• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.031 seconds

BCON : Blockchain-based Content Management Service Using DID

  • Kim, Hye-Won;Lee, Young-Eun;Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.97-105
    • /
    • 2021
  • In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user's content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.

Travel mode classification method based on travel track information

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.133-142
    • /
    • 2021
  • Travel pattern recognition is widely used in many aspects such as user trajectory query, user behavior prediction, interest recommendation based on user location, user privacy protection and municipal transportation planning. Because the current recognition accuracy cannot meet the application requirements, the study of travel pattern recognition is the focus of trajectory data research. With the popularization of GPS navigation technology and intelligent mobile devices, a large amount of user mobile data information can be obtained from it, and many meaningful researches can be carried out based on this information. In the current travel pattern research method, the feature extraction of trajectory is limited to the basic attributes of trajectory (speed, angle, acceleration, etc.). In this paper, permutation entropy was used as an eigenvalue of trajectory to participate in the research of trajectory classification, and also used as an attribute to measure the complexity of time series. Velocity permutation entropy and angle permutation entropy were used as characteristics of trajectory to participate in the classification of travel patterns, and the accuracy of attribute classification based on permutation entropy used in this paper reached 81.47%.

Context Awareness Model using the Improved Google Activity Recognition (개선된 Google Activity Recognition을 이용한 상황인지 모델)

  • Baek, Seungeun;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.57-64
    • /
    • 2015
  • Activity recognition technology is gaining attention because it can provide useful information follow user's situation. In research of activity recognition before smartphone's dissemination, we had to infer user's activity by using independent sensor. But now, with development of IT industry, we can infer user's activity by using inner sensor of smartphone. So, more animated research of activity recognition is being implemented now. By applying activity recognition system, we can develop service like recommending application according to user's preference or providing information of route. Some previous activity recognition systems have a defect using up too much energy, because they use GPS sensor. On the other hand, activity recognition system which Google released recently (Google Activity Recognition) needs only a few power because it use 'Network Provider' instead of GPS. Thus it is suitable to smartphone application system. But through a result from testing performance of Google Activity Recognition, we found that is difficult to getting user's exact activity because of unnecessary activity element and some wrong recognition. So, in this paper, we describe problems of Google Activity Recognition and propose AGAR(Advanced Google Activity Recognition) applied method to improve accuracy level because we need more exact activity recognition for new service based on activity recognition. Also to appraise value of AGAR, we compare performance of other activity recognition systems and ours and explain an applied possibility of AGAR by developing exemplary program.

A Study on the Application Model of Information Commons in the University Libraries (대학도서관의 정보공유공간(Information Commons) 적용 모형 연구)

  • Chung, Jae-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.201-221
    • /
    • 2007
  • According to the changing of information environment and user's need, discussion of changing role is increasing gradually in the library, in consequence, interests about the concept of Information Commons, which are integrated IT, education, learning, and cultural functions, are becoming larger. However, in order to adopt the Information Commons in the University library, the model about the consideration and application of basic element is essential. So that, the purpose of this study is to suggest the ways which are adopting the elements and process of the applying Information Commons. In addition, based on Information Commons of Arizona university Library & Indiana University Library which is well organized with model, researcher tried to attempt the virtual renovation to the 'S 'University library'. Through presenting the applicable model of Information Commons, it aims to provide the example of discussion with actively about Information Commons.

  • PDF

Application of Topic Modeling Techniques in Arabic Content: A Systematic Review

  • Maram Alhmiyani;Huda Alhazmi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.1-12
    • /
    • 2023
  • With the rapid increase of user generated data on digital platforms, the task of categorizing and classifying theses huge data has become difficult. Topic modeling is an unsupervised machine learning technique that can be used to get a summary from a large collection of documents. Topic modeling has been widely used in English content, yet the application of topic modeling in Arabic language is limited. Therefore, the aim of this paper is to provide a systematic review of the application of topic modeling algorithms in Arabic content. Using a well-known and trusted databases including ScienceDirect, IEEE Xplore, Springer Link, and Google Scholar. Considering the publication date from 2012 to 2022, we got 60 papers. After refining the papers based on predefined criteria, we resulted in 32 papers. Our result show that unfortunately the application of topic modeling techniques in Arabic content is limited.

A Study on the Design and Implementation of an Application Program Reuse System based on common language (범용언어에 의한 응용 프로그램 재사용 시스템의 설계 및 구현)

  • O, Mu-Song;Kim, Hyeong-Tae
    • Asia pacific journal of information systems
    • /
    • v.4 no.2
    • /
    • pp.83-130
    • /
    • 1994
  • Software development of large scale program such as Operating System or University Total Information System is lengthy and costly process. In order to reduce cost, time and risk, there is currentry general acceptance of the need for Software Reuse System during the whole development cycles. In this paper, (from a practical point of view), the problem of existing reuse system methodology is analyzed and an implement method of software reuse system is presented. Also using this method Application Program Reuse System(APRS) which supports all phase of software life cycles is designed and implemented. This application program reuse system which is based on common language is considerably shown to reduce communication Error of requirement specification between systems analyst and end-user.

  • PDF

Design Modeling of Web-Base a Written Application System using UML (UML을 이용한 웹 기반 원서접수 시스템 설계 모델링)

  • Hwang, Hyun-Bo;Kim, Seok-Soo;Lee, Jae-Cheol
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.2059-2062
    • /
    • 2002
  • In this paper, We are design & implement to the Web based a written Application system using the objected oriented language UML. This system has the many effect which are reusing and maintenance by the pattern definition of implementation steps. Also this system has a special feature among the other web based a written Application systems because this system is supply to user directed methods.

  • PDF

Internet Based Intelligent Survey and Application System (지능형 웹기반 설문 및 원서 접수시스템)

  • So Yo-Hwan;Kim Seok-Soo
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.54-60
    • /
    • 2004
  • This research employs the intelligent survey agent and online application from to help people to locate the information they would want from Internet quickly. Corporate sectors and indivisuals are in need of valuable and relevant information to swiftly adapt to the Internet-driven business or educational environment. Based on Internet GUI environment, this user-friendly online survey and online application form program uses the agent of increasing the interest and participation of users. The system helps along with the decision making process by quickening the information gathering process.

  • PDF

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.