• Title/Summary/Keyword: Web-traffic

Search Result 366, Processing Time 0.029 seconds

Mobile Eye Tracker and for Use of the Same for Revitalizing Studies on Eye Tracking (아이트래킹 연구 활성화를 위한 모바일 아이트래커의 활용)

  • Seo, Eun-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.10-18
    • /
    • 2016
  • The cognitive ability of humans depends much on the vision. 'Vision' refers to the sense that receives stimulus of light through eyes. 'Gaze' refers to a function of a straight line that connects the central point of the pupil and a viewpoint in the external world, and, in general, it means a straight line that connects an object that is viewed and the eyes. There are active studies on the gaze in various academic circles including 'psychology' and 'cognitive linguistics.' As a method to objectively analyze the gaze, studies on 'eye tracking' are revitalized. A device for studies on eye tracking is an 'eye tracker.' As the fields of the study expand from development and analysis of Web pages to analysis of stores, methods of traffic signal processing, transport equipment, analysis of user experiences on image contents, and marketing analysis, there occurs a greater demand for a glasses eye-tracking than that for a fixed eye tracker. This study identifies the overview and characteristics of eye tracking and presents a way for spreading studies on eye tracking.

A Quantitative Assessment Model of Private Information Breach (기업의 개인정보 유출로 인한 경제적 피해규모 산출방법)

  • Han, Chang-Hee;Chai, Seung-Wan;Yoo, Byung-Joon;Ahn, Dae-Hwan;Park, Chae-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.17-31
    • /
    • 2011
  • Damage caused by private information breach causes serious problems and huge social losses. In order to make a better policy that prevents society from suffering from the damage, we have to know about the actual size of damage. So it is needed to develop a quantitative model of private information breach that helps catching the more accurate size of damage. In our study, we suggest a method which calculate not only the costs of damage from firms' perspective but also those from individual and social perspectives. In this process, we refer to methods adopted by JNSA(Japan Network Security Association) and Ponemon Research Institue and modify it with considering our current situation. Also we try to make a new model by using new methods(web traffic analysis, survey, indirect comparison, etc.) and verify it with theories and methods from econometrics, cost accounting and theory of producer.

RDBMS Based Efficient Method for Shortest Path Searching Over Large Graphs Using K-degree Index Table (대용량 그래프에서 k-차수 인덱스 테이블을 이용한 RDBMS 기반의 효율적인 최단 경로 탐색 기법)

  • Hong, Jihye;Han, Yongkoo;Lee, Young-Koo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.5
    • /
    • pp.179-186
    • /
    • 2014
  • Current networks such as social network, web page link, traffic network are big data which have the large numbers of nodes and edges. Many applications such as social network services and navigation systems use these networks. Since big networks are not fit into the memory, existing in-memory based analysis techniques cannot provide high performance. Frontier-Expansion-Merge (FEM) framework for graph search operations using three corresponding operators in the relational database (RDB) context. FEM exploits an index table that stores pre-computed partial paths for efficient shortest path discovery. However, the index table of FEM has low hit ratio because the indices are determined by distances of indices rather than the possibility of containing a shortest path. In this paper, we propose an method that construct index table using high degree nodes having high hit ratio for efficient shortest path discovery. We experimentally verify that our index technique can support shortest path discovery efficiently in real-world datasets.

The traffic performance evaluation between remote server and mobile for applying to encryption protocol in the Wellness environment (웰니스 환경에서 암호화 프로토콜 적용을 위한 모바일과 원격 서버간 트래픽 성능 평가)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lee, Jae-Kwang
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.415-420
    • /
    • 2013
  • U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in order to look into the influence that the encryption module influences on the communication evaluation in the biometric information transmission gone to the smart mobile device and Hospital Information System.In the case of the U-WHS model, the client used the Objective-c programming language for software development of iOS Xcode environment and SEED and HIGHT encryption module was applied. In the case of HIS, the MySQL which is the Websocket API of the HTML5 and relational database management system for the client and inter-server communication was applied. Therefore, in WIFI communication environment, by using wireshark, data transfer rate of the biometric information, delay and loss rate was checked for the evaluation.

WAP Protocol Adaptation Requirements for Internet Service of Portable Handset in the Wireless Environment (무선 휴대 단말기 환경에서의 인터넷 서비스를 위한 WAP 프로토콜 수용방안)

  • 권영미;조웅기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.363-367
    • /
    • 1999
  • As the subscription rate to both Internet services and wireless communications services increases rapidly, traffic in the future wireless communications will be dominated by Internet applications. Current research for wireless technology is focused to the multimedia data transmission mainly for the personal computer or notebook whose display which has large display and abundant memory. But in the near future, Internet access request from the handphone or PDA device which is already spreaded in the world will be large. Special handset terminals which has small display monitor, low capacity memory and poor processing power has to be managed differently from torrent wireless communications protocols. So, WAP Forum is organized with wireless handset manufacturers in the world and the standardization process for wireless application is being actively developed. In this paper, basic model and architecture of WAP is introduced and adaptation requirements for change from HTML documents to WML formats are proposed. Also, compression ratio gained in the transform from the existing web documents to WML is shown.

