• Title/Summary/Keyword: internet addresses

Search Result 233, Processing Time 0.026 seconds

Negotiations in Space and Time: Changing Gender Relations in Thai Tourist-oriented Encounters

  • King, Victor T.;Rotheray, J.
    • SUVANNABHUMI
    • /
    • v.11 no.2
    • /
    • pp.25-57
    • /
    • 2019
  • The paper addresses Erik Cohen's pioneering work on tourism in Thailand, specifically his publications on the relations between Thai women and foreign (farang) men in tourist-oriented encounters. Of sociological-anthropological interest is his conceptualization of these relations as "open-ended prostitution as a skilful game of luck" based on his study of a Bangkok soi (lane) in 1981-1984, and his exploration of Thai culture in terms of ambiguity and contradiction. On the basis of recent ethnographic research in the northern Thai tourist hub of Chiang Mai and wide-ranging observations on tourism development in Thailand, we examine continuity and change in these male-female engagements since Cohen's research, especially in the context of the increasing availability of such electronic agencies as social media, messaging, video chat, and internet dating. Whereas Cohen's concept of ambiguity and illusion has tended to disappear from physical spaces, it seems to have resurfaced in virtual space. The complexities of host-guest relations, and particularly the interactions both within the variegated category of "guests" themselves and then between their "hostesses" are explored in terms of sites of tourism-oriented encounters in both physical and virtual space so as to deconstruct these oppositional categories which have been formative in studies of tourism.

  • PDF

Music License in the Metaverse

  • Kyungsuk Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.44-54
    • /
    • 2023
  • This paper provides a comprehensive analysis of the implications of the metaverse on the music industry, focusing on copyright issues and potential solutions. It delves into the concept and characteristics of metaverse platforms, describing them as environments that immerse users in a variety of virtual experiences. A significant portion of the paper is dedicated to exploring music use and copyright infringement in the metaverse. It examines how users incorporate existing music into their content, often leading to legal challenges due to copyright infringement. The paper discusses the role of online service providers (OSPs) in this context and the legal implications of their actions. The paper also addresses the 'safe harbor' provisions for OSPs and examines the balance between protecting rights holders and limiting OSP liability. It highlights the challenges and limitations of copyright enforcement in the metaverse, especially given the unique nature of content on platforms such as Roblox. Finally, the article proposes solutions to simplify music licensing in the metaverse, suggesting a shift from property rules to liability rules and the establishment of Collective Management Organizations (CMOs) to streamline the licensing process and better protect copyright holders' interests.

Implementation of On-Device AI System for Drone Operated Metal Detection with Magneto-Impedance Sensor

  • Jinbin Kim;Seongchan Park;Yunki Jeong;Hobyung Chae;Seunghyun Lee;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.101-108
    • /
    • 2024
  • This paper addresses the implementation of an on-device AI-based metal detection system using a Magneto-Impedance Sensor. Performing calculations on the AI device itself is essential, especially for unmanned aerial vehicles such as drones, where communication capabilities may be limited. Consequently, a system capable of analyzing data directly on the device is required. We propose a lightweight gated recurrent unit (GRU) model that can be operated on a drone. Additionally, we have implemented a real-time detection system on a CPU embedded system. The signals obtained from the Magneto-Impedance Sensor are processed in real-time by a Raspberry Pi 4 Model B. During the experiment, the drone flew freely at an altitude ranging from 1 to 10 meters in an open area where metal objects were placed. A total of 20,000,000 sequences of experimental data were acquired, with the data split into training, validation, and test sets in an 8:1:1 ratio. The results of the experiment demonstrated an accuracy of 94.5% and an inference time of 9.8 milliseconds. This study indicates that the proposed system is potentially applicable to unmanned metal detection drones.

