• Title/Summary/Keyword: internet environment

Search Result 4,896, Processing Time 0.028 seconds

Global Internet Computing Environment based on Java (자바를 기반으로 한 글로벌 인터넷 컴퓨팅 환경)

  • Kim, Hui-Cheol;Sin, Pil-Seop;Park, Yeong-Jin;Lee, Yong-Du
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2320-2331
    • /
    • 1999
  • Over the Internet, in order to utilize a collection of idle computers as a parallel computing platform, we propose a new scheme called GICE(Global Internet Computing Environment). GICE is motivated to obtain high programmability, efficient support for heterogeneous computing resources, system scalability, and finally high performance. The programming model of GICE is based on a single address space. GICE is featured with a Java based programming environment, a dynamic resource management scheme, and efficient parallel task scheduling and execution mechanisms. Based on a prototype implementation of GICE, we address the concept, feasibility, complexity and performance of Internet computing.

  • PDF

Status of Illegal Hazardous Information for Chemical on Internet - Monitoring Cases of Chemical Cyber Surveillance - (인터넷 상 화학물질 불법 유해정보 현황 고찰 - 화학물질 사이버감시단 신고 사례를 중심으로 -)

  • Hwang, Man Sik;Im, Ji Young;Jeon, Da Young;Song, Ki Bong;Lee, Sang Mok;Ryu, Ji Sung;Lee, Ji Ho
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.13-22
    • /
    • 2018
  • Recently, social crimes using chemicals at home and abroad are increasing. These chemicals are readily available in the internet. Therefore, the NICS(national institute of chemical safety) runs a 'Chemical Cyber Surveillance' to help the public take control of the internet and create a healthy cyberspace through voluntary participation of the public. The study analyzed more than 1,000 sites suspected illegal hazardous information or blocked among cyber surveillance 3,500 case reports in the past yeas. And, the number of illegal hazardous information reported in the past three years is analyzed by type and substance. They want to examine the characteristics of hazardous chemical information on the internet and use it as a basic data to establish illegal information management measures that spread over cyberspace.

An Analysis of Housing Information on Internet Provided by U. S. University CES (미국대학의 Cooperative Extension Service가 제공하는 Internet상의 주생활정보 분석)

  • 최재순
    • Journal of Families and Better Life
    • /
    • v.16 no.4
    • /
    • pp.69-82
    • /
    • 1998
  • As a way to serve housing information providing on internet will be a useful method in the near future in Korea. This study was planned to review the housing information on internet network which provided by U. S. .University CES(cooperative extension service) Comparative analysis was used as a Research method in terms of contents and items about housing information on internet provided by U. S. university CES during two weeks each in August 1997 and July 1998. Findings are as follows; Universities providing housing information and information items had been remarkably increased during one year since August 1997. Most of housing informations except one university CES were free to use in 1997 but three university CES among 12 universities showed only the title of items with charge amounts in 1998. Informations about 'Housing Management' and 'Environment' items were the large parts of the housing information in 1997. In 1998. 'Environment' items were remarkably increased. Items bout insects and mildew removing were large portion of the 'Housing Management'. Items about energy saving water and air quality were large portion of the 'Environment' These findings will be useful to develop items of housing information on internet network with Korean language which should be compensated by the survey research.

  • PDF

A study on linkage of database and information search service based on WIPI (WIPI 기반 데이터베이스 연동 및 정보 제공 서비스에 관한 연구)

  • 임창묵;정성훈;임재홍
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.379-383
    • /
    • 2004
  • Mobile Internet has different platform cause interrupt activation of mobile internet because contents providers have each different development environment. To use of WIPI(Wireless Internet Platform for Interoperability) developer by KWISF(Korea Wireless Internet Standard Forum) founded to solve this problem guarantee independence of hardware and interpretation of mobile application. In this paper, we research method to activate WIPI which is standard platform to develop applications easily and efficiently in mobile environment and we implement WIPI application to show the excellent of WIPI in mobile development environment.

