• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.038 seconds

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Implementation of Real-time Sedentary Posture Correction Cushion Using Capacitive Pressure Sensor Based on Conductive Textile

  • Kim, HoonKi;Park, HyungSoo;Oh, JiWon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.153-161
    • /
    • 2022
  • Physical activities are decreasing and sitting time is increasing due to the automation, smartization, and intelligence of necessary household items throughout daily life. Recent healthcare studies have reported that the likelihood of obesity, diabetes, cardiovascular disease, and early death increases in proportion to sitting time. In this paper, we develop a sitting posture correction cushion in real time using capacitive pressure sensor based on conductive textile. It develops a pressure sensor using conductive textile, a key component of the posture correction cushion, and develops a low power-based pressure measurement circuit. It provides a function to transmit sensor values measured in real time to smartphones using BLE short-range wireless communication on the posture correction cushion, and develops a mobile application to check the condition of the sitting posture through these sensor values. In the mobile app, you can visualize your sitting posture and check it in real time, and if you keep it in the wrong posture for a certain period of time, you can notify it through an alarm. In addition, it is possible to visualize the sitting time and posture accuracy in a graph. Through the correction cushion in this paper, we experiment with how effective it is to correct the user's posture by recognizing the user's sitting posture, and present differentiation and excellence compared to other product.

A Study on Method to Activate the Operation of a Fire Safety Experience Center Based on Virtual Reality (가상현실 기반 소방안전체험관 운영 활성화 방안 연구)

  • Young Sook Kim;Kwangsu Moon
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.713-728
    • /
    • 2022
  • Purpose: This study examined the effect of VR safety education content quality on behavioral intention and collect operational opinions through interview. Method: Based on the survey data of 93 former and current officers, the hypothesis was verified. In addition, 15 fire safety experience centers were visited to conduct interview. Result: For the quality of VR safety education contents, immersion and convenience had a significant effect on usage satisfaction, recommendation intention, and field application intention. In addition, convenience and aesthetic experience had a significant effect on the educational effect, but immersion and diversity did not significant. In the interview, they suggested that VR education has high user satisfaction and good educational effects. The quality of content(particularly immersion and convenience) is an important factor in VR education. In the long-term persepective, it is necessary to prepare a standard teaching plan for each disaster, in addition, manpower, expertise, maintenance problems, and etc. Conclusion: Through these results, it was confirmed that VR experience content quality affects behavioral intention and educational effect and that efforts and investments to improve content quality are needed to enhance the effectiveness of VR experience education. And the contents derived from the interview will be helpful in the operation of an effective fire safety experience center.

Developing Library Tour Course Recommendation Model based on a Traveler Persona: Focused on facilities and routes for library trips in J City (여행자 페르소나 기반 도서관 여행 코스 추천 모델 개발 - J시 도서관 여행을 위한 시설 및 동선 중심으로 -)

  • Suhyeon Lee;Hyunsoo Kim;Jiwon Baek;Hyo-Jung Oh
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.2
    • /
    • pp.23-42
    • /
    • 2023
  • The library tour program is a new type of cultural program that was first introduced and operated by J City, and library tourists travel to specialized libraries in the city according to a set course and experience various experiences. This study aims to build a customized course recommendation model that considers the characteristics of individual participants in addition to the existing fixed group travel format so that more users can enjoy the opportunity to participate in library tours. To this end, the characteristics of library travelers were categorized to establish traveler personas, and library evaluation items and evaluation criteria were established accordingly. We selected 22 libraries targeted by the library travel program and measured library data through actual visits. Based on the collected data, we derived the characteristics of suitable libraries and developed a persona-based library tour course recommendation model using a decision tree algorithm. To demonstrate the feasibility of the proposed recommendation model, we build a mobile application mockup, and conducted user evaluations with actual library users to identify satisfaction and improvements to the developed model.

