• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

Time Series Modeling Pipeline for Urban Behavioral Demand Prediction under Uncertainty (COVID-19 사례를 통한 도시 내 비정상적 수요 예측을 위한 시계열 모형 파이프라인 개발 연구)

  • Minsoo Jin;Dongwoo Lee;Youngrok Kim;Hyunsoo Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.2
    • /
    • pp.80-92
    • /
    • 2023
  • As cities are becoming densely populated, previously unexpected events such as crimes, accidents, and infectious diseases are bound to affect user demands. With a time-series prediction of demand using information with uncertainty, it is impossible to derive reliable results. In particular, the COVID-19 outbreak in early 2020 caused changes in abnormal travel patterns and made it difficult to predict demand for time series. A methodology that accurately predicts demand by detecting and reflecting these changes is, therefore, required. The current study suggests a time series modeling pipeline that automatically detects and predicts abnormal events caused by COVID-19. We expect its wide application in various situations where there is a change in demand due to irregular and abnormal events.

Artifacts Analysis of GoToWebinar and GoToMeeting (화상 회의 애플리케이션 GoToWebinar 및 GoToMeeting 아티팩트 분석 )

  • Soojin Kang;Giyoon Kim;Yangsun Lee
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • Various video conferencing and collaboration applications have emerged due to the global epidemic of new viral infections. In addition to real-time video conferencing, video conferencing applications provide features such as chat and file sharing on various platforms. Because various personal information is stored through functions such as chatting, file and screen sharing, these video conferencing applications are the major target of analysis from a digital forensic investigation. In the case of applications that provide cross-platform, the form of stored data is different depending on the platform. Therefore, to utilize data of video conferencing application for forensic investigation, preliminary research on artifacts stored by platform is required. In this paper, we used the video conferencing applications GoToWebinar and GoToMeeting and analyzed the artifacts generated. As a result, we list the main data from a digital forensic investigation. We identify data stored for each platform provided by GoToWebinar and GoToMeeting and organize artifacts that can estimate user behavior. Also, we classify the data that can be acquired according to the role and environment within the video conference.

  • PDF

Analysis of Regulatory Sandbox Usage by IT Companies (IT기업의 규제샌드박스 활용 분석)

  • Seokju Song;Daihwan Min;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.109-124
    • /
    • 2023
  • This study aims to apply the concept of regulatory stringency to the regulatory sandbox with a fresh perspective. The regulatory sandbox is a system that gives opportunities under certain conditions to new technologies or businesses that have not been launched due to inadequacy or insufficiency in legal systems. Previous research on regulatory sandboxes has mainly focused on discussions about their impact on specific technologies or business domains. This study attention to the results according to the evaluations. Among them, whether special cases for demonstration can evolve into official permission has garnered significant attention. For this study, among the cases that passed the regulatory sandbox evaluation from February, 2019, to December, 2022, 162 cases in the field of ICT convergence were selected. The evaluation results were classified into three groups 'positive interpretation (Fast Track)', 'temporary permission', and 'special case for demonstration.' Each case was assigned to one of the three groups. Through the comparative analysis, the common characteristics and differences were summarized. Then, this study explored improvement measures to pass a less restrictive regulatory sandbox. The analysis of the cases revealed that the differences in each evaluation result were attributed to variations in the technological characteristics and user protection features. Considering these differences, as well as the higher weight and importance of the preparation stage for sandbox application, this study suggested a three-step approach to prepare for temporary permission and positive interpretation rather than special case for demonstration. In addition, this thesis discussed the policy limitations of the regulatory sandbox mechanism in South Korea and the limitations of the current study. Hopefully, the results of this study would be beneficial to individuals and companies, particularly venture companies and startups seeking to develop new technologies or businesses and utilize regulatory sandboxes.

