• Title/Summary/Keyword: web store

Search Result 313, Processing Time 0.026 seconds

Semantic Image Retrieval Using RDF Metadata Based on the Representation of Spatial Relationships (공간관계 표현 기반 RDF 메타데이터를 이용한 의미적 이미지 검색)

  • Hwang, Myung-Gwun;Kong, Hyun-Jang;Kim, Pan-Koo
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.573-580
    • /
    • 2004
  • As the modern techniques have improved, people intend to store and manage the information on the web. Especially, it is the image data that is given a great deal of weight of the information because of the development of the scan and popularization of the digital camera and the cell-phone's camera. However, most image retrieval systems are still based on the text annotations while many images are creating everyday on the web. In this paper, we suggest the new approach for the semantic image retrieval using the RDF metadata based on the representation of the spatial relationships. For the semantic image retrieval, firstly we define the new vocabularies to represent the spatial relationships between the objects in the image. Secondly, we write the metadata about the image using RDF and new vocabularies. Finally. we could expect more correct result in our image retrieval system.

The Development of Image Processing System for Medical Robot Remote Application (의료용 로봇 원격 응용을 위한 영상처리 시스템 개발)

  • Kim, Joo Young;Kim, Joong Hyuk;Kim, Jung Chae;Kim, Kee Deog;Yoo, Sun K.
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.239-251
    • /
    • 2012
  • In this paper, web-base image processing system has been implemented for remote-controlled medical robot applications. The developed software system was hierarchically composed of diverse image processing and remote operation modules, and the hierarchical composition was satisfied the expandability to higher level application and the accessibility over the web. It can also support diverse file formats including DICOM, VRML, and CAD(STL) to display, transmit, store and share the processed images depending on application environment. Message-based data exchange, object-oriented module and open-source based software configuration will enable the dynamic combination associated with diverse remote medical application requirements.

A Study on Expansion of Headings of Korean Decimal Classification Based Upon the Analysis of Directory Classifications of Internet Resources in Food and Culture (음식문화 분야 인터넷자원 분류체계 분석을 통한 한국십진분류법의 항목명 확장에 관한 연구)

  • Chung, Yeon-Kyoung;Lee, Mi-Hwa
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.49-69
    • /
    • 2010
  • Library classification system is based upon academic disciplines, However, it is difficult to classify for Internet resources due to its lack of up-to-datedness and practicality. Especially, headings of Korean Decimal Classification need to reflect practical aspects and it should be also developed for classification of web based resources. The purposes of this study are to analyze the structures of directory classifications in Internet resources and to suggest additional headings of KDC as a practical library classification as well as a classification system for internet resources. Directory classification systems of Naver, Yahoo, Kyobo Internet book store, Amazon were selected and their food and culture subjects were analyzed for this study. The headings of KDC were compared to them and new possible headings were suggested with reference of NDC and DDC in the area of food and culture. This study provided a way of developing KDC for a classification system for Internet resources as well as library materials.

A Study on Web-based Collaborative CAD System (웹 기반 협동 CAD시스템에 관한 연구)

  • 윤보열;김응곤
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.4
    • /
    • pp.767-773
    • /
    • 2000
  • As computer systems and communication technologies develop rapidly, CSCW(Computer Supported Collaborative Work) system appears nowadays, through which it is available to work on virtual space without any restriction of time and place. Most of CWCS systems depend on a special network and groupware. The systems of graphics and CAD are not so many because they are specified by hardware and application software. In this paper, we propose a web-based collaborative CAD system, which can be jointly worked on Internet WWW being independent from any platforms. It can create and modify 3D objects easily using VRML and Java 3D API, and it can send, print, and store them. The interactive work for designing objects can be also carried out through chatting with each other. This system is executed in the environment of Client/server architecture. Clients connect to the CAD sewer through Java applet on WWW. The server is implemented by Java application, and it consists of three components : connection manager which controls the contact to users, work manager which keeps viewing in concurrency and provides virtual work space sharing with others, and solid modeler which creates 3D object.

