• Title/Summary/Keyword: External User

Search Result 527, Processing Time 0.024 seconds

Combination of an adaptive hypermedia system and an external application using a message hooking mechanism (메시지 후킹 메커니즘을 이용한 적응형 하이퍼미디어 시스템과 외부 응용 프로그램의 결합)

  • Jung, Hyosook;Park, Seongbin
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.4
    • /
    • pp.107-114
    • /
    • 2005
  • While a user is using an adaptive hypermedia system, the user can also use an external application. If the user accesses the information which is related to the contents provided by the adaptive hypermedia system, it can affect a user profile that contains the information about the knowledge or interests of the user. However, the adaptive hypermedia system understands user's behavior based on whether a page is accessed or not and it is difficult for the system to recognize user's behavior that can occur outside the adaptive hypermedia system. In this paper, we propose an approach that can detect user's behavior using a message hooking mechanism so that both user's behavior inside an adaptive hypermedia system and behaviors that occur outside the system can be reflected in a user profile. We analyze user events using a hooking mechanism and update a user profile using an XML parser.

  • PDF

A Knowledge-Based Fuzzy Post-Adjustment Mechanism:An Application to Stock Market Timing Analysis

  • Lee, Kun-Chang
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 1995
  • The objective of this paper is to propose a knowledge-based fuzzy post adjustment so that unstructured problems can be solved more realistically by expert systems. Major part of this mechanism forcuses on fuzzily assessing the influence of various external factors and accordingly improving the solutions of unstructured problem being concerned. For this purpose, three kinds of knowledge are used : user knowledge, expert knowledge, and machine knowledge. User knowledge is required for evaluating the external factors as well as operating the expert systems. Machine knowledge is automatically derived from historical instances of a target problem domain by using machine learning techniques, and used as a major knowledge source for inference. Expert knowledge is incorporate dinto fuzzy membership functions for external factors which seem to significantly affect the target problems. We applied this mechanism to a prototyoe expert system whose major objective is to provide expert guidance for stock market timing such as sell, buty, or wait. Experiments showed that our proposed mechanism can improve the solution quality of expert systems operating in turbulent decision-making environments.

  • PDF

Design and Implementation of avatar behaving on Internet Using EAI (EAI를 이용한 인터넷 상에서의 아바타 동작에 관한 설계 및 구현)

  • 정회경;안성옥;정재길
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.97-108
    • /
    • 2001
  • This thesis is about the design and implementation of the system for controlling Avatar, user's alter ego in a simulated world using the EAI(External Authoring Interface) technology to be able to control VRML(Virtual Reality Modeling Language). In this thesis, user's Avatar described in VRML language embodied interactions to move and show an expression by JAVA according to a user's demand. In the future, this would be able to develop into a research to try to embody and construct a simulated society based on web for the purpose of various integration of society such as cyber government, lecture, trial performance, and auction.

  • PDF

Trust-based business model in trust economy: External interaction, data orchestration and ecosystem value

  • Minzheong, Song
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.32-41
    • /
    • 2018
  • The aim of this study is to formulate a trust-based business model of Internet services in so called the "trust economy." For it, firstly concepts of trust and trust economy are discussed. Then, we present previous literatures' review of trust in social science prism and trust economy in economic prism. This study classified the literatures' stances with two viewpoints of the 'system' and the 'user'. With this backdrop, we discuss three contradictory stances: Internal optimization vs. external interaction, personal data control vs. orchestration, and end-user vs. ecosystem value. In the result, we formulate a trust-based business model framework with three trust issues in user perspective and suggests three strategic directions related three issues along with representative use cases.

Development of Flight Control Application for Unmanned Aerial Vehicle Employing Linux OS (리눅스 기반 무인항공기 제어 애플리케이션 개발)

  • Kim Myoung-Hyun;Moon Seungbin;Hong Sung Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.78-84
    • /
    • 2006
  • This paper describes UAV (Unmanned Aerial Vehicle) control system which employs PC104 modules. It is controlled by application program based on Linux OS. This application consists of both Linux device driver in kernel-space and user application in user-space. In order to get data required in the unmanned flight, external devices are connected to PC104 modules. We explain how Linux device drivers deal with data transmitted by external devices and we account for how the user application controls UAV on the basis of data processed in the device driver as well. Furthermore we look into the role of GCS (Ground Control Station) which is to monitor the state of UAV.

Glanceable and Informative WearOS User Interface for Kids and Parents

  • Kim, Siyeon;Yoon, Hyoseok
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.17-22
    • /
    • 2021
  • This paper proposes a wearable user interface intended for kids and parents using WearOS smartwatches. We first review what constitutes a kids smartwatch and then design UI components for watchfaces to be used by kids and parents. Different UI components ranging from activity, education, voice search, app usage, video, location, health, and quick dial are described. These components are either implemented as complications or on watchfaces and may require on-device standalone function, cross-device communication, and external database. We introduce a theme-based amusing UI for kids whereas simple and easily accessible components are recommended to parents' watchface. To illustrate use cases, we present 3 scenarios for enhancing communication between parents and child. To show feasibility and potential of our approach, we implement our proof-of-concept using commercial smartwatches, smartphones, and external cloud database. Furthermore, performance of checking app usages on different devices are presented, followed by discussion on limitations and future work.

An Analysis of the Service Quality and Satisfaction Perceived by Users and Librarians on the Foreign Research Information Center (이용자와 상호대차담당자가 인식하는 외국학술지지원센터(FRIC)의 서비스품질과 고객만족도 분석)

  • Oh, Dong-Geun;Hwang, Jae-Young;Yeo, Ji-Suk
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.23-42
    • /
    • 2012
  • This study is to investigate and analyze the service quality and satisfaction perceived by users and librarians of the Foreign Research Information Center (FRIC). The survey results reveal that three groups of in-campus (internal) user group, external user group and interlibrary loan librarian group has highly perceived the service quality and satisfaction of the FRIC. Two user groups have statistically significant different perceptions on the service quality, loyalty, and satisfaction. Internal user group perceived more highly than external user group, in 6 items of satisfaction, 1 item of loyalty, and 7 items of service quality. Structural equation models of satisfaction and loyalty on two user groups were proved to be appropriate. Material factor including success rate of copied text and general physical status of the copy influences significantly on the user satisfaction in both groups.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

The Study of Implementation of SignBoard Receiving DARC for Vehicle 1. The Implementation of Sign Board Receiving DARC (차량용 FM 부가방송 수신 전광판의 구현에 관한 연구 1. FM 부가방송 수신 전광판의 구현)

  • 최재석;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1169-1174
    • /
    • 2002
  • In this paper, we implemented the sign board system that displays user's image, user's sentence, the information from DARC. The existing sign board is displaying only user's image and sentence. Or other existing sign board is displaying the information via CDMA network. However, our system is also able to display the user's message like other system and gain the information more cheap by DARC. This system includes the main processor, the program memory, the external memory, the DARC module and the LED display module. The external memory stores the user's message files and the order file that decides the displaying order of user's file and the DARC information The DARC module extracts the DARC information from FM signal. From the experiment, we could confirm that this system display the DARC information and the user's message by the order file.