• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.117 seconds

Ontology-Based Adaptive Information Providing System (온톨로지 기반 정보제공 시스템)

  • Sohn, Young-Tae;Rhee, Sang-Keun;Lee, Ji-Hye;Kim, Jae-Kwan;Han, Yo-Sub;Park, Myon-Woong
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.596-600
    • /
    • 2009
  • As the amount of available information increases rapidly, sometimes the efficient search method alone is not enough to obtain necessary information in timely manner. Therefore additional support is needed to share the burden of searching for and filtering information. In the area of ubiquitous computing, computer systems existing everywhere should be able to proactively provide information just in time. Resource matching is essential in order to develop a system searching and recommending information required for a user in a specific context. This paper describes the infrastructure and methodology of information providing including systematical organization representation, ontological resource demarcation, and resource matching in the environment of a research institute. A specific application was developed to illustrate the proposed approach.

  • PDF

A Study on Analysis and Development of Geo-Spatial Collaboration Platform (공간정보 기반의 협업지원플랫폼 분석 및 구축)

  • Choi, Won Wook;Hong, Sang Ki;Ahn, Jong Wook
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.33-46
    • /
    • 2015
  • The fact that the limits of information recency, diversity, and usability are mainly caused by the supply oriented geospatial data and service development is commonly recognized. It is recently tried to overcome the limits by facilitating user experience and VGI(Volunteered Geographic Information) in several geospatial web services. This study suggests conceptual architecture and service scenario for geospatial collaborative platform prototype through review and examination of previous researches. The prototype, composed of 4 unit modules: 3D POI Creation Module, 3D POI Application Module, 3D POI/Event Management Module, 3D POI/Event Monitoring Module, provides the capability of collaboratively dealing with geospatial work. The suggested service scenario is demonstrated by developing prototype for the service modules.

3D Visualization of Forest Information Using LiDAR Data and Forest Type Map (LiDAR 데이터와 임상도를 이용한 산림정보의 3차원 시각화)

  • Bang, Eun-Gil;Yoon, Dong-Hyun;Koh, June-Hwan
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.53-63
    • /
    • 2014
  • As recent interest in ecological resources increases, an effort in three-dimensional visualization of the ecological resources has increased for the restoration and preservation of the natural environment as well as the evaluation of the landscape. However, in the case of forest resources, information extraction has been active, but the effort in trying to apply that information into an effective visualization has not happened. In other words, the effort for effective visualization is lacking when it comes to the visualization of forest resources, and numerous cases are ether non-realistic or the simulation required for analysis is inappropriate. Therefore, this paper extracts information through the use of airborne LiDAR data, aerial photograph, and forest type maps to create a vegetation layer, and then uses Flora3D forest modeling tools and ArcGlobe to accurately visualize the vegetation layer into the three dimension. An effective application for restoration and preservation of ecological resources as well as analysis on the urban landscape can be considered as a result of intuitively and realistically enabling the user's awareness of forest information within the Geographic Information System.

Meta Data Model based on C-A-V Structure for Context Information in Ubiquitous Environment (유비쿼터스 환경에서 컨텍스트 정보를 위한 C-A-V구조 기반의 메타 데이터 모델)

  • Choi, Ok-Joo;Yoon, Yong-Ik
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.41-46
    • /
    • 2008
  • In ubiquitous computer environment, by improving the computer's access to context information for dynamic service adaptation, we can increase richness of communication in human computer interaction and make it possible to produce more useful computational services. We need new data structure in order to flexible apply dynamic information to current context information repository and enhance the communication ability between human and computer. In this paper, we proposed to C-A-V (Category-Attribute-Value) context metadata structure required to support dynamic service adaptation for increasing communication ability in user-centric environments. We also classify the context metadata, as well as define its relationship with other context information on the basis of the application services, changes in the external environments.

