• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.032 seconds

A Study on Utilizing BIM Level of Architectural Design Information for School Facilities (BIM을 활용한 학교시설 설계정보단계 설정에 관한 연구)

  • Kim, Myoung-Keun;Koh, In-Lyong;Kim, Hyung-Un
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.4
    • /
    • pp.13-20
    • /
    • 2012
  • The recent advances in digital technology allow the use of BIM for integratively managing various information pertaining to an architectural structure. This can be the suitable tool for effectively utilizing the various requests of both the users and the administrators from the planning phase. In particular, planning and constructing a school facility can be challenging because it is an important learning facility where the students are required follow a set schedule. Accommodating to the various needs and requests of the users and the other related parties in the progress can be very difficult. Therefore, in order to use the BIM with the basis of data to manage the lifetime of the school facility, it is necessary to develop the specialized BIM process customized to the school facilities. Using this as the base, the BIM process specifically for school facilities should be phased in, applied, and expanded. The objective of this study is to define the scope of application and to plan for the efficient utilization of the BIM process specialized for school facilities, when conducting the project from planning phase to design development phase through the series of processes. Unlike the presently used enhancement of the visible minute details of the models, the methods to enhance the quality of information contained inside the model will be proposed. Also, the user will participate in the school facility construction. The realistic BIM application is aimed through the research for the processes for building models that will be utilized for construction and management.

Data Visualization Design of Bus Information Terminal using Smart Client Platform (Smart Client 기반 BIT 시각화 설계)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.55-60
    • /
    • 2013
  • Smart client is a term describing an application environment which delivers applications over a web HTTP connection and does not require installation and/or updates. The term "Smart Client" is meant to refer to simultaneously capturing the benefits of a "thin client" (zero-install, auto-update) and a "fat client" (high performance, high productivity). A "Smart Client" application can be created in several very different technologies. Over the past few years, ITS has started to move towards smart clients, also called rich clients. The trend is a move from traditional client/server architecture to a Web-based model. More similar to a fat client vs. a thin client, smart clients are Internet-connected devices that allows a user's local applications to interact with server-based applications through the use of Web services. Smart Client applications in BIT bridge the gap between web applications and desktop applications. They provide the benefits of a web applicationwhile still providing the snappy look and feel inherent to desktop applications.

Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform (오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.141-152
    • /
    • 2013
  • The applications and concerned technologies of cloud computing services, one of major trends in the information communication technology, are widely progressing and advancing. OpenStack, one of open source cloud computing platforms, is comprised of several service components; using these, it can be possible to build public or private cloud computing service for a given target application. In this study, a remote sensing image analysis processing service on cloud computing environment has designed and implemented as an operational test application in the private cloud computing environment based on OpenStack. The implemented service is divided into instance server, web service, and mobile app. A instance server provides remote sensing image processing and database functions, and the web service works for storage and management of remote sensing image from user sides. The mobile app provides functions for remote sensing images visualization and some requests.

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Implementation and Performance Evaluation of Pavilion Management Service including Availability Prediction based on SVM Model (SVM 모델 기반 가용성 예측 기능을 가진 야외마루 관리 서비스 구현 및 성능 평가)

  • Rijayanti, Rita;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.766-773
    • /
    • 2021
  • This paper presents an implementation result and performance evaluation of pavilion management services that does not only provide real-time status of the pavilion in the forest but also prediction services through machine learning. The developed hardware prototype detects whether the pavilion is occupied using a motion detection sensor and then sends it to a cloud database along with location information, date and time, temperature, and humidity data. The real-time usage status of the collected data is provided to the user's mobile application. The performance evaluation confirms that the average response time from the hardware module to the applications was 1.9 seconds. The accuracy was 99%. In addition, we implemented a pavilion availability prediction service that applied a machine learning-based SVM (Support Vector Model) model to collected data and provided it through mobile and web applications.

An One-time Proxy Signature Scheme Suitable for Mobile Communications (이동 통신 환경에 적합한 일회용 대리 서명 방식)

  • Kim, So-Jin;Park, Ji-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.533-540
    • /
    • 2003
  • According to the development of mobile communications, many people have been offered high qualify of the application services using portable terminals. But those works nay have many vulnerabilities and have the limit of excutaions. Because the application services are provided in mobile network and the performance of portable terminals is lower than that of base stations. To improve these problems, in this paper, we propose one-time proxy signature scheme that can reduce the computational ctsost on a user and prevent a proxy agent's dishonesty. The proposed scheme is based on the KBLK scheme [2] which applied the fail-stop signature scheme [1]. It is constructed that a proxy signer can sign only one message with a proxy key and we add anonimity to it for the user's identity protection in mobile communication like a M-commerce.

The Effect of Augmented Reality-based Fashion Product Application on Intention to Use (증강현실기반의 패션제품 어플리케이션 특성요인과 사용의도와의 관계에 관한 연구)

  • Kim, Hyekyung;Park, Jihye;Kim, Yongseok;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.89-102
    • /
    • 2020
  • With the technology of the 4th Industrial Revolution integrated into the industry as a whole, digital transformation (DT) is becoming an innovative and essential element of corporate survival in the fashion industry, and it is expected that the paradigm shift in shopping will become an unavoidable reality, especially based on the AR. Therefore, in this study, the characteristics of augmented reality were presented separately as perceived realism, interaction, pleasure, and usability, and the influence of augmented reality by immersion parameters on the user's satisfaction and intended to reveal the relationship between satisfaction and usage through the characteristics of augmented reality. For the purpose of this study, a structured questionnaire was conducted, and the available 209 responses were collected and used for empirical analysis. The results of the empirical analysis are as follows. First, while immersion has the greatest effect on satisfaction, the effect on use intention has a stronger effect on satisfaction than immersion. This indicates that purchase occurs when the user's immersion leads to satisfaction, and when the satisfaction falls, the intention to use is also lowered. Second, interactivity, enjoyment, and ease of use among the various characteristics of fashion applications have a positive effect on immersion. Among them, ease of use had a strong effect on immersion. In light of this, it can be seen that ease of use should be considered first when creating an application based on augmented reality in the future fashion industry. However, the perceived reality is low in the degree of immersion, and the effect on satisfaction is also lowered, so it is difficult to be connected to intention. Considering that this study was conducted through indirect experience through video viewing, this study expects the development of research through a more practical research model in the future, as the impact is considered to be a relatively low measurement.

Design and Implementation of Architecture for Convergence of Home Network Services and Data Broadcasting Services (홈네트워크 서비스와 데이터방송 서비스의 컨버전스를 위한 구조 설계 및 구현)

  • Bae, Yu-Seok;Oh, Bong-Jin;Moon, Kyeong-Deok;Kim, Sang-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.717-724
    • /
    • 2006
  • This paper describes the design and implementation of architecture for convergence of home network services and data broadcasting services based on UMB and ACAP middleware; the one is used for interoperability of home networked devices, and the other for data broadcasting services. The proposed architecture provides TV-centric user interface capable of managing home network services and data broadcasting services together using a remote controller and TV sets TV applying Java TV Xlet interface and HAVi user interface for home network services like data broadcasting services. Besides, we define the service proxy for accessing home network services in a set-top box and the service broker for providing data related to home network services in a home server. Finally, the application manager in ACAP middleware manages the lifecycle of home network services through service events from the service proxy to the application manager.