• Title/Summary/Keyword: internet users

Search Result 4,159, Processing Time 0.03 seconds

Design of Network Protocols for Distributed Virtual Environments (분산 가상 환경을 위한 네트워크 프로토콜의 설계)

  • Ko, Dong-Il;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.1-11
    • /
    • 2000
  • Recently, the explosive popularity of Internet gave birth to researches on Distributed Virtual Environments(DVE). They aim at providing a shared application data environment at realtime for users participating in the same application session across Internet. As more users join the session, and as more multimedia data are shared, because of network resource limitation, it is more difficult to maintain the quality of DVE, such as users' satisfaction level. Previous works mainly tried to solve the scalability, synchronization and data transport issues at the application level, with limited success. We suggest a new network centric solution, that consists of a novel network architecture and protocols upon which any large-scale DVE application can be easily developed. The performance of the proposed scheme, called GAIA, is verified by simulation.

  • PDF

Development of web based shape inspection system for the forging products having complicated shapes (인터넷을 이용한 정밀단조품의 품질평가 시스템 개발에 관한 연구)

  • Park, K.S.;Kim, B.J.;Jang, J.H.;Moon, Y.H.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2006.05a
    • /
    • pp.211-214
    • /
    • 2006
  • The outer race of the constant velocity(CV) joint is an important load-supporting automotive part, which transmits torque between the transmission and the wheel. The outer race is difficult to forge, because its shape is very complex and the required dimensional tolerances are very stringent. Therefore, the internet based shape inspection system is developed in this study to provide quick and accurate data through the easy control from users. Proposed system uses mechanical displacement sensors to measure the shape of CV joint that has six inner ball grooves, and commercially available Lab-View program is used to process measured data into the dimensional shape. Developed program provides a simple user interface that enables users real-time access of data measured from industrial production lines. Furthermore, it can exchange measured data via the internet between users and forging system operators. A java applet helped the system connection via internet. A data, IP access, is transmitted to the packet by TCP/IP. Our proposed system has many advantages over current measuring systems including fast and efficient data processing by real-time control, and system flexibility.

  • PDF

Deep Learning-based Tourism Recommendation System using Social Network Analysis

  • Jeong, Chi-Seo;Ryu, Ki-Hwan;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.113-119
    • /
    • 2020
  • Numerous tourist-related data produced on the Internet contain not only simple tourist information but also diverse ideas and opinions from users. In order to derive meaningful information about tourist sites from such big data, the social network analysis of tourist keywords can identify the frequency of keywords and the relationship between keywords. Thus, it is possible to make recommendations more suitable for users by utilizing the clear recommendation criteria of tourist attractions and the relationship between tourist attractions. In this paper, a recommendation system was designed based on tourist site information through big data social network analysis. Based on user personality information, the types of tourism suitable for users are classified through deep learning and the network analysis among tourist keywords is conducted to identify the relationship between tourist attractions belonging to the type of tourism. Tour information for related tourist attractions shown on SNS and blogs will be recommended through tagging.

Weighted Adaptive Opportunistic Scheduling Framework for Smartphone Sensor Data Collection in IoT

  • M, Thejaswini;Choi, Bong Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.5805-5825
    • /
    • 2019
  • Smartphones are important platforms because of their sophisticated computation, communication, and sensing capabilities, which enable a variety of applications in the Internet of Things (IoT) systems. Moreover, advancements in hardware have enabled sensors on smartphones such as environmental and chemical sensors that make sensor data collection readily accessible for a wide range of applications. However, dynamic, opportunistic, and heterogeneous mobility patterns of smartphone users that vary throughout the day, which greatly affects the efficacy of sensor data collection. Therefore, it is necessary to consider phone users mobility patterns to design data collection schedules that can reduce the loss of sensor data. In this paper, we propose a mobility-based weighted adaptive opportunistic scheduling framework that can adaptively adjust to the dynamic, opportunistic, and heterogeneous mobility patterns of smartphone users and provide prioritized scheduling based on various application scenarios, such as velocity, region of interest, and sensor type. The performance of the proposed framework is compared with other scheduling frameworks in various heterogeneous smartphone user mobility scenarios. Simulation results show that the proposed scheduling improves the transmission rate by 8 percent and can also improve the collection of higher-priority sensor data compared with other scheduling approaches.

