• Title/Summary/Keyword: browser

Search Result 829, Processing Time 0.028 seconds

A Study on User Interface and Control Method of Web-based Remote Control Platform (웹 기반 원격제어 플랫폼의 사용자 인터페이스와 제어 기법에 관한 연구)

  • Lee, Kangwon;Shin, Yejin;Lee, Yeonji;Seol, Soonuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.827-837
    • /
    • 2017
  • Since the area of smart home has been attracting attention, researches have been conducted to control syntagmatically various electronic products with a single remote controller. Previous researches have developed a dedicated controller or an application that acts as a remote controller and controls electronic products by configuring control screen for each product. However, these approaches are not suitable for controlling various electronic products that should be controlled by configuring separate control screens for each product. In this paper, we propose a web-based remote control platform. We define universal user interfaces applicable to various devices by categorizing user interactions of electronic goods and implement them as APIs. By applying the APIs to IPTV and car navigation devices we show that it is possible to control them through only a web browser. We also propose a method to group multiple control requests in order to efficiently handle consecutive control requests and show the improved response time and data usage.

Spring Boot-based Programming Education and Online Scoring System (Spring boot 기반의 프로그래밍 교육 및 온라인 채점 시스템)

  • Cho, Minwoo;Lee, Taejun;Choi, Jiyoung;Lee, Sungock;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.450-452
    • /
    • 2021
  • Recently, as interest in programming and artificial intelligence has increased, software education has been compulsory from elementary school. In order to achieve this goal of programming education, it is necessary to basically establish a lab environment suitable for students and teachers. However, there is a problem with performance problems caused by old computers in the lab environment of the school, and there is a problem that students must purchase and use the existing online platform while implementing an algorithm contest program in which students access and evaluate their problem-solving ability at the same time. Therefore, in this paper, to solve this problem, we propose a web-based online practice environment and algorithm contest scoring system using React and Spring boot. Through this, it is believed that even in a computer with low specifications, programming can be studied using only a web browser.

  • PDF

"Where can I buy this?" - Fashion Item Searcher using Instance Segmentation with Mask R-CNN ("이거 어디서 사?" - Mask R-CNN 기반 객체 분할을 활용한 패션 아이템 검색 시스템)

  • Jung, Kyunghee;Choi, Ha nl;Sammy, Y.X.B.;Kim, Hyunsung;Toan, N.D.;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.465-467
    • /
    • 2022
  • Mobile phones have become an essential item nowadays since it provides access to online platform and service fast and easy. Coming to these platforms such as Social Network Service (SNS) for shopping have been a go-to option for many people. However, searching for a specific fashion item in the picture is challenging, where users need to try multiple searches by combining appropriate search keywords. To tackle this problem, we propose a system that could provide immediate access to websites related to fashion items. In the framework, we also propose a deep learning model for an automatic analysis of image contexts using instance segmentation. We use transfer learning by utilizing Deep fashion 2 to maximize our model accuracy. After segmenting all the fashion item objects in the image, the related search information is retrieved when the object is clicked. Furthermore, we successfully deploy our system so that it could be assessable using any web browser. We prove that deep learning could be a promising tool not only for scientific purpose but also applicable to commercial shopping.

Nitric Oxide-Induced Downregulation of a NAD(P)-Binding Rossmann-Fold Superfamily Gene Negatively Impacts Growth and Defense in Arabidopsis thaliana

  • Tiba Nazar Ibrahim Al Azawi;Murtaza Khan;Bong-Gyu Mun;Song-Uk Lee;Da-sol Lee;Waqas Rahim;Anjali Pande;Nusrat Jahan Methela;Cho-Jun Ho;Byung-Wook Yun
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.143-143
    • /
    • 2022
  • Plant defense systems against pathogens have been studied extensively and are currently a hot topic in plant science. Using a reverse genetics technique, this study looked into the involvement of the NO-downregulated NAD(P)-binding Rossmann-fold superfamily gene in plant growth and defense in Arabidopsis thaliana. For this purpose, the knockout and overexpressing plant of the candidate gene along with the relevant controls were exposed to control, oxidative and nitro-oxidative stresses. The results showed that candidate gene negatively regulates plants' root and shoot lengths. To investigate the role of the candidate gene in plant basal defense, R-gene-mediated resistance and systemic acquired resistance (SAR) plants were challenged with virulent or avirulent strains of Pseudomonas syringae pathovar tomato (Psf) DC3000. The results showed that the candidate gene negatively regulates plants' basal defense, R-gene-mediated resistance and SAR. Further characterization via GO analysis associated the candidate gene with metabolic and cellular processes and response to light stimulus, nucleotide binding and cellular location in the cytosol and nucleus. Protein structure analysis indicated the presence of a canonical Oxidoreductase family NAD (P)-binding Rossmann fold domain of 120 amino acids with a total of 121 plant homologs across 35 different plant species in the clad streptophyta. Arabidopsis eFP browser showed its expression in almost all the above-ground parts. Protein analysis indicated C225 and C359 as potential targets for S-Nitrosylation by NO. SMART analysis indicated possible interactions with mevalonate/galactokinase, galacturonic acid kinase, arabinose kinase, putative xylulose kinase, GroES-like zinc-binding alcohol dehydrogenase and various glyceraldehyde-3-phosphate dehydrogenases.

