• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.028 seconds

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Smartphone Application's User Interface Design, User's Cognitive Functions, and Work Performance (사용자 인지기능을 매개로 스마트폰 애플리케이션의 사용자환경 디자인이 애플리케이션 이용성과에 미치는 영향)

  • Jung, Wonjin;Yim, Hyung-Rok
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2014
  • Nowadays, smartphones have become a portable multimedia computer because of a variety of useful applications in our daily lives, which can be downloaded and installed easily in smartphones. Despite of the fact that, however in the IS literature there has been little research on smartphone applications' user interface design. Specifically, there has been little understanding about smartphone users' cognitive functions as a mediating variable in the relationship between the user interface design of smartphone applications and users' work performance with the applications. Thus, the research aims of this study are to examine 1) the effects of the user interface design attributes including simplicity, consistency, and metaphor on the compliance with or the extension of users' mental models representing users' cognitive functions, and 2) the effects of the users' cognitive functions on their work performance with the applications. A survey was conducted and Structural Equation Modeling(SEM) was employed to analyze the data. The results of this study showed that two of the user interface design attributes, simplicity and consistency, strongly affected users' cognitive functions. In addition, users' cognitive functions significantly influenced users' work performance. However, there was no relationship between the metaphors in the user interfaces of smartphone applications and the compliance with users' mental model. This study contributed theoretically not only to explore users' mental models that are rarely investigated in the IS field, but also to add some findings related to users' cognitive functions to the IS literature. This study also can help practitioners to develop more user friendly user interfaces of smartphone applications by suggesting the design attributes, such as simplicity, consistency, and metaphor.

Implementation of Henhouse Monitoring System Based on Ubiquitous Sensor Network (USN 기반의 계사 모니터링 시스템 구축)

  • Park, DongGook;Yoe, Hyun;Rhyu, KyeongTaek;Shin, ChangSun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.9-18
    • /
    • 2009
  • This paper proposes a Ubiquitous Henhouse Monitoring System (UHMS) that can not only monitor henhouse's conditions and raising environments, but also control the henhouse remotely by using sensor network technology. The system consists of three layers. The physical layer connects sensors with facilities. The middleware layer processes and manages data collected from the physical layer. And the application layer provides the user with the user requested services. The system provides a real-time monitoring service, a facility controlling service, an expert service, a consumer safety service, and a mobile message service via interacting with components of each layer. Finally, a henhouse model is defined and the relevant system components and the application GUIs are implemented.

A Study of GUI-Sharing Mechanism by GDI Hooking (GDI 훅킹에 의한 GUI 공유 기법에 관한 연구)

  • 김형준;박기식;조인준;정회경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.593-601
    • /
    • 1998
  • This paper shows the GUI-sharing mechanism based on GDI hooking that can be useful for group users to ,share application programs dedicated to specific systems in distributed environments. In order to implement a networked-group working for real-time bases, an application-sharing mechanism should be necessary. This paper presents the implementation issues of application-sharing mechanism and provides a way of group working by implementation of GDI hooking module using GDI library in Windows 95 environment.

  • PDF

Component-based Requirements Analysis for the GPS Applications (GPS 애플리케이션에 대한 컴포넌트 기반의 요구사항 분석)

  • Lee, Sang Young;Lee, Yoon Hyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.177-188
    • /
    • 2012
  • GIS provides the various analyzing and displaying using diverse spatial data have supported the powerful functionality and friendly user-interface. But, early GIS software is developed as package tool, it have many difficulties with reducing the cost of developing GPS application and satisfying the various user requirements. At present, the developed GPS applications across multiple domains, despite the common features are built separately for each domain in terms of software engineering development followed out waste of time and money expenditure. However, common features between GPS applications, if deployed as a component assembly and reuse components in terms of enabling the two kinds of component-based development can bring out the beneficial results. In this paper, we described the Analysis and design of GPS ApplicationsS based on Component. Each GPS component is composed of many objects accomplish the atomic service processing and cooperate with each other. And, GPS components meets the qualifications of thc low cost of developing GPS application because of the reusability and re-composition.

