• Title/Summary/Keyword: External User

Search Result 527, Processing Time 0.034 seconds

The iZone System for Safety Walking of Children (어린이의 안전한 보행을 위한 iZone 시스템)

  • Min, Seonghee;Oh, Yoosoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.1
    • /
    • pp.62-69
    • /
    • 2019
  • In this paper, we propose iZone system for safe walking of children. The proposed system recognizes the state that a child is down a roadway as a dangerous situation. And then it informs the surrounding adults and guardians of the child in the event of a dangerous situation. The iZone system consists of the iZone device that attaches to a child's bag or clothing, the iZone app for children, the iZone server, and external beacons. The proposed system uses the ultrasonic sensor of the iZone device and the GPS coordinates and external beacons information by the children's smartphone to determine the dangerous situation. The proposed system uses external beacons to calibrate the GPS coordinates. Moreover, it determines whether the child is down the roadway in sidewalk by measuring the height difference between the roadway and the sidewalk using ultrasonic sensor.

A Study on the User-contributed Reviews for the Next Generation Library Catalogs (차세대 도서관 목록의 이용자 서평에 관한 고찰)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.115-132
    • /
    • 2012
  • The purpose of this study is to examine the current status of user-contributed reviews for the Next Generation Library Catalogs, and the potential impact of user reviews available from the external sources, including Amazon.com and GoodReads.com. During the period of February 16th through April 4th, 2012, the number of holding libraries and user-contributed reviews, tags and reading lists of ten selected books were examined from the WorldCat. Also the user-contributed reviews for the same books available from Amazon.com and GoodReads.com were examined, and a case of reviews for one book was analyzed. The result shows that only a few users participated in the WorldCat, and user-contributed reviews were rarely used, when compared with tags or reading lists. Several hundred to thousand user-contributed reviews for the same books were available from Amazon.com and GoodReads.com directly linked with bibliographic records. A case of one book from Amazon.com reveals the possibility of distorting the function of user-contribution. With the introduction of the function of user-contribution, it is expected that its growth rate should be carefully observed and its potential impact on users should be thoroughly and systematically analyzed in the near future.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Social Media Performance: From the Perspective of Social Media Apathetic Behavior

  • Inwon Kang;Sungjoon Yoo
    • Journal of Korea Trade
    • /
    • v.26 no.3
    • /
    • pp.1-22
    • /
    • 2022
  • Purpose - Social media platforms have presented individuals with an opportunity to create and maintain their social relationship through the use of social media services. However, such social relationship has a negative influence on users' interest in social media. Design/methodology - Using structural equation modeling, this study seeks to examines the effects of different social media conflicts (individual and social conflicts) on users' psychological internal state, especially user apathetic behavior Findings - The findings confirm that, among social media conflicts, social-related conflict, especially social interaction overload has a negative effect on cognitive resonance, while individual conflict has the highest effect on cognitive dissonance. Also, cognitive dissonance has a much greater effect than cognitive resonance on user resistance, this means that users' negative perception of social media has a greater influence on their resistance. Lastly, user's resistance was found to have a positive influence on user's apathetic behavior. Originality/value - In other to capture social media Apathetic behavior, this study focus on social media conflict perspective, which includes social-related conflict and individual conflict, which are found to influence users' internal states towards social media and further induce social media behavior. This study is unique because it is among the first to explore social media apathetic behavior by focusing on the influence of both external social media conflict and internal state. Also, this study proposed that social related conflict has a higher negative influence on WeChat user than individual related conflict.

Business Information Visuals and User Learning : A Case of Companies Listed on the Stock Exchange of Thailand

  • Tanlamai, Uthai;Tangsiri, Kittisak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.11-33
    • /
    • 2010
  • The majority of graphs and visuals made publicly available by Thai listed companies tend to be disjointed and minimal. Only a little over fifty percent of the total 478 companies included graphic representations of their business operations and performance in the form of two or three dimensional spreadsheet based graphs in their annual reports, investor relations documents, websites and so on. For novice users, these visual representations are unlikely to give the big picture of what is the company's financial position and performance. Neither will they tell where the company stands in its own operating environment. The existing graphics and visuals, in very rare cases, can provide a sense of the company's future outlook. For boundary users such as audit committees whose duty is to promote good governance through transparency and disclosure, preliminary interview results show that there is some doubt as to whether the inclusion of big-picture visuals can really be of use to minority shareholders. These boundary users expect to see more insightful visuals beyond those produced by traditional spreadsheets which will enable them to learn to cope with the on-going turbulence in today's business environment more quickly. However, the debate is still going on as to where to draw the line between internal or external reporting visuals.