  • PDF

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

HTML5-based Streaming System Designed for Real-time Store Video (HTML5기반 실시간 저장 영상에 대한 스트리밍 시스템 설계)

  • Ban, Tae-Hak;Bae, Eun-Ah;Kim, Jong-Moon;Jeong, In-Yong;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.736-738
    • /
    • 2014
  • As part of real-time streaming service, which is one of the latest QoS technology has become the issue. But the current majority of streaming services are specific S/W I a separate setup program supports real-time streaming service a reality, will be stored until the end of the video, save for a video about editing and is not available. In this paper, a video about multi-threaded and distributed processing system applied to the Storm technique based on separate software or installation of programs without the H T M L 5-based Web content is produced by each device using a Web browser, real-time streaming system you want, no. This is a streaming service that provides users with real-time editing and the footage is stored as about and respond in real time between the server and the client and content sharing that need training and will be utilized in the field of multimedia streaming.

  • PDF

Implementation of Key Recovery Model based on XML for B2B (B2B를 위한 XML기반의 키 복구 구현)

  • 김주한;문기영;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, we will introduce a design of key recovery based on XML can be used in B2B environment. XML Digital Signature and XML Encryption that are defied recently as standards by W3C(World Wide Web Consortium) are deployed to sign/verify or encrypt/decrypt documents for electronic commerce and keys to store/load at/from key recovery server. The result of signature or encryption is always an XML document and all messages used in this key recovery system are also XML documents. It enables to adapt transparently this key recovery system to legacy XML applications and electronic commerce platforms based on XML. And its method for key recovery is key escrow. One of the characteristics of this key recovery is that one enterprise can recover keys of some documents for electronic commerce from external key recovery system in other enterprises related with them and also recover keys from owns.

Personal Information Protection Recommendation System using Deep Learning in POI (POI 에서 딥러닝을 이용한 개인정보 보호 추천 시스템)

  • Peng, Sony;Park, Doo-Soon;Kim, Daeyoung;Yang, Yixuan;Lee, HyeJung;Siet, Sophort
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.377-379
    • /
    • 2022
  • POI refers to the point of Interest in Location-Based Social Networks (LBSNs). With the rapid development of mobile devices, GPS, and the Web (web2.0 and 3.0), LBSNs have attracted many users to share their information, physical location (real-time location), and interesting places. The tremendous demand of the user in LBSNs leads the recommendation systems (RSs) to become more widespread attention. Recommendation systems assist users in discovering interesting local attractions or facilities and help social network service (SNS) providers based on user locations. Therefore, it plays a vital role in LBSNs, namely POI recommendation system. In the machine learning model, most of the training data are stored in the centralized data storage, so information that belongs to the user will store in the centralized storage, and users may face privacy issues. Moreover, sharing the information may have safety concerns because of uploading or sharing their real-time location with others through social network media. According to the privacy concern issue, the paper proposes a recommendation model to prevent user privacy and eliminate traditional RS problems such as cold-start and data sparsity.

Harmful Image Detection Method Using Skin and Non-Skin Features (피부 특징과 비 피부 특징을 이용한 유해 이미지 탐지 방법)

  • Jun, Jae-Hyun;Jung, Min-Suk;Jang, Yong-Suk;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.55-61
    • /
    • 2015
  • Today, IT technology provide convenience to many people. Smartphone era is opened, and market environment is changing rapidly. Pornography market is active by using smartphone use free internet. Many people access mobile harmful site of USA and Japan. App store of the apple has been cut off the porn service, but access block to mobile Web page is an impossible situation. In this paper, we proposed the harmful image detection method of using skin and non skin features to detect harmful image. Our proposed method can provide enough performance than previous method.

A product recommendation system based on adjacency data (인접성 데이터를 이용한 추천시스템)

  • Kim, Jin-Hwa;Byeon, Hyeon-Su
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2011
  • Recommendation systems are developed to overcome the problems of selection and to promote intention to use. In this study, we propose a recommendation system using adjacency data according to user's behavior over time. For this, the product adjacencies are identified from the adjacency matrix based on graph theory. This research finds that there is a trend in the users' behavior over time though product adjacency fluctuates over time. The system is tested on its usability. The tests show that implementing this recommendation system increases users' intention to purchase and reduces the search time.