• 제목/요약/키워드: via internet

검색결과 1,301건 처리시간 0.023초

인터넷과 sns를 이용한 마약거래 대응방안에 관한 연구 (A Study on Drug trading countermeasures via internet and sns)

  • 박호정
    • 융합보안논문지
    • /
    • 제18권1호
    • /
    • pp.93-102
    • /
    • 2018
  • 인터넷과 sns를 이용한 일반인들의 마약거래가 급증하고 있어 사회문제가 되고 있다. 일반인들의 마약수요를 억제하기 위하여 사전에 마약 관련 정보를 제공하여 마약범죄를 예방하는 것이 가장 중요하다. 일반인들은 인터넷과 sns를 이용한 마약거래를 하더라도 적발가능성이 낮다고 판단하여 인터넷과 sns를 이용한 마약거래를 하게 된다. 따라서 인터넷과 sns를 이용한 마약거래의 적발가능성이 높다고 일반인들이 인식하게 한다면 인터넷과 sns를 이용한 마약거래는 감소될 수 있을 것으로 생각된다. 통제배달기법규정의 구체화와 위장수사제도의 도입을 통해 인터넷과 sns를 이용한 마약거래의 적발가능성을 높인다면 일반인들이 쉽게 인터넷과 sns를 이용한 마약거래를 할 수는 없을 것으로 본다. 이와 함께 마약범죄 처벌규정을 세분화하여 단순마약구매자에 대하여는 처벌보다는 치료위주의 처우를 통해 마약수요를 억제하고 마약공급자에 대한 처벌규정은 강화해야 한다. 마약류 대부분이 해외에서 밀반입되므로 외국에서 마약이 공급될 수 없도록 마약정보의 공유시스템을 구축하고 마약공급국가와 공조와 검색체계의 강화를 통해 인터넷과 sns를 이용하여 국내이용자가 해외에서 들여오는 마약공급을 사전에 차단해야 할 필요가 있다.

  • PDF

임베디드 인터넷을 이용한 원격검침장치 설계 (Design of a Remote Measurement System via Embedded Internet)

  • 박재삼
    • 한국컴퓨터산업학회논문지
    • /
    • 제4권10호
    • /
    • pp.723-730
    • /
    • 2003
  • 본 논문에서는 임베디드인터넷을 이용하여 일반가정의 모든 미터기에 의하여 계측된 검침데이터를 인터넷을 통하여 수집 가능하도록 하는 새로운 구조의 원격검침시스템을 개발하였다. 수집된 검침데이터는 인터넷을 통하여 메인서버로 전송하여 저장가능 하도록 함으로써, 각 가정의 검침 데이터의 데이터베이스를 자동화, 신속한 검침가능, 비용절감등 많은 효과를 거둘수 있도록 이용할 수 있다. 검침데이터의 모니터링 및 데이터베이스 등을 윈도우 환경에서 구현하였다. 개발된 시스템을 실제 디지털열량계에 연결하여 실험함으로써, 개발된 원격검침시스템이 충분히 실용성이 있음을 보였다.

  • PDF

Knowledge-Based Control via the Internet

  • Tang, Kok-Zuea;Goh, Han-Leong;Tan, Kok-Kiong;Lee, Tong-Heng
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권2호
    • /
    • pp.207-219
    • /
    • 2004
  • This paper presents the development of a knowledge-based control system operating via the Internet. With the synergy provided by the Internet, the central expert controller with its knowledge-base has the potential to serve a multitude of front-end clients located anywhere in the world provided they have Internet access. In this way, the operational span of the knowledge-based control system can be expanded to virtually anyplace within the reach of the Internet. This configuration has positive implications in improving the efficiency of distributed operations, thereby enabling plantwide optimization and costs savings. Datasocket technology is adopted to facilitate a more efficient data exchange between the knowledge-based central server and the front-end clients. A specific application in the remote monitoring and fault diagnosis of machines using the proposed control configuration is presented in the paper.

Active X 컨트롤을 이용한 인터넷 DGPS 구현 (Performance of Internet DGPS Using Active X Control)

  • 강준묵;이용욱;이은수;조성호
    • 한국측량학회:학술대회논문집
    • /
    • 한국측량학회 2003년도 춘계학술발표회 논문집
    • /
    • pp.37-44
    • /
    • 2003
  • The aim of this research was performance of Web-based real time DGPS using MS visual basic 6.0 Active X control. This system supported the navigation of rover by transmitting the DGPS correction information of base station via internet and monitored the moving of rover by displaying the corrected results received from rover as well as permitting Web users monitoring for rover. The Web-based DGPS server and the client system using MS visual basic 6.0 Active X control for DGPS displayed on Web-browser with the pre analysis was constructed and the system loading test via Web-browser was performed after debugging this system through the static GPS test and publishing it on Web. Also, the wireless internet DGPS test on Web by changing the distance between a base station and a rover was carried out. As the result of the test, the real time DGPS could be performed by transmitting the correction message which calculated from the server system to the client system continually. The rover could be managed by displaying the location information which received from the client system. Other users also could monitor the rover by connecting with this system via internet in real time.