  • PDF

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Design and Implementation of a Similarity based Plant Disease Image Retrieval using Combined Descriptors and Inverse Proportion of Image Volumes (Descriptor 조합 및 동일 병명 이미지 수량 역비율 가중치를 적용한 유사도 기반 작물 질병 검색 기술 설계 및 구현)

  • Lim, Hye Jin;Jeong, Da Woon;Yoo, Seong Joon;Gu, Yeong Hyeon;Park, Jong Han
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.30-43
    • /
    • 2018
  • Many studies have been carried out to retrieve images using colors, shapes, and textures which are characteristic of images. In addition, there is also progress in research related to the disease images of the crop. In this paper, to be a help to identify the disease occurred in crops grown in the agricultural field, we propose a similarity-based crop disease search system using the diseases image of horticulture crops. The proposed system improves the similarity retrieval performance compared to existing ones through the combination descriptor without using a single descriptor and applied the weight based calculation method to provide users with highly readable similarity search results. In this paper, a total of 13 Descriptors were used in combination. We used to retrieval of disease of six crops using a combination Descriptor, and a combination Descriptor with the highest average accuracy for each crop was selected as a combination Descriptor for the crop. The retrieved result were expressed as a percentage using the calculation method based on the ratio of disease names, and calculation method based on the weight. The calculation method based on the ratio of disease name has a problem in that number of images used in the query image and similarity search was output in a first order. To solve this problem, we used a calculation method based on weight. We applied the test image of each disease name to each of the two calculation methods to measure the classification performance of the retrieval results. We compared averages of retrieval performance for two calculation method for each crop. In cases of red pepper and apple, the performance of the calculation method based on the ratio of disease names was about 11.89% on average higher than that of the calculation method based on weight, respectively. In cases of chrysanthemum, strawberry, pear, and grape, the performance of the calculation method based on the weight was about 20.34% on average higher than that of the calculation method based on the ratio of disease names, respectively. In addition, the system proposed in this paper, UI/UX was configured conveniently via the feedback of actual users. Each system screen has a title and a description of the screen at the top, and was configured to display a user to conveniently view the information on the disease. The information of the disease searched based on the calculation method proposed above displays images and disease names of similar diseases. The system's environment is implemented for use with a web browser based on a pc environment and a web browser based on a mobile device environment.

A Software Architecture for Supporting Dynamic Collaboration Environment on the Internet (인터넷 상에서의 동적인 협업 환경의 지원을 위한 소프트웨어 구조)

  • 이장호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.146-157
    • /
    • 2003
  • Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to workspaces, per mit users to move work dynamically between private and shared workspaces, and be easily accessible on the Internet. We present the software architecture of a development environment, called Collaboratory Builder's Environment(CBE), for building collaboratories to meet such needs. CBE provides user extensibility by allowing a collaboratory to be constructed as a collection of collaborative applets. To support dynamic reconfiguration of shared workspaces, CBE uses the metaphor of room that can contain applets, users, and arbitrary data objects. Rooms can be used not only for synchronous collaboration but also for asynchronous collaboration by supporting persistence. For the access over the Internet room participants are given different roles with appropriate access rights. A prototype of the model has been implemented in Java and can be run from a Java-enabled Web browser. The implemented system had been used by 95 users including 79 space scientists around the world in a scientific campaign that ran for 4 days. The usage evaluation of the campaign is also presented.

