• Title/Summary/Keyword: web browser

Search Result 628, Processing Time 0.026 seconds

Development of AVL-GIS System Using IDGPS and Wireless Communication Techniques (IDGPS 와 무선통신을 이용한 AVL-GIS 시스템개발)

  • 안충현;양종윤;최종현
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.209-221
    • /
    • 1999
  • In this research, AVL-GIS(Automatic Vehicle Location System linked with Geographic Information System) system was developed using integration of core techniques of GIS engine written by Java language, GOS(Global Positioning System) and wireless telecommunication interfacing techniques. IDGPS(Inverted differential GPS) techniques was employed to estimate accurate position of mobile vehicle and to supervise their path from AVL-GLS control center system. Between mobile vehicle and AVL-GLS control center system which has spatial data analysis function, road network and rleate ddata base were connected wireless phone to communicate for position an dmessage in real time. The developed system from this research has more enhanced GIS functions rather than previous AVL oriented system which has MDT for message display and voice communication only. This system can support build-up application system such as fleet management like bus, taxi, truck, disaster and emergency and monitoring of transportation status for customer s order via web browser in filed of EC/CALS in low cost.

  • PDF

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience (OTP에 대한 신뢰 및 재사용의도의 결정요인: 인지된 보안성, 보안의식 및 사용자경험을 중심으로)

  • Yun, Hae-Jung;Jang, Jae-Bin;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.163-173
    • /
    • 2010
  • PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.

A study on 3D Pottery Modeling based on Web (웹기반 3D 도자기 모델링에 관한 연구)

  • Park, Gyoung Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.209-217
    • /
    • 2012
  • In this paper, I proposed new system that a user makes modeling 3D symmetric pottery using mouse and can confirm the result immediately in internet browser. The main advantage of proposed system is that users who have no specialized knowledge about 3D graphic can easily create 3D objects. And a user can use it that has only PC connected network and mouse without additional devices as like expensive haptic and camera device. For developing proposed system, VRML/X3D that is International Standard language for virtual reality and 3D graphics was used. Because it was born based on internet that is different from other 3D graphic languages, it was able to interact and navigate with users. With those features and high completeness of 3D pottery realization using mouse considered, the system may be useful and is superior in performance to other pottery modeling system.

Schema Definition and Implementation for Web3D Physical Units (웹3D 물리 단위 스키마 정의와 구현)

  • Kim, Lee-Hyun;Park, Chang-Sup;Lee, Myeong-Won
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.3
    • /
    • pp.11-19
    • /
    • 2010
  • This paper describes how to define and implement the schema for 3D virtual objects with physical units so that the objects can be compared in virtual environments based on physical properties, such as length, according to the specified units. We define physical units for virtual objects using the International System of Units and based on the X3D (Extensible 3D) specification. The schema must be defined with validation so that it does not violate the original X3D data structure. In this paper, we have extended the original X3D schema with a physical unit specification, and demonstrate the difference between units-specified and non-units-specified 3D scenes using an X3D browser that we developed.

The blocking method for accessing toward malicious sites based on Android platform (안드로이드 플랫폼 기반 악성사이트 차단 방법)

  • Kim, Dae-Cheong;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.499-505
    • /
    • 2014
  • According to the increasing use of smart devices such as smart phones and tablets, the service that targets mobile office, finance and e-government for convenience of usage and productivity has emerged significantly. As a result, important information is treated with the smart devices and also, the malicious activity that targets smart devices is increasing steadily. In particular, the damage case by harmful sites, malware distribution sites and phishing sites that targets smart devices has occurred steadily and it has emerged as a social issue. In the case of smart devices, the Android platform is occupied the 90% in Korea, 2013 therefore the method of device block level is required to resolve the social issues of smart devices. In this paper, we propose a method that can be effectively blocked when you try to access an illegal site to Web browser on the Android platform and develop the application and also analyze the wrong site block function.

Efficient Sharing System of Medical Information for Interoperability between PACS System (PACS 시스템간 상호운용성을 위한 효율적인 의료 정보공유시스템)

  • Cho, Ik-Sung;Kwon, Hyeong-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.498-504
    • /
    • 2009
  • In the PACS system, the radiology image(X-ray) and its report are saved as separated parts. The exchange of the radiology image between clinics that installed this system are easily achieved by the DICOM standardization. But it is difficult to exchange the radiology report between clinics because a solution of PACS system is different according to manufacturers. The radiology report should be unified the vocabulary and the type of code for effective sharing and exchanging, and also the radiology image and its report should be integrated for the accurate analysis. In this paper, we propose the sharing system of medical information based on HL7-CDA, it defines the templates and converts the structured documents. For this purpose, we design the XML schema of the radiology report and turn the DICOM files into defined schema. The HL7-CDA documents based on XML is easily displayed on web browser and can help the diagnosis by inserting the radiology image.

Design and Implementation of Finger Language Translation System using Raspberry Pi and Leap Motion (라즈베리 파이와 립 모션을 이용한 지화 번역 시스템 설계 및 구현)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2006-2013
    • /
    • 2015
  • Deaf are it is difficult to communicate to represent the voice heard, so theay use mostly using the speech, sign language, writing, etc. to communicate. It is the best way to use sign language, in order to communicate deaf and normal people each other. But they must understand to use sign language. In this paper, we designed and implementated finger language translation system to support communicate between deaf and normal people. We used leap motion as input device that can track finger and hand gesture. We used raspberry pi that is low power sing board computer to process input data and translate finger language. We implemented application used Node.js and MongoDB. The client application complied with HTML5 so that can be support any smart device with web browser.

Design of ActiveX based Application for the Implementation of Control & Monitoring System (제어 및 모니터링 시스템 구현을 위한 ActiveX 기반의 애플리케이션 설계)

  • Song, Min-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1237-1242
    • /
    • 2006
  • Microsoft's ActiveX corresponding to the advanced type of COM based distributed application model is made available for the use of component communication[1]. ActiveX supports reuse of code and object linking, so developers can integrate many objects into application and improve the efficiency of development. Also, Integration of seperated application makes easy to develop customized program[2]. ActiveX, formerly used to develope communication application in Visual C++ or Visual Basic, has the efficiency of programming and is widely used in the M&C(Monitoring and Control) of instruments. In this paper, we will implement M&C application capable of remote operating, and besides, develop web browser and media player in the form of ActiveX control in order to control and monitor program remotely.

  • PDF

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

The Implementation of the Knowledge Potal-based Knowledge Management System in University (지식포털기반 대학지식경영시스템 구축)

  • Kim, Se-Ihn
    • The Journal of Information Technology
    • /
    • v.6 no.1
    • /
    • pp.21-38
    • /
    • 2003
  • The college and university is a knowledge-centered organization, and 'knowledge' is the important strategic resource. Although this organization composed entirely of the knowledge worker that is able to use the knowledge in the most efficient and effective method, our university is not enough to manage the knowledge as strategic advantage. So, we need to implement knowledge management system under knowledge community centered in students, faculty and staff. The well-designed knowledge community can produce a new value and profit that can develope the university organization. We used to the portal technology defined as a personalized, single point of access through a web browser to various information located inside and outside of an university Knowledge portal supporting the activities of knowledge community will improve the knowledge transfer in student's learning activity, the knowledge creation in faulty's research activity, the knowledge sharing amount the various communities, and the accumulation of a process knowledge in operation and management. Eventually, a redesigned knowledge portal-based system will create a new value of university.

  • PDF