• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,203, Processing Time 0.033 seconds

A Study of Incremental and Multiple Entry Support Parser for Multi View Editing Environment (다중 뷰 편집환경을 위한 점진적 다중진입 지원 파서에 대한 연구)

  • Yeom, Saehun;Bang, Hyeja
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.21-28
    • /
    • 2018
  • As computer performance and needs of user convenience increase, computer user interface are also changing. This changes had great effects on software development environment. In past, text editors like vi or emacs on UNIX OS were the main development environment. These editors are very strong to edit source code, but difficult and not intuitive compared to GUI(Graphical User Interface) based environment and were used by only some experts. Moreover, the trends of software development environment was changed from command line to GUI environment and GUI Editor provides usability and efficiency. As a result, the usage of text based editor had decreased. However, because GUI based editor use a lot of computer resources, computer performance and efficiency are decreasing. The more contents are, the more time to verify and display the contents it takes. In this paper, we provide a new parser that provide multi view editing, incremental parsing and multiple entry of abstract syntax tree.

Comparison of Customers Perception of Feature and Smart Phone Users Mainly in 20s

  • Kim, Hyun-Jong
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.115-124
    • /
    • 2011
  • The property of the mobile phone is taking important role to choose it. In the present situation, exploring, comparing and analyzing the important properties of regular mobile phone(feature phone) and smart phone are very meaningful study. Therefore, the survey was carried out to get the properties of feature phone and smart phone and analyze the difference of those phones. And proposed the important variables for customer satisfaction which must be given priority. The result showed that 'design' and 'Quality' are important to both mobile phone user groups. The problems with mobile phones currently in use were 'poor performance' to feature phone users and 'expensive charge' and 'poor A/S' to smart phone users. Two groups also showed significant difference with the customer satisfactions, and smart phone user group showed higher satisfaction. For smart phone user group, four factors are induced from the properties but 'Hardware Quality' (representing 'call Quality', 'A/S', 'Convenience to use', 'Battery life') and 'Design & Function'(representing 'Internet', 'Convergence Functions', 'Design, 'Color') have significant and positive effects on Customer Satisfaction.

A Study on the Quality Evaluation Model of Operating Systems (운영체제 품질 평가 모형)

  • Yun Min Seok;Han Sang Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.1006-1013
    • /
    • 2002
  • The multiplicity of operating systems brings about a choice problem to the end-user and a multi-fold intensity to the competing developer. This study intends to provide guidelines solving the problems for both the end-user and the developers of operating systems. For the purpose, we adopt an appropriate evaluation model in terms of user-perceived quality through the applicable criteria and an evaluation method. Briefly, reliability and portability are key factors to contribute to the perceived duality. The empirical study also illustrates a comparative analysis on the dominant products. Microsoft Windows and Linux, in Korea.

  • PDF

Study on Developing a Monitoring System for Safe Fire Testing (안전한 탄 발사시험을 위한 모니터링 시스템 개발에 관한 연구)

  • Ki Jae-sug
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.05a
    • /
    • pp.453-459
    • /
    • 2005
  • On this research, we show some concrete examples as software design, 2D/3D display, graph display, and gage display to develop a data monitoring system for real time safe fire testing. Developed software which is simulation software for live fire testing, has been designed to display informations about whole test status in a live fire testing, and with this, user can control a live fire testing under the safe environment. Beside, we increase a security by using a authority of user to access on this software. and we develop it based on module designed to apply a requirement of user later on.

  • PDF

Study on Developing a Monitoring System for Safe Fire Testing (안전한 탄 발사시험을 위한 모니터링 시스템 개발에 관한 연구)

  • Ki Jae Sug
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.2
    • /
    • pp.65-72
    • /
    • 2005
  • On this research, we show some concrete examples as software design, 2D/3D display, graph display, and gage display to develop a data monitoring system for real time safe fire testing. Developed software which is simulation software for live fire testing, has been designed to display informations about whole test status in a live fire testing, and with this, user can control a live fire testing under the safe environment. Beside, we increase a security by using a authority of user to access on this software. and we develop it based on module designed to apply a requirement of user later on.

Library User Education using HyperCard (하이퍼 카드를 응용(應用)한 도서관 이용자(利用者) 교육(敎育))

  • Tak, Hae-Kyung
    • Journal of Information Management
    • /
    • v.25 no.3
    • /
    • pp.1-27
    • /
    • 1994
  • HyperCard used the concept of hypertext not only is the database management program and the educational medium used hypermedia but also provides the environment able to develop the educational software. In this paper, the concept and characteristics of HyperCard are reviewed, and the example applied HyperCard program to library user education are given.

  • PDF

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

A Study on The Quality Comparison of Software Packages for Statistical Analyses (통계처리용 소프트웨어 패키지의 품질 비교에 관한 연구)

  • 이상석;윤민석
    • Journal of Korean Society for Quality Management
    • /
    • v.27 no.1
    • /
    • pp.195-210
    • /
    • 1999
  • The multiplicity of software packages brings about a choice problem to the end-user and a multi-fold intensity to the competing developer. This study intends to provide guidelines solving the problems for both the end-user and the developer of packages for automatic statistical analyses. For the purpose, we adopt an appropriate evaluation model in terms of user-perceived quality through the applicable criteria and an evaluation method. The result of empirical study is described, which shows that the weight of each criterion is dynamic along usage levels. Briefly, functionality, usability, and reliability are key factors to contribute to the perceived quality. The empirical study also illustrates a comparative analysis on the dominant products, SAS and SPSS, in Korea.

  • PDF

Reliability Metrics Design and Verification for the Acquisition of Small and Mid-Sized Web Application (중소규모 웹어플리케이션 개발업체 신뢰성평가를 위한 신뢰도 메트릭의 설계 및 유효성 검증)

  • Choi, Kwoung-Hee;Rhew, Sung-Yul
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.193-203
    • /
    • 2006
  • Software reliability prediction is a statistical method to put in place a timely software development practice useful for objective assessment of bidders. The current study suggests one research method that enables reliability assessment of such previous projects by studying user satisfaction and project management history. If incorporated into the existing acquisition process, the reliability assessment method will further enhance objectivity and accuracy in bidder selection process. The GQM(Goal Question Metric) paradigm was used to identify assessment metrics for bidder evaluation and questionnaires were collected from users to create user satisfaction indexes. In addition, 'weight of evidence', the most appropriate categorical method, was used to isolate attributes of each variable that may contribute to reliability assessment.