• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

The effect of color application on cognitive response in public facilities: The partial mediating effects of emotional response (공공시설물에서 컬러 적용이 인지반응에 미치는 영향과의 관계: 사용자 감성반응의 부분매개효과)

  • Park, Sungeuk;Myoung, Sungmin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.154-163
    • /
    • 2020
  • This study aimed to examine the speed of cognitive response of users by color application for the information searching or the searching how to use the target object. Also, the purpose of this study is to explore how color application has an impact on cognitive response, and to find the mediating effect of user's emotional response. A total of 227 persons were collected and analyzed by PASW 18.0 for data analysis. In conclusion, it was confirmed that color application had a direct effect on cognitive response, suggesting that emotional response may have a slight effect. Among four sub-factors of color applications, the most contribution factor of cognitive response was the clatiry and the lowest factor was the attention.

A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention (사용자 의도 기반 응용계층 DDoS 공격 탐지 알고리즘)

  • Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.39-52
    • /
    • 2011
  • An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.

The Effects of AR(Augmented Reality) Contents on User's Learning : A Case Study of Car manual Using Digital Contents (증강현실기술(AR) 콘텐츠가 사용자의 학습적 효과에 미치는 영향: 자동차 매뉴얼 디지털콘텐츠 제작을 중심으로)

  • Won, Jong-Seo;Choi, Sung-Ho
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.17-23
    • /
    • 2017
  • The purpose of this study is to find out the effects of AR digital contents on user learning context. More and more companies using digital contents for their products. Especially, some companies using AR (Augmented Reality) digital contents as a manual of their car. This Application affords diverse information to customers who want to know usage of its interface. Using this application, the study shows the effects of using AR digital contents on user's absorption, physical presence, immersion.

Development of Optimal Design User Interface for Waveguide tee Junction using PSO Algorithm and VBA (PSO 알고리즘과 VBA를 이용한 Waveguide tee Junction의 최적설계 인터페이스 개발)

  • Park, Hyun-Soo;Byun, Jin-Kyu;Lee, Dal-Ho;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.36-39
    • /
    • 2009
  • We developed an optimal design interface based on VBA(Visual Basic Application) that takes advantage of API(Application Program Interface) function of commonly used EM analysis software. The developed interface is adopted for an optimal design of a septum in a waveguide tee junction using PSO(Particle Swarm Optimization) algorithm. The objective function of the optimal design is defined by $S_{11}$-parameter of the waveguide tee junction Design variables are established as position of the septum, that are changed to satisfy the design goal Using the developed design interface and PSO algorithm, the objective function converged to the smallest value, showing the validity of the proposed method. The design interface was developed using Microsoft Excel software, enabling easy control of design parameters for user. Also, various analysis parameters can be set in the Excel interface, including waveguide input mode and frequency. After completion of the design, field solutions at user-specified positrons can be extracted to the output files in complex number form.

  • PDF

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF

Event and Service registry system for USN Application Services (USN응용 서비스를 위한 이벤트 및 서비스 레지스트리 시스템)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1459-1466
    • /
    • 2009
  • In ubiquitous environment, various and amount of sensor data information occur continuously and periodically about thing and user from RHO, sensor network of various space. Such, the users from among many of provider who provide sensor service should find service that themselves is wanted. And when service use, service right to user should be provided. But in the current environment of the USN(Ubiquitous Sensor Network) Application Service, there is no the registry to find these services but only business- oriented UDDI(Universal Description Discovery, and integration). In addition, when service use, service right to user should be provided but current services provided only services one of the conditions or events. Therefore, rules-based processing system of service event that can provide service according various conditions and events is need. In this paper research into service registry for sensor service search with reference to existing UDDI and event processing system for USN application service with reference to event rule based on web service as WS-ECA(Web Service-Event Condition Action).