Customer Voices in Telehealth: Constructing Positioning Maps from App Reviews (고객 리뷰를 통한 모바일 앱 서비스 포지셔닝 분석: 비대면 진료 앱을 중심으로)

  • Minjae Kim;Hong Joo Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.69-90
    • /
    • 2023
  • The purpose of this study is to evaluate the service attributes and consumer reactions of telemedicine apps in South Korea and visualize their differentiation by constructing positioning maps. We crawled 23,219 user reviews of 6 major telemedicine apps in Korea from the Google Play store. Topics were derived by BERTopic modeling, and sentiment scores for each topic were calculated through KoBERT sentiment analysis. As a result, five service characteristics in the application attribute category and three in the medical service category were derived. Based on this, a two-dimensional positioning map was constructed through principal component analysis. This study proposes an objective service evaluation method based on text mining, which has implications. In sum, this study combines empirical statistical methods and text mining techniques based on user review texts of telemedicine apps. It presents a system of service attribute elicitation, sentiment analysis, and product positioning. This can serve as an effective way to objectively diagnose the service quality and consumer responses of telemedicine applications.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

A Study on Mitigating the Disparity in Public Transportation Information Usage among the Elderly through Expert Delphi Survey (전문가 델파이 조사를 통한 고령층의 대중교통 정보이용 격차 해소방안 연구)

  • Miyoung BHIN;Seulki SON;Hyunju KIM;Chaewon LEE
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.127-136
    • /
    • 2023
  • Gyeonggi Province has established a bus information system to provide real-time bus arrival information, aiming to make bus usage convenient for its residents. While the Gyeonggi bus information system is becoming more advanced through the application of IT technology, there are still information-vulnerable groups finding it difficult to use. In particular, the elderly have a low level of digital information literacy and habe difficulty using it. In this regard, this study aims to address the information usage disparity among the elderly in public transportation by utilizing expert in-depth survey methodology known as the Delphi technique. The study classified the policy initiatives that Gyeonggi Province should undertake into three categories: user education and expanded promotion, technological development and dissemination, and providing convenient usage environment. Through two rounds of surveys, the study assessed the priority of ten specific sub-tasks within these categories. Additionally, it gathered opinions on the effectiveness and feasibility of each item. The results yielded prioritization and evaluation of effectiveness and feasibility for nine sub-tasks. Based on these outcomes, the study proposed future projects that Gyeonggi Province should implement to address the information disparity among the elderly, offering a comprehensive approach to bridge the gap.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Model for Evaluating Technology Importance of Patents under Incomplete Citation (불완전 인용정보 하에서의 특허의 기술적 중요도 평가 모형)

  • Kim, Heon;Baek, Dong-Hyun;Shin, Min-Ju;Han, Dong-Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.121-136
    • /
    • 2008
  • Although domestic research funding organizations require patented technologies as an outcome of financial aids, they have much difficulty in evaluating qualitative value of the patented technology due to lack of systematic methods. Especially, because citation data is not essential to patent application in Korea, it is very difficult to evaluate a patent using the incomplete citation data. This study proposes a method for evaluating technology importance of a patent when there is no or insufficient citation data in patents. The technology importance of a patent can be evaluated objectively and quantitatively by the proposed method which consists of 5 steps such as selection of a target patent, collection of related patents, preparation of key word vector, clustering patents, and technological importance assessment. The method was applied to a patent on 'user identification method for payment using mobile terminal' in order to evaluate technology importance and demonstrate how the method works.

  • PDF

Development of SIP based Call Processing Language Server System (SIP기반 호 처리 언어(CPL) 서버 시스템의 설계 및 구현)

  • Yi Jong-Hwa;Min Kyung-Joo;Kang Shin-Gak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.101-108
    • /
    • 2004
  • SIP(Session Initiation Protocol) is a suitable protocol for supporting Internet telephony services and currently market requirements fur developing supplementary telephony services such as unconditional call forwarding, call forwarding on busy or no answer, call filtering services have recently grown. CPL(Call Processing Language) is a standard technology that can be used to describe and control internet telephony services. In this paper, we describe the CPL system for supplementary Internet telephony services using SIP as an application level call signaling protocol. Those supplementary services are composed of CPL client which is a SIP UA, SIP Proxy server, Registrar and CPL server In this paper, we describe the design and implementation of the CPL server system in detail which is developed in Linux 7.2 using C and C++ programming languages.