  • PDF

Performance Analysis of Smartphone based u-NMS (스바트폰 기반의 u-NMS 성능 분석)

  • Kim, Chae-Hwan;Sohn, Woo-Jin;Lee, Kyung-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.608-617
    • /
    • 2011
  • ubiquitous network management system (u-NMS) is the network management system based on smartphone which are recently of wide use. The purpose of the u-NMS is to provide convenience for network administrator utilizing the mobility of smartphone and to manage the network efficiently. This paper proposes the smart NMS agent and the mobility management server (MMS). The smart NMS agent enables to use the monitoring web server and remote control application on the smartphone in wireless network. The MMS is developed to reduce the problems such as handover latency and packet loss, which can be taken place in wireless network. The network manager can monitor traffic in real time through the smart NMS agent and remotely control the network efficiently when sudden failures happen in the u-NMS. In this paper, performance evaluation is carried out with our test-bed system implemented. We focus on the measurement of the MMS performance. When the MMS is compared to previous mobility management protocol, our mobility management server reduces the average latency up to 65% in initial access, handover latency and processing delay to the network management center.

A Case Study on Mobile Advertisement Injection (모바일 광고 인젝션 사례 연구)

  • Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1049-1058
    • /
    • 2017
  • The rapid evolution of mobile technologies and proliferation of mobile devices have created a new channel for marketing by mobile advertising. As mobile advertising is a close relative to online advertising, it also has similar problems such as advertisement injections (Ad injections). Users are exposed to unwanted advertisements and redundant web traffic by injected ads can cause additional charges of mobile devices. Although mobile ad injection can cause many problems it has been merely studied. In this paper, we analyze ad injection activities by mobile applications that exploit a legitimate application (Naver mobile application). We reverse-engineered 2 mobile applications and find out characteristics of mobile ad injections. We compare mobile ad injections with online ad injections and suggest feasible mitigations.

Construction of IoT Environment for XMPP Protocol Based Medical Devices Using Powershell (Powershell을 이용한 안전한 XMPP 프로토콜 기반의 의료기기 IoT환경 구축 제안)

  • Park, Yeon-Jin;Lee, Kuen-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.15-20
    • /
    • 2016
  • MicroSoft Windows 10 IoT version, released in August 2015, successfully drew consumer interest by introducing the familiar Windows into the IoT market, and enabled an easier system construction of IoT web servers. Meanwhile, overdiagnosis has recently emerged as a controversy in medical society. Establishment of communication between IoT servers and medical devices will send treatment results to users and activate communication between hospitals, greatly reducing this problem. The IoT server, with its limited resources, utilizes lightweight protocols that do not generate traffic and are easy to use. This paper proposes IoT networks which will enable medical devices to easily provide ubiquitous environments to their users, through utilization of the lightweight Simple Service Discovery Protocol (SSDP) and the secure Extensible Messaging and Presence Protocol (XMPP).

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

The Influence of Personality Traits on Airline Untact Check-in: Focusing on Mobile Check-in User

  • YANG, Jae-Pil;PARK, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.15-30
    • /
    • 2021
  • Purpose: Year of 2020, COVID-19 has been changing the people's everyday life to ways never been thought of before all over the world. The IT and electronic industry, the methods of supplying goods and services have been changed from contact to un-tact environments based on un-tact systems very rapidly. COVID-19 has been striking the tourism and the travel industry, especially the airline and hotel industry of which services are provided by human. For the passenger service of airliner, automation has been propelled and un-tact style of service has become mainstreams except cabin service since 2000's. For passenger transportation, due to traffic regulations and exclusions etc., switching to new ways is not easy. However, under the new environment made by COVID-19, kiosk check-in, web check-in and mobile check-in has become more important. In this study, the characteristics of airline customers using mobile goods are investigated to find ways to raise the rate of utilizing mobile check-in and to increase the efficiency of boarding process. Research design, data, and methodology: Considering the COVID-19 environment, survey was done by online research company. The research model is designed to integrate the user characteristics and usage/purchase motive and technology acceptance theory. Especially considering infectious diseases prevention, concern of safety is adopted as one of the usage motive variable. Results: Extraversion or conscientiousness characteristics prefers counter check-in(contact service), while openness characteristics prefers mobile check-in(un-tact service). Concern of safety for infectious disease shows strong non-preference on counter check-in. Conclusions: Regarding service type regardless of type of the industry, automation and un-tact have been mainstreams due to high costs of labor, efficiency and standardization issue, etc., and COVID-19 has given impetus to them. For airliner, un-tact service including boarding process service has been more and more important. To raise the rate of un-tact service use, the characteristics of the user should be analyzed first. The study results indicate that for extraversion or conscientiousness, some kinds of methods to induce them to use un-tact service more are needed.