• Title/Summary/Keyword: 사용자 점도

Search Result 3,350, Processing Time 0.032 seconds

Peak Detection of Pulse Wave Based on Fuzzy Inference and Multi Sub-Band Filters for U-Healthcare (U-헬스케어를 위한 퍼지추론과 다중 하위대역 필터를 기반한 맥파 최대치 검출)

  • Lee, Ju-Won;Lee, Byeong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2159-2164
    • /
    • 2008
  • Ubiquitous healthcare system is system that monitors and manages user's health information, and most important in the healthcare system is accuracy of the measured health data. But, the accuracy changes remarkably according to user's motion artifacts in real life. To elevate accuracy of health data, we proposed new algorithm to detect maximum point of pulse wave for heart rate extraction. and the proposed algorithm is to detect maximum points detect of pulse wave in photo-plethysmography signal included motion artifacts by fuzzy inference and multi sub-band filters. In results of experiment to evaluate the performance of the proposed algorithm, we could verify the proposed algorithm extracted maximum point of pulse wave in complex motion artifacts.

A Study on XSS Attacks Characters, Sample of Using Efficient the Regular Expressions (효율적인 정규식 표현을 이용한 XSS 공격 특징점 추출 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Gui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.663-664
    • /
    • 2009
  • OWASP에서 발표한 2007년 웹 애플리케이션 취약점 중 하나인 XSS 공격이 사용자 브라우저에서 스크립트를 실행하게 함으로써 사용자의 세션을 가로채거나 웜을 업로드하여 악성코드를 삽입하는 공격이다[2]. 하지만 많은 XSS 방어 기법에서는 단순 스크립트 우회기법과 강제적인 스크립트 차단 방법을 채택하고 있다. 또한 강제적인 XSS 필터 적용으로 과탐지로 인한 정상적인 웹 페이지가 출력 되지 않는 사례가 나타나고 있다. 따라서 본 연구는 효율적인 정규식을 이용하여 XSS 공격 특징을 분석하여 특징점들을 추출하고 이 특징점들을 기반으로 특정한 규칙을 가진 문자열들을 모든 문자가 유효한지 확인할 수 있는 정규식 표현 방법을 이용하여 다양한 응용프로그램에 적용할 수 있는 기술을 연구하고자 한다. 또한 이를 기반으로 포털 사이트와 브라우저에서 제공하는 XSS 필터들과 비교하여 과탐지율 및 오탐지율 서로 비교하여 본 연구가 효율성 면에서 효과가 있는지 우위를 둘 것이며, 브라우저 벤더, 포털 사이트, 개인 PC 등 충분한 시험 평가와 수정을 통해서 응용할 수 있는 계기를 마련할 것이다

User Experience(UX) of Facebook: Focusing on Users' Eye Movement Pattern and Advertising Contents (Facebook의 사용자경험연구: 사용자의 시선경로와 광고콘텐츠를 중심으로)

  • Kim, Tae-Yang;Shin, Dong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.45-57
    • /
    • 2014
  • This study examines subjects' eye movement pattern and surveys their attitudes to the exposed advertisements on the Facebook. Different from the F-shaped pattern of the typical Web pages, users' eye movements on the Facebook have shown a rough H-shape. Even though a large number of users have shown F-shaped pattern on the ordinary Web pages in order to skip the contents of a Web, subjects' eye-movement pattern on the Facebook has H -shaped pattern due to the unique User Interface (UI) of the Facebook. With the right side and vertical arrangement of ads on the Facebook, users skip the page with having a large H-shaped pattern. In addition, this study set four AOIs(Area of Interest) that are advertising sections comprised on the Facebook Web page and measured fixation length within the AOIs then surveyed subjects' attitudes about the exposed ads. Through the experiment and survey, this study offers the optimum advertising position that can attract Facebook users' attention. As the result of experiment and survey, the second ad has the subjects' highest attitude to advertising and fourth ad is the next effectiveness and first and third ad followed. This study highlights the key implications to provide better user experiences(UX) and marketing strategies to users who are the consumers of companies and organizations which have a plan to put their advertising on the Facebook.

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

Study of GUI Design appearing in Fast Food Restaurant DID - Focused on Lotteria, McDonald's, Burger King and Mom's Touch - (패스트푸드점 DID에 나타난 GUI 디자인 연구 - 롯데리아, 맥도날드, 버커킹, 맘스터치 중심으로 -)

  • Lee, Young-Hwa
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.253-262
    • /
    • 2019
  • This study conducted an actual condition survey with users in order to examine the Graphic User Interface (GUI) design appearing in fast food Digital Information Display (DID). Selecting four restaurants with high sales in the hamburger industry in 2017, including Lotteria, McDonald's, Burger King, and Mom's Touch, based on this, this study investigated and analyzed GUI visual components appearing in DID, including layout, character, color, graphics, and videos based on this. As a result, this study could propose a design plan providing users with the layout that can be clearly and neatly divided, characters attracting attention with high readability, colors with high visibility, graphics attract interest, and videos with various contents, rather than a complex approach for efficient GUI design, analyzing the environmental factors of fast food restaurants.

