerations when we develop digital library though reviewing and analyzing the digital libraries for the children and youth. The research targets are ICDL and LG Scienceland which are functioning as the digital libraries. The research methods are literary reviews for theory background and analysis of distinctive features from two webpages. As a result of the research. some suggestions for the navigation. labeling. searching. design and interface, content and new technologies that can be employed are made.