Interface Application of a Virtual Assistant Agent in an Immersive Virtual Environment (몰입형 가상환경에서 가상 보조 에이전트의 인터페이스 응용)

  • Giri Na;Jinmo Kim
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • In immersive virtual environments including mixed reality (MR) and virtual reality (VR), avatars or agents, which are virtual humans, are being studied and applied in various ways as factors that increase users' social presence. Recently, studies are being conducted to apply generative AI as an agent to improve user learning effects or suggest a collaborative environment in an immersive virtual environment. This study proposes a novel method for interface application of a virtual assistant agent (VAA) using OpenAI's ChatGPT in an immersive virtual environment including VR and MR. The proposed method consists of an information agent that responds to user queries and a control agent that controls virtual objects and environments according to user needs. We set up a development environment that integrates the Unity 3D engine, OpenAI, and packages and development tools for user participation in MR and VR. Additionally, we set up a workflow that leads from voice input to the creation of a question query to an answer query, or a control request query to a control script. Based on this, MR and VR experience environments were produced, and experiments to confirm the performance of VAA were divided into response time of information agent and accuracy of control agent. It was confirmed that the interface application of the proposed VAA can increase efficiency in simple and repetitive tasks along with user-friendly features. We present a novel direction for the interface application of an immersive virtual environment through the proposed VAA and clarify the discovered problems and limitations so far.

Mobile application for preventing card loss using the NFC technology (NFC 기술을 이용한 카드 분실을 방지하기 위한 모바일 앱)

  • Kang, Ki-Beom;Jwa, Jeong-Woo;Kim, Soon-Whan;Kim, Heung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.181-188
    • /
    • 2017
  • As smart phone users increase the number of users who insert credit cards into wallet type smart phone cases is increasing. In this paper, we developed an Android application for preventing credit card loss in a wallet type smart phone case using the NFC (Near Field Communication) technology of smart phone. The developed android application uses the NFC reading and writing functions of the smart phone. When the credit card is inserted into the wallet type smart phone case, the android application detects the NFC tag in the credit card and registers credit card information. When the credit card is removed from the smart phone case, the Android application automatically detects the credit card loss and notifies to the user. The user can check and finds the location information of the lost credit card on the map of the Android application. We can easily develop the Android application for preventing credit card loss when a function that automatically detects an leaving NFC tag is added to Android.

A Study of Cyclomatic Complexity for Web Application (웹 어플리케이션의 순환복잡도 메트릭스에 관한 연구)

  • An, Jong-Geun;Yu, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.447-456
    • /
    • 2002
  • Web applications haute different structural characteristics from conventional applications. A web application typically consists of server-side script elements which run on web sowers, client-side script elements which run on the client web-browser, link elements that the user clicks, and event elements that connect user-triggered request to the client script elements. These four elements are combined to form a web application. In such environments, direct application of conventional methods for measuring application complexity may not be possible, because they are primarily designed to measure complexity of modules and classes. In this paper, therefore, we propose metrics of Cyclomatic Complexity for Web Application (CCWA). We developed a tool to measure such metrics and applied it to the real-world examples. We found that the proposed CCWA metrics can be used for measuring complexity of highly complex web applications, which is not possible with conventional module and class based measurement techniques.

Technology Requirements for Wearable User Interface

  • Cho, Il-Yeon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.5
    • /
    • pp.531-540
    • /
    • 2015
  • Objective: The objective of this research is to investigate the fundamentals of human computer interaction for wearable computers and derive technology requirements. Background: A wearable computer can be worn anytime with the support of unrestricted communications and a variety of services which provide maximum capability of information use. Key challenges in developing such wearable computers are the level of comfort that users do not feel what they wear, and easy and intuitive user interface. The research presented in this paper examines user interfaces for wearable computers. Method: In this research, we have classified the wearable user interface technologies and analyzed the advantages and disadvantages from the user's point of view. Based on this analysis, we issued a user interface technology to conduct research and development for commercialization. Results: Technology requirements are drawn to make wearable computers commercialized. Conclusion: The user interface technology for wearable system must start from the understanding of the ergonomic aspects of the end user, because users wear the system on their body. Developers do not try to develop a state-of-the-art technology without the requirement analysis of the end users. If people do not use the technology, it can't survive in the market. Currently, there is no dominant wearable user interface in the world. So, this area might try a new challenge for the technology beyond the traditional interface paradigm through various approaches and attempts. Application: The findings in this study are expected to be used for designing user interface for wearable systems, such as digital clothes and fashion apparel.