• Title/Summary/Keyword: webpage

Search Result 128, Processing Time 0.024 seconds

Development of a Home-Based Multimedia Tutoring System for Postpartum Depression Management (산모의 산후우울 간호관리를 위한 멀티미디어 재택관리 시스템 개발)

  • 배정이
    • Journal of Korean Academy of Nursing
    • /
    • v.29 no.1
    • /
    • pp.9-20
    • /
    • 1999
  • Postpartum depression is one of the most serious problems in maternal health because it affects not only the mother but also her family. Postpartum depression disturbs maternal -infant interaction and attachment. However, most postpartum depression patients ignore this problem and do not seek treatment. Thus this study in conducted to development of a Home-Based Multimedia Tutoring System for postpartum depression management. With this computerized system, mothers in the postpartum periods can check the level of postpartum depression using a personal computer. This system will go through each mother's data and screen those who have abnormal values. In addition this system includes intervention programs -education for nutrition, hygiene care, sleep, postpartum exercise, methods of relaxation, deep breathing, visualization, music therapy and family therapy-to relieve postpartum depression. Using this system, a mother who has a minor level of depression can manage it by herself. Computer language used in this study were html 3.2, OS used was Microsoftware NT Server 4.0, the graphic tool was Adobe Photoshop 4.0, and the Webpage tool was Notepade. The results of this study are show at internet “URL : http : //203.241.225.42/”. Finally, the author suggests that this system could be adequately applied to assessing postpartum depression and as a intervention strategy for mothers during the postpartum period. Further this study contributes to designing an appropriate postpartum depression prevention strategy.

  • PDF

Case study on Evaluation of IT supported cyber apartments in Korea (최근 사이버 아파트의 디지털 서비스 유용성에 대한 사례 연구)

  • Baek, Hye-Young;Lee, Yeun-Sook;Lee, Hyun-Jeong
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.83-87
    • /
    • 2005
  • The supply of Korean housing has met the demand thoughout the fourth quarter of the twentieth century, and demographic, social and economic changes have been entailed. All the circumstances became a significant foundation to develop digital homes. This study was designed to find out the residents' current use of and needs for digital services, and the interview with three housewives residing in a recently developed digital home was conducted. The three households used most of the digital services, and favored cellular phone, as the main device to use digital functions, since it's small and easy to carry out and operate. It was noticed that the use and preference of digital services was likely to be explained by the lifecycle each household and the lifestyles of an individual. The participants didn't use the webpage of the digital home since the information contained in the web site wasn't quite useful. Also the interviewees perceived that digital home brings many conveniences and benefits. Currently, the main constraints for further development of digital home in Korea are affordability and the establishment of a variety of life scenarios from real situations.

  • PDF

Heliocentric Potential (HCP) Prediction Model for Nowscast of Aviation Radiation Dose

  • Hwang, Junga;Kim, Kyung-Chan;Dokgo, Kyunghwan;Choi, Enjin;Kim, Hang-Pyo
    • Journal of Astronomy and Space Sciences
    • /
    • v.32 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • It is well known that the space radiation dose over the polar route should be carefully considered especially when the space weather shows sudden disturbances such as CME and flares. The National Meteorological Satellite Center (NMSC) and Korea Astronomy and Space Science Institute (KASI) recently established a basis for a space radiation service for the public by developing a space radiation prediction model and heliocentric potential (HCP) prediction model. The HCP value is used as a critical input value of the CARI-6 and CARI-6M programs, which estimate the aviation route dose. The CARI-6/6M is the most widely used and confidential program that is officially provided by the U.S. Federal Aviation Administration (FAA). The HCP value is given one month late in the FAA official webpage, making it difficult to obtain real-time information on the aviation route dose. In order to overcome this limitation regarding time delay, we developed a HCP prediction model based on the sunspot number variation. In this paper, we focus on the purpose and process of our HCP prediction model development. Finally, we find the highest correlation coefficient of 0.9 between the monthly sunspot number and the HCP value with an eight month time shift.

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

A Study on the Regional Knowledge-Information Service: Focusing on Public Libraries in Korea and Japan (지역 지식정보서비스에 관한 연구 - 한국과 일본의 공공도서관을 중심으로 -)

  • Park, Hyun-Hee;Lee, Sung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.393-412
    • /
    • 2015
  • The purpose of this study is to suggest development plan of the Regional knowledge information services through the case study analysis between Korea and Japan public libraries. For this purpose, we analyzed literature related to the Regional knowledge information services, performed case study, and carried out a investigation which focuses on a public libraries webpage. According to the analysis, the development plan for the Regional knowledge information services was suggested as follow; that is user-friendly service, internal cooperation, external network cooperative strategy, visible public relations and recognition improvement. This study has aimed to prepare for the basic data which will help Korea public libraries to make better Regional knowledge information services in the future.

Touch Effect of Mental Simulation in Online Fashion Shopping -The Role of Instrumental and Autotelic Needs for Touch-

  • Lee, Ha Kyung;Choi, Dooyoung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.45 no.2
    • /
    • pp.376-389
    • /
    • 2021
  • This study investigates the effects of the interplay of device types and the need for touch (NFT) on product attitudes and determines how the mental simulation of touch mediates such relationships. Specifically, we test the roles of instrumental and autotelic NFT in the moderated mediation effect of mental simulation of touch. We instructed the potential participants to shop for a leather jacket on a webpage. With a total of 152 data points from the responses of participants who used a laptop and a touch device that uses a direct-touch interface (e.g., tablets), we conducted descriptive statistics, analysis of variance, and PROCESS procedures using SPSS 20.0. The results show a greater mental simulation for touch when using a touch device than a laptop. When individuals' instrumental NFT is low, using a touch device while shopping online heightens mental simulation of touch, which impacts product attitudes. In particular, such a moderated mediation effect strengthens as the value of individuals' autotelic NFT increases. However, when individuals' instrumental NFT is high, a touch device cannot drive mental simulation for touch, increasing favorable attitudes toward the product.

Method for Evaluating the Security Risk based on Webpage Source Code (웹 페이지 소스 코드에 기반한 보안 위험도 산정 기법)

  • Cho, Sanghyun;Lee, Min-Soo;Kim, Young-Gab;Lee, Junsub;Kim, Sangrok;Kim, Moon-Jeong;Kim, In Ho;Kim, Sung Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1258-1261
    • /
    • 2007
  • 온라인 피싱과 같은 경제적 목적의 정보 수집 행위들이 급격히 증가하고 있는 가운데, 위험 사이트 정보를 관리하는 블랙리스트 기반의 대응과 신뢰할 수 있는 사이트를 기반으로 하는 화이트 리스트 접근 방법이 활용되고 있다. 그러나 블랙리스트 기반 방법은 피싱 사이트의 유효시간을 볼 때 비현실적이며, 화이트 리스트 접근 방법은 인증된 사이트 내에 존재하는 악성 웹 페이지나 악성 사이트로 유도되는 피싱 메일에는 대응하기 어렵다. 이 논문에서는 화이트 리스트 접근 방법을 보완하기 위해 사용자 웹 페이지의 위험도를 정량화 할 수 있는 웹 페이지 위험도 산정 기법을 제안한다.

  • PDF

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.