• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.026 seconds

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Pairwise fusion approach to cluster analysis with applications to movie data (영화 데이터를 위한 쌍별 규합 접근방식의 군집화 기법)

  • Kim, Hui Jin;Park, Seyoung
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.2
    • /
    • pp.265-283
    • /
    • 2022
  • MovieLens data consists of recorded movie evaluations that was often used to measure the evaluation score in the recommendation system research field. In this paper, we provide additional information obtained by clustering user-specific genre preference information through movie evaluation data and movie genre data. Because the number of movie ratings per user is very low compared to the total number of movies, the missing rate in this data is very high. For this reason, there are limitations in applying the existing clustering methods. In this paper, we propose a convex clustering-based method using the pairwise fused penalty motivated by the analysis of MovieLens data. In particular, the proposed clustering method execute missing imputation, and at the same time uses movie evaluation and genre weights for each movie to cluster genre preference information possessed by each individual. We compute the proposed optimization using alternating direction method of multipliers algorithm. It is shown that the proposed clustering method is less sensitive to noise and outliers than the existing method through simulation and MovieLens data application.

Exploring the Motivational Use of Special Libraries from a User's ARCS Perspective (이용자의 ARCS 관점에서 본 전문도서관 동기적 이용 탐색)

  • Na, Kyoungsik;Jeong, Yongsun
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.2
    • /
    • pp.35-60
    • /
    • 2022
  • This study reports on the motivational use of special libraries from a user's perspective that investigated four motivational components: attention, relevance, confidence, and satisfaction (ARCS) of the library users. Even though special libraries received relatively little attention compared to public libraries, special libraries could fill the niche of public libraries for the special and specific needs of the community in the current library environments in South Korea. Qualitative data were collected through individual interviews and forty people participated in the project. The findings of this study show the four themes (ARCS) that users need motivation as a way to start using a special library, thereby staying focused and revisiting the library. It is possible that the ARCS model will contribute to the implementation, application, and practice of both special libraries and their services in the library environment. The results are expected to expand our knowledge on the motivational ARCS use of special libraries and to serve as basic data when designing motivational strategies and plans of the systems for special libraries.

Design and Implementation of YouTube-based Educational Video Recommendation System

  • Kim, Young Kook;Kim, Myung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.37-45
    • /
    • 2022
  • As of 2020, about 500 hours of videos are uploaded to YouTube, a representative online video platform, per minute. As the number of users acquiring information through various uploaded videos is increasing, online video platforms are making efforts to provide better recommendation services. The currently used recommendation service recommends videos to users based on the user's viewing history, which is not a good way to recommend videos that deal with specific purposes and interests, such as educational videos. The recent recommendation system utilizes not only the user's viewing history but also the content features of the item. In this paper, we extract the content features of educational video for educational video recommendation based on YouTube, design a recommendation system using it, and implement it as a web application. By examining the satisfaction of users, recommendataion performance and convenience performance are shown as 85.36% and 87.80%.

A Client-Side App Model for Classifying and Storing Documents

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif;Khalifa, Mahmoud;Alsharani, Mohammed Mujib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.225-233
    • /
    • 2022
  • Due to the large number of documents that are important to people and many of their requests from time to time to perform an essential official procedure, this requires a practical arrangement and organization for them. When necessary, many people struggle with effectively arranging official documents that enable display, which takes a lot of time and effort. Also, no mobile apps specialize in professionally preserving essential electronic records and displaying them when needed. Dataset consisting of 10,841 rows and 13 columns was analyzed using Anaconda, Python, and Mito Data Science new tool obtained from Google Play. The research was conducted using the quantitative descriptive approach. The presented solution is a model specialized in saving essential documents, categorizing according to the user's desire, and displaying them when needed. It is possible to send in an image or a pdf file. Aside from identifying file kinds like PDFs and pictures, the model also looks for and verifies specific file extensions. The file extension and its properties are checked before sharing or saving it by applying the similarity algorithm (Levenshtein). Our method effectively and efficiently facilitated the search process, saving the user time and effort. In conclusion, such an application is not available, which facilitates the process of classifying documents effectively and displaying them quickly and easily for people for printing or sending to some official procedures, and it is considered one of the applications that greatly help in preserving time, effort, and money for people.