Volume Control using Gesture Recognition System

  • Shreyansh Gupta;Samyak Barnwal
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.161-170
    • /
    • 2024
  • With the technological advances, the humans have made so much progress in the ease of living and now incorporating the use of sight, motion, sound, speech etc. for various application and software controls. In this paper, we have explored the project in which gestures plays a very significant role in the project. The topic of gesture control which has been researched a lot and is just getting evolved every day. We see the usage of computer vision in this project. The main objective that we achieved in this project is controlling the computer settings with hand gestures using computer vision. In this project we are creating a module which acts a volume controlling program in which we use hand gestures to control the computer system volume. We have included the use of OpenCV. This module is used in the implementation of hand gestures in computer controls. The module in execution uses the web camera of the computer to record the images or videos and then processes them to find the needed information and then based on the input, performs the action on the volume settings if that computer. The program has the functionality of increasing and decreasing the volume of the computer. The setup needed for the program execution is a web camera to record the input images and videos which will be given by the user. The program will perform gesture recognition with the help of OpenCV and python and its libraries and them it will recognize or identify the specified human gestures and use them to perform or carry out the changes in the device setting. The objective is to adjust the volume of a computer device without the need for physical interaction using a mouse or keyboard. OpenCV, a widely utilized tool for image processing and computer vision applications in this domain, enjoys extensive popularity. The OpenCV community consists of over 47,000 individuals, and as of a survey conducted in 2020, the estimated number of downloads exceeds 18 million.

A Ligthtweight Experimental Frame based on Microservice Architecture (마이크로서비스아키텍처 기반 경량형 모의실험환경)

  • Gyu-Sik Ham;Hyeon-Gi Kim;Jin-Woo Kim;Soo-Young Jang;Eun-Kyung Kim;Chang-beom Choi
    • Journal of IKEEE
    • /
    • v.28 no.2
    • /
    • pp.123-130
    • /
    • 2024
  • As technology advances swiftly and the lifespan of products becomes increasingly short, there is a demand to fasten the pace of research outcomes, product development, and market introduction. As a result, the researchers and developers need a computational experiment environment that enables rapid verification of the experiment and application of research findings. Such an environment must efficiently harness all available computational resources, manage simulations across diverse test scenarios, and support the experimental data collection. This research introduces the design and implementation of an experimental frame based on a microservice architecture. The experimental frame leverages scripts to utilize computing resources optimally, making it more straightforward for users to conduct simulations. It features an experimental frame capable of automatically deploying scenarios to the computing components. This setup allows for the automatic configuration of both the computing environment and experiments based on user-provided scenarios and experimental software, facilitating effortless execution of simulations.

A Study on Recommendation Application of Air Purification Companion Plant using MBTI (MBTI를 통한 공기 정화 반려식물 추천 애플리케이션 연구)

  • Yu-Jun Kang;Youn-Seo Lee;Hyeon-Ah Kim;Hee-Soo Kim;Won-Whoi Huh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.139-145
    • /
    • 2024
  • Since COVID-19, most of people's main living spaces have been moved indoors. Due to this influence, many people's interest in companion plants continues to rise. People who raise companion plants often raise them for the purpose of emotional stability or air purification. In fact, plants have the effect of giving people a sense of emotional stability and the ability to purify indoor air is excellent depending on what kind of plant they are. However, if you do not have knowledge of plants, you will not know which plants have excellent air purification effects, and even if you grow them, you will face a problem that withers quickly. Therefore, in this paper, we develop an app that provides users who do not have prior knowledge to store and manage their MBTI and member information in a database using databases and MBTI, and based on this, recommend plant data that fits their preferences with the user and manage their schedules through calendars.