An Empirical Study of the Effect of Uncertainty Avoidance on Post-Adoption Behavior: Focusing on Mobile Internet Services (불확실성 회피성향이 수용 후 행동에 미치는 영향: 모바일 인터넷 서비스를 중심으로)

  • Choi, Hun;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.95-116
    • /
    • 2006
  • Although the study of post-adoption has increased in recent years, few studies have focused on the moderating effect of uncertainty avoidance on the relationship between post-expectation and behavior. The purpose of this study is to examine the moderating effect of uncertainty avoidance in the mobile Internet domains. This study proposed a post-adoption model based on prior continuance model. This theoretical model was verified empirically by conducting web surveys and multi-group analysis. Based on the survey data, we classified users into those with high uncertainty avoidance and those with low uncertainty avoidance. The results indicate that post expectations have significant impacts on satisfaction and continuance intention. The results also show that the impacts of intrinsic motivational factors of mobile Internet services on satisfaction and continuance intention are stronger for users with high uncertainty avoidance. On the other hand, the impacts of extrinsic motivational factors on satisfaction and continuance intention are stronger for users with low uncertainty avoidance, with a few exceptions. This paper ends with theoretical and managerial implications of the study results, as well as limitations and future research directions.

Comparison Study Between Landline and Mobile VOD (유무선 모바일 VOD 인터넷간 차이 연구)

  • Sung Ho-Jun
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.273-285
    • /
    • 2006
  • This study compares choice of contents genre between mobile VOD service users and landline internet VOD service users. Overall, males showed a higher rate of VOD usage than females and a variety of contents were used for entertainment, programs and mood alteration. In addition, a higher frequency of VOD usage showed a higher rate of VOD usage and also resulted in higher level of satisfaction. Also, the quality of landline internet VOD service showed to be higher than mobile VOD service. This suggests that programs for mobile VOD needs to be developed as well as a more open and simple rate system. In addition, subjects of this study showed to use VOD services mainly for entertainment purposes, suggesting that a variety of programs need to be developed in order to higher the level of satisfaction of its users.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

Internet Banking Service Vulnerability Analysis and Security Solution (인터넷 뱅킹 서비스 취약점 분석 및 보안대책)

  • Lee, Sang-Jin;Hwang, So-Yeon;Kim, Kyung-Kon;Ryeo, Sung-Koo
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.119-128
    • /
    • 2007
  • Since the internet banking service was introduced to Korea in 1999, the service has placed itself as an indispensable service to most users. The internet banking, which provides convenience for internet users as well as efficiency for banks, is expected to increase its importance more and to play a bigger role as a passage of funds. Meanwhile, numerous accounts as to the misusage of the internet banking service have been reported and the types and size of damages, especially making illegal money transfers and embezzling user information through computer hacking, tend to increase continuously. This paper points out fundamental problems of the current internet banking service by analyzing the all components of the internet banking service and fitting the results of structural analysis of hacking threats in accordance with service flow. This paper also attempts to propose the means to minimize the hacking threats of the internet banking service.

  • PDF

Development of indicators for the evaluation of internet site for health information (인터넷 건강정보 사이트 평가지표 개발)

  • Kim, Yong-Soon;Park, Ji-Won;Yoo, Moon-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.6 no.2
    • /
    • pp.291-298
    • /
    • 2000
  • Objective : Use of Internet for health related information is rapidly increasing. There is, however, no consensus as to which information is correct and reliable. This study was conducted to develop an evaluation standards for health related information on the Internet for the purpose of delivering correct information to internet users. Methods : A Delphi technique, which involved a panel of 65 experts, was used as the research design for this study. In the first round, the initial evaluation criteria which consisted of 12 items was developed through a literature review by the researcher and the items represented 2 categories, structure and function. In the second round, a semi-structured questionnaire was sent to the experts with the initial evaluation tool and the respondents identified 55 items. In the third round, these 55 items were analyzed for content validity by the experts and a total of 35 items were included in the model; 11 items in the structural area, 24 in the functional area. Conclusions : Development of indicators for the evaluation of internet site for health information is crucial to provide correct and reliable information. For evaluation to be effective further evaluation programs need to be developed so that users can be sure that the information they received is accurate.

  • PDF

Internet Based for Computer Integration Manufacturing System

  • Suesut, T.;Hankarjonsook, C.;Tipsuwanporn, V.;Tammarugwattana, N.;Tirasesth, K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.260-263
    • /
    • 2003
  • This paper has developed the computer integration manufacturing system and Internet based tele-operations. The functions of CIMS include production planing, material requirement planning, work order generation, process control, quality control, shipping planning, warehouse and inventory management and material cost accounting.[1] In this paper focuses on the automatic warehouse control and inventory management by developing the information system as well as the Internet-based integration. The system overview is divided into three parts, the mechanical system, the computer and developed software to control and manage the information and the communication system. The mechanical system consists of the warehouse machine and forklift mobile robot controlled by programmable logic controller (PLC). The computer works on many functions such as control station interfaces with PLC, managing database and inventory, and Internet server to broadcast the inventory database to users via World Wide Web and monitoring the operation on web camera. Our scheme the inventory database can be checked easily anywhere and anytime when the users connect to the Internet. In this article, the lead-time and inventory level can be reduced therefore the holding cost and operating time is also decreased.

  • PDF