• 제목/요약/키워드: External User

Search Result 528, Processing Time 0.03 seconds

Development of an Operational MICOM for efficient Central Control of Public Address System (통합 전관 방송 시스템의 효율적인 중앙 집중 제어를 위한 운용 MICOM 개발)

  • Kim, Jung-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.325-329
    • /
    • 2011
  • We are developing a minimized integrated public address system that has facilities such as external input, Mic., CD, MP3 and Radio. In this paper, developing an integrated public address system with operational MICOM will make it possible to control the facilities of digital devices centrally. The operational MICOM is composed of 3 layers which are a control layer, a processing layer and a user interface layer. The control layer controls digital devices in the integrated public address and the processing layer is for processing voice data editing, controlling signals of devices and providing status information of the device. The user interface layer displays the status of control devices and the data processing of a user. A remote control is used for the central control.

Appplication of Role-based access control in Embedded OS (임베디드 OS에서의 역할기반 접근제어 적용)

  • Lim, Jae-Deok;Un, Sung-Kyong;Kim, Ki-Young;Kim, Jeong-Nyeo;Lee, Choel-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.163-165
    • /
    • 2007
  • Recently, the security requirements of the embedded system which were not considered when the embedded system is independently deployed are being increased because the embedded system is connected to an internet. The connection to the internet of embedded system is the meaning that it is exposed to the various kinds of external attack and can be a victim to these attacks in anytime. Particularly, it is trend that the user-related information is stored into the personal terminals and/or electrical appliances such as PDA, home gateway for home network, settop boxes and so on. So it is needed the security mechanism which protects the user information from the malicious accesses. Accordingly, the coverage of the system security is being expanded from the general server to the embedded system. And it is not enough that the embedded system supports only its inherent functions and it becomes the essential element to provide the security function to the embedded system. This paper applies the RBAC(role-based access control) function to the embedded linux OS and tries to strengthen the security of the embedded linux OS. RBAC is implemented as a loadable kernel module with LSM(Linux Security Module) security framework for user's flexibility.

  • PDF

A Study on Factors Influencing Acceptance Intention of Fintech -Focusing on Mobile Payment Service- (핀테크 수용에 영향을 미치는 요인에 관한 연구: 모바일 결제 서비스를 중심으로)

  • Lee, Jae Kwang;Kim, Jong Moo;Lee, Kang Eun;Yoon, So Ra;Jo, Hyeon
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.181-199
    • /
    • 2017
  • Recently, the Fintech industry is growing rapidly, and mobile payment service plays a key role in this growth. The purpose of this study is to investigate factors affecting initial acceptance of mobile payment service using Technology Acceptance Model. In the research model, service-related factors such as economic efficiency and security, user-related factors such as user innovativeness and social factors such as social influence were adopted as external variables, and acceptance intention was introduced as dependent variable. Perceived usefulness and perceived ease of use were selected as mediating variables. The collected data were analyzed using SPSS Statistics v22 and Smart PLS 2.0. The results of the study are as follows. First, service-related factors such as economic efficiency and security did not affect the user acceptance intention. Second, individual innovativeness and social influence have significant effects on perceived usefulness and perceived ease of use respectively. And the perceived usefulness and perceived ease of use, which are mediators, have a significant influence on the acceptance intention of mobile payment service. The results of this study will serve as a useful guide for Fintech industries.

A Hybrid Positioning System for Indoor Navigation on Mobile Phones using Panoramic Images

  • Nguyen, Van Vinh;Lee, Jong-Weon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.835-854
    • /
    • 2012
  • In this paper, we propose a novel positioning system for indoor navigation which helps a user navigate easily to desired destinations in an unfamiliar indoor environment using his mobile phone. The system requires only the user's mobile phone with its basic equipped sensors such as a camera and a compass. The system tracks user's positions and orientations using a vision-based approach that utilizes $360^{\circ}$ panoramic images captured in the environment. To improve the robustness of the vision-based method, we exploit a digital compass that is widely installed on modern mobile phones. This hybrid solution outperforms existing mobile phone positioning methods by reducing the error of position estimation to around 0.7 meters. In addition, to enable the proposed system working independently on mobile phone without the requirement of additional hardware or external infrastructure, we employ a modified version of a fast and robust feature matching scheme using Histogrammed Intensity Patch. The experiments show that the proposed positioning system achieves good performance while running on a mobile phone with a responding time of around 1 second.

