• Title/Summary/Keyword: web browser

Search Result 628, Processing Time 0.024 seconds

Teleoperation System of a Mobile Robot over the Internet (인터넷을 이용한 이동로봇의 원격 운용 시스템)

  • Park, Taehyun;Gang, Geun-Taek;Lee, Wonchang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.3
    • /
    • pp.270-274
    • /
    • 2002
  • This paper presents a teleoperation system that combines computer network and an autonomous mobile robot. We control remotely an autonomous mobile robot with vision over the Internet to guide it under unknown environments in the real time. The main feature of this system is that local operators need a web browser and a computer connected to the communication network and so they can command the robot in a remote location through the home page. The hardware architecture of this system consists of an autonomous mobile robot, workstation, and local computers. The software architecture of this system includes the client part for the user interface and robot control as well as the server part for communication between users and robot. The server and client systems are developed using Java language which is suitable to internet application and supports multi-platform. Furthermore. this system offers an image compression method using JPEG concept which reduces large time delay that occurs in network during image transmission.

Development of Meteorologic Data Retrieval Program for Vulnerability Assessment to Natural Hazards (재해 취약성 평가를 위한 기상자료 처리 프로그램 MetSystem 개발)

  • Jang, Min-Won;Kim, Sang-Min
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.47-54
    • /
    • 2013
  • Climate change is the most direct threatening factors in sustaining agricultural productivity. It is necessary to reduce the damages from the natural hazards such as flood, drought, typhoons, and snowstorms caused by climate change. Through the vulnerability assessment to adapt the climate change, it is possible to analyze the priority, feasibility, effect of the reduction policy. For the vulnerability assessment, broad amount of weather data for each meterological station are required. Making the database management system for the meteorologic data could troubleshoot of the difficulties lie in handling and processing the weather data. In this study, we generated the meteorologic data retrieval system (MetSystem) for climate change vulnerability assessment. The user interface of MetSystem was implemented in the web-browser so as to access to a database server at any time and place, and it provides different query executions according to the criteria of meteorologic stations, temporal range, meteorologic items, statistics, and range of values, as well as the function of exporting to Excel format (*.xls). The developed system is expected that it will make it easier to try different analyses of vulnerability to natural hazards by the simple access to meteorologic database and the extensive search functions.

Diagnosing the Cause of Operational Faults in Machine Tools with an Open Architecture CNC

  • Kim Dong Hoon;Kim Sun Ho;Song Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.8
    • /
    • pp.1597-1610
    • /
    • 2005
  • The conventional computerized numerical controller (CNC) of machine tools has been increasingly replaced by a PC-based open architecture CNC (OAC) that is independent of a CNC vendor. The OAC and machine tools with an OAC have led to a convenient environment in which user-defined applications can be efficiently implemented within a CNC. This paper proposes a method of diagnosing the cause of operational faults. The method is based on the status of a programmable logic controller in machine tools with an OAC. An operational fault is defined as a disability that occurs during the normal operation of machine tools. Operational faults constitute more than 70 percent of all faults and are also unpredictable because most of them occur without any warning. To quickly and correctly diagnose the cause of an operational fault, two diagnostic models are proposed: the switching function and the step switching function. The cause of the fault is logically diagnosed through a fault diagnosis system using diagnostic models. A suitable interface environment between a CNC and developed application modules is constructed to implement the diagnostic functions in the CNC domain. The results of the diagnosis were displayed on a CNC monitor for machine operators and transmitted to a remote site through a Web browser. The proposed diagnostic method and its results were useful to unskilled machine operators and reduced the machine downtime.

Groupware Current Status Analysis Ⅰ (그룹웨어의 현황 분석 Ⅰ)

  • Kim, Sun-Uk;Gim, Bong-Jin
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.75-93
    • /
    • 1997
  • Unlike individual applications, it is extremely hard to obtain user requirements for group systems, since there exists very complicated dynamics in group. This may result in spreading a great amount of products with a broad range of contents. Thus, this study presents a comparative analysis of groupware products. As a result, these products have been categorized into three areas which include cooperation/document management systems, collaborative writing systems, and decision-making/meeting systems. While the systems reviewed here focus on the cooperation/document management systems, the other two areas will be dealt in details in part Ⅱ. The first area ends up with two large categories such as proprietary groupware products and intranet groupware products. However, it has been observed that there is a natural convergence between these two categories. Consequently, the comparative analysis has been performed in terms of functions provided on the two categories and a combined category. Each group of the functions has been divided into three parts which consist of basic functions, quasi-basic functions, and others. Such a decision has been made based on the frequency rate of the functions provided in the products. With a more strict rule, the basic functions comprise electronic mail, sanction, bulletin board, document management, scheduling, security, Web browser, and Internet connectivity. This study also provides a framework for integrated functional model of groupware systems. The basic functions are merged into the model. However, the model is so flexible that it can partially include the quasi-functions in addition to the basic functions. In the future, it is expected that a large number of products will stem from the modification of the functional model.

