• 제목/요약/키워드: webpage

검색결과 128건 처리시간 0.027초

산모의 산후우울 간호관리를 위한 멀티미디어 재택관리 시스템 개발 (Development of a Home-Based Multimedia Tutoring System for Postpartum Depression Management)

  • 배정이
    • 대한간호학회지
    • /
    • 제29권1호
    • /
    • pp.9-20
    • /
    • 1999
  • Postpartum depression is one of the most serious problems in maternal health because it affects not only the mother but also her family. Postpartum depression disturbs maternal -infant interaction and attachment. However, most postpartum depression patients ignore this problem and do not seek treatment. Thus this study in conducted to development of a Home-Based Multimedia Tutoring System for postpartum depression management. With this computerized system, mothers in the postpartum periods can check the level of postpartum depression using a personal computer. This system will go through each mother's data and screen those who have abnormal values. In addition this system includes intervention programs -education for nutrition, hygiene care, sleep, postpartum exercise, methods of relaxation, deep breathing, visualization, music therapy and family therapy-to relieve postpartum depression. Using this system, a mother who has a minor level of depression can manage it by herself. Computer language used in this study were html 3.2, OS used was Microsoftware NT Server 4.0, the graphic tool was Adobe Photoshop 4.0, and the Webpage tool was Notepade. The results of this study are show at internet “URL : http : //203.241.225.42/”. Finally, the author suggests that this system could be adequately applied to assessing postpartum depression and as a intervention strategy for mothers during the postpartum period. Further this study contributes to designing an appropriate postpartum depression prevention strategy.

  • PDF

최근 사이버 아파트의 디지털 서비스 유용성에 대한 사례 연구 (Case study on Evaluation of IT supported cyber apartments in Korea)

  • 백혜영;이연숙;이현정
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2005년도 춘계학술발표대회 논문집
    • /
    • pp.83-87
    • /
    • 2005
  • The supply of Korean housing has met the demand thoughout the fourth quarter of the twentieth century, and demographic, social and economic changes have been entailed. All the circumstances became a significant foundation to develop digital homes. This study was designed to find out the residents' current use of and needs for digital services, and the interview with three housewives residing in a recently developed digital home was conducted. The three households used most of the digital services, and favored cellular phone, as the main device to use digital functions, since it's small and easy to carry out and operate. It was noticed that the use and preference of digital services was likely to be explained by the lifecycle each household and the lifestyles of an individual. The participants didn't use the webpage of the digital home since the information contained in the web site wasn't quite useful. Also the interviewees perceived that digital home brings many conveniences and benefits. Currently, the main constraints for further development of digital home in Korea are affordability and the establishment of a variety of life scenarios from real situations.

  • PDF

Heliocentric Potential (HCP) Prediction Model for Nowscast of Aviation Radiation Dose

  • Hwang, Junga;Kim, Kyung-Chan;Dokgo, Kyunghwan;Choi, Enjin;Kim, Hang-Pyo
    • Journal of Astronomy and Space Sciences
    • /
    • 제32권1호
    • /
    • pp.39-44
    • /
    • 2015
  • It is well known that the space radiation dose over the polar route should be carefully considered especially when the space weather shows sudden disturbances such as CME and flares. The National Meteorological Satellite Center (NMSC) and Korea Astronomy and Space Science Institute (KASI) recently established a basis for a space radiation service for the public by developing a space radiation prediction model and heliocentric potential (HCP) prediction model. The HCP value is used as a critical input value of the CARI-6 and CARI-6M programs, which estimate the aviation route dose. The CARI-6/6M is the most widely used and confidential program that is officially provided by the U.S. Federal Aviation Administration (FAA). The HCP value is given one month late in the FAA official webpage, making it difficult to obtain real-time information on the aviation route dose. In order to overcome this limitation regarding time delay, we developed a HCP prediction model based on the sunspot number variation. In this paper, we focus on the purpose and process of our HCP prediction model development. Finally, we find the highest correlation coefficient of 0.9 between the monthly sunspot number and the HCP value with an eight month time shift.

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

지역 지식정보서비스에 관한 연구 - 한국과 일본의 공공도서관을 중심으로 - (A Study on the Regional Knowledge-Information Service: Focusing on Public Libraries in Korea and Japan)

  • 박현희;이성숙
    • 한국문헌정보학회지
    • /
    • 제49권3호
    • /
    • pp.393-412
    • /
    • 2015
  • 본 연구의 목적은 한국과 일본의 공공도서관의 사례 분석을 통해 지역 지식정보서비스의 발전 방안을 제시하기 위한 것이다. 이를 위해 지역 지식서비스와 관련된 문헌분석, 사례조사를 진행하고 지역 공공도서관 홈페이지를 중심으로 조사 분석하였다. 이러한 분석을 통해 지역 지식정보서비스를 위한 발전 방안으로 이용자 지향적 서비스, 내부 협력, 외부 네트워크 협력, 홍보, 인식의 개선 등을 제안하였다. 본 연구는 앞으로 한국 공공도서관의 지역 지식정보서비스 운영의 기초자료로 활용될 수 있을 것이다.

Touch Effect of Mental Simulation in Online Fashion Shopping -The Role of Instrumental and Autotelic Needs for Touch-

  • Lee, Ha Kyung;Choi, Dooyoung
    • 한국의류학회지
    • /
    • 제45권2호
    • /
    • pp.376-389
    • /
    • 2021
  • This study investigates the effects of the interplay of device types and the need for touch (NFT) on product attitudes and determines how the mental simulation of touch mediates such relationships. Specifically, we test the roles of instrumental and autotelic NFT in the moderated mediation effect of mental simulation of touch. We instructed the potential participants to shop for a leather jacket on a webpage. With a total of 152 data points from the responses of participants who used a laptop and a touch device that uses a direct-touch interface (e.g., tablets), we conducted descriptive statistics, analysis of variance, and PROCESS procedures using SPSS 20.0. The results show a greater mental simulation for touch when using a touch device than a laptop. When individuals' instrumental NFT is low, using a touch device while shopping online heightens mental simulation of touch, which impacts product attitudes. In particular, such a moderated mediation effect strengthens as the value of individuals' autotelic NFT increases. However, when individuals' instrumental NFT is high, a touch device cannot drive mental simulation for touch, increasing favorable attitudes toward the product.

웹 페이지 소스 코드에 기반한 보안 위험도 산정 기법 (Method for Evaluating the Security Risk based on Webpage Source Code)

  • 조상현;이민수;김영갑;이준섭;김상록;김문정;김인호;김성훈
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 추계학술발표대회
    • /
    • pp.1258-1261
    • /
    • 2007
  • 온라인 피싱과 같은 경제적 목적의 정보 수집 행위들이 급격히 증가하고 있는 가운데, 위험 사이트 정보를 관리하는 블랙리스트 기반의 대응과 신뢰할 수 있는 사이트를 기반으로 하는 화이트 리스트 접근 방법이 활용되고 있다. 그러나 블랙리스트 기반 방법은 피싱 사이트의 유효시간을 볼 때 비현실적이며, 화이트 리스트 접근 방법은 인증된 사이트 내에 존재하는 악성 웹 페이지나 악성 사이트로 유도되는 피싱 메일에는 대응하기 어렵다. 이 논문에서는 화이트 리스트 접근 방법을 보완하기 위해 사용자 웹 페이지의 위험도를 정량화 할 수 있는 웹 페이지 위험도 산정 기법을 제안한다.

  • PDF

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.