• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.032 seconds

System and method for detecting gas using smart-phone (스마트폰을 이용한 가스검출시스템 및 검출 방법연구)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.2
    • /
    • pp.129-137
    • /
    • 2015
  • This study is in regard to the gas detection system and gas detection method utilizing smart phone. This study includes; 1) the sensor module attached to the smart phone to detect and measure flammable gas or toxic gas; and 2) gas detection APP which is installed inside the smart phone and recognizes the user information and location information automatically by reading RFID tag indicating the user or the location to detect gas through the contact area where RFID and blue tooth reader is installed inside of the above mentioned smart phone, and then measures the combustible gas or toxic gas by operating above mentioned sensor module and obtains the data thus measured, and above mentioned smart phone is characterized by its transmission of the above mentioned user information, location information and measured data which are obtained by above mentioned gas detecting APP to operation server via communication network. With this, reliability for the location detecting gas by the user, the result of the measurement, etc. can be secured. Furthermore, this provides the effect of preventing artificial manipulation at the time of input which is associated with the identification of the user to be measured by utilizing removable sensor module and application or the mistake resulted from wrong input by the user. In addition, by transmitting the measured data from the sensor module carrying out gas detection to operation server, this provides the effect of making it possible to process the data thus collected to a specialized data for combustible gas or toxic gas.

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Wearable Device based Discrimination Algorithm for Dangerous Situation (웨어러블 디바이스 기반 위험상황 식별 알고리즘)

  • Yu, Dong-Gyun;Cho, Kwang-Hee;Hwang, Jong-Sun;Kim, Han-Kil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.605-606
    • /
    • 2016
  • Recently utilizing various wearable device has been going research to provide new services. Conventional wearable devices provide a service to a user by measuring the biological information. However, by measuring the biometric information such a situation the value of the algorithm, the user state and insufficient technology. In this paper, by utilizing an acceleration sensor and the rate sensor set a threshold for measuring the biological information, and heart rate and movement in order to solve this problem. And it proposes an algorithm to cope with the user's status and identifying emergency situations.

  • PDF

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

The Design and Implementation of Two-Way Search Algorithm using Mobile Instant Messenger (모바일 인스턴스 메신저를 이용한 양방향 검색 알고리즘의 설계 및 구현)

  • Lee, Daesik;Jang, Chungryong;Lee, Yongkwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.55-66
    • /
    • 2015
  • In this paper, we design and implement a two-way search algorithm that can provide a customized service through the user with real-time two-way communication using a mobile instant messaging service. Therefore, we design and implement the automative search system which enables delivering message to each user mobile terminal from a plurality of relay mobile terminals by utilizing the mobile instant messenger, not to deliver a message from the main server to the mobile instant messenger user directly. Two-way search system using the mobile instant messenger can be immediately collect the user's response is easy to identify the orientation of each user, and thus can be provided to establish a differentiated service plan. Also, It provides a number of services(text, photos, videos, etc) in real-time information to the user by utilizing the mobile instant messenger service without the need to install a separate application. Experiment results, data processing speed of the category processing way to search for the data of the DB server from a user mobile terminal is about 7.06sec, data processing number per minute is about 13 times. The data processing speed of the instruction processing way is about 3.10sec, data processing number per minute is about 10 times. The data processing speed of the natural language processing way is about 5.13sec, per data processing number per minute is about 7 times. Therefore in category processing way, command processing way and natural language processing way, instruction processing way is the most excellent in aspect of data processing speed, otherwise in aspect of per data processing number per minute, the category processing way is the best method.