  • PDF

Design and Embodiment in Home Network at Gateway is Stabilization MSAC (Home Network 게이트웨이에서 효율적인 MSAC 설계 및 구현)

  • Yoon, Woon-Kwan;Choi, Kyong-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2006
  • Home Gateway which composes Home network in Ubiquitous Computing environment is an equipment to provide the connection with the external Internet Physically, and it carry out the role which communication, control and monitor is important. But Home gateway has potential threats because it connected on external Internet as spillage user's information from outside wrongdoers. Consequently, Home gateway has to have security module and structure for the communication which is sate. In this research paper, We designed Home gateway security structure for the communication which is protected when computer user use the computer from the outside to home to send information or important data.

  • PDF

A Standby Mode Transition Scheme for Set-top Box Power Saving by the Use Information of External Device (외부 입력기기 사용 정보 기반 셋톱박스 대기모드 전환 기술)

  • Kim, Yong-Ho;Choi, Yun-Bum;Oh, Nam-Cul;Kim, Hoon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.124-130
    • /
    • 2010
  • This paper considers a power saving technique of set-top box (STB) that turns the signal into content which is then displayed on the television (TV) screen. A traditional power saving scheme, Auto Power Down (APD), was devised to reduce the power consumption of STB. APD checks whether the user is watching TV over a period of time and enforces STB into stand-by mode when the check result reveals the user is not watching TV. This paper proposes an enhanced power saving scheme that transits STB operation mode to 'stand-by' immediately when STB recognizes the change of TV's external input signal. The proposed scheme does not require the monitoring time to check the users' watching TV, and transits to standby mode faster than the conventional APD, which results in better performance in power saving. The simulation result shows that the proposed scheme achieves 2 to 11% improvement in power consumption compared with the conventional APD.

  • PDF

A Study of Digital filter for context-awareness using multi-sensor built in the smart-clothes (멀티센서 기반 스마트의류에서 상황인지를 위한 디지털필터연구)

  • Jeon, Byeong-chan;Park, Hyun-moon;Park, Won-Ki;Lee, Sung-chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.911-913
    • /
    • 2013
  • The user's context awareness is important to the reliability of sensors data. The sensor data is constantly change to external temp, internal& external environment and vibration. This noise environment is affecting that the data collected information from sensors. Of course this method of digital filter and inference algorithm specifically request for the use of ripple noise and action inference. In this paper, experiment was a comparison of the KF(Kalman Filter) and WMAF(Weight Moving Average Filter) for noise decrease and distortion prevention according to user behavior. And, we compared the EWDF(Extended Weight Dual Filter) with several filer. In an experiment, in contrast to other filter, the proposed filter is robust in a noise-environment.

  • PDF

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Development of 3-D viewer for indoor location tracking system using wireless sensor network

  • Yang, Chi-Shian;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.110-114
    • /
    • 2007
  • In this paper we present 3-D Navigation View, a three-dimensional visualization of indoor environment which serves as an intuitive and unified user interface for our developed indoor location tracking system via Virtual Reality Modeling Language (VRML) in web environment. The extracted user's spatial information from indoor location tracking system was further processed to facilitate the location indication in virtual 3-D indoor environment based on his location in physical world. External Authoring Interface (EAI) provided by VRML enables the integration of interactive 3-D graphics into web and direct communication with the encapsulated Java applet to update position and viewpoint of user periodically in 3-D indoor environment. As any web browser with VRML viewer plug-in is able to run the platform independent 3-D Navigation View, specialized and expensive hardware or software can be disregarded.