  • PDF

인터넷 쇼핑몰 이용자의 성별에 따른 구매 이전의 지각된 위험과 구매의도에 관한 연구 (A Study on the Perceived Risk of E Commerce and the Pre-Purchase Intention of Internet Shopping Mall Users according to Gender)

  • 강영신;정범석
    • 경영과정보연구
    • /
    • 제23권
    • /
    • pp.135-156
    • /
    • 2007
  • The aims of this study are to determine if the perceived risk of e-commerce affect the Internet shopping mall users' decision to pre-purchase an item via e-commerce, to find out if there are differences among the induced perceived risk according to gender, and to verify if the perceived risk according to gender have a correlation to a person's decision to pre-purchase an item via e-commerce. It can thus be concluded that the pre-perceived risk of e-commerce affect the Internet shopping mall users' purchase intention. Different results were obtained, though, according to gender. Moreover, the perceived risk of e-commerce based on gender and the purchase intention of the Internet shopping mall users were shown not to have a correlation. This means that although slightly different study results were presented, e-commerce purchasers can use these results to recognize the risk of e-commerce.

  • PDF

Home Network Electrical Appliance Control With The UPnP Expansion

  • Cho, Kyung-Hee;Lee, Sung-Joo;Chung, Hyun-Sook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제7권2호
    • /
    • pp.127-131
    • /
    • 2007
  • The control of electrical appliances residing in the home network can be accomplished via Internet with the UPnP expansion without modifying an existing UPnP. In this paper, we propose the Internet Gateway that consists of an UPnP IGD(Internet Gateway Device) DCP(Device Control Protocol) and an UPnP Bridge as a system to control electrical appliances of home network. UPnP IGD DCP is to enable the configurable initiation and sharing of Internet connections as well as assuring advanced connection-management features and management of host configuration service. It also supports transparent Internet access by non-UPnP-certified devices. UPnP Bridge searches for local home network devices by sending control messages, while control point of UPnP Bridge looks up devices of interest on the Internet, subsequently furnishing the inter-networking controlling among devices which belong to different home network systems. With our approach, devices on one home network can control home electrical appliances on the other home network via Internet through IGD DCP with control commands of UPnP.

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

게시판 기능을 이용한 지능형 유무선 통보 시스템 (An intelligent Not of boat ion of both wired and wire less internet using Bu1letin Board Systems)

  • 박인숙;이용일;이현수;박대훈;허혜선;홍윤식
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(3)
    • /
    • pp.209-212
    • /
    • 2001
  • In this paper, an intelligent notification system has been presented. The system operates on both wired and wireless internet. When a new message has been uploaded in a bulletin board systems(BBS) on HTTP web server, it sends the same message to their cellular phones of all members of a given group at the same time via SMS(Short Message Service). In addition, on reading SMS message, those who read them respond to a WAP server using pulling technique via wireless internet. Therefore, the HTTP server does know the members who did not read the message yet. Two different web servers, the HTTP server and the WAP server, running on a single system has been implemented. They share the single database which covers al1 related information about the BBS. The set of experiments shows that the notification system works well as we have expected Thus, we conclude that the proposed system that operates on both wired and wireless internet is the one of successful model for such environments.

  • PDF

무선 인터넷 환경에서 CHAP 인증 기법을 이용한 로밍 서비스 지원 방법 (Roaming Service Support Technique using CHAP in Wireless Internet)

  • 박정현;유승재;양정모
    • 융합보안논문지
    • /
    • 제4권2호
    • /
    • pp.53-60
    • /
    • 2004
  • 본 논문에서는 무선 인터넷 환경에서 CHAP 인증 기법을 이용한 로밍 서비스 지원 방법을 기술한다. 이를 위해 특별히 GPRS 망으로 이동한 이동 ISP 망 가입자가 자신의 홈 ISP 망을 접속하여 인증을 받기 위한 기법을 제시한다 또 이동 ISP 망 가입자의 단말에서 정의되어야 할 인증 메시지 구조와 GPRS 망 게이트웨이에서 구현될 메시지 구조를 제시한다. 아울러 GGSN과 ISP 망간의 인증 메시지 구조를 정의하며 이들 제안된 내용에 대해 시험 환경 구축을 통해 실제 시뮬레이션 결과를 보였다.

  • PDF

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권2호
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.