Research on A Comprehensive Study on Building a Zero Knowledge Proof System Model (영지식 증명 시스템 구축 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.3
    • /
    • pp.8-13
    • /
    • 2024
  • Zero Knowledge Proof (ZKP) is an innovative decentralized technology designed to enhance the privacy and security of virtual currency transactions. By ensuring that only the necessary information is disclosed by the transaction provider, ZKP protects the confidentiality of all parties involved. This ensures that both the identity of the transacting parties and the transaction value remain confidential.ZKP not only provides a robust privacy function by concealing the identities and values involved in blockchain transactions but also facilitates the exchange of money between parties without the need to verify each other's identity. This anonymity feature is crucial in promoting trust and security in financial transactions, making ZKP a pivotal technology in the realm of virtual currencies. In the context of the Fourth Industrial Revolution, the application of ZKP contributes significantly to the comprehensive and stable development of financial services. It fosters a trustworthy user environment by ensuring that transaction privacy is maintained, thereby encouraging broader adoption of virtual currencies. By integrating ZKP, financial services can achieve a higher level of security and trust, essential for the continued growth and innovation within the sector.

User Perspective Website Clustering for Site Portfolio Construction (사이트 포트폴리오 구성을 위한 사용자 관점의 웹사이트 클러스터링)

  • Kim, Mingyu;Kim, Namgyu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.59-69
    • /
    • 2015
  • Many users visit websites every day to perform information retrieval, shopping, and community activities. On the other hand, there is intense competition among sites which attempt to profit from the Internet users. Thus, the owners or marketing officers of each site try to design a variety of marketing strategies including cooperation with other sites. Through such cooperation, a site can share customers' information, mileage points, and hyperlinks with other sites. To create effective cooperation, it is crucial to choose an appropriate partner site that may have many potential customers. Unfortunately, it is exceedingly difficult to identify such an appropriate partner among the vast number of sites. In this paper, therefore, we devise a new methodology for recommending appropriate partner sites to each site. For this purpose, we perform site clustering from the perspective of visitors' similarities, and then identify a group of sites that has a number of common customers. We then analyze the potential for the practical use of the proposed methodology through its application to approximately 140 million actual site browsing histories.

Implementation of Facility Management System for Plant Factory (식물공장 시설관리 시스템의 구현)

  • Lee, Yong-Woong;Seo, Beom-Seok;Kim, Chan-Woo;Kim, Kyung-Hee;Park, Yang-Ho;Shin, Chang-Sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.141-151
    • /
    • 2011
  • This paper suggests the Facility Management System for plant factory promising to be a core technology of the agriculture in the future. This system makes diagnoses that status from sensors or facilities in the factory for exact operation and monitors the internal environment with the control status in real-time. It is expected that we could operate a plant factory safely and effectively by using the system. The system consists of the data management module, the context provider module, the context interpreter module, the service provider module, the data storage and user interface. The system provide with the failure diagnosis service, the facility control service, and the high-reliability monitoring service via the interactions between above modules. The failure diagnosis service determines whether the sensors or facility devices are in failure or not, and informs the administrator of their conditions. The facility control service is activated in case if the facilities need to be managed during the diagnosis for failure or malfunction processes. The high-reliability monitoring service provides the administrator with verified data through the failure diagnosis service. Then we confirmed that the suggested system operates correctly through the system simulation.

A Design of an AMI System Based on an Extended Home Network for the Smart Grid (스마트 그리드를 위한 확장 홈 네트워크 기반의 AMI 시스템 설계)

  • Hwang, Yu-Jin;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.56-64
    • /
    • 2012
  • A smart grid is the next generation power grid which combines the existing power grid with information technology, so an energy efficient power grid can be provided. In this paper, in order to build an efficient smart grid an AMI system, which gears with the existing home network and provides an user friendly management function, is proposed. The proposed AMI system, which is based on an extended home network, consists of various functional units; smart meters, communication modules, home gateway, security modules, meter data management modules (MDMM), electric power application modules and so on. The proposed home network system, which can reduce electric power consumption and transmit data more effectively, is designed by using IEEE 802.15.4. The extended home gateway can exchange energy consumption information with the outside management system via web services. The proposed AMI system is designed to enable two-way communication between the home gateway and MDMM via the Internet. The AES(Advanced Encryption Standard) algorithm, which is a symmetric block cipher algorithm, is used to ensure secure information exchange. Even though the results in this study could be limited to our experimental environment, the result of the simulation test shows that the proposed system reduces electric power consumption by 4~42% on average compared to the case of using no control.