• Title/Summary/Keyword: Web-browser's

Search Result 189, Processing Time 0.026 seconds

Implementation of a Template-Based Authoring Tool for Multimedia Content (템플릿 기반 멀티미디어 컨텐트 저작도구 구현)

  • 고현일;성미영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.368-376
    • /
    • 2004
  • Currently, the package tools and software development kits of Microsoft's Windows Media Technology provides users an environment to write, distribute and play multimedia contents. However, it is very difficult for common users to create a media streaming content using the Windows Media technology, because of its technical hardship. Therefore, we developed an easy-to-use authoring tool for multimedia streaming content which can be used in the Windows Media Technology environment. Our authoring tool is based on the web page templates by which HTML codes can be generated automatically. Using the existing streaming media authoring tool provided by the Microsoft, users have to code the temporal markers and the event script commands directly to the ASF(Advanced Systems Format) files or ASX (ASF Stream Redirector) format files. We developed an easy-to-use interface for insetting temporal markers and the event script commands to the ASF files by simple mouse clicking and dragging to minimize the effort of users for creating multimedia streaming content. In addition, we implemented an ASX file creation wizard that allows users to create ASX format file without coding ASX tags. We also implemented various web page templates where the ASF files and the ASX files can be embedded by just clicking the corresponding templates. The target web pages can be automatically generated from those templates and previewed directly on the web browser at the time of creation.

  • PDF

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Security of Password Vaults of Password Managers (패스워드 매니저의 패스워드 저장소 보안 취약점 분석)

  • Jeong, Hyera;So, Jaewoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1047-1057
    • /
    • 2018
  • As the number of services offered on the Internet exponentially increases, password managers are increasing popular applications that store several passwords in an encrypted database (or password vault). Browser-integrated password managers or locally-installed password managers store the password vault on the user's device. Although a web-based password manager stores the password vault on the cloud server, a user can store the master password used to sign in the cloud server on her device. An attacker that steals a user's encrypted vault stored in the victim's device can make an offline attack and, if successful, all the passwords in the vault will be exposed to the attacker. This paper investigates the vulnerability of the password vault stored in the device and develops attack programs to verify the vulnerability of the password vault.

A Prefetch Policy for Large Spatial Data in Distributed Environment (분산환경에서 대용량 공간데이타의 선인출 전략)

  • Park, Dong-Ju;Lee, Seok-Ho;Kim, Hyeong-Ju
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1404-1417
    • /
    • 1999
  • 웹과 같은 분산 환경에서는, 웹 브라우저 상에서 SQL 형식의 공간 질의를 수행시키는 것과 또한 서버로부터 그 질의 결과를 보는 것이 가능하다. 그러나, 격자 이미지(raster image)와 같은 대용량 공간 데이타를 포함하는 질의 결과를 웹 브라우징할 때 발생하는 많은 문제점들 중에서, 사용자 응답 시간의 지연은 매우 중요한 문제이다. 본 논문에서는 사용자의 재요청(callback) 접근 패턴이 공간적 근접성(spatial locality)을 따른다는 가정하에서의, 사용자 응답 시간을 최소화하기 위한 새로운 프리페치(prefetch) 전략에 대해서 서술한다. 본 논문의 프리페치 전략은 다음과 같이 요약될 수 있다. 첫째, 프리페치 알고리즘은 사용자의 접근 패턴을 잘 반영하는 힐버트 곡선(Hilbert-curve) 모델을 바탕으로 한다. 둘째, 프리페치 전송 비용을 줄이기 위해서 사용자의 재요청 시간 간격(think time)을 이용한다. 본 논문에서는, 힐버트 곡선을 이용한 프리페치 전략의 성능 평가를 위해서 다양한 실험을 하였으며, 그 결과로 프리페치를 하지 않는 방식보다 높은 성능 향상이 있음을 보인다.Abstract In distributed environment(e.g., WWW), it would be possible for the users to submit SQL-like spatial queries and to see their query results from the server on the Web browser. However, of many obstacles which result from browsing query results including large spatial data such as raster image, the delay of user response time is very critical. In this paper we present a new prefetch policy which can alleviate user response time on the assumption that user's callback access pattern has spatial locality. Our prefetch policy can be summerized as follows: 1) our prefetch algorithm is based on the Hibert-curve model which well replects user's access pattern, and 2) it utilizes user's callback interval to reduce prefetch network transmission cost. In this paper we conducted diverse experiments to show that our prefetch policy achieves higher performance improvement compared to other non-prefetch methods.

Dynamic Power Management for Webpage Loading on Mobile Devices (모바일 웹 페이지 로딩에서 동적 관리 기법)

  • Park, Hyunjae;Choi, Youngjune
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1623-1628
    • /
    • 2015
  • As the performance of mobile devices has increased, high-end multicore CPUs have become the norm in smartphones. However, such high performance devices are exposed to the problem of battery depletion due to the energy consumption caused by software performance, and despite increases in battery capacity. The required resources are dynamic and varied, and further user interaction is highly random; thus, Linux-based power management such as DVFS is needed to fulfill requirements. In order to reduce power consumption, we propose a method to restrict the CPU frequency of data download while maintaining user reactivity. This can supplement the weakness of existing Linux-based power management techniques like DVFS in relation to webpage loading. Through the implementation of our method at the application level, we confirm that energy consumption from webpage loading is reduced.