  • PDF

An Integrated Study for Customer Loyalty in Internet Shopping Mall (인터넷 쇼핑몰의 고객충성도에 대한 통합적 연구 - 옥션과 인터파크 고객을 중심으로)

  • Kwon, Young-Guk;Lee, Sun-Ro;Park, Hyun-Jee
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.23-53
    • /
    • 2006
  • The main purpose of this paper is to setup a integrated model and verify the integrated model for a customer loyalty in the internet shopping environments. The results of a structural equation model (SEM) using AMOS and LISREL include: First, hypothesis that Internet environment characteristics in outside factors has a positive effect on satisfaction, trust and commitment is partially supported. However, mutual communication to satisfaction, community to commitment and open-ubiquity to trust did not reveal a positive effect. Second, hypothesis that Internet showing mall environment has a positive effect on satisfaction is partially supported. However, transaction to commitment and transaction to trust did not reveal a positive effect. Third, hypothesis that relational benefits has a positive effect on both satisfaction and commitment is partially supported. However, confident honest to commitment and economic honest to trust did not reveal a positive effect. Forth, satisfaction trust and commitment have a strong effect upon loyalty. Fifth, satisfaction has a positive effect on trust and commitment. However, trust did not show a positive effect on commitment. Outside factors(Internet environment characteristics, showing mall characteristics, and relational benefit) partially revealed a positive effect on satisfaction trust, and commitment. Mediating variables such as satisfaction, trust, and commitment again have positive effect on loyalty. But, the relationship for trust to commitment did not reveal the significant effect in this study while other studies revealed significant effect.

  • PDF

A New Communication Network Model for Chat Agents in Virtual Space

  • Kim, Jong-Woo;Ji, Seong-Hyun;Kim, Seon-Yeong;Cho, Hwan-Gue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.287-312
    • /
    • 2011
  • Internet chat programs and instant messaging services are becoming increasingly popular among Internet users. One of the crucial issues with Internet chat is how to manage the corresponding pairs of questions and answers in a sequence of conversations. Although many novel methodologies have been introduced to cope with this problem, most are poor in managing interruptions, organizing turn-taking, and conveying comprehension. The Internet environment is recently evolving into a 3D environment, but the problems with managing chat dialogues with the standard 2D text-based chat have remained. Therefore, we propose a more realistic communication model for chat agents in 3D virtual space in this paper. First, we propose a new method to measure the capacity of communication between chat agents and a novel visualization method to depict the hierarchical structure of chat dialogues. In addition, we are concerned with communication networks for virtual people (avatars) living in virtual worlds. In this paper we consider a microscopic aspect of a social network in a relatively short period of time. Our experiments show that our model is highly effective in a virtual chat environment, and the communication network based on our model greatly facilitates investigation of a very large and complicated communication network.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

Designing a data based school with Internet of Things (데이터 기반 학교 운영을 위한 사물인터넷(IoT) 활용 환경 설계)

  • Kye, Bo-kyung
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.20 no.3
    • /
    • pp.25-32
    • /
    • 2021
  • This study analyzed the application articles of the Internet of Things (IoT) in the educational environment. It defined learning environmental data, utilization scenarios, and models that IoT can improve teaching and learning through Focus Group Interviews for academic experts, teachers, and technicians in related fields. In addition, the IoT pilot prototype was developed, verified, and drew implications from the perspective of collection, analysis, and utilization of real-time data based on the actual school settings. This study has significance as a priori case of building and applying a learning environment using the Internet of Things in real school settings considering relevant restrictions.

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.

A Design for Development of Productive Software on X-Internet Environment (X-인터넷 환경에서 생산성 있는 소프트웨어 개발 방법의 설계)

  • Lee Myeong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.2
    • /
    • pp.53-59
    • /
    • 2005
  • The environment of If is, currently, on its developing process to the period of Web Service, Ubiquitous, and Telemetics which not only enable computer and internet to be utilized like the water or the air, but also be a new motivating force for its advance. In the respect of various interactions and User Interface, however, it is requiring more demands from its users, and additional functions which cannot be provided by the Web Browser. It is required a new model for supplementary of the limitation of Web_based according to their customers' requirement, to enrich the good aspects of Client-Server System, and accept such various intricate requirements. It is X-Internet, which has born with these requirements. In this study, therefore, it will be suggested a productive development framework and a method to perform the project on Rich-Thin Client Platform of X-Internet Based.