The research of new Multimedia design developmenton Internet(Focus on the layout) (인터넷에서의 뉴멀티미디어 디자인 개발에 관한 연구 -레이아웃을 중심으로-)

  • 류성현;신계옥;이은주;이현주;배경선
    • Archives of design research
    • /
    • v.20
    • /
    • pp.111-120
    • /
    • 1997
  • Recently, rapidly increasing internet Websites are providing us with the new kinds of multimedia informations without borders acting as the center for exchanging informations. Such new media informations through the internet passes informations via light on the monitor and provides the various informations, with the differentiation from the traditional printing media, it can be searched with electronic commands in limited space. In the process of adapting the new technologies, new media has successfully responded to the fast change and the development of its needs by experiencing the trials and errors, steadily establishing the stable position with its new information transferring and exchanging methods. The representative hompage of websites of information transformations means the first page containing no lower directories and consist of titles, icons, symbols and addresses and can design them in consideration of graphical process, planning, contents and others. Such hompages are very important since the graphical images shows its visual expressions deciding the total meanings of the hompages. In this research, we have analyzed the visual factors of frequencies, ratio of areas, distributions, alignment methodologies on layouts of hompages consisting titles, icons, contents and symbols, etc. from randomly picked samples of 161 hompages of websites in the internets of various areas. Generally, the homepages are designed with graphical expressions in personal way and the feedbacks and responses of such may differs, but we think, this can be used as reference materials for the analysis of new media in objective way. Also, it can be used as the base informations for arrangement and planning of designs with the characteristics of graphics and Graphic User Interfaces in the background which are implemented over internet.

  • PDF

A Study on a Method of Selecting Variant Groups to be Reviewed for LGR (Label Generation Rule) of Internet Top-Level Hanja Domain (인터넷 최상위 한자 도메인의 국제 생성 규칙(LGR)을 위한 검토 대상 이체자 묶음 선정 방안 연구)

  • Kim, Kyongsok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.1
    • /
    • pp.7-16
    • /
    • 2016
  • This paper discusses a method of selecting variant groups to be reviewed for LGR (Label Generation Rule) of Internet Top-Level Hanja Domain. The most difficult problem in setting up LGR of Internet Top-Level Hanja Domain is how to treat Hanja variants. If domains containing variants (e.g.: 東海國) are directed to different addresses, confusion will arise. Therefore, it is desirable that such domains are directed to the same address. Since variant groups of Korea and China are not same, we need to unify variant groups of Korea and China. In the process of reviewing 3093 Chinese variant groups, the author found that Korea does not need to review Chinese variant groups which include no or just one Korean Hanja character. Korea only need to review Chinese variant groups which include two or more Korean Hanja characters. By doing so, the author could reduce the number of Chinese variant groups to be reviewed by Korea from 3093 to 303, which is only one-tenth of the original number of Chinese variant groups. After Korea finishes reviewing 303 Chinese variant groups selected according to the method suggested in this paper, the job of setting up LGR of Internet Top-Level Hanja domain will be accelerated by negotiating with China.

The research of new multimedia design development on Internet - Focus on the color - (인터넷에서의 뉴멀티미디어 디자인 개발에 관한 연구 - 색채를 중심으로 -)

  • 류성현;신계옥;이은주;이현주
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.143-152
    • /
    • 1998
  • Recently, rapidly increa~ing internet Websites are providing us with the new kinds of multimedia infonnations without borders acting as the center for exchanging informations. Such new media infonnations through the internet passes infonnations via light on the monitor and provides the various infonnations, with the differentiation from the traditional printing media, it can be searched with electronic commands in limited space. In the process of adapting the new technologies, new media has successfully responded to the fast change and the development of its needs by experiencing the trials and errors, steadily establishing the stable position with its new infonnation transferring and exchanging methods. The representative hompage of websites of information lransfonnations means the first page containing no lower directories and consist of titles, icons, symbols and addresses and can design them in consideration of graphical process, planning, contents and others. Such hompages are very important since the graphical images shows its visual expressions deciding the total meanings of the hompages. In this research, we have analyzed the relationships between its overall colors and text colors from randomly picked hompages of websites in the internets of various areas. Generally, the homepages are designed with graphical expressions in personal way and the feedbacks and responses of such may differs, but this can be used as reference materials for the analysis of new media in objective way. Also, it can be used as the base informations for arrangement and planning of designs with the characteristics of graphics and Graphical User Intertilces in the backhlfound which are implemented over internet.