Implementation of Joystick for Flight Simulator using WiFi Communication

  • Myeong-Chul Park;Sung-Ho Lee;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.111-118
    • /
    • 2023
  • In this paper, we propose a WiFi-based joystick with an acceleration sensor and a vibration sensor that can be used in flight simulators and VR fields. The flight simulator is a technology belonging to the ICT and SW application field and provides a simulation environment that reproduces the aircraft environment. Existing flight simulator control devices are fixed to a specific device and the user's activity area is limited. In this paper, a 3D space manipulation device was implemented for the user's free use of space. In addition, the proposed control device is designed as a WiFi communication board and display that displays information and performs 3-axis sensing for accurate and sophisticated control compared to existing VR equipment controllers. And the applicability was confirmed by implementing a Unity-based virtual environment. As a result of the implementation device verification, it was confirmed that the control device operates normally through the communication interface, It was confirmed that the sensing values in the game and the sensing values measured on the implemented board matched each other. The results of this study can be used for VR and various metaverse related contents in addition to flight simulators.

Development of Methodology for Automated Office Room Generation Based on Space Utilization (공간 사용률 기반 오피스 실 생성 자동화 방법론 개발)

  • Song, Yoan;Jang, Jae Young;Cha, Seung Hyun
    • Journal of KIBIM
    • /
    • v.14 no.3
    • /
    • pp.1-12
    • /
    • 2024
  • Many efforts are being made to enhance user productivity and promote collaboration while ensuring the economic efficiency of office buildings. Analyzing space utilization, indicating how users utilize spaces, has been a crucial factor in these efforts. Appropriate space utilization enhances building maintenance and space layout design, reducing unnecessary energy waste and under-occupied spaces. Recognizing the importance of space utilization, there have been several studies to predict space utilization using information about users, activities, and spaces. These studies suggested an ontology of the information and implemented automated activity-space mapping as part of space utilization prediction. Despite the existing studies, there remains a gap in integrating space utilization prediction with automated space layout design. As a foundational study to bridge this gap, our study proposes a novel methodology that automatically generates office rooms based on space utilization optimization. This methodology consists of three modules: Activity-space mapping, Space utilization calculation, and Room generation. The first two modules use data on space types and user activity types as input to calculate and optimize space utilization through requirement-based activity-space mapping. After optimizing the space utilization value within an appropriate range, the number and area of each space type are determined. The Room generation module then automatically generates rooms with optimized areas and numbers. The practical application of the developed methodology is demonstrated, highlighting its effectiveness in fabricated case scenario. By automatically generating rooms with optimal space utilization, our methodology shows potential for expanding to automated generation of optimized space layout design based on space utilization.

Android Malware Analysis Technology Research Based on Naive Bayes (Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1087-1097
    • /
    • 2017
  • As the penetration rate of smartphones increases, the number of malicious codes targeting smartphones is increasing. I 360 Security 's smartphone malware statistics show that malicious code increased 437 percent in the first quarter of 2016 compared to the fourth quarter of 2015. In particular, malicious applications, which are the main means of distributing malicious code on smartphones, are aimed at leakage of user information, data destruction, and money withdrawal. Often, it is operated by an API, which is an interface that allows you to control the functions provided by the operating system or programming language. In this paper, we propose a mechanism to detect malicious application based on the similarity of API pattern in normal application and malicious application by learning pattern of API in application derived from static analysis. In addition, we show a technique for improving the detection rate and detection rate for each label derived by using the corresponding mechanism for the sample data. In particular, in the case of the proposed mechanism, it is possible to detect when the API pattern of the new malicious application is similar to the previously learned patterns at a certain level. Future researches of various features of the application and applying them to this mechanism are expected to be able to detect new malicious applications of anti-malware system.

(ubi-UCAM: an Unified Context-Aware Application Model for ubiHome) (ubiHome을 위한 컨텍스트 기반 응용 서비스 모형)

  • 장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.550-558
    • /
    • 2003
  • Context-aware application plays an important role in ubiquitous computing (ubiComp) environment by providing user with anytime, anywhere services even without any explicitly triggered command. In this paper we propose a unified context-aware application model which is an essential part to develop various applications in ubiquitous computing environment. The proposed model affirms the independence between sensor and application by using unified context in the form of 5W1H. It also ensures that application exploits relatively accurate context to trigger personalized services. To show usefulness of the proposed model, we apply it to the sensors and applications in the ubiHome, a test bed for ubiComp-enabled home applications. According to the experimental results, without loss of generality, we believe it can be extended to various context-aware applications in daily life.

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.