• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.027 seconds

Design and Implementation of Collaborative Filtering Application System using Apache Mahout -Focusing on Movie Recommendation System-

  • Lee, Jun-Ho;Joo, Kyung-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.125-131
    • /
    • 2017
  • It is not easy for the user to find the information that is appropriate for the user among the suddenly increasing information in recent years. One of the ways to help individuals make decisions in such a lot of information is the recommendation system. Although there are many recommendation methods for such recommendation systems, a representative method is collaborative filtering. In this paper, we design and implement the movie recommendation system on user-based collaborative filtering of apache mahout. In addition, Pearson correlation coefficient is used as a method of measuring the similarity between users. We evaluate Precision and Recall using the MovieLens 100k dataset for performance evaluation.

A Study on the User's Sustainable Intention of Mobile Tourism : Focused on Chinese Tourists Visiting Korea (모바일 관광 애플리케이션 사용자의 지속적 사용의도에 미치는 영향 : 방한 중국관광을 중심으로)

  • Long, Shang Guan-Jin;Park, Uk-Yeol;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.5
    • /
    • pp.47-62
    • /
    • 2018
  • Purpose - Based on preceding studies, this thesis focuses on the finding of the definition and category of mobile tourism application and deriving out its characteristics. And after looking for how they make influences on continuous intention to use, we make empirical study with TAM model. Research design, data, and methodology - There are many Chinese tourist who visit Korea with user's constant intention to use of tourism application. This study is to find out the definition and category of mobile tourism application through research of preceding study and to fomulate the research model and hypothesis that how tourism application attributes (convenience, interaction, accessibility, local basis, security) affect constant intention to use of mobile tourism application. In order to verify a hypothesis, we conducted a survey for Chinese users of tourism application. In empirical study, we analyzed a structure model for frequency analysis, reliability analysis, exploratory factor analysis, validity analysis through IBM SPSS Statistics 21.0 and IBM SPSS AMOS 21.0 Results - Among tourism applications, convenience, interaction, accessibility and local basis have positive effects on both perceived usefulness and perceived easiness respectively. But security does not. Also perceived easiness has a positive effect on perceived usefulness. Finally, perceived usefulness and perceived easiness have positive effect on constant intent to use. Conclusions - Tourism application enterprises should put emphasis on design such as menu or function in order to simplify the operation of new services for new customers. Therefore, comfortable user interface and development of useful function can improve tourism application. Consequently, it leads to the promotion of tourism application. Also, when users perceive tourism application as a useful media which is easy, comfortable and useful content, the degree of constant intention to use becomes increased. It is important to provide plentiful and useful contents for customers and to develop user interface such as easy operation because these factors have positive effects on constant demand and use of tourism application.

Design and Implemention of Application for Measuring Delivery Location (배달위치를 측정하기 위한 어플리케이션 설계 및 구현)

  • Kim, Byung-June;Lee, Ki-Young;Lee, Young-Dae;Kang, Jeong-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.31-35
    • /
    • 2017
  • Recently, Many deliveries have sprung up and those are beginning to receive much attention from consumers. Like this, the application makes our lives more comfortable. Now, the delivery food application uses only static information of the user and the users only makes oder. In this thesis, however, the studies suggested that designed food application uses the user's location for mesuring a distance of delivery and estimated arrival time is displayed in the delivery application and The application provides a graphical view of the location of the user in real time.

A Design and Implementation of Fitness Application Based on Kinect Sensor

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.43-50
    • /
    • 2021
  • In this paper, we design and implement KITNESS, a windows application that feeds back the accuracy of fitness motions based on Kinect sensors. The feature of this application is to use Kinect's camera and joint recognition sensor to give feedback to the user to exercise in the correct fitness position. At this time, the distance between the user and the Kinect is measured using Kinect's IR Emitter and IR Depth Sensor, and the joint, which is the user's joint position, and the Skeleton data of each joint are measured. Using this data, a certain distance is calculated for each joint position and posture of the user, and the accuracy of the posture is determined. And it is implemented so that users can check their posture through Kinect's RGB camera. That is, if the user's posture is correct, the skeleton information is displayed as a green line, and if it is not correct, the inaccurate part is displayed as a red line to inform intuitively. Through this application, the user receives feedback on the accuracy of the exercise position, so he can exercise himself in the correct position. This application classifies the exercise area into three areas: neck, waist, and leg, and increases the recognition rate of Kinect by excluding positions that Kinect does not recognize due to overlapping joints in the position of each exercise area. And at the end of the application, the last exercise is shown as an image for 5 seconds to inspire a sense of accomplishment and to continuously exercise.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Image Matching-based Mobile Application Providing Indoor Place Information (영상 매칭 기반 실내 장소 안내 모바일 어플리케이션)

  • Ko, Seung Hee;Yang, Mi Hyun;Oh, Seung Hyeon;Hong, Sung Ho;Hwang, Sung Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1424-1432
    • /
    • 2016
  • A person often needs to visit a facility that have not been visited before. In this case, it is necessary to easily identify the building in which the facility is located. Indoor navigation is also important, as the person may get lost due to the complex structure of buildings. To solve these problems, this paper presents a mobile application which provides a user with indoor place information and indoor navigation. A user is requested to take a photograph of a building of interest or of the current location. Then, the proposed application identifies the building of interest or the current location of the user by utilizing an image matching technique. For fast matching, database filtering by using GPS/magnetometer data and pre-extraction of features for images in the database are utilized. In case of indoor navigation, the application provides the actual images of check points as well as the moving direction. Simulation results show that the proposed system successfully identifies the location of users and provides place information and indoor navigation.

A Scheme for Providing Anonymity and Untraceability in Mobile Computing Environments (이동 컴퓨팅 환경에서의 익명성과 불추적성 지원 기법)

  • Choi, Sun-Young;Park, Sang-Yun;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.570-577
    • /
    • 2001
  • In recent years, Internet-based application services on the mobile environment have been activated, and the developments of mobile internet application for user authentication and privacy have been required. Especially, the research for preventing disclosure of identity caused by user mobility is on the progress. In this paper, we introduce the study of an authentication protocol for anonymity and untraceability supporting the protection of user identity and the authenticated secure association mechanism between mobile hosts and remote domains. In this protocol use public cryptography.

  • PDF

A Study on Users' Influential Factors affecting RFID Adoption (RFID 도입 선호도에 미치는 고객성향 요인 분석에 관한 연구)

  • Kim, Jin-Soo;Lee, Hak-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.115-135
    • /
    • 2009
  • As one of core technologies in ubiquitous era, interest and application of RFID is increasing. Although its' applications has been developed in various areas, actual application rate is still underestimated. Previous studies show that most of researches are focused on RFID implementation strategies, emphasizing technical advantages and benefits of RFID. To increase RFID adoption rate, however, end user's attitude about information technology has to be considered. The empirical study has been conducted to analyze user's influential factors which affect the RFID adoption. The results show that some of user's attitude about IT are valid and provide useful guide lines about RFID adoption.

  • PDF