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Monitoring of On-Line Nutrition Information-Analysis of Meta Data (인터넷 영양정보의 모니터링-메타데이터의 분석)

  • 강혜경;강명희;유경혜;이선영
    • Journal of Nutrition and Health
    • /
    • v.37 no.8
    • /
    • pp.688-700
    • /
    • 2004
  • This study was conducted to analyze how appropriate the on-line nutrition information was externally as a web information. Four-hundred-ninety-seven web sites from 5 internet search engines (Yahoo, Empas, Nate, Hanmir, Naver) were selected on the basis of April 25th, 2004. The skillful personnels monitored them about 8 evaluating categories: clarity, purpose, authority, durability, advertisement, privacy and/or security, responsibility, and contents. Forty percent of the selected web sites were operated by the companies which had commercial purpose like internet shopping malls and 5.6% by academies, societies, research institutions, schools/colleges and public institutions. Most of web sites (76.1 %) were managed for advertisements and sales of companies' commodities, and 32.6% had the food and nutrition information as first purpose. Ninety-three percent of web sites were targeted to healthy individuals through whole life cycle. Specifically, there were lots of web sites for the obesity which were offered by diet related companies. Of the 497 web sites, 193 mentioned the name providing the nutrition information, but only 1/3 had reliability on their specialty. As a source of nutrition information, 52.7% of web sites were using 'books of the major field' and 42.0% 'newspapers' and 23.7% 'broadcasting', respectively. Most web sites mentioned 'setting-up date' but not 'renewal date'. Thirty-six percent of web sites took '2 - 3 days' for the operators to answer the questions through the bulletin. Forty-seven percent of web sites answered' 1 - 10 questions' per 1 week, but 40.1 % of them didn't answer for a week at all. There were 118 web sites (23.7%) to record the connected frequencies and 36.0% of them put the advertisements. Around 96% of web sites mentioned feedback addresses. Among the menus of web sites, 68.0% were about self-advertisement and 64.0% about nutrition information. Each web site was scored to judge its external quality according to the operators by selecting 13 items. Web sites managed by public institution had highest scores (9.5), and lowest in private vendors', food companies' and individual web pages. Among search engines, Naver got the highest score of 7.0 and Nate the lowest one of 6.1. As it was only the pilot study, there were several limits in evaluating tools, time and monitored quantity. To make monitoring of on-line nutrition informatiions actively, standardized monitoring forms might be developed under the integrated studies.

Reducing False Alarm and Shortening Worm Detection Time in Virus Throttling (Virus Throttling의 웜 탐지오판 감소 및 탐지시간 단축)

  • Shim Jae-Hong;Kim Jang-bok;Choi Hyung-Hee;Jung Gi-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.847-854
    • /
    • 2005
  • Since the propagation speed of the Internet worms is quite fast, worm detection in early propagation stage is very important for reducing the damage. Virus throttling technique, one of many early worm detection techniques, detects the Internet worm propagation by limiting the connection requests within a certain ratio.[6, 7] The typical throttling technique increases the possibility of false detection by treating destination IP addresses independently in their delay queue managements. In addition, it uses a simple decision strategy that determines a worn intrusion if the delay queue is overflown. This paper proposes a two dimensional delay queue management technique in which the sessions with the same destination IP are linked and thus a IP is not stored more than once. The virus throttling technique with the proposed delay queue management can reduce the possibility of false worm detection, compared with the typical throttling since the proposed technique never counts the number of a IP more than once when it chicks the length of delay queue. Moreover, this paper proposes a worm detection algorithm based on weighted average queue length for reducing worm detection time and the number of worm packets, without increasing the length of delay queue. Through deep experiments, it is verified that the proposed technique taking account of the length of past delay queue as well as current delay queue forecasts the worn propagation earlier than the typical iuぉ throttling techniques do.

A Scheme of Distributed Network Security Management against DDoS Attacks (DDoS 공격에 대응하는 분산 네트워크 보안관리 기법)

  • Kim Sung-Ki;Yoo Seung-Hwan;Kim Moon-Chan;Min Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.72-83
    • /
    • 2006
  • It is not a practical solution that the DDoS attacks or worm propagations are protected and responded within a domain itself because it clogs access of legitimate users to share communication lines beyond the boundary a domain. Especially, the DDoS attacks with spoofed source address or with bogus packets that the destination addresses are changed randomly but has the valid source address does not allow us to identify access of legitimate users. We propose a scheme of distributed network security management to protect access of legitimate users from the DDoS attacks exploiting randomly spoofed source IP addresses and sending the bogus packets. We assume that Internet is divided into multiple domains and there exists one or more domain security manager in each domain, which is responsible for identifying hosts within the domain. The domain security manager forwards information regarding identified suspicious attack flows to neighboring managers and then verifies the attack upon receiving return messages from the neighboring managers. Through the experiment on a test-bed, the proposed scheme was verified to be able to maintain high detection accuracy and to enhance the. normal packet survival rate.