• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

Development of an Informetric Analysis System KnowledgeMatrix (계량정보분석시스템 KnowledgeMatrix 개발)

  • Lee, Bangrae;Yeo, Woon Dong;Lee, June Young;Lee, Chang-Hoan;Kwon, Oh-Jin;Moon, Yeong-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.167-171
    • /
    • 2007
  • Application areas of Knowledge Discovery in Database (KDD) have been expanded into many R&D management processes including technology trends analysis, forecasting and evaluation etc. Established research field such as informetrics (or scientometrics) has recently fully utilized techniques or methods of KDD. Various systems have been developed to support works of analyzing large-scale R&D related databases such as patent DB or bibliographic DB by a few researchers or institutions. But extant systems have some problems for korean users to use. Their prices is not cheap, korean language process not available, and user's demands not reflected. To solve these problems, Korea Institute of Science and Technology Information (KISTI) developed stand-alone type information analysis system named as KnowledgeMatrix. KnowledgeMatrix system offer various functions to analyze retrieved data set from databases. Knowledge Matrix main operation unit is composed of user-defined lists and matrix generation, cluster analysis, visualization, data pre-processing. KnowledgeMatrix show better performances and offer more various functions than extant systems.

  • PDF

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

A Study on the Implementation of Information Extraction Agency for Ship Sale and Purchase using Content Based Retrieval (내용기반 검색을 이용한 선박매매 정보추출 에이전트의 구현에 관한 연구)

  • Ha, Chang-Seung;Jung, Lee-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.43-50
    • /
    • 2007
  • Delay in the process of Information Extraction, IE, is largely due to inability to correctly recognize the user's information requirement of particular search factors. Especially if the wrapper rules are used in a search engine, the search generally fails to classify internet documents properly and efficiently since the application of the same wrapper rules lacks extensibility throughout various types of existing internet document. In case of buying or selling a ship, if the price range, type. place of delivery, inspection site and other information relevant to the sales would be available through the internet for proper retrieval the sales could more readily succeed by using Ontology relating to sales or purchase information and by selectively searching for the desired information through the content based retrieval system. This system proposes to improve various wrapper systems existing throughout different internet sites and to eliminate unnecessary information tagged on the existing internet documents in order to create a more advanced information retrieval system.

  • PDF

A Web-GIS based on Object Location Information Monitoring System for Ubiquitous Environment (유비쿼터스 환경을 위한 Web-GIS 기반의 객체위치정보 모니터링 시스템)

  • Kim, Taek-Cheon;Kim, Seok-Hun;Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1755-1763
    • /
    • 2007
  • Specially, location information can say that is important information in this ubiquitous environment and solutions of new GIS system to utilize this are required. Examine method to improve web geography information service system because this paper uses XML and presented specific implementation result. Through internet. it planed various geography information that offer in form of service that do not receive restriction of heterogeneous system environment. Also, did thing that is easy when request service about geography information that user need and deliver fast by purpose. Supplement and to improve open-ended and XML of form normalized use and developed existent web geography information service. So that can use map service in web browser without setup of application program that buy expensive GIS software or offer in each company design and implement.

The credit card approval information management using WIPI (WIPI를 이용한 신용카드 결제 정보 관리)

  • Kim, Won-Kyum;Han, Jae-Yong;Park, Hyo-Won;Lee, Sun-Heum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.824-829
    • /
    • 2009
  • SMS service is widely used for providing the approval information of a credit card when the payment is made by a credit card. But the message contained in the SMS is very simple and includes one time approval information. Although detailed approval informations could be retrieved by means of wire-network or mobile network services, the wire-network service could not be used on moving and the mobile network service requires high cost. In this paper, a WIPI application program managing the approval informations of a credit card based on the accumulated SMS messages in the cell phone has been developed. A cell phone user can conveniently can get the useful information such as the approval list on last month, the approval list on this month, the total amount on this month and the information about payment by installment from the developed program without any cost.

A Case Study on the Development of Information Systems based on the Client/Server System (클라이언트/서버 시스템 환경에 기초한 정보시스템 구축에 관한 사례연구-P 대학의 종합정보시스템을 중심으로-)

  • 한용호;류영태
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.27-50
    • /
    • 2001
  • The purpose of this study was to examine some of the most important factors for the development of information systems with today's fast-paced, ever-changing, and exciting information system environment. Especially, it was focused to investigate current information technology related to develop information systems, to find some important problems during the development process, and to suggest solutions for the problems. Case research methodology was used because a natural setting was needed and a focus was on contemporary events for this study. Similarly, research phenomena was not supported by a strong theoretical base. The case was the development of an integrated information systems in a specific university. Multiple-case designs were desirable, but single-case study was used because of limitations of site selection. Multiple data collection methods were employed in this study such as documentation, interviews, and direct observation. Some major problems were found during the system development. First, the schedule to complete a project was delayed over six months. Second, the system did not ensure to align organizational goals and information systems goals based on BPR (Business Process Reengineering). Third, there was a difficulty in evaluating request for proposal (RPR) returns and choosing a vendor. Finally, information technology is changing too fast. So, it was very difficult to get the transparency of new technology The study has suggested a few solutions: top management support, matching If planning with business planning, complete project plan and control, user participation, and training Finally, joint application development (JAD) is strongly recommended, which is a workshop that unites management, IT specialists, and knowledge workers to define and specify the logical requirements and technical alternatives for a proposed system.

  • PDF

A Research on how to turn informationization Database of construction materials to practical use (건설 자재정보 DataBase의 실용화 방안 연구)

  • Kwon, Oh-Yong;Han, Chung-Han;Lee, Hwa-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.747-750
    • /
    • 2007
  • Information of construction material is served through internet to user but it is poor to use information of construction material because of lack of information which is accumulated and insufficience of standardization. So informationization of civil materials are closely connected with works and then it is promoted to be used through works like design, construction etc. Informationization for management of information of construction material which reflects questionnaires about opinion of workers presents promotion by stage considering first, continuous renewal of information of construction material and increase in quantity, second classification system and standardization of terms in order to share and connect information of construction material third, developing inquiry method of material information needed in construction stage fourth, connecting material information DB and application through design and construction.

  • PDF

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Implementation of Personalized Rehabilitation Exercise Mobile App based on Edge Computing

  • Park, Myeong-Chul;Hur, Hwa-La
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.93-100
    • /
    • 2022
  • In this paper, we propose a mobile app for personalized rehabilitation exercise coaching and management service using an edge computing-based personalized exercise information collection system. The existing management method that relies on user input information has difficulty in examining the actual possibility of rehabilitation. In this paper, we implement an application that collects movement information along with body joint information through image information analysis based on edge computing at a remote location, measures the time and accuracy of the movement, and provides rehabilitation progress through correct posture information. In addition, in connection with the measurement equipment of the rehabilitation center, the health status can be managed, and the accuracy of exercise information and trend analysis information is provided. The results of this study will enable management and coaching according to self-rehabilitation exercises in a contactless environment.