• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.027 seconds

An Empirical Study on Failure Factors in the practical application of Logistics Information System Practice Based on Smart-phone' Characters - Focus on Container Transportation Firms - (스마트 폰을 이용한 물류정보시스템의 실무적용 상 애로요인에 관한 실증분석 - 컨테이너 육상운송을 중심으로 -)

  • YOON, Tae-Han
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.70
    • /
    • pp.81-107
    • /
    • 2016
  • Purpose : The purpose of this study is to find that Factors in the practical application of LISMB(Logistics Information System Practice Based) on S.P(Smartphone)' Characters. and take in the whole situation of LISMB on S.P' Characters by this research and it is clear from the findings that LISMB on S.P' Characters situations and distinctiveness. Research design, data, methodology : Research model and hypotheses have been developed based on literature review and working-level interview The collected data were analysed with structural equation modeling, examining the hypothesized relationships and mediating effect. Result : The results of research are as follows, First, LISMB on S.P' Characters has a positive effect on a precariousness of operation management. but That has no effect on a precariousness of general management. Second, Consign management and User non-cooperation has a mediating effect on relationships between LISMB on S.P' Characters and general management. Third, Old version system, User non-cooperation and Unskilled in equipment new system has a partly mediating effect on relationships between LISMB on S.P' Characters and operation management. Conclusion : Smart-phon Prevalence rates keeps increasing. Nevertheless, LISMB on S.P' Characters may no be used in Container transportation market. This problem are being blamed for hampering corporate activities and harbor logistics industry development. so we need new way to solve that problem.

  • PDF

Mobile Application based on Image Processing and a Proportion for Food Intake Measuring

  • Kim, Do-Hyeon;Kim, Yoon;Han, Yu-Ri
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.57-63
    • /
    • 2017
  • In the paper, we propose a new reliable technique for measuring food intake based on image automatically without user intervention. First, food and bowl image before and after meal is obtained by user. The food and the bowl are divided into each region by the K-means clustering, Otsu algorithm, Morphology, etc. And the volume of food is measured by a proportional expression based on the information of the container such as it's entrance diameter, depth, and bottom diameter. Finally, our method calculates the volume of the consumed food by the difference between before and after meal. The proposed technique has higher accuracy than existing method for measuring food intake automatically. The experiment result shows that the average error rate is up to 7% for three types of containers. Computer simulation results indicate that the proposed algorithm is a convenient and accurate method of measuring the food intake.

Data Processing Framework Design by Bluetooth (블루투스를 이용한 데이터 처리 프레임워크 설계)

  • Nam, Yong-su;Kim, Tae Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.455-458
    • /
    • 2009
  • Bluetooth technology has been applied to mobile device, personal computers, peripherals, information and variety of consumer electronics. Not also the original Bluetooth technology must be especially focused in the application of mobile phone but applications such as wireless headsets and dial-up networking may be increased. However Bluetooth is so only focused to wireless headset application that the various software applications are presently ignored. In this paper, we propose the framework design to implement Bluetooth profile for kiosk servers, which can be used in Theater, train station, bank, government and public offices. Then mobile devices capable of processing user's input/output can be remotely accessed in these servers by using Bluetooth module and AP, although Kiosk servers are only processed user input data.

  • PDF

A Method for Testing Web Applications by Using Black-box Tests based on User Screens and Web Interface Test Coverage (사용자 화면 중심의 블랙 박스 테스트와 웹 인터페이스 테스트 커버리지를 통한 웹 어플리케이션 테스트 방법)

  • Lim, Jeung-Hee;Lee, Si-Hyun;Jang, Jin-A;Choi, Byoung-Ju;Hwang, Sang-Cheol
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.706-717
    • /
    • 2009
  • A web application is implemented by reusing the library provided by framework and has hierarchical architecture. Also, to deal with the user request from a screen, the web application has an execution flow, called 'Business Logic', which starts with a screen, executes its composed component and comes back to the screen via database. To test web application effectively, it should reflect the characteristics of web application. In this paper we propose to test web applications via user screens with the black-box testing approach and verify its source codes with the web interface white-box test coverage that covers all the business logics of the test target and their corresponding interfaces. We analyze the proposing testing method through its tool: Testopiacov.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Risk Situation Analysis with usage Patterns of Mobile Devices

  • Kim, Jeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.7
    • /
    • pp.39-47
    • /
    • 2018
  • This paper confirms the risk of using smartphone through the analysis of collected usage pattern and proposes the smartphone intervention system in risk situations. In order to check the risk of smartphone usage, we made information collecting application and collected smartphone usage pattern from 11 experiment participants for two months. By analyzing smartphone usage pattern, we confirmed that about 12% of smartphone usage is being used in driving, walking, and on the street. In addition, we analyzed the response rate of smartphone notification in risk situations and confirmed that user responds the smartphone notifications in real-time even in risk situations. Therefore, it is required to present a system that intervenes the use of smartphone in order to protect smartphone users in risk situations. In this paper, we classify risk situations of using smartphone. Also, the proposed smartphone intervention system is designed to periodically detect risk situations. In risk situations, smartphone function can be restricted according to user setting of smartphone. And smartphone can be used normally when safe situation is restored.

Location-aware visualization of VRML models in indoor location tracking system

  • Yang, Chi-Shian;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.220-228
    • /
    • 2007
  • For many applications particularly in navigation system, a three-dimensional representation improves the usability of information. This paper introduces 3D Graphical User Interface (GUI) of indoor location tracking system, 3D Navigation View. The application provides users a 3D visualization of the indoor environments they are exploring, synchronized with the physical world through spatial information obtained from indoor location tracking system. It adopts widely used Virtual Reality Modeling Language (VRML) to construct, represent, distribute and render 3D world of indoor environments over Internet. Java, an all-purpose programming language is integrated to comprehend spatial information received from indoor location tracking system. Both are connected through an interface called External Authoring Interface (EAI) provided by VRML. Via EAI, Java is given the authority to access and manipulate the 3D objects inside the 3D world that facilitates the indication of user's position and viewpoint in the constructed virtual indoor environments periodically.

Implementation of HTML5-based Hybrid Mobile Office System (HTML5 기반의 하이브리드 모바일 오피스 시스템 구현)

  • Choi, Yong-Kyu;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.725-729
    • /
    • 2012
  • In this paper, the standardization of the Web technology of HTML5/CSS3 and JQuery Mobile, using a variety of mobile platforms, run independently within an environment as possible to implement the Mobile Office System. In addition, user friendly Web interface and dynamic web design through a mobile device in a Mobile Office system provides convenience to the user when a hybrid Web application based mobile office system implement.

  • PDF

EPD File Generation System Based on Template for Choosing E-paper Contents Layout

  • Son, Bong-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.107-114
    • /
    • 2018
  • We propose EPD(Electrophoretic Display) file generation system based on template that enable users to choose contents layout for E-paper display. And also we show implementation results that apply the proposed system in digital doorsign management field adopting E-paper display. Template includes information for contents layout which is composed of standard form image to be used as background image, coordinates of area for dynamic data to be inserted, data source about dynamic data, and characteristic data of EPD panel for displaying contents. System administrator registers templates in Forms Server. When user chooses a contents layout, Forms Server automatically generates EPD file for displaying contents in E-paper by using information of the template and sends EPD file into doorsign. Strength of the proposed system lies in reflecting user preference about contents design and adding personal data into E-paper contents by smartphone application.

Extended GTRBAC Model for Access Control Enforcement in Ubiquitous Environments (유비쿼티스 환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.45-54
    • /
    • 2005
  • The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation. multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.

  • PDF