Use of Mini-maps for Detection and Visualization of Surrounding Risk Factors of Mobile Virtual Reality (미니맵을 사용한 모바일 VR 사용자 주변 위험요소 시각화 연구)

  • Kim, Jin;Park, Jun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.22 no.5
    • /
    • pp.49-56
    • /
    • 2016
  • Mobile Virtual Reality Head Mount Displays such as Google Cardboard and Samsung Gear VR are being released, as well as PC-based VR HMDs such as Oculus Rift and HTC Vive. However, when the user wears HMD, it hides the external view of the user. Therefore, it may happen that the user is struck by the surrounding objects such as furniture, and there is no definite solution to this problem. In this paper, we propose a method to reduce the risk of injuries by visualizing the location and information of obstacles scanned by using a RGB-D camera.

Hair-Blending Method for 2D Virtual Color Hairstyler Based on Semi-automatic Field Morphing (반자동 필드 모핑에 기반한 2D 가상 컬러 헤어스타일러의 모발 블렌딩 방법)

  • Kwak, Noyoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.3-9
    • /
    • 2008
  • This paper is related to hair-blending for 2D virtual color hairstyler based on the semi-automatic field morphing. The proposed 2D virtual color hair-styler is characterized as generating virtual hairstyles using the variable morphing mask instead of the fixed one for the semi-automatic morphing, and then hair-blending the generated virtual hairstyles using sigmoid function around the boundary region of the variable morphing mask. The proposed method is able to generate the virtual hairstyles with an easy-to-use interface based on semi-automatic field morphing. According to the proposed method, a user can shorten the working time and even an unskilled user can obtain natural hairstyles as he or she designates a small number of external user inputs.

  • PDF

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Gamified Contents Management System design for continuous and voluntary participation of Users (사용자의 지속적이며 자발적인 참여를 위한 게임화 기반의 콘텐츠 관리 시스템 설계)

  • Choi, Won-Kyum;Yun, Chan;Woo, Tack
    • Journal of Korea Game Society
    • /
    • v.18 no.6
    • /
    • pp.5-16
    • /
    • 2018
  • It is very difficult, but important, to induce and maintain voluntary user engagement in content. For example, many Internet contents provide financial rewards for the user's participation and maintenance. However, there are limitations to methods such as stimulating only external motivations, such as monetary rewards, and sophisticated design and management are needed to obtain sustained and voluntary user participation in content. For this purpose, we propose a Gamified CMS that extends the existing Content Management System (CMS) by referring to the example of the Gamified Learning Management System. This will ultimately increase the participation and commitment of users in content.

The Apartment House Manager's Duty of Korean and England (한.영 공동주택 관리사의 업무)

  • 신경주
    • Journal of the Korean housing association
    • /
    • v.5 no.2
    • /
    • pp.129-139
    • /
    • 1994
  • This study is primarily concerned with the apartment house manager's duty of korea and England. The results are as follows ; 1. In England, detailed duty is prescribed to apartment house managers, where as Korea has not specific prescription. Therefore, we suggest 7 items as the management duty of apartment house manager. Namely, that is inhabitant management, external duty management, business management, account management, estate and public institution management, environment management and safety management. 2. In England, apartment house manager is executing their duty before moving into. But in Korea, their management duty is executed after moving into. There are problems which each of them(inhabitant-user-manager) has plural responsibility.

  • PDF

Customer Satisfaction and Loyalty to Tourism Websites (웹사이트에서의 고객만족과 충성도)

  • Gwon, Yeong-Guk;Park, Hyeon-Ji;Lee, Seon-Ro
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2005.05a
    • /
    • pp.1-18
    • /
    • 2005
  • The main purpose of this paper is to investigate the relationship between website environmental characteristics (website characteristics, user characteristics, and external environments), satisfaction, trust and loyalty in tourism e-business. The following results were determined by verifying five hypotheses using LISREL. Website environments partially support perceived satisfaction and also perceived trust. Satisfaction has a strong effect upon perceived trust while satisfaction doesn't effect perceived loyalty. Trust significantly impacts perceived loyalを in tourism e-business.

  • PDF