Development of CDMA Based Monitoring Web System for Efficient Management of National Control Points (효율적인 국가기준점 관리를 위한 CDMA기반 모니터링 웹 시스템 개발)

  • Oh, Yoon-Seuk;Lee, Young-Kyun
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2007.10a
    • /
    • pp.265-270
    • /
    • 2007
  • 국가기준점은 측량을 위한 주요 시설물로서 관리가 매우 중요하다. 그러나 국가기준점이 설치되어 있는 환경은 측량을 위한 시야 확보가 필요하기 때문에 삼각점의 경우 산 정상이나 인근 기준점과 시통이 가능한 위치에 설치하며, 수준점의 경우 도로변이나 하천변에 설치한다. 국가기준점은 화강암으로 된 표석 형태로 설치되기 때문에 이렇게 외부환경에 노출될 경우 자연 풍화, 인위적인 훼손, 파손 등이 발생할 수 있다. 이러한 현황 파악을 위하여 주기적인 방문관리가 필요하다. 그러나 전국적으로 약 22,000개 가량 설치되어 관리가 어려운 실정이다. 본 연구에서는 국가기준점 관리의 효율성을 높이고 기준점 정책 수립을 위한 통계자료수집을 위한 국가기준점 모니터링 시스템을 개발하였다.본 시스템은RFID가 부착된 국가기준점을 사용할 경우 RFID를 인식하는 단말기는 실시간으로 CDMA 망을 이용하여 모니터링 시스템에 정보를 전송하고, 웹 시스템 상에서 실시간으로 현재 사용중인 기준점이 표시된다. 사용중인 기준점의 사용용도 및 사용자의 현황도 화면에 표시된다. 이러한 정보는 이력관리가 되며, 사용 및 관리에 관한 이력정보 보고서, 기준점별 사용 빈도 및 사용 목적별 빈도 등이 저장되어 기준점 설치, 관리 대상 기준점 선정 등을 위한 기준점 정책 수립을 위한 통계자료를 생산할 수 있다. 이러한 시스템 개발을 통하여 실시간 기준점 모니터링이 가능하며, 관리대상 기준점 선정, 전산화된 이력관리 구현 등으로 인하여 관리비용을 절감하고, 관리인력을 최소화 하는 효율적인 기준점 관리가 가능하게 될 것이다.

  • PDF

Development of Real-Time Vision-based Eye-tracker System for Head Mounted Display (영상정보를 이용한 HMD용 실시간 아이트랙커 시스템)

  • Roh, Eun-Jung;Hong, Jin-Sung;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.6
    • /
    • pp.539-547
    • /
    • 2007
  • In this paper, development and tests of a real-time eye-tracker system are discussed. The tracker system tracks a user's gaze point through movement of eyes by means of vision-based pupil detection. The vision-based method has an advantage of detecting the exact positions of user's eyes. An infrared camera and a LED are used to acquire a user's pupil image and to extract pupil region, which was hard to extract with software only, from the obtained image, respectively. We develop a pupil-tracking algorithm with Kalman filter and grab the pupil images by using DSP(Digital Signal Processing) system for real-time image processing technique. The real-time eye-tracker system tracks the movements of user's pupils to project their gaze point onto a background image.

Online Face Pose Estimation based on A Planar Homography Between A User's Face and Its Image (사용자의 얼굴과 카메라 영상 간의 호모그래피를 이용한 실시간 얼굴 움직임 추정)

  • Koo, Deo-Olla;Lee, Seok-Han;Doo, Kyung-Soo;Choi, Jong-Soo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.4
    • /
    • pp.25-33
    • /
    • 2010
  • In this paper, we propose a simple and efficient algorithm for head pose estimation using a single camera. First, four subimages are obtained from the camera image for face feature extraction. These subimages are used as feature templates. The templates are then tracked by Kalman filtering, and camera projective matrix is computed by the projective mapping between the templates and their coordinate in the 3D coordinate system. And the user's face pose is estimated from the projective mapping between the user's face and image plane. The accuracy and the robustness of our technique is verified on the experimental results of several real video sequences.

A Study on Enforce the Policy of User Certification in Public Certificate System (공인인증서 시스템의 사용자 인증정책 강화에 관한 연구)

  • Kim, In-Bum;Hwang, Joo-Yong;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.69-76
    • /
    • 2010
  • public certification is some kind of electric ID which can prove the valid user, based on open KEY. usually it had been used in the field of government complaint, e-commerce, financial. but recently it expands the its use range through computerization of work process of diversity fields such as e-sports, property, medical industry. because of this reason, importance for user certificate process is gradually rose. The purpose of this paper is looking at the method for user certification of public certificates and draw a way for enforce the user certification process by Vulnerability Analysis. To draw the alternative we study the Authentication Principle and policy structure of public certification system by researching references, has drew the limitation for policy of certification. we provide the guideline to enforce the user certification through conclusion which has been drew from previous step.