• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.035 seconds

A Study on Construction of Subject Headings for the Word Based Classification (이용자 중심의 주제어 기반 분류를 위한 주제명 개발에 관한 연구: 지식조직체계 분석을 바탕으로)

  • Baek, Ji-Won
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.1
    • /
    • pp.171-193
    • /
    • 2011
  • This study aims to analyse the necessity of the subject heading construction for the word based classification and to suggest a methodology that uses various knowledge organization systems(KOS). For this purpose, six kinds of KOS were collected for the 20 selected works in each subject. The collected subjects were analysed in terms of constructing a subject heading for the word based classification. The result of the analysis shows that there is a noticeable difference between the library oriented KOS and commercial oriented KOS. In addition, user oriented tags are more similar to the commercial sector's concerning subject categorization than the library oriented ones. However, there is no noticeable difference among the library oriented KOS, commercial sector oriented KOS, and user oriented tags regarding the subject vocabulary. Some practical implications were suggested for the application to the Korean libraries based on the findings of this study.

Fake GPS Detection for the Online Game Service on Server-Side (모의 위치 서비스를 이용한 온라인 게임 악용 탐지 방안)

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1069-1076
    • /
    • 2017
  • Recently $Pok\acute{e}mon$ GO implements an online game with location-based real time augmented reality on mobile. The correct play of this game should be based on collecting the $Pok\acute{e}mon$ that appears as the user moves around by foot, but as the popularity increases, it appears an abuse to play easily. Many people have used an application that provides a mock location service such as Fake GPS, and these applications can be judged to be cheating in online games because they can play games in the house without moving. Detection of such cheating from a client point of view (mobile device) can consume a large amount of resources, which can reduce the speed of the game. It is difficult for developers to apply detection methods that negatively affect game usage and user's satisfaction. Therefore, in this paper, we propose a method to detect users abusing mock location service in online game by route analysis using GPS location record from the server point of view.

An Implementation of Internet Protocol Version 6 o Windows NT Kernel Environment (윈도우 NT 커널 환경에서 IPv6 프로토콜 구현 연구)

  • Kang, Shin-Gak;Kim, Dae-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2521-2532
    • /
    • 1997
  • The next generation internet protocol, IPv6, have been developed by the IETF according to the requirements of enhancement of classic IP protocols to satisfy the lack of Internet address space as well as the support of multimedia applications. This paper presents an implementation of IPv6 protocols on the Windows NT kernel environment. In this work, we developed and also tested the basic functions, required for operating as an IPv6 host, such as IPv6 header processing, IPv6 address handling, control message processing, group membership processing and neighbor discovery functions. The implemented IPv6 protocol driver module is connected to the lower network interface card through NDIS, a standard network interface. And this driver module that operates within kernel, is implemented as it is connected to upper user applications and lower NDIS using dispatch and lower-edge functions. The developed IPv6 protocol driver can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library.

  • PDF

Tour Social Network Service System Using Context Awareness (상황인식 기반의 관광 소셜 네트워크 서비스 응용)

  • Jang, Min-seok;Kim, Su-gyum;Choi, Jeong-pil;Sung, In-tae;Oh, Young-jun;Shim, Jang-sup;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.573-576
    • /
    • 2014
  • In this paper, it provides social network service using context-aware for tourism. For this the service requires Anthropomorphic natural process. The service object need to provide the function analyzing, storing and processing user action. In this paper, it provides an algorithm to analysis with personalized context aware for users. Providing service is an algorithm providing social network, helped by 'Friend recommendation algorithm' which to make relations and 'Attraction recommendation algorithm' which to recommend somewhere significant. Especially when guide is used, server analysis history and location of users to provide optimal travel path, named 'Travel path recommendation algorithm'. Such as this tourism social network technology can provide more user friendly service. This proposed tour guide system is expected to be applied to a wider vary application services.

  • PDF

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Study on Effect of Exercise Performance using Non-face-to-face Fitness MR Platform Development (비대면 휘트니스 MR 플랫폼 개발을 활용한 운동 수행 효과에 관한 연구)

  • Kim, Jun-woo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.571-576
    • /
    • 2021
  • This study was carried out to overcome the problems of the existing fitness business and to build a fitness system that can meet the increased demand in the Corona situation. As a platform technology for non-face-to-face fitness edutainment service, it is a next-generation fitness exercise device that can use various body parts and synchronize network-type information. By synchronizing the exercise information of the fitness equipment, it was composed of learning contents through MR-based avatars. A quantified result was derived from examining the applicability of the customized evaluation system through momentum analysis with A.I analysis applying the LSTM-based algorithm according to the cumulative exercise effect of the user. It is a motion capture and 3D visualization fitness program for the application of systematic exercise techniques through academic experts, and it is judged that it will contribute to the improvement of the user's fitness knowledge and exercise ability.

