• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.032 seconds

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

Design and Implementation of Location Recommending Services using Personal Emotional Information based on Collaborative Filtering (개인 감성정보를 이용한 협업 필터링 기반 장소 추천 서비스 설계 및 구현)

  • Byun, Jeong;Kim, Dong Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1407-1414
    • /
    • 2016
  • In this study, we develop that Location Recommending System using personal emotion information based on Collaborative Filtering. Previous Location Recommending System recommended a place visited by the user of the rating or the pattern of location for the user place. These systems are not high user satisfaction because that dose not consider the user status or have not objectively the information. Using user's personal emotion information to recommend a high-affinity users who have visited the place felt similar emotions objectively can improve user satisfaction with the place. In this study, a user using a mobile application directly register the recognized emotion information using the current position and bio-signal, and using the registered information measuring the similarity of user with a similarity emotion, predicts a preference for the place it is recommended to emotional place. The system consists of a user interface, a database, a recommendation module.

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Development of User Model for an Educational Adaptive Hypermedia System (교육용 적응적 하이퍼미디어 시스템의 사용자 모형 개발)

  • Yu, Jeong-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.4
    • /
    • pp.547-554
    • /
    • 2004
  • Education is the largest application area of adaptive hypermedia systems. The user modeling is considered a very important part of the field of adpative hypermedia systems. In this paper we present the developed user model which provides different educational contents using a neural network. The user model has been verified on hypermedia for learning about basic web concepts, multimedia and HTML. This paper reports the results of simulation. Our simulation shows that the user model exactly can provide contextual different links for different students.

  • PDF

Controlling Position of Virtual Reality Contents with Mouth-Wind and Acceleration Sensor

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.57-63
    • /
    • 2019
  • In this paper, we propose a new framework to control VR(Virtual reality) contents in real time using user's mouth-wind and acceleration sensor of mobile device. In VR, user interaction technology is important, but various user interface methods is still lacking. Most of the interaction technologies are hand touch screen touch or motion recognition. We propose a new interface technology that can interact with VR contents in real time using user's mouth-wind method with acceleration sensor. The direction of the mouth-wind is determined using the angle and position between the user and the mobile device, and the control position is adjusted using the acceleration sensor of the mobile device. Noise included in the size of the mouth wind is refined using a simple average filter. In order to demonstrate the superiority of the proposed technology, we show the result of interacting with contents in game and simulation in real time by applying control position and mouth-wind external force to the game.

An advertisement method using inaudible sound of speaker

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.7-13
    • /
    • 2015
  • Recently, there are serviced user customized advertisement of various type using smart device. Representative services are advertisement service using light of smart TV screen or audible sound of smart TV to transmit advertisement information. However, those services have to do a specific action of smart device user for advertisement information or need audible audio information of TV contents. To overcome those weakness, therefore, we propose an advertisement method using inaudible sound of speaker based on smart device. This method supports the transfer of advertising content to the smart device user with no additional action or TV audio signal required to access that content. The proposed method used two high frequencies among 18kHz ~ 22kHz of audible frequency range which smart TV can send out. And it generates those frequencies synthesized with audio of TV contents as trigger signal which can send advertisements to smart device. Next, smart device analysis the trigger signal and request advertisement contents related to the signal to server. After then, smart device can show the downloaded contents to user. Because the proposed method uses the high frequencies of sound signals via the inner speaker of the smart device, its main advantage is that it does not affect the audio signal of TV content. To evaluate the efficacy of the proposed method, we developed an application to implement it and subsequently carried out an advertisement transmission experiment. The success rate of the transmission experiment was approximately 97%. Based on this result, we believe the proposed method will be a useful technique in introducing a customized user advertising service.

Design and Implementation of Procedural Self-Instructional Contents and Application on Smart Glasses

  • Yoon, Hyoseok;Kim, Seong Beom;Kim, Nahyun
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.243-250
    • /
    • 2021
  • Instructional contents are used to demonstrate a technical process to teach and walkthrough certain procedures to carry out a task. This type of informational content is widely used for teaching and lectures in form of tutorial videos and training videos. Since there are questions and uncertainties for what could be the killer application for the novel wearables, we propose a self-instruction training application on a smart glass to utilize already-available instruction videos as well as public open data in creative ways. We design and implement a prototype application to help users train by wearing smart glasses specifically designed for two concrete and hand-constrained use cases where the user's hands need to be free to operate. To increase the efficiency and feasibility of the self-instruction training, we contribute to the development of a wearable killer application by integrating a voice-based user interface using speech recognizer, public open data APIs, and timestamp-based procedural content navigation structure into our proof-of-concept application.

A Study on User's Wayfinding Information-Seeking Behavior When Using the Mobile Map Application on Foot (도보 상황에서 모바일 지도 애플리케이션 이용자의 길 찾기 정보추구행위에 관한 연구)

  • Gwon, Hyeon Jeong;Lee, Jee Yeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.469-492
    • /
    • 2021
  • This study aims to find an optimal method for the mobile map application to provide directions by analyzing users' behavior in wayfinding and the information referenced in the direction-finding tasks. The mobile application provided information such as 'the name of the store on the first floor,' 'current location and directions to proceed if there are multi-branching roads,' and 'alleyways.' In the visual representation of information, the application should pay attention to 'landmark elements such as subway station exits and bus stops,' 'the color of crosswalks and overpasses,' 'division between sidewalks and driveways,' and 'entry to the subway stations.' For the mobile map application to provide intuitive interaction, it is necessary to specify 'the direction toward the destination,' 'the possible rotation of the map screen,' and 'the big roads' preference guidance.'

Application of Motion Analysis to User Participation Behavior Model: Focused on Interactive Space

  • Kwon, Jieun;Nah, Ken
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.3
    • /
    • pp.175-189
    • /
    • 2014
  • Objective: The goal of this research is to develop new user behavior model using user motion analysis with microscopic perspective for attracting user's participation in interactive space. Background: The interactive space is 'human's place', which is made up of complex elements of digital virtual space and traditional analog and physical environment based on human-computer interaction system. Human behavior has changed in it at the same time. If the user couldn't make participation in interaction, the purpose of the system is not met, which reduces its effect. Therefore, we need to focus on interactive space that is potential future direction from a new point of view. Method: For this research, we would discuss and study fields of interactive space; (1) finding definition of interactive space and studying background of theory about it. (2) providing base of user behavior model with study of user's context that is to be user information and motion. (3) examining user motion, classify basic motion type and making user participation behavior model in phases. Results: Through this process, user's basic twenty motions which are systematized are taken as a standard for analysis of interaction process and participation in interactive space. Then, 'NK-$I^5$ (I Five)' model is developed for user participation types in interactive space. There are five phases of user participation behavior: Imperception, Interest, Involvement, Immersion, and Influence. In this analysis, three indicators which are time, motion types, and user relationship are found to be related to participation. Conclusion: The capabilities and limitation of this research is discussed to attract user participation. This paper focuses especially on contribution of design to lead user's participation in interactive system and expectation to help adapt to user centered design of various interactive space with new aspect of user behavior research. Application: The results of the 'NK-$I^5$ (I Five)' model might help to realize successful interactive space based on user centered design.