• Title/Summary/Keyword: Web-page

Search Result 675, Processing Time 0.031 seconds

Design of Customized e-Business Training Supporting System (E-TSS) for Developing Countries (개발도상국을 위한 맞춤형 E-비즈니스 교육지원시스템 설계)

  • Kim, Kio-Chung;Yu, Soo-Kyung
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.617-624
    • /
    • 2008
  • Global economy is moving to digital economy accelerated by the rapid development of ICT (information and communication technology). However, the progress in e-business in developing countries has been slow due to the lack of experience, technology, and basic infra structure. One way to solve this problem is to provide them with customized e-business solution, training, and contents service. In this paper, we design an E-business Training Supporting System (E-TSS) for developing countries. It consists of a simple business blog to support business web page and a customized e-business solution. The E-TSS is customized for individual country. This customization becomes more effective utilizing an intelligent agent based upon recognizing unique characteristics such as language and time. The E-TSS is implemented and utilized by APEC (Asia-Pacific Economic Cooperation) Women's e-Biz Center.

  • PDF

REMOTE NUMERICAL SIMULATIONS OF THE INTERACTION OF HIGH VELOCITY CLOUDS WITH RANDOM MAGNETIC FIELDS

  • Santikkan, Alfredo;Hernandez-Cervantes, Liliana;Gonzalez-Ponce, Alejandro;Kim, Jong-Soo
    • Journal of The Korean Astronomical Society
    • /
    • v.40 no.4
    • /
    • pp.165-169
    • /
    • 2007
  • The numerical simulations associated with the interaction of High Velocity Clouds (HVC) with the Magnetized Galactic Interstellar Medium (ISM) are a powerful tool to describe the evolution of the interaction of these objects in our Galaxy. In this work we present a new project referred to as Theoretical Virtual i Observatories. It is oriented toward to perform numerical simulations in real time through a Web page. This is a powerful astrophysical computational tool that consists of an intuitive graphical user interface (GUI) and a database produced by numerical calculations. In this Website the user can make use of the existing numerical simulations from the database or run a new simulation introducing initial conditions such as temperatures, densities, velocities, and magnetic field intensities for both the ISM and HVC. The prototype is programmed using Linux, Apache, MySQL, and PHP (LAMP), based on the open source philosophy. All simulations were performed with the MHD code ZEUS-3D, which solves the ideal MHD equations by finite differences on a fixed Eulerian mesh. Finally, we present typical results that can be obtained with this tool.

Development and Evaluation of e-EBPP(Evidence-Based Practice Protocol) System for Evidence-Based Dementia Nursing Practice (근거중심 치매 간호실무를 위한 e-EBPP 시스템 개발 및 평가)

  • Park, Myonghwa
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.3
    • /
    • pp.411-424
    • /
    • 2005
  • Purpose: The purpose of this study was to develop and evaluate e-EBPP(Evidence-based Practice Protocol) system for nursing care for patients with dementia to facilitate the best evidence-based decision in their dementia care settings. Method: The system was developed based on system development life cycle and software prototyping using the following 5 processes: Analysis, Planning, Developing, Program Operation, and Final Evaluation. Result: The system consisted of modules for evidence-based nursing and protocol, guide for developing protocol, tool for saving, revising, and deleting the protocol, interface tool among users, and tool for evaluating users' satisfaction of the system. On the main page, there were 7 menu bars that consisted of Introduction of site, EBN info, Dementia info, Evidence Based Practice Protocol, Protocol Bank, Community, and Site Link. In the operation of the system, HTML, JavaScript, and Flash were utilized and the content consisted of text content, interactive content, animation, and quiz. Conclusion: This system can support nurses' best and cost-effective clinical decision using sharable standardized protocols consisting of the best evidence in dementia care. In addition, it can be utilized as an e-learning program for nurses and nursing students to learn use of evidence based information.

  • PDF

Snippet Extraction Method using Fuzzy (퍼지를 이용한 스니핏 추출 방법)

  • Park, Sun;Choi, Myeong Su;Kim, Cheong Ho;Kim, Cheong Uck;Na, Hee Kun;Choi, Seock Whan;Kumar, Shiu;Lee, Seong Ro
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.387-388
    • /
    • 2012
  • In order to solve problem which User sometime visits the wrong page with respect to user intention when uses snippet. this paper proposes a new snippet extraction method using fuzzy. The proposed method uses pseudo relevance feedback to expand the use's query. It uses the fuzzy association between the expanded query and the web pages to extract snippet to be well reflected semantic user's intention.