Implement of IoT Smart Tumbler for manages the intake of each drink

  • Geu-rin, Nam;Hoon, Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.153-160
    • /
    • 2023
  • Recently, interest in the environment and well-being is increasing due to changes in people's level of consciousness. Accordingly, it is trying to reduce disposable products, and interest in "water diet" is increasing as a way to maintain a healthy body. Many people use portable tumblers to drink water or drinks, and in particular, recently, they have evolved into a smarter form that provides various functions to increase user convenience. Existing studies have limited drinks to "water," so there is a limit to monitoring various drinks. To solve this problem, this paper produced a smart tumbler that can judge drinks using IoT technology and monitor the intake of drinks. In addition, it became possible to measure the intake more accurately by judging the case of throwing away the beverage without drinking it. Based on the data of various IoT-based sensors, the user can identify the intake amount of each drink in a dedicated application and receive various conveniences.

Importance-Performance Analysis for Korea Mobile Banking Applications: Using Google Playstore Review Data (국내 모바일 뱅킹 애플리케이션에 대한 이용자 중요도-만족도 분석(IPA): 구글 플레이스토어 리뷰 데이터를 활용하여)

  • Sohui, Kim;Moogeon, Kim;Min Ho, Ryu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.115-126
    • /
    • 2022
  • The purpose of this study is to try to IPA(Importance-Performance Analysis) by applying text mining approaches to user review data for korea mobile banking applications, and to derive priorities for improvement. User review data on mobile banking applications of korea commercial banks (Kookmin Bank, Shinhan Bank, Woori Bank, Hana Bank), local banks (Gyeongnam Bank, Busan Bank), and Internet banks (Kakao Bank, K-Bank, Toss) that gained from Google playstore were used. And LDA topic modeling, frequency analysis, and sentiment analysis were used to derive key attributes and measure the importance and satisfaction of each attribute. Result, although 'Authorizing service', 'Improvement of Function', 'Login', 'Speed/Connectivity', 'System/Update' and 'Banking Service' are relatively important attributes when users use mobile banking applications, their satisfaction is not at the average level, indicating that improvement is urgent.

Efficient Graph Construction and User Movement Path for Fast Inspection of Virus and Stable Management System

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.135-142
    • /
    • 2022
  • In this paper, we propose a graph-based user route control for rapidly conducting virus inspections in emergency situations (eg, COVID-19) and a framework that can simulate this on a city map. A* and navigation mesh data structures, which are widely used pathfinding algorithms in virtual environments, are effective when applied to CS(Computer science) problems that control Agents in virtual environments because they guide only a fixed static movement path. However, it is not enough to solve the problem by applying it to the real COVID-19 environment. In particular, there are many situations to consider, such as the actual road traffic situation, the size of the hospital, the number of patients moved, and the patient processing time, rather than using only a short distance to receive a fast virus inspection.

Identifying Daily and Weekly Charging Profiles of Electric Vehicle Users in Korea : An Application of Sequence Analysis and Latent Class Cluster Analysis (전기차 이용자의 일단위 및 주단위 충전 프로파일 유형화 분석 : 순차패턴분석과 잠재계층분석을 중심으로)

  • Jae Hyun Lee;Seo Youn Yoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.194-210
    • /
    • 2022
  • The user-centered EV charging infrastructure construction policy the government is aiming for can increase convenience for electric vehicle users and bring new electric vehicle users into the market. This study was conducted to provide an in-depth understanding of the charging behaviors of actual electric vehicle users, which can be used as basic information for the electric vehicle charging infrastructure. Based on charging diary data collected for a week, the charging of electric vehicles was analyzed on a daily and weekly basis, and sequence analysis and latent class analysis were used. As a result, five daily charging profiles and four weekly charging profiles were identified, which are expected to contribute to revitalizing the electric vehicle market by providing key information for decision-making by potential electric vehicle users as well for establishing user-centered charging infrastructure policies in the future.