An Intelligent Land Vehicle Information System for CDMA-based Wireless Remote Diagnosis and Management (CDMA기반 무선 원격진단 및 관리를 위한 지능형 차량 정보 시스템)

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.91-101
    • /
    • 2006
  • Researches on services of vehicles have been mainly focused on how to provide useful information and entertainment for an in-vehicle driver. However, the needs are appreciably increased for more advanced services that help drivers to check and manage their vehicles conveniently, without requiring drivers to attach to their vehicles. It is a sort of ubiquitous computing, providing an intelligent interactive services for human at any time and any where. In this paper, we present an intelligent vehicle information system to enable a driver to remotely diagnose and control a vehicle via CDMA communication network connected to the Internet. The system improves mobility for diagnosis and control of vehicle by implementing a cut and call back mechanism, which allows the vehicle terminal to have access to the information server on the Internet via CDMA call. No matter where the driver is, he can obtain the remote diagnosis and control services on the web browser without any additional application installation. Design methodology is introduced and evaluation results are analyzed for the CDMA-based intelligent vehicle information system. The experimental results show that the response time of the vehicle terminal to a web client request is 10.302 seconds at the beginning and 646.44ms thereafter. The average response time of CAN sensor node to a vehicle terminal request is 6.669ms.

Analyzing System of Fuel Filter Based on Temperature and Pressure Measurement for Diesel Cars (온도 및 압력 측정에 기반을 둔 디젤 차량의 연료필터 분석 시스템)

  • Jang, Young-Sung;Lee, Bo-Hee;Yoon, Dal-Hwan;Kim, Jin-Geol;Son, Byeong-Min
    • Journal of IKEEE
    • /
    • v.18 no.3
    • /
    • pp.383-391
    • /
    • 2014
  • In this paper, temperature, pressure and flow analysis system for testing a fuel filter of a diesel engine at the low-temperature environment in winter, is proposed. The light oil of diesel engine below a specific temperature is changed to the waxing materials like paraffin, and it prevents engine to start easily because of reducing fluidity. Thus, built-in block heater should be installed with fuel filter in order to solve this problem. And it is necessary to design evaluation system that can analyze the performance according to temperature, pressure and flow characteristics near fuel filter at a very low temperature. In this paper, we measured a physical quantity related to the performance of around the fuel filter using the proposed system, and analyzed their characteristics. Also the measured data is transferred to remote user by using a web server of embedded systems, and analyzed their conditions in remote place via web browser in order to know the operating status of fuel filter. We installed the proposed system in a small test chamber to verify the performance and took an experiment in normal temperature and very low temperature, and could obtain temperature, pressure and flow of near the fuel filter. As a result, the fuel flow could be improved during operation of the fuel heater.

A 2D / 3D Map Modeling of Indoor Environment (실내환경에서의 2 차원/ 3 차원 Map Modeling 제작기법)

  • Jo, Sang-Woo;Park, Jin-Woo;Kwon, Yong-Moo;Ahn, Sang-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.355-361
    • /
    • 2006
  • In large scale environments like airport, museum, large warehouse and department store, autonomous mobile robots will play an important role in security and surveillance tasks. Robotic security guards will give the surveyed information of large scale environments and communicate with human operator with that kind of data such as if there is an object or not and a window is open. Both for visualization of information and as human machine interface for remote control, a 3D model can give much more useful information than the typical 2D maps used in many robotic applications today. It is easier to understandable and makes user feel like being in a location of robot so that user could interact with robot more naturally in a remote circumstance and see structures such as windows and doors that cannot be seen in a 2D model. In this paper we present our simple and easy to use method to obtain a 3D textured model. For expression of reality, we need to integrate the 3D models and real scenes. Most of other cases of 3D modeling method consist of two data acquisition devices. One for getting a 3D model and another for obtaining realistic textures. In this case, the former device would be 2D laser range-finder and the latter device would be common camera. Our algorithm consists of building a measurement-based 2D metric map which is acquired by laser range-finder, texture acquisition/stitching and texture-mapping to corresponding 3D model. The algorithm is implemented with laser sensor for obtaining 2D/3D metric map and two cameras for gathering texture. Our geometric 3D model consists of planes that model the floor and walls. The geometry of the planes is extracted from the 2D metric map data. Textures for the floor and walls are generated from the images captured by two 1394 cameras which have wide Field of View angle. Image stitching and image cutting process is used to generate textured images for corresponding with a 3D model. The algorithm is applied to 2 cases which are corridor and space that has the four wall like room of building. The generated 3D map model of indoor environment is shown with VRML format and can be viewed in a web browser with a VRML plug-in. The proposed algorithm can be applied to 3D model-based remote surveillance system through WWW.

  • PDF