Exploration on Possibility of the Disciplinary Convergence of the User Studies and the Research in Practice (이용자연구와 실용연구 분야의 학제적 융합 가능성 도출 연구)

  • Lee, Jee Yeon;Kam, Miah
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.1
    • /
    • pp.129-155
    • /
    • 2018
  • This research aims to discover various aspects of the user studies and the research in practice and also to propose collaboration methods by empirical analysis of the data. To determine the application applicability of the user studies in other subject areas, the degree of keyword overlap between the user studies and the User Experience (UX), one of the research in practice discipline, was measured. The quantitative information science methods including simple frequency analysis were applied to more than ten thousand published papers to generate the network mapping and ranking as well as comparative analysis by time. The analysis result showed that there were slightly lesser overlap between the user studies and the UX in the domestically published articles than the international ones. It also revealed that there is a relationship between the actual occurrences of collaboration and the keyword overlap. The temporal analysis showed that there is increasingly more keyword overlap between two disciplines and thus it is possible to predict the active convergence in the future.

Effect of the Affordance Characteristics of VR Game UI on the User Experience (VR 게임 UI의 어포던스 특성이 사용자 경험에 미치는 영향)

  • Park, Jun-Hong;Lee, Junsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.252-258
    • /
    • 2020
  • Advances in IT technologies are developing VR content technologies that provide five senses information to users and interact with them. These VR content technologies are widely used by users not only for time and space limitations but also for providing immersion experiences. VR contents are contents that allow users to experience images that are played on the screen through five senses such as augmented reality, virtual reality, and holograms as well as visuals. VR games are also becoming more diverse in interfaces for the interaction of users with VR games. This study recognized the importance of the interface and analyzed the impact of the application characteristics of VR game UI on user experience and satisfaction from the user perspective. Research shows that VR game UI interacts with user experience and satisfaction. This appears to affect user experience based on how well people using VR game UI can understand and utilize the characteristics and functions of UI.

User Experience Factors in Connected Car Infotainment Applications : Focusing on Text Mining Analysis in the Android Auto Reviews (커넥티드카 인포테인먼트 애플리케이션의 사용자 경험 요인 : 안드로이드 오토 리뷰의 텍스트마이닝 분석을 중심으로)

  • Jung Yong Kim;Su-Eun Bae;Junho Choi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.211-225
    • /
    • 2023
  • In the future, infotainment systems are expected to play a pivotal role in mobility ecosystems connecting users and vehicles. This study draws user-experience factors from reviews of Android Auto, a car infotainment application, and analyzes factors that affect satisfaction. The user-experience factors of infotainment have been redefined based on previous studies. To analyze actual user-experience factors, topics are obtained, applied, and interpreted from user discourse through topic modeling. Sentiment analysis and logistic regression are used to determine positive and negative user-experience factors that affect satisfaction. Results of the empirical analysis show that Ease of Use and Understandability are factors that have the greatest impact on satisfaction, and Flexibility, Safety, and Playfulness are factors that have the most critical effect on dissatisfaction. Therefore, this paper suggests ways to improve the satisfaction level of the infotainment system, and establishes a strategy accordingly.

Redesign Application Architecture for Advanced Volcanic Disaster Response System (화산재해대응시스템 고도화를 위한 응용아키텍처 재설계)

  • Youn, Junhee;Kim, Tae-Hoon;Kim, Dusik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.90-95
    • /
    • 2018
  • The Korean Peninsula is no longer safe from volcanic disasters. Therefore, the Korean government has been developing a spatial information-based system implementation technology since 2014. VDRS (Volcanic Disaster Response System), which is the result of the technology, was implemented in 2016 as Phase I. Since then, phase II implementation technology has been developed for an advanced system reflecting the user's requirements. To advance the system, redesign architecture is essential. This paper examined the redesign application architecture for an advanced VDRS. First, existing application architecture, which was implemented in phase I, was analyzed. Second, the user's requirements for advanced VDRS were analyzed. The analyzed user's requirements were categorized as a transforming service oriented to a business-oriented architecture, improving accuracy, and expanding the spatial range and target disaster. Third, application architecture was redesigned based on gap analysis between the existing architecture and user's requirements. The results of the proposed redesign architecture are presented as the application system structure and description of the application function based on owner's point of view in the enterprise architecture. The results of this paper can be used to derive the application module design and provide a detailed description of the application module based on the designer's point of view. Further research focused on structuring the HW/SW architecture will be required for system implementation.