• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.03 seconds

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

Targeting Data Service for Web-Based Media Contents (웹 기반 미디어 콘텐츠를 위한 맞춤형 데이터 서비스)

  • Park, Sung-Joo;Chung, Kwang-Sue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1154-1164
    • /
    • 2010
  • As an useful application in broadcasting services, the targeting service has been mainly studied to improve the service satisfaction and user usage in various media service environments based on user profile, preferences, and usage history. Targeting service is expanding its domain from broadcasting contents to interstitial contents and from fixed TV devices to mobile devices. Service data also include advertisement data, coupon, and information about media contents as well as simple broadcasting data. In this paper, the targeting data service is designed and implemented on articles, advertisement and broadcasting information on the basis of the user information. To adapt this to web-based media contents, information on user profile, preferences, and usage history is newly defined on the basis of the user metadata developed in TV-Anytime Forum and the user information defined in OpenSocial. The targeting data service is implemented to generate user preferences information and usage history pattern based on the similarity among user preference, contents information, and usage history. Based on performance evaluation, we prove that the proposed targeting data service is effectively applicable to web-based media contents as well as broadcasting service.

A Study of GPS Position Detection Application in Smart Phone (안드로이드 기반 스마트폰 GPS 위치 역추적 어플리케이션 연구)

  • Kim, Min-Gi;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.248-251
    • /
    • 2010
  • Smart Phones from a PC using the Internet using a multimedia data service provides a scalable and user convenience is provided in the form of an application. Wired and wireless communications, especially with the reduction of royalty free WiFi or the Internet to download the application program on the PC you're using on the Smart Phone. In this paper, the location API in Android-based Smart Phone, using GPS coordinates identified in the latitude and longitude coordinates can be transferred to the server, Android Smart Phone to know the possibility of retracing the location. You are smart trace back information from the user application program design, development, and real-time GPS location signals combined backtrack to read the GPS location in Google Earth application is to study the trace back.

  • PDF

A Design and Implementation of The Deep Learning-Based Senior Care Service Application Using AI Speaker

  • Mun Seop Yun;Sang Hyuk Yoon;Ki Won Lee;Se Hoon Kim;Min Woo Lee;Ho-Young Kwak;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.23-30
    • /
    • 2024
  • In this paper, we propose a deep learning-based personalized senior care service application. The proposed application uses Speech to Text technology to convert the user's speech into text and uses it as input to Autogen, an interactive multi-agent large-scale language model developed by Microsoft, for user convenience. Autogen uses data from previous conversations between the senior and ChatBot to understand the other user's intent and respond to the response, and then uses a back-end agent to create a wish list, a shared calendar, and a greeting message with the other user's voice through a deep learning model for voice cloning. Additionally, the application can perform home IoT services with SKT's AI speaker (NUGU). The proposed application is expected to contribute to future AI-based senior care technology.

User Centered Context-aware Smart Home Applications (사용자 중심의 환경맥락 기반 스마트 홈 응용)

  • 오유수;장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.111-125
    • /
    • 2004
  • In this paper, we applied user-centered context to Smart Home Applications. Current research activities on smart home have just focused on the infrastructure without considering user's contexts and implementation cost. We first realized the user-centered personalized services using ubi-UCAM (a Unified Context-aware Application Model), which exploited contexts from various kinds of smart sensors. We, then, verified its usefulness in the ubiquitous computing-enabled home environment. It can be extended to various application areas since it guarantees independence between sensors and services. Accordingly, it will play a key role in future smart home environment.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

GIS-based Web-Service Architecture

  • Niaraki, Abolghasem Sadeghi;Kim, Kye-Hyun;Lee, Chol-Young;Kim, Tae-Hoon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.113-118
    • /
    • 2008
  • The present research addresses the system design for building a geospatially-based web services application for mobile users. In recent years, geospatial information(GI) and Geographic Information Systems(GIS) are significant resources in decision-making analyses at various levels of society and activities. Recently, the integration of GIS and web services, called GIS web services, provides the wider implementation of GIS. At the present time, accessing, presenting, and manipulating updatedgeospatial information to locate geo-related facility services are real challenges related to application developers to implement for foot-travelers properly. The present paper investigates how the web services work in a GIS for discovering geo-related facility services such as a restaurant and post office in the user's vicinity. Thus, a prototype, with an architecture consisting of a windows application on the client side as well as facility services and geo-engineon the server side, were designed and implemented with the proposed GIS web services platform. On both the client and server sides, visual studio .Net technology was used. A geo-engine on the server side was also built with ESRI's MapObjects. Following successful implementation of the prototype presented in this study, the mobile user is able to invoke remote web services to assess the location of various facilities such as restaurants. Moreover, the present research demonstratesthat web services are not restricted only to web-based use, but can also be utilized by any web-connected application.

  • PDF

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

A Study on the Environment and Stategies of End-User Computing (EUC 환경분석과 대응전략에 관한 연구)

  • 김용식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.574-580
    • /
    • 1990
  • Recently End-User Computing(EUC) is emerging as an alternative to the traditional information systems development approach which cannot cope with users' requirements of systems development because of increase in backlog. It is necessary that appropriate models of EUC to evaluate the expected benefits and risks and to implement should be developed for managers. The main objective of this study is to help managers who need to review their MIS policies by presentinb EUC strategies under the information systems research framework which have concluded through many studies.

  • PDF

A Multi-Agent MicroBlog Behavior based User Preference Profile Construction Approach

  • Kim, Jee-Hyun;Cho, Young-Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2015
  • Nowadays, the user-centric application based web 2.0 has replaced the web 1.0. The users gain and provide information by interactive network applications. As a result, traditional approaches that only extract and analyze users' local document operating behavior and network browsing behavior to build the users' preference profile cannot fully reflect their interests. Therefore this paper proposed a preference analysis and indicating approach based on the users' communication information from MicroBlog, such as reading, forwarding and @ behavior, and using the improved PersonalRank method to analyze the importance of a user to other users in the network and based on the users' communication behavior to update the weight of the items in the user preference. Simulation result shows that our proposed method outperforms the ontology model, TREC model, and the category model in terms of 11SPR value.