• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.034 seconds

Web Service for Traffic Information Using Focus+Context Visualization Technique (Focus + Context 시각화 기법을 사용한 교통정보 웹 서비스)

  • Kim, Kwangseob;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.101-106
    • /
    • 2014
  • Information and Communication Technology environment has been developing rapidly and variety of services are in service. As data becomes increasingly sophisticated. These data was applied techniques of visualization in order to visualize efficiently. Various agencies are providing the map based data in real-time. However, traffic information is getting more complex and users are having a difficulty to understand with convential visualization techniques. This study was designed and implemented in the web service of traffic information using Focus+Context. Web service implemented HTML5(Hyper Text Markup Language 5), and it runs on browser of either desktop or mobile devices. This study sets an example as web application from a user perspective by combining information visualization and traffic information.

Big data-based Local Store Information Providing Service (빅데이터에 기반한 지역 상점 관련 정보제공 서비스)

  • Mun, Chang-Bae;Park, Hyun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.561-571
    • /
    • 2020
  • Location information service using big data is continuously developing. In terms of navigation, the range of services from map API service to ship navigation information has been expanded, and system application information has been extended to SNS and blog search records for each location. Recently, it is being used as a new industry such as location-based search and advertisement, driverless cars, Internet of Things (IoT) and online to offline (O2O) services. In this study, we propose an information system that enables users to receive information about nearby stores more effectively by using big data when a user moves a specific route. In addition, we have designed this system so that local stores can use this system to effectively promote it at low cost. In particular, we analyzed web-based information in real time to improve the accuracy of information provided to users by complementing the data. Through this system, system users will be able to utilize the information more effectively. Also, from a system perspective, it can be used to create new services by integrating with various web services.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Analysis of Delay Characteristics in Advanced Intelligent Network-Intelligent Peripheral (AIN IP) (차세대 지능망 지능형 정보제공 시스템의 지연 특성 분석)

  • 이일우;최고봉
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1124-1133
    • /
    • 2000
  • Advanced Intelligent Network Intelligent Peripheral (AIN IP) is one of the AIN elements which consist of Service Control Point (SCP), Service Switching Point (SSP), and IP for AIN services, such as play announcement, digit collect, voice recognition/synthesis, voice prompt and receipt. This paper, featuring ISUP/INAP protocols, describes the procedures for call setup/release bearer channels between SSP/SCP and IP, todeliver specialized resources through the bearer channels, and it describes the structure and procedure for AIN services such as Automatic Collect Call (ACC), Universal Personal Telecommunication (UPT), and teleVOTing(VOT). In this environments, the delay characteristics of If system is investigated as the performance analysis, Policy establishment.

  • PDF

Implementation and Design of Objective Quality Assurance System for Multimedia Service Video (멀티미디어 서비스 영상의 객관적 품질측정 시스템 설계 및 구현)

  • Joo, Hae-Jong;Hong, Bong-Hwa;On, Jin-Oh;Hong, Suk-Ju
    • 전자공학회논문지 IE
    • /
    • v.45 no.1
    • /
    • pp.58-64
    • /
    • 2008
  • This Paper provides perceptual metrics for video quality based on properties of human visual system, and audio quality based on human audition. All metrics work without reference signals, allowing non-intrusive, in-service measurements. A simple and easy-to-learn user interface displays the metrics and saves them in popular file formats like CSV. In this paper, proposed method was able to various and corrective measurement for the multimedia service video quality. As that it was able to application to set up service guide line and the methode of measurement and system for the set up standardization of the high quality video service.

An Extended Role-based Access Control Model with Privacy Enforcement (프라이버시 보호를 갖는 확장된 역할기반 접근제어 모델)

  • 박종화;김동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1076-1085
    • /
    • 2004
  • Privacy enforcement has been one of the most important problems in IT area. Privacy protection can be achieved by enforcing privacy policies within an organization's data processing systems. Traditional security models are more or less inappropriate for enforcing basic privacy requirements, such as privacy binding. This paper proposes an extended role-based access control (RBAC) model for enforcing privacy policies within an organization. For providing privacy protection and context based access control, this model combines RBAC, Domain-Type Enforcement, and privacy policies Privacy policies are to assign privacy levels to user roles according to their tasks and to assign data privacy levels to data according to consented consumer privacy preferences recorded as data usage policies. For application of this model, small hospital model is considered.