  • PDF

Teleoperation System of a Mobile Robot over the Internet (인터넷을 이용한 이동로봇의 원격 운용 시스템)

  • Park, Taehyun;Gang, Geun-Taek;Lee, Wonchang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.3
    • /
    • pp.270-274
    • /
    • 2002
  • This paper presents a teleoperation system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision over the Internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a web browser and a computer connected to the communication network and so they can command the robot in a remote location through the home page. The hardware architecture of this system consists of an autonomous mobile robot, workstation, and local computers. The software architecture of this system includes the client part for the user interface and robot control as well as the server part for communication between users and robot. The server and client systems are developed using Java language which is suitable to internet application and supports multi-platform. Furthermore. this system offers an image compression method using JPEG concept which reduces large time delay that occurs in network during image transmission.

A Splog Detection System Using Support Vector Systems (지지벡터기계를 이용한 스팸 블로그(Splog) 판별 시스템)

  • Lee, Song-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.163-168
    • /
    • 2011
  • Blogs are an easy way to publish information, engage in discussions, and form communities on the Internet. Recently, there are several varieties of spam blog whose purpose is to host ads or raise the PageRank of target sites. Our purpose is to develope the system which detects these spam blogs (splogs) automatically among blogs on Web environment. After removing HTML of blogs, they are tagged by part of speech(POS) tagger. Words and their POS tags information is used as a feature type. Among features, we select useful features with X2 statistics and train the SVM with the selected features. Our system acquired 90.5% of F1 measure with SPLOG data set.

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.

Development of A Prototype Device to Capture Day/Night Cloud Images based on Whole-Sky Camera Using the Illumination Data (정밀조도정보를 이용한 전천카메라 기반의 주·야간 구름영상촬영용 원형장치 개발)

  • Lee, Jaewon;Park, Inchun;cho, Jungho;Ki, GyunDo;Kim, Young Chul
    • Atmosphere
    • /
    • v.28 no.3
    • /
    • pp.317-324
    • /
    • 2018
  • In this study, we review the ground-based whole-sky camera (WSC), which is developed to continuously capture day and night cloud images using the illumination data from a precision Lightmeter with a high temporal resolution. The WSC is combined with a precision Lightmeter developed in IYA (International Year of Astronomy) for analysis of an artificial light pollution at night and a DSLR camera equipped with a fish-eye lens widely applied in observational astronomy. The WSC is designed to adjust the shutter speed and ISO of the equipped camera according to illumination data in order to stably capture cloud images. And Raspberry Pi is applied to control automatically the related process of taking cloud and sky images every minute under various conditions depending on illumination data from Lightmeter for 24 hours. In addition, it is utilized to post-process and store the cloud images and to upload the data to web page in real time. Finally, we check the technical possibility of the method to observe the cloud distribution (cover, type, height) quantitatively and objectively by the optical system, through analysis of the captured cloud images from the developed device.

How to Promote the Korean Journal of Child Studies to an International Journal (아동학회지를 어떻게 국제화시킬 것인가?)

  • Huh, Sun
    • Korean Journal of Child Studies
    • /
    • v.37 no.1
    • /
    • pp.7-16
    • /
    • 2016
  • Objective: It aimed at proposing the Korean Journal of Child Studies' strategy to be promoted to international journal based on the style and format of scholarly journals and journal metrics. Methods: The review of the journal in not only print version, but also an online version was done from the perspective of style and format. The total citation and impact factor were manually calculated from Web of Science Core Collection. Results: More professional level manuscript editing is required for maintaining the consistency of the style and format. The verso page and back matters should be improved to international level. Journal homepage should be reconstructed by adopting digital standards for the journal, including journal article tag suite, CrossMark, FundRef, ORCID, and text and data mining. To become an international journal, transformation into English journal and deposition to PubMed Central is mandatory. Conclusion: Since the editor's and society members' performance is top-notch, it will be possible to promote the journal up to international level soon. Society should guarantee the term of editor for enough time and support her with full cost and complete consent.

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF