• Title/Summary/Keyword: webpage

Search Result 128, Processing Time 0.033 seconds

A Study on Event Revitalization for Reading Education in School Libraries (독서교육을 위한 학교도서관의 행사 활성화 방안)

  • Lee, Man-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.1
    • /
    • pp.385-404
    • /
    • 2009
  • The purpose of this study is to survey the events which school libraries have practiced for reading education and to do the suggestions on the revitalization of events which are related to the reading education. The results of this study is like following; 1) Teacher-librarians should be employed to school libraries. 2) School libraries ought to make a plan for the events which are related to the reading and libraries and practice it. 3) School libraries have to inform the news according to reading education events through the webpage of school libraries. 4) The budget for reading education should be obtained. 5) The administrative assistance is needed for the reading education events. 6) Teacher-librarian should make the plans for reading education based on the social memorials.

  • PDF

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

An Implementation the e-Healthcare System for the Indoor Diagnosis of the People Using the Color Analysis System (컬러분석시스템을 이용한 재택진료 e-Healthcare System구현)

  • Moon, Hyun-Sik;Kwak, Ji-Young;Kwon, Hyouk-Gil;Kim, Min-Sik;Lee, Eung-Hyuk
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.545-547
    • /
    • 2005
  • As information technology has been developed rapidly, there is growing online medicine service through forming as information technology and medicine information are amalgamated in the medical service field. That acquires real time biological information of patient through a communication network which could be applied into e-healthcare system for a diagnosis and treatment of patient. Because of these reasons, it is necessary for the e-healthcare system to develop. But,the facilities existing in the medical service field could not be used to an on line environment because of the limitation of the time and space. To solve the point of such issue, we propose an auto color analysis system that is a precise and quick to measure health states of user, and the device has the important merit that it is very low cost. Also, the hospital web database and the monitering webpage for a diagnosis have been made for an e-healthcare system.

  • PDF

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

Applying the Identical Content to Various Types of Mobile Devices Using the Image Map Method (이미지 맵 방법을 이용한 다양한 모바일 단말기에서의 동일한 컨텐츠 적용)

  • Zhao, Mei-Hua;Seo, Chang-Woo;Ko, Hee-Ae;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.173-184
    • /
    • 2010
  • The advancement of ubiquitous networks facilitates and increases access to the Internet via mobile devices, which offers the advantages of enhanced mobility and accessibility. While Mobile Internet is largely free of temporal and spatial restrictions, producing content for mobile websites is a challenging work due to the existence of multiple device types and markup languages. This paper proposes a technique that makes use of image maps to improve the visual consistency of mobile web content displayed on a variety of mobile devices. The proposed image map method captures several objects comprising the webpage into a single image, and provides the image in Mobile Web services. Mobile devices employing the proposed method can reorganize webpages with multiple objects more easily and obtain the visually identical content on their screen.

Design and Implementation of Warehouse Management Visualization System based on Silverlight (Silverlight 기반의 창고관리 시각화 시스템설계 및 구현)

  • Im, Ji-Young;Ryu, Nam-Hoon;Ban, Kyeong-Jin;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.313-318
    • /
    • 2008
  • The next generation Web 2.0 users are requiring a screen that satisfies visual and emotional factors regarding UI and the possibility of constant recognition about various information. To actively deal with these kinds of user demands, dual cooperation between the developer and designer is becoming more urgently needed. For this, Microsoft released Silverlight, a tool for when making a web presentation that enables persons to create a visually stunning webpage using diverse platforms and function. We applied clarity and animation to existing windows concepts, using Silverlight with which designers and developers can work together and is accessable to many development tools, and provided 3D effects to implement a Warehouse Management System.

  • PDF

Web-based Controlled Delivery and Consumption of Multimedia in MPEG-21 Framework

  • Hendry Hendry;Cha Kyung-Ae;Park Keunsoo;Kim Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.43-46
    • /
    • 2004
  • MPEG-21 is an on-progress project of the Moving Picture Expert Group (MPEG) that has been started in many independent parts such as part for standardizing the declaration of a digital item (MPEG-21 Part 2: Digital Item Declaration), right expression language (MPEG-21 Part S: Rights Expression Language), way to process the digital item (MPEG-21 Part 10: Digital Item Processing), etc. All this part is intended to form a framework to enable transparent and augmented use of multimedia resources across a wide range of networks and devices (1). In this paper, we show our research initiative to develop a web-based application that utilized many parts of MPEG-21 technology. The implemented concept uses a digital item and license providers in the server side while the MPEG-21 Conformant application is implemented as a plug-in application that will be downloaded to the user terminal when user accesses the webpage for the frist time. The result of this research shows that with some combination of MPEG-21 parts, we can develop an authorized multimedia delivery and consumption application.

  • PDF

API Design and Webpage Mapping for GPS NMEA based Google Map (GPS NMEA기반의 Google MAP용 API설계 및 웹페이지 매핑)

  • Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.29-36
    • /
    • 2011
  • In this paper, NMEA based Parser programming for Smart-phone was designed at a GPS receiver. The design scheme for Map API and sensor web services was designed according to the Google Map API standards that the position values of NMEA sentences were changed due to XML files. As a result of interfaces between GPS NMEA sentences of Smart-phone and Google Map API, it is possible that real time visual positioning sensor web services about the Google Map mapping from a GPS receiver could be worked on web sever.

Training and role of paramedics in Japan (일본 구급구명사의 양성 및 업무에 관한 고찰)

  • Lee, Kyoung-Youl
    • The Korean Journal of Emergency Medical Services
    • /
    • v.18 no.2
    • /
    • pp.137-145
    • /
    • 2014
  • Purpose: The emergency medical service (EMS) system in Japan is similar to that in Korea. This study reviewed the development of paramedics who are major personnel in the respective EMS system of their country. Methods: We searched law for paramedics and publications in J-stage, MEDLINE and the webpage of Japan's Fire and Disaster Management Agency. Results: Paramedic training had started in Japan in 1991, and most paramedics were employed in fire departments. In Japan, ambulances belonging to fire department are staffed by a three-person unit, including at least one paramedic. Medical control advisory boards were established in all Japanese prefectures in 2003 with the purpose of upgrading the activities of ambulance personnel, including paramedics. The scope of paramedics' work has been widened owing to the continued efforts of medical control advisory boards. This allows them to perform invasive procedures including tracheal intubation, intravenous line placement, and epinephrine administration under medical control of a physician. Conclusion: As paramedics' responsibilities expand, further development of the paramedic role and an effective medical control advisory board system are imperative both Korea and Japan.