AgeCAPTCHA: an Image-based CAPTCHA that Annotates Images of Human Faces with their Age Groups

  • Kim, Jonghak;Yang, Joonhyuk;Wohn, Kwangyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1071-1092
    • /
    • 2014
  • Annotating images with tags that describe the content of the images facilitates image retrieval. However, this task is challenging for both humans and computers. In response, a new approach has been proposed that converts the manual image annotation task into CAPTCHA challenges. However, this approach has not been widely used because of its weak security and the fact that it can be applied only to annotate for a specific type of attribute clearly separated into mutually exclusive categories (e.g., gender). In this paper, we propose a novel image annotation CAPTCHA scheme, which can successfully differentiate between humans and computers, annotate image content difficult to separate into mutually exclusive categories, and generate verified test images difficult for computers to identify but easy for humans. To test its feasibility, we applied our scheme to annotate images of human faces with their age groups and conducted user studies. The results showed that our proposed system, called AgeCAPTCHA, annotated images of human faces with high reliability, yet the process was completed by the subjects quickly and accurately enough for practical use. As a result, we have not only verified the effectiveness of our scheme but also increased the applicability of image annotation CAPTCHAs.

A Model to Infer Users' Behavior Patterns for Personalized Recommendation Service based Context-Awareness (컨텍스트 인식 기반 개인화 추천 서비스를 위한 사용자 행동패턴 추론 모델)

  • Seo, Hyo-Seok;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.293-297
    • /
    • 2012
  • In order to provide with personalized recommendation service in context-awareness environment, the collected context data should be analyzed fast and the objective of user should be able to inferred effectively. But, the context collected from the mobile devices is not suitable for applying the existing inference algorithms as they are due to the omission or uncertainty of information and the efficient algorithms are required for mobile environment. In this paper, the behavior pattern was classified using naive bayes classification for minimize the loss caused by the omission or error of information. And pattern matching was used to effectively learn of the users inclination and infer the behavior purpose. The accuracy of the suggested inference model was evaluated by applying to the application recommendation service in the smart phones.

Towards a hierarchical global naming framework in network virtualization

  • Che, Yanzhe;Yang, Qiang;Wu, Chunming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1198-1212
    • /
    • 2013
  • Network virtualization enables autonomous and heterogeneous Virtual Networks (VNs) to co-exist on a shared physical substrate. In a Network Virtualization Environment (NVE), the fact that individual VNs are underpinned by diverse naming mechanisms brings about an obvious challenge for transparent communication across multiple VN domains due to the complexity of uniquely identifying users. Existing solutions were mainly proposed compatible to Internet paradigm with little consideration of their applications in a virtualized environment. This calls for a scalable and efficient naming framework to enable consistent communication across a large user population (fixed or mobile) hosted by multiple VNs. This paper highlights the underlying technical requirements and presents a scalable Global Naming Framework (GNF), which (1) enables transparent communication across multiple VNs owned by the same or different SPs; (2) supports communication in the presence of dynamics induced from both VN and end users; and (3) greatly reduces the network operational complexity (space and time). The suggested approach is assessed through extensive simulation experiments for a range of network scenarios. The numerical result clearly verifies its effectiveness and scalability which enables its application in a large-scale NVE without significant deployment and management hurdles.

A new Network Coordinator Node Design Selecting the Optimum Wireless Technology for Wireless Body Area Networks

  • Calhan, Ali;Atmaca, Sedat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1077-1093
    • /
    • 2013
  • This paper proposes a new network coordinator node design to select the most suitable wireless technology for WBANs by using fuzzy logic. Its goal is to select a wireless communication technology available considering the user/application requirements and network conditions. A WBAN is composed of a set of sensors placed in, on, or around human body, which monitors the human body functions and the surrounding environment. In an effort to send sensor readings from human body to medical center or a station, a WBAN needs to stay connected to a local or a wide area network by using various wireless communication technologies. Nowadays, several wireless networking technologies may be utilized in WLANs and/or WANs each of which is capable of sending WBAN sensor readings to the desired destination. Therefore, choosing the best serving wireless communications technology has critical importance to provide quality of service support and cost efficient connections for WBAN users. In this work, we have developed, modeled, and simulated some networking scenarios utilizing our fuzzy logic-based NCN by using OPNET and MATLAB. Besides, we have compared our proposed fuzzy logic based algorithm with widely used RSSI-based AP selection algorithm. The results obtained from the simulations show that the proposed approach provides appropriate outcomes for both the WBAN users and the overall network.