  • PDF

Development of the Jini Surrogate-based Broadband PLC Home Controller (Jini Surrogate에 기반한 광대역 PLC 홈 제어기 개발)

  • Kim Hee-Sun;Lee Chang-Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • The home network system guarantees families a safe, economical, socially integrated and healthy life by using information appliances. And it provides a family with domestic safety, control of instruments, controllable energy and health monitoring by connecting to home appliances. This study designs the broadband PLC home controller using broadband PLC(Power Line Communication) technology which can save much cost at a network infrastructure by using the existing power line at home. The broadband PLC home controller consists of the broadband PLC module, the embedded main controller module and I/O module. The broadband PLC home controller can control various domestic appliances such as an auto door-lock, a boiler, an oven, etc., because it has various I/O specifications. In this study, selected home network middleware for the broadband PLC home controller is Jini surrogate using Jini technology designed by means of access to easily a home network system without a limitation of the devices. And a client application program is supported java servlet program to manage and monitor the broadband PLC home controller via web browser of a PC or a PDA, etc. Finally, for an application, we implemented and tested a home security system using one broadband PLC home controller.

A Study on the Implementation of Mobile Website Using HTML5 (HTML5를 이용한 모바일 웹사이트 구현)

  • Nam, Chi-Hyuk;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.165-172
    • /
    • 2013
  • Website creations and their renewal process are very difficult due to ever-changing mobile environments such as various operating systems and mobile devices. In this regard, HTML5 serves as the solution and guideline to developing well-functioning websites. Mobile websites using HTML5 can provide consistent contents and services even though users access them through various OS or device types. This paper examines a possibility of the HTML5-based website for a local private college located in Busan. For this, location-based map service and semantic auto dialing webform service have been implemented. After making the website available, students and staff members were satisfied with the improvement in the speed of loading time and error free contents service. In the future, the rest of HTML5 functionalities are planned to be implemented sequentially.

A study on the push technology for Web Browser (웹브라우저에서 푸시 테크놀로지 광고 연구)

  • Hong, Yoon-Ki;Choi, Sung
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07a
    • /
    • pp.175-184
    • /
    • 1999
  • 인터넷의 사용자 증가와 저 비용, 그리고 언제 어디서나 필요한 정보를 다양하고 상세하게 볼 수 있는 장점에 힘입어 고도성장이 거듭되고 있다. 또, 인터넷 인구가 증가와 더불어 전자적인 거래가 만들어지는 것을 전자상거래라 하며, 이러한 상거래에서 전자적으로 매매와 구입을 하게 된다. 전자상거래의 증가는 개인과 기업 모두 자신의 웹사이트와 물품을 알리기 위하여 홍보하기 시작하였다. 이런 홍보가 바로 광고이며, 광고는 사람들이 봐야 홍보 효과가 있다. 인터넷이라는 매체는 전세계라는 장소와 24 시간이라는 시간, 그리고 적은 비용으로 유지되지만 사용자의 자율에 의해 검색을 하게 되므로 웹사이트에 찾아오지 않으면 광고의 홍보 효과는 그만큼 낮을 수밖에 없다. 또한 기존 배너광고의 경우 웹사이트에 10%라는 공간만을 할당하므로 계속해서 늘어가는 광고를 점차 감당하기 어렵게 되어 가고 있다. 이밖에도 광고의 효과를 예측하기 힘들다는 점은 광고주로부터 신뢰감을 얻지 못하고 있다. 이러한 기존 풀(Pull)방식의 단점을 극복하고자 새로이 등장하게 된 것이 푸시 테크놀로지(Push Technology)이다. 푸시 테크놀로지란 정보를 밀어 보내주는 방식을 의미하며, TV처럼 방송국에서 시청자가 어쩔 수 없이 보게 해 주는 기술이다. 이렇게 TV의 장점과 인터넷의 장점을 합쳐 놓은 것이 바로 푸시 테크놀로지이다. 본 연구에서는 기존 풀(Pull)방식의 문제점 및 이를 이용한 광고의 단점을 알아보고 이로 인하여 등장하게 된 푸시(Push)방식에 대한 설명과 이를 이용한 광고기법 기술에 대해서 연구하였다.

  • PDF

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System

  • Lim, Hyung-Min;Jang, Kun-Won;Kim, Byung-Gi
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.609-620
    • /
    • 2010
  • In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this purpose, SCORM (Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) and other standards provide learning design support functions, such as, progress checks. However, in order to apply these types of standards, contents packaging is required, and due to the complicated standard dimensions, the facilitation level is lower than the work volume when developing the contents and this requires additional work when revision becomes necessary. In addition, since the learning results are managed by the server there is the problem of the OS being unable to save data when the network is cut off. In this study, a system is realized to manage the actions of learners through the event interception of a web-browser by using event hooking. Through this technique, all HTMLbased contents can be facilitated again without additional work and saving and analysis of learning results are available to improve the problems following the application of standards. Furthermore, the ubiquitous learning environment can be supported by tracking down learning results when the network is cut off.

Implementation of a Mouse with an OLED display for a Customized Advertisement Based on the Internet (인터넷 기반 수요자 맞춤형 광고를 위한 OLED 디스플레이 장착 마우스의 구현)

  • Lee, Sun-Hwan;Lee, Hyuek-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.1
    • /
    • pp.50-55
    • /
    • 2011
  • In this paper, we propose and demonstrate an effective video advertising method for on-line shopping malls. For the Internet advertising, we make a mouse with a small OLED display that can communicate with PC's Internet network. Without displaying the teasing Pop-ups on the PC's monitor, the advertising for a shopping mall is directly sent to the OLED display on the mouse. Also, the proposed method has merits of sending the advertising based on customer's preference by using IP multicasting, which the customer can select an advertising category in advance. When the customer want to buy an item on the OLED display, the detail advertising can be immediately accessed through a Web browser on PC's monitor by pushing a special button on the mouse.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.