A Study on the Influence of Augmented Reality Experience in Mobile Applications on Product Purchase (모바일 어플리케이션의 증강현실 이용경험이 제품구매에 미치는 영향 연구)

  • Kim, Minjung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.971-978
    • /
    • 2022
  • As a marketing method in a non-face-to-face society, the purpose of this study is to test how AR experience affects purchase intention in the process of consumers recognizing product information to purchase products and to secure the basis for the effectiveness of developing and introducing augmented reality functions in future product brand applications. Literary research methods and empirical research methods were used to verify the research purpose, and to measure this, an application of domestic tableware brand 'Odense', which implements augmented reality functions, was produced and used as an experimental tool. Also, a direct causal relationship was attempted by constituting a questionnaire by deriving a measurement scale for perceived usefulness, perceived ease, perceived pleasure, and purchase, which are factors of technology acceptance theory (TAM), and empirical analysis was conducted using the SPSS 25.0 statistical package to achieve the purpose of the study. As a result of the study, significant results were derived from all factors in the effect of perceived usefulness, ease, and pleasure on purchase intention, and several significant differences were found among factors according to gender, age, and internet shopping usage time in general characteristics. In conclusion, the user experience of the medium in which the augmented reality function is introduced in the information recognition stage of the product has a positive effect on purchase compared to the user experience of existing applications.

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

A Study on Development of Data Broadcasting Service Using RSS on Web 2.0 Environment (웹 2.0 환경에서 RSS를 활용한 데이터방송 서비스 구현에 대한 연구)

  • Jang, Yun-Yong;Yim, Hyun-Jeong;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.664-676
    • /
    • 2009
  • As data broadcasting has become available, diverse contents can now be provided through digital TV, IPTV and DMB; yet it is true in the current situation that killer contents are insufficient that can satisfy users. On the contrary, in case of the web, with the advent of web 2.0 aiming at user-centered services, the contents market has grown greatly. The ideas and technologies of Web 2.0, if gratified into data broadcasting, are expected to make a contribution to the vitalization of contents. This paper proposes a method of using RSS, as a concrete example of applying web 2.0 to data broadcasting. Accordingly, we have developed a system for producing data services for the ground wave DMB data broadcasting, by using RSS at the stage of authoring news and the like, for which provision of the latest information is important. And for IPTV, we have developed a data broadcasting application so that users can select the RSS they want, as well as a creation system for using RSS at the authoring stage. It is anticipated that the application of RSS by means of the system will simplify the authoring process, making easy the provision of the latest information through the web, and thereby making possible the provision of diverse services to users.

  • PDF

Study on SNS Application Data Decryption and Artifact (SNS 애플리케이션의 데이터 복호화 및 아티팩트 연구)

  • Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.583-592
    • /
    • 2020
  • With the popularization of smartphones, Social Networking Service (SNS) has become the means of communication for modern people. Due to the nature of the means of communication, SNS generates a variety of archive and preservation evidence. Therefore, it is a major analysis target in terms of digital forensic investigation. An application that provides SNS stores data in a central server or database in a smartphone inside for user convenience. Some applications provide encryption for privacy, which can be anti-forensic in terms of digital forensic investigation. Therefore, the study of the encryption method should be continuously preceded. In this paper, we analyzed two applications that provide SQLite-based database encryption through SQLCipher module. Each database was decrypted and key data was identified.

Efficient Buffer Allocation Policy for the Adaptive Block Replacement Scheme (적응력있는 블록 교체 기법을 위한 효율적인 버퍼 할당 정책)

  • Choi, Jong-Moo;Cho, Seong-Je;Noh, Sam-Hyuk;Min, Sang-Lyul;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.324-336
    • /
    • 2000
  • The paper proposes an efficient buffer management scheme to enhance performance of the disk I/O system. Without any user level information, the proposed scheme automatically detects the block reference patterns of applications by associating block attributes with forward distance of a block. Based on the detected patterns, the scheme applies an appropriate replacement policy to each application. We also present a new block allocation scheme to improve the performance of buffer cache when kernel needs to allocate a cache block due to a cache miss. The allocation scheme analyzes the cache hit ratio of each application based on block reference patterns and allocates a cache block to maximize cache hit ratios of system. These all procedures are performed on-line, as well as automatically at system level. We evaluate the scheme by trace-driven simulation. Experimental results show that our scheme leads to significant improvements in hit ratios of cache blocks compared to the traditional schemes and requires low overhead.

  • PDF