• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.027 seconds

Posture Correction Guidance System using Arduino (아두이노를 활용한 자세교정 유도 시스템)

  • Kim, Donghyun;Kim, Jeongmin;Bae, Woojin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.369-372
    • /
    • 2021
  • These days, people spend more time sitting at a desk for studies or work. Also, because people continue to use computers, smartphones, and tablet PCs often during break times, their posture is getting worse. Maintaining a position of bad posture for an extended period of time causes problems with the musculoskeletal system related to the neck, shoulders, and spine. Additionally, problems such as physical fatigue and posture deformation are predicted to expand to a wide range of age groups. Therefore, the core function of the system we are developing is to ensure correct sitting posture and to receive alert notifications via the created mobile application. To create the system, a flex sensor, pressure sensor, and tilt sensor are attached to a chair and utilized. The flex sensor detects and compares the amount of bending in the chair's posture and transmits this value to an Arduino Uno R3 board. Additionally, information such as body balance and incline angle are collected to determine whether or not the current sitting posture is correct. When the posture is incorrect, a notification is sent through the mobile application to indicate to the user and the monitoring app that their posture is not correct. The system proposed in this study is expected to be of great help in future posture-related research.

  • PDF

A study on macro detection using information of touch events in Android mobile game environment (안드로이드 모바일 게임 환경에서의 터치 이벤트 정보를 이용한 매크로 탐지 기법 연구)

  • Kim, Jeong-hyeon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1123-1129
    • /
    • 2015
  • Macro(automatic hunting) of mobile game is a program that touch the screen by defined rules like a game bot in PC online games, and it is used by make various ways like android application or windows application program. This gives honest users deprivation and make to lose their interest. Finally they would leave the game and gradually game life would be shorten. Although many studies to prevent these problems in PC online game are conducted, applying mobile game to PC's way is difficult because mobile games are limited to use the network and device performance is different with PC. In this paper, we propose a framework for macro detection by using the touch event information. A touch event on the mobile game is a necessary control command to the game. Because macro touches the screen with the same pattern, there is a difference between normal user's behavior and macro's operation. In mobile games that casual games are mostly, Touch event is the best difference that identify normal user against macro for a short period of time. As a result of detecting macros used in real mobile game by using the proposed framework it showed 100% accuracy and 0% false positive rate.

Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform (클라우드 플랫폼을 이용한 악성 URL 및 수정된 APK 파일 검증 시스템 설계 및 구현)

  • Je, Seolah;Nguyen, Vu Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.921-928
    • /
    • 2016
  • Over the past few years, Smishing attacks such as malicious url and malicious application have been emerged as a major problem in South Korea since it caused big problems such as leakage of personal information and financial loss. Users are susceptible to Smishing attacks due to the fact that text message may contain curios content. Because of that reason, user could follow the url, download and install malicious APK file without any doubt or verification process. However currently Anti-Smishing App that adopted post-processing method is difficult to respond quickly. Users need a system that can determine whether the modification of the APK file and malicious url in real time because the Smishing can cause financial damage. This paper present the cloud-based system for verifying malicious url and malicious APK file in user device to prevent secondary damage such as smishing attacks and privacy information leakage.

Study on the Development of Open Interfaced Geospatial Information Service Platform (개방형 인터페이스 기반 국토정보 서비스 플랫폼 개발 연구)

  • Chang, Yoon-Seop;Kim, Jae-Chul;Choi, Won-Geun;Kim, Kyung-Ok
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.17-24
    • /
    • 2009
  • Recently many of earlier GIS services are changing to the form of user-participated dynamic geoweb service like many new impressive web 2.0 services substitute for earlier old-fashioned web 1.0 services. Many relevant technologies are necessary to be developed so as to integrate a number of geospatial data and functions all around into the useful geoweb services. It is also necessary to make the integration easy and to cope with the rapid changes in geoweb environment. In this study, the trend of relevant geoweb technologies were reviewed before, and the development of open geospatial service platform were carried out. As a result, open 2D/3D map service engine, user-participated mashup engine, Open API search engine and so on were im plemented as the core components of that platform. The platform will be able to be used as the common platform among a number of applications in the fields such as public/private GIS integration, u-city projects and GIS/LBS services etc.

  • PDF

Robust Scheduling based on Daily Activity Learning by using Markov Decision Process and Inverse Reinforcement Learning (강건한 스케줄링을 위한 마코프 의사결정 프로세스 추론 및 역강화 학습 기반 일상 행동 학습)

  • Lee, Sang-Woo;Kwak, Dong-Hyun;On, Kyoung-Woon;Heo, Yujung;Kang, Wooyoung;Cinarel, Ceyda;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.599-604
    • /
    • 2017
  • A useful application of smart assistants is to predict and suggest users' daily behaviors the way real assistants do. Conventional methods to predict behavior have mainly used explicit schedule information logged by a user or extracted from e-mail or SNS data. However, gathering explicit information for smart assistants has limitations, and much of a user's routine behavior is not logged in the first place. In this paper, we suggest a novel approach that combines explicit schedule information with patterns of routine behavior. We propose using inference based on a Markov decision process and learning with a reward function based on inverse reinforcement learning. The results of our experiment shows that the proposed method outperforms comparable models on a life-log dataset collected over six weeks.

