• Title/Summary/Keyword: 사용자 점도

Search Result 3,350, Processing Time 0.034 seconds

An Exploratory Study on User Experience of Augmented Reality Advertising (증강현실 광고의 사용자경험에 대한 탐색적 연구)

  • Sung, Jungyeon;Jo, Jae-wook
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.177-183
    • /
    • 2016
  • Augmented Reality(AR) has been further developed through connectivity with Artificial Intelligence (AI), Big Data, the Internet of Things(IoT). The interest of AR in the advertising is on the increase. However, it needs to explore the use of AR technology in advertising based on user experience rather than the technical aspects. This study is very significant in that it is the exploratory study which provides guidelines in the field of utilizing AR, particularly based on direct user experience. In addition, through a quantitative survey, it checks the validity of the present study to verify the impact of utilitarian, experiential value of AR ad on brand attitude as consumer attitude. The characteristics of AR ad based on user experience through this study will provide guidance to utilize AR ad, utilizing AR technology in various fields, such as education and exhibitions in developing convergence contents that can provide practical value.

Zero-knowledge Based User Remote Authentication Over Elliptic Curve (타원곡선상의 영지식기반 사용자 원격인증 프로토콜)

  • Choi, Jongseok;Kim, Howon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.517-524
    • /
    • 2013
  • Although password-based authentication as known as knowledge-based authentication was commonly used but intrinsic problems such as dictionary attack remain unsolved. For that the study on possession-based authentication was required. User remote authentication using smartcard is proceeding actively since Lee et al. proposed user remote authentication using knowledge-based information(password) and possession-base information(smartcard) in 2002. in 2009, Xu et al. proposed a new protocol preserving user anonymity and Shin et al. proposed enhanced scheme with analysis of its vulnerabilities on user anonymity and masquerading attack in 2012. In this paper, we analyze Shin et al. scheme on forward secrecy and insider attack and present novel user authentication based on elliptic curve cryptosystem which is secure against forward secrecy, insider attack, user anonymity and masquerading attack.

The Success Factors for Self-Service Business Intelligence System: Cases of Korean Companies (사용자 주도 비즈니스 인텔리전스 성공요인 고찰: 한국 기업 사례를 중심으로)

  • JungIm Lee;Soyoung Yoo;Ingoo Han
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.127-148
    • /
    • 2023
  • Traditional Business Intelligence environment is limited to support the rapidly changing businesses and the exponential growth of data in both volume and complexity of data. Companies should shift their business intelligence environment into Self-Service Business Intelligence (SSBI) environment in order to make smarter and faster decisions. However, firms seem to face various challenges in implementing and leveraging the effective business intelligence system, and academics do not provide sufficient studies related including the success factors of SSBI. This study analyzes the three cases of Korean companies in depth, their development process and the assessment of business intelligence, based on the theoretical model on the key success factors of business intelligence systems. The comparative analysis of the three cases including project managers' interviews and performance evaluations provide rich implications for the successful adoption and the use of business intelligence systems of firms. The study is expected to provide useful references for firms to fully leverage the effects of business intelligence systems and upgrade towards self-service business intelligence systems.

Development of a Calculating Program for the Prism Power Influencing to Binocular Vision according to Shift of Binocular Visual Points in the Distance Vision Spectacles (원용안경의 양안 주시점 이동에 따른 양안시에 미치는 프리즘 굴절력 산출 프로그램 개발)

  • Lee, Dong-Hee
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.15 no.3
    • /
    • pp.257-262
    • /
    • 2010
  • Purpose: Developing a calculating program for the prism power which influenced the binocular vision according to shifts of binocular visual points in the distance vision spectacles. Methods: By using the Delphi 6.0 programming language, we developed a calculating program of the relative binocular prism power according to the movements of binocular visual points in the distance vision spectacles, which was calculated by dragging the mouse along the traces of binocular visual points on the computer window. Results: We developed a calculating program for the relative binocular prism power according to the movements of binocular visual points in the distance vision spectacles. The user of the program could confirm the trace of visual points by allowing them to display the trace of binocular visual points on the computer screen with a mouse button. An application on confirming the variation of prism power by graphs in the program also allowed the user to use the program more conveniently. Conclusions: By using the developed program, the user could easily calculate the relative binocular prism power according to shifts of binocular visual points in the distance vision spectacles. We also found that the developed program helped the user to receive a lot of assistance in analyzing the asthenopia.

Automatic Generation of Aimpoints Using 3D Target Shapes and CEP (3차원 모델 형상과 원형공산오차를 고려한 목표점 자동 생성 기법)

  • Kang, Yuna
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.71-79
    • /
    • 2019
  • This research proposes an automatic generation system of aimpoints with considering 3D target shapes and CEP(circular error probability) values after determining a target and an azimuth value. In the past, users decided aimpoints manually based on experience or just chose a middle point of the 3D model. Futhermore, it was not possible to select a proper position with consideration of azimuth because users should decide aimpoints before the azimuth value was determined. To solve this problem, this research provides a automatic system to compute proper aimpoints with 3D target shapes, azimuth values and CEP. This article contains the explanation of 3 steps for generating aimpoints automatically: first, generating a reference plane and candidate entry points, then computing scores of each entry points and finally determining an aimpoint from the entry point with the highest score. Users can easily determine a final aimpoint with high probability of success using this system.