Analysis of Users' Gestures by Application in Smartphone Touch Interfaces (스마트폰 터치 인터페이스에서 애플리케이션별 사용자 제스처의 분석)

  • Kim, Jisun;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.9-14
    • /
    • 2015
  • Touch interface is widely used in a smartphone instead of a keyboard or a keypad interface that has been adopted in a PC or a featurephone, respectively. Touch interface can recognize a variety of gestures that clearly represent the distinct features of each application's input. This paper analyzes users' gesture of each application captured by the touch interface of a smartphone. Specifically, we extract touch input traces from various application categories such as game, web browser, youtube, image and e-book viewer, video player, camera, and map applications, and then analyzed them. Through this analysis, we observed a certain unique characteristics of each application's touch input, and this can be utilized in various useful areas such as identification of an application user, prevention of running an application by an illegal user, or design of a new interface convenient to a specific user.

Implimentation of MMS using JNI (JNI를 이용한 MMS 구현)

  • Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Manufacturing Message Specification (MMS) is designed as a communication standard protocol, ISO/IEC 9506, on factory automation for messaging between heterogeneous programmable unit controller, PLC, NC, Robot, of different vendors on the networks. MMS is also a standard protocol of OSI reference model application layer, In this paper, we show an implementation of MMS over TCP/IP using ANSI-C programming language on the unix environment, and make java classification using java native interface (NJI) with MMS library. The use of java classification provides a basic environment ot overcome a difficult programming with different MMS application programming interface (MMS-I) which requires a siklled programming technique of graphic user interface (GUI). In this paper, we implement a MMS application program of the automated assembly model for printed circuit board based on WWW which shows the operation, control and monitoring of real manufacturing device (RMD) with web browser providing users for consistent user interface.

  • PDF

The Implementation of the Knowledge Potal-based Knowledge Management System in University (지식포털기반 대학지식경영시스템 구축)

  • Kim, Se-Ihn
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.21-38
    • /
    • 2003
  • The college and university is a knowledge-centered organization, and 'knowledge' is the important strategic resource. Although this organization composed entirely of the knowledge worker that is able to use the knowledge in the most efficient and effective method, our university is not enough to manage the knowledge as strategic advantage. So, we need to implement knowledge management system under knowledge community centered in students, faculty and staff. The well-designed knowledge community can produce a new value and profit that can develope the university organization. We used to the portal technology defined as a personalized, single point of access through a web browser to various information located inside and outside of an university Knowledge portal supporting the activities of knowledge community will improve the knowledge transfer in student's learning activity, the knowledge creation in faulty's research activity, the knowledge sharing amount the various communities, and the accumulation of a process knowledge in operation and management. Eventually, a redesigned knowledge portal-based system will create a new value of university.

  • PDF

A Study on the Link Server Development Using B-Tree Structure in the Big Data Environment (빅데이터 환경에서의 B-tree 구조 기반 링크정보 관리서버의 개발)

  • Park, Sungbum;Hwang, Jong Sung;Lee, Sangwon
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.75-82
    • /
    • 2015
  • Major corporations and portals have implemented a link server that connects Content Management Systems (CMS) to the physical address of content in a database (DB) to support efficient content use in web-based environments. In particular, a link server automatically connects the physical address of content in a DB to the content URL shown through a web browser screen, and re-connects the URL and the physical address when either is modified. In recent years, the number of users of digital content over the web has increased significantly because of the advent of the Big Data environment, which has also increased the number of link validity checks that should be performed in a CMS and a link server. If the link validity check is performed through an existing URL-based sequential method instead of petabyte or even etabyte environments, the identification rate of dead links decreases because of the degradation of validity check performance; moreover, frequent link checks add a large amount of workload to the DB. Hence, this study is aimed at providing a link server that can recognize URL link deletion or addition through analysis on the B-tree-based Information Identifier count per interval based on a large amount of URLs in order to resolve the existing problems. Through this study, the dead link check that is faster and adds lower loads than the existing method can be performed.

Home Health Care Service Using Routine Vital Sign Checkup and Electronic Health Questionnaires (주기적인 생리변수 측정과 전자건강설문을 이용한 재택건강관리서비스)

  • 박승훈;우응제;이광호;김종철
    • Journal of Biomedical Engineering Research
    • /
    • v.22 no.5
    • /
    • pp.469-477
    • /
    • 2001
  • In this Paper. we describe a home health care service using electronic health questionnaires and routine checkup of vital signs Including ECG (Electrocardiography) , blood pressure. and SpO$_2$ (Oxygen Saturation) . This system is for patients at home with chronic diseases, discharged Patients, or any normal people for the Prevention of disease The service requires a home health care terminal and a PC with Interned connection installed at Patient home. The distance health care management center is equipped with a vital-sign and questionnaire interpreter as well as database, Web, and notification servers with UMS (Unified Messaging System). Participating Physician can access the servers at the center using a Web browser running on a PC available to them at any time. These components are linked together through various kinds of data and voice communication channels including PSTN (Public Switched Telephone Network) . CATV(Community Antenna TV) . Interned. and mobile communication network. Following the Physician's direction given to a Patient. he or she uses the home health care terminal to collect vital signs and fill out the questionnaire. When the terminal automatically transmits these data to the management center. the data interpreter and servers at the center process the information fo1lowing the Protocol implemented on the system. Physicians can retrieve and review data corresponding to their Patients and send back their diagnostic reports to the center. UMS at the center delivers the physician 's recommendation to the corresponding patient through the notification server. Patients can also reprieve and review their own records as well as diagnostic reports from physicians. The system Provides a new way of collecting diagnostic information and delivering doctor's recommendation to patients at home for their health management. Future works are needed in the development of new technology for measurements and interpretations of various vital signs .

  • PDF