Configuration Management for Multi-Level Security Information Technology Systems (IT 시스템의 다중 수준 보안을 위한 관리 환경 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.39-48
    • /
    • 2010
  • In a complex, secure IT system environment there will be groups of data that be segregated from one another, yet reside on the same system. Users of the system will have varying degrees of access to specific data. The Configuration Management(CM) of the information architecture, the physical architecture, user privileges and application security policies increases the complexity for operations, maintenance and security staff. This pager describes(current work to merge the capabilities of a network CM toll with those of a Computer Aided System Engineering(CASE) tool. The rigour of Systems Engineering(SE) modelling techniques can be used to deal with the complexities of multi-level information security. The SE logical and physical models of the same system are readily tailorable to document the critical components of both the information architecture and physical architecture that needs to be managed. Linking a user-friendly, physical CM tool with the extended capabilities of a CASE tool provide the basis for improved configuration management of secure IT systems.

A Study for DHRMIS S/W Quantitive Quality Evaluation (국방 인사정보 S/W체계의 정량적 품질평가 연구)

  • Rho, Seung-Dam;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.273-280
    • /
    • 2008
  • This paper is thing for a quantitive quality evaluation in national Defense Human Resource Management Information S/W system development. Apply a quantitive quality evaluation way to be based on an international standard to admonish at ISO/IEC 9126. Proposed 6 basis of count, and set up sub 27 items detailed functionality, reliability, use anger, efficiency, maintenance anger, a transplant result, and inspection of quality table wrote the Matrix measured S/W quality to a chart. Studied a quantitive evaluation plan of a Defense Human Resource Management Information S/W system to see weight by the priority order that reflected a characteristic of a national defense business to a Purpose of a subject user, and Presented. It is 80% in quantitive quality evaluation application satisfied under 8, Very Satisfied 7(87.5%) Satisfied 1(12.5%) of Defense Human Resource Managers and judgment worked as marked so that satisfaction of reliability and a user regarding functionality was high and there will be contribute to an elevation of defense capabilities as analyze efficient national defense S/W use and effect.

  • PDF

Web-based Product Recommendation System with Probability Similarity Measure (확률 유사성척도를 활용한 웹 기반의 상품추천시스템)

  • Choi, Sang-Hyun;Ahn, Byeong-Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.1
    • /
    • pp.91-105
    • /
    • 2007
  • This research suggests a recommendation system that enables bidirectional communications between the user and system using a utility range-based product recommendation algorithm in order to provide more dynamic and personalized recommendations. The main idea of the proposed algorithm is to find the utility ranges of products based on user specified preference information and calculate the similarity by using overlapping probability of two range values. Based on the probability, we determine what products are similar to each other among the products in the product list of collaborative companies. We have also developed a Web-based application system to recommend similar products to the customer. Using the system, we carry out the experiments for the performance evaluation of the procedure. The experimental study shows that the utility range-based approach is a viable solution to the similar product recommendation problems from the viewpoint of both accuracy and satisfaction rate.

  • PDF

Implement of Smart Phone Application for Website Administration (스마트폰을 이용한 모바일 웹사이트 관리 프로그램 구현)

  • Park, Suhyun;Park, Jaeyang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.876-879
    • /
    • 2009
  • As performance and feature set of mobile devices are getting better, the scope of things for which they can be used is also getting widened. More than simply browsing information using mobile web, now these devices can interact with users. It requires various features to manage a web site; supporting full-browsing alone is not enough since there are problems such as processing speed, user interface restriction. However, using mobile devices to manage a web site has its own merits since the can be used without restriction of time and location. In this paper, we introduce a mobile web site administration software that provides both online and offline features. It supports CRUD (Create, Read, Update, Delete) operations for news and users. These operations can be executed both offline and online. A user can do most of things offline; It connects to online only when it's absolutely necessary and does those in batch mode.

  • PDF

Interior Location Services Based Emergency Call System (실내 위치 서비스 기반 긴급 호출 시스템)

  • Kim, Doan;Kim, Yongkuk;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.149-155
    • /
    • 2019
  • In this paper, we propose an emergency call system which makes a call to an institution or a guardian when an urgent case occurs to a user based on the indoor location service. In addition, it establishes indoor location service infrastructure assuming welfare institutions and hospitals. The proposed system receives the sensor value from the device that is in the form of a clock on the wrist and determines the emergency situation and delivers emergency information to the terminal. The location terminal transmits location and emergency information to the server, and the server accesses the database and stores the data. This enables the caregiver to communicate with the server through the application, monitor the user's status, receive notifications, and respond to emergency situations by using the emergency call function. If the proposed system is applied to the fields requiring urgent action such as medical field and welfare field, it will provide more stable and prompt emergency service to users and carers.