• Title/Summary/Keyword: via internet

Search Result 1,301, Processing Time 0.024 seconds

Comparison of Adult Brassier between Korea and Japan - Based on the Information on the Internet -

  • Joen Mi-Sun;Park Myung-Ja;Lee Kyu-Hye
    • The International Journal of Costume Culture
    • /
    • v.7 no.2
    • /
    • pp.112-122
    • /
    • 2004
  • A brassier supports and protects breasts and makes a better shape of the upper half of the body through shaping breasts. A brassier, therefore, is recognized as the key underwear for female. Recently, the distribution structure and channels of the brassiere industry is diversified from conventional type of markets to department stores, convenience stores, and internet shopping mall. Studies on the sales of brassieres via internet, however, is not sufficient even though the market size has been dramatically increased thursdays. The study on the size structure (including the size and the materials fabric of brassieres circulating via internet) is especially rare. Therefore, this study tries to comply with increasing requests of consumers through comparing brassier brands on internet. In depth, this study compares cases of Korea and Japan in terms of availability of website on sales, quality indication like materials and functions, and size. The results indicated that there were three companies in Korea which run a website and make a sale through a website. All three Japanese companies operate a website and make sales on a website as well. In terms of size, Korean companies diversify their size of products in two ways. It varies from A cup to D cup based on cup size, and 65 to 100 according to its entire size. On the other hand, Japanese companies use AA, A to I to measure cup size, and 65 to 100 for entire size.

  • PDF

A Study on the Remote Control & Monitoring System for Wind Turbine System via Internet (인터넷기반의 풍력발전기 원격제어와 모니터링에 관한 연구)

  • Park, Jang-Hun;Chae, Jeong-Su;Mun, Seong-Ryong;Jeong, Jun-Ik;Lee, Ho-Soon;Rho, Do-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2003.07b
    • /
    • pp.1395-1397
    • /
    • 2003
  • This paper is concerned with a client-server architecture for the remote control of wind turbine system over the internet network. Recently the development of internet are study in remote area machine control, observation, remote control (teleoperation) automation industrial system in several fields. One of the important problems which should be solved in the remote control is an irregular time delay problem. This research practiced emergency system on-off experiment to Internet. Finally, we apply it to a wind turbine system that consists of a remote control and network via internet. It is experimented that real time of internet remote control and stability of wind turbine system.

  • PDF

A Medium Access Control Protocol for Stable Internet Services on IS-2000 Network (IS-2000망에서 안정적 인터넷 서비스를 위한 매체접근제어 프로토콜)

  • 조성현;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.193-196
    • /
    • 2000
  • A new medium access control protocol is proposed to support stable wireless Internet services. Using the characteristics of the uplink Internet traffic and a Voice-Packet multi-session mode, the proposed protocol transmits the uplink Internet traffic via the voice traffic channel of silent duration in a multi-session mode. Out simulation results show that the proposed protocol guarantees stable wireless Internet services under heavy loads.

  • PDF

Tele-Control of Rapid Prototyping Machine System Via Internet (인터넷 기반의 원격 제어를 이용한 RP 시스템 개발)

  • 최태림;송용억;강신일
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.24-27
    • /
    • 2001
  • Nowadays, increasing demand of the customized products has led to an increased usage of rapid prototyping in the product development. However, the acquisition price of a rapid prototyping equipment is still too high that not every body can afford to buy one. To offer a wide access to the users who need physical prototypes, a connection of the rapid prototyping equipment to the Internet is a viable step. It would allow a large group of customers all over the world to use the manufacturing capability of a service provider offering this kind of manufacturing service. To realize how such an e-manufacturing concept can look like, a LOM-type 3D printer developed at KIST has been used as test site and connected to the Internet. A possible user can log on to the server of the equipment and view his STL file and start the building operation from a remote place. To see whether the operation runs properly, a CCD camera is used to transmit the actual state of operation online. The result so far proves the feasibility of rapid prototyping on the Internet as well as an order-adaptive manufacturing system via web.

  • PDF

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing (클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴)

  • Yin, XiaoChun;Thiranant, Non;Lee, HoonJae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.49-58
    • /
    • 2014
  • With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.

Possibility and Challenge of Using Internet for International Exchange - Focused on Korean Students' Views -

  • Shin-hye, Heo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.55-62
    • /
    • 2024
  • International exchange implementing the Internet began inevitably due to the pandemic, but it provided Digital Nomads with new experiences in their lives using the Internet. This study the possibility and challenge of international exchange implementing the Internet identified. To this end, we explored its strengths and weaknesses through interviews and descriptions of students who participated in international exchange. As a result, we identified that students were positive in the diverse aspects of communication tools and ways, whereas they were negative because they felt difficulties in the physical environment, inaccessible physical conditions especially. They were also negative in the emotional exchange, an ice-breaking which needed much more time than offline exchange. Therefore, we identified in the case of designing or conducting student activities implementing the Internet, including international exchange, the possibility of activities implementing the Internet could be much more extended if their developer various programs considered in the introduction step.

Demographic Characteristics, Purchase Practices and Satisfaction Degree of Women Consumers Purchased Apparel Products via Home Shopping (홈쇼핑으로 의류제품을 구매한 여성 소비자의 특성과 구매실태 및 만족도)

  • Sohn, Boo-Hyun;Choi, Jong-Myoung
    • Korean Journal of Human Ecology
    • /
    • v.12 no.4
    • /
    • pp.497-508
    • /
    • 2003
  • This research was conducted to activate the horne shopping by providing the basic data about demographic characteristics, purchase practices and satisfaction degree of women consumers. The subjects were 328 women consumers residing in Cheongju who had purchased apparel products through home shopping. Collected data were analyzed by frequency analysis, t-test, analysis of variance, and cross-tabulation analysis using SPSS. The results were as follows: 1) When purchasing formal wears, casual wear and furnishing textile products through home shopping, respondents considered the design and fiber content seriously, and when purchasing underwear, the fiber content and size. 2) When purchasing apparel products, most of respondents confirmed apparel labels, and married women confirmed more than single women did. Among apparel labels, fiber content, care symbol, and size were the items that respondents considered most. 3) The single women managed internet and knew the value of internet in searching information or purchasing apparel products better than married ones. 4) When purchasing apparel products via home shopping, respondents used TV, catalog, and internet in order. 5) Degree of satisfaction for clothing purchased via home shopping was in ordinary level, high for furnishing textile products and low for formal wears.

  • PDF

Implementation of Home-Network Sewer using UPnP based on the Embedded Linux (Embedded Linux 기반의 UPnP를 사용한 홈-네트워크 서버 구현)

  • 정진규;진선일;이희정;황인영;홍석교
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.9
    • /
    • pp.638-643
    • /
    • 2004
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this paper is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

Suggestion and Implementation of Improved Control Point for Remote Control Home-Network based on the UPnP (UPnP 기반의 홈-네트워크 원격제어를 위한 개선된 Control Point의 제안 및 구현)

  • Jeong, Jin-Gyu;Jin, Seon-Il;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.769-772
    • /
    • 2003
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility. The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this study is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform.

  • PDF