A Study on Implementation of Vulnerability Assessment Tool on the Web (웹 환경을 이용한 보안 취약점 점검 도구 개발에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.82-85
    • /
    • 2007
  • 본 논문은 웹을 이용한 보안 취약점 점검 도구를 개발한다. 본 논문은 보안 취약점 점검 도구들을 이용하여 웹 상에서 사용자의 컴퓨터 시스템에 대한 점검을 통해서 결과를 보여주는 환경을 개발한다. 개발된 웹 보안 취약점 점검 도구는 쉽게 자신의 서버 컴퓨터의 취약점을 점검할 수 있다. 본 논문에서 구현된 보안 취약점 점검 도구의 기능은 포트 스캔, SQL injection 취약점 점검 기능으로 구성되어 있다. 포트 스캔 취약점 점검 도구의 기능은 열려져 있는 컴퓨터 시스템의 포트 점검을 통하여 불필요하게 열려져 있는 포트를 점검한다. 이런 점검을 통해서 보안 취약점을 사전에 차단한다. SQL injection 기능은 DB에서 SQL 구문의 취약점을 점검한다. 본 논문에서 제안하는 보안 취약점 점검 기능에 대해서 실험을 수행하였다.

  • PDF

Design of An Automated Penetration Testing Tool for SQL/NoSQL Injection Vulnerabilities (SQL/NoSQL Injection 취약점 자동 침투 시험 도구의 설계)

  • Oh, Jung-Wook;Doh, Kyung-Goo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.431-434
    • /
    • 2014
  • 웹서비스 사용이 보편화되면서 웹 애플리케이션의 보안취약점을 악용하는 해커들이 늘어나고 있다. 악의적인 공격으로 인한 피해를 막기 위해 보안을 견고하게 하지만 보안취약점에 의한 피해가 빈번하게 발생하고 있다. 본 논문에서는 이러한 보안취약점 중 SQL Injection 취약점과 NoSQL Injection 취약점을 분석하고, 침투 시험을 통해 사용자의 최소한의 개입만으로 SQL Injection 취약점과 NoSQL Injection 취약점을 자동으로 탐지하는 도구의 설계 방법을 제안한다. 제안한 도구는 SQL Injection 취약점과 NoSQL Injection 취약점을 탐지하기 위한 전문적인 보안 지식을 요구하지 않기 때문에 자동 침투 시험 도구를 사용하면 보안 비전문가도 쉽게 취약점을 탐지할 수 있다.

Development of Integrated Analysis Model for Eyegaze Analysis - With Emphasis on the Generation of Heuristic Guidelines for User Interface Design - (시선추적 분석을 위한 통합 해석 모델의 개발 - 사용자 인터페이스 디자인을 위한 휴리스틱 가이드라인의 도출을 중심으로 -)

  • 성기원;이건표
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.23-32
    • /
    • 2004
  • This paper's objective is the analysis of eye-movement recording with visual perception process, the inference of heuristic guidelines with human information processing, and the generation of design principles for practical works. For this objective, it was experimented on that the user's eye-movement recording of interactive media with the Eyegaze Interface System, and analyzed the visual perception process of top-down & bottom-up processing, and inferred the design principles from human information process. Our results provide the implications of design through the analysis of the user's eye-movement recording that were changed according to each menu depth of the interactive media. And, it is proposed that the new concept of heuristic guidelines based on each stage of action that is related to human factors.

  • PDF

Vulnerability Analysis on the Strong-Password Mutual Authentication Protocols (강력한 패스워드 상호인증 프로토콜 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.722-728
    • /
    • 2011
  • Most services need to have authentication protocols to verify users' eligibility in the network environment. For this, a lot of user authentication protocols have been researched and developed. Two of them, SPMA and I-SPMA protocols, introduced the lack of mutual authentication and vulnerability to the reply attack of the prior protocols and suggested revised protocols. Nevertheless, these protocols did not mention about the critical problem caused when the server and the client lose synchronization on the secret information between them. Therefore, in this paper, we analyze the security characteristics of the existing protocols and prove the vulnerability to the synchronization of the protocols.

Implementation of Smart-phone based Customize Home Automation System (스마트폰 기반의 주문형 홈 오토메이션 시스템의 구현)

  • Jung, Sun-A;Kim, Byung-Joo;Kim, Byung-Hoon;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.771-772
    • /
    • 2011
  • 본 연구에서는 최근 네트워크 기술의 발전으로 가정 내 정보가전기기의 네트워크가 중요해지는 점에 따라 기존의 네트워크 기반의 홈 오토메이션 시스템의 단점을 극복할 HCAS(implementation of house customize automation system based on smart-phone)를 구현하고자 하였다. 기존의 단점으로는 필요한 기능을 사용자에 따라 쉽게 변경하지 못하는 점과 홈 오토메이션 시스템의 높은 비용 등이 있다. 이러한 단점을 보완하기위해 Customize 즉, 사용자의 선택에 따라 제어 가능한 가전기기의 추가 및 제거가 가능한 기능을 구현하였고 ZigBee기술을 사용함으로써 저 전력 무선네트워크를 구현하였다. 그리고 최근의 이슈인 스마트폰을 이용함으로써 기존의 월패드형 이나 리모컨형의 불편한 휴대성을 보완하였고 직관적이며 이미지기반의 사용자 인터페이스는 HCAS의 사용자들이 시스템 제어를 조금 더 편리하고 쉽게 할 수 있게 하였다. 또한 실제로 제작한 모델 하우스에 적용시켜보고 추후의 연구 방향을 제시 하였다.

  • PDF