A Cultural Dimensions Model based on Smart Phone Applications

  • Oh, Jung-Min;Moon, Nam-Mee
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.209-220
    • /
    • 2011
  • One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior patterns indicate the significance of smart phone applications. So far, studies on applications have focused mainly on technical approaches, including recommendation systems. Meanwhile, the issue of culture, as an aspect of user characteristics regarding smart phone use, remains largely unexamined throughout the world. Hence, the present study attempts to analyze the highest ranked smart phone applications downloaded and paid for that are ranked the highest in 10 countries (Korea, Japan, China, India, the UK, USA, Indonesia, Canada, France, and Mexico) and we then derive the CDSC (Cultural Dimensions Score of Content) for these applications. The results derived are, then, mapped to the cultural dimensions model to determine the CISC (Cultural Index Score for Country). Further, culturally significant differences in smart phone environments are identified using MDS analysis.

Leap-Motion Based Tracking Framework for Practice and Analysis of User's Arm Muscle (확장현실에서 사용자의 팔 근육 연습 및 분석을 위한 립모션 기반 추적 프레임워크)

  • Park, Seonga;Park, Soyeon;Kim, Jong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.469-472
    • /
    • 2020
  • 본 논문에서는 립모션 디바이스를 이용하여 손의 움직임을 계산하고 이로부터 저글링 운동 동작뿐 만 아니라 이것을 이용한 팔 근육을 연습할 수 있는 새로운 프레임워크를 제안한다. 제안된 방법은 실시간으로 동작하기 때문에 사용자의 동작에 맞춰진 분석을 할 수 있다. 본 논문의 프레임워크는 크게 세 부분으로 나누어진다. 우선, 1) 사용자가 공을 튕기는 이벤트 트리거를 손목 움직임으로부터 정의한 뒤, 2) 사용자의 손 위치를 기준으로 저글링 형태의 움직임을 공에 매핑시키기 위한 포물선 기반 입자 기법을 제안한다. 마지막으로, 3) 손목의 굽힘을 기반으로 근육의 활동 양을 시각화할 수 있는 기법을 제안한다. 결과적으로 본 논문의 프레임워크를 이용하면 실시간 저글링 게임을 할 수 있을 뿐만 아니라 사용자의 팔 근육 움직임을 실시간으로 분석할 수 있다.

  • PDF

A Personalized Healthcare Analysis System in Ubiquitous Environment

  • Sain, Mangal;Chung, Wan-Young;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.235-243
    • /
    • 2011
  • With the recent trends and the adaptation of further advancement in personal healthcare system leads to develop some application which can work independent and user can operate that application without much interference of physician or any specialist user. To meet these needs, this paper proposes and implements a progressive architecture for the personal healthcare information system. This new architecture will not only play the role of middleware but also provide a analysis tool to process that different sensor data which is collected from different sensors implemented on patient body and environment. After collecting that data, with the help of various developed applications this data can be convert into useful information which will be stored in application server for further use and research. These features can be enabled by simple and effortless interactions of normal users and act autonomously to support their activities. This proposed personal healthcare architecture will also provide analysis report to the doctors and patient or various users for further instructions. The analysis report consists of healthcare data analysis results and history of patients. We are considering healthcare data like ECG, which is an important aspect for basic healthcare need.

Biometric User Authentication Method of Mobile Application in Trustable Space (신뢰할 수 있는 공간에서 생체인식기반의 모바일 애플리케이션 사용자인증 기법)

  • Lee, Tae Kyong;Kim, Yong Hyuk;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.201-212
    • /
    • 2017
  • As services using mobile devices increase, exposure of personal information, and secure threats increase. In this paper, we propose a location-based user authentication system used in mobile device for tightening security. Our authentication system is performed to authenticate two steps. The first authentication is location authentication to ensure that the user accesses an application in trustable space. This authentication method uses an Access Point's information. The second authentication is trustable space authentication to confirm the normal user. This method is carried out the authentication by using biometric information from the user.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.