• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

Analysis of Priority in the Robotaxi Design Elements : Focusing on Application of AHP Methodology (로보택시 설계 요소 간 우선순위 분석 : AHP 방법론 적용을 중심으로)

  • Juhye Ha;Yeonbi Jeung;Junho Choi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.179-193
    • /
    • 2023
  • research on user-friendly experience design is crucial to reduce resistance and enhance acceptance of robotaxis. This study analyzes the prioritization of design factors in robotaxi systems and provides design guidelines based on user experience. Using the AHP(Analytic Hierarchy Process) technique, users' perceived importance of four primary design factors and sixteen 16 sub-design elements were assessed, and comfort and safety were top priorities. The results showed that the artificial intelligence agent was the most critical design factor, followed by driving guidance information, interior design, and exterior design. These findings offer valuable insights for robotaxi professionals, and could assist in informed decision-making and creating user-centered design guidelines.

An authentication service application using Context-awareness (상황인식 기법을 이용한 인증 서비스 응용)

  • Lee, Myung-jun;Lee, Tae-sik;Hong, Ho-jung;Hwang, Hyeon-seo;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.169-172
    • /
    • 2013
  • In this paper, we develop an application service of user authentication system using context awareness technology. The proposed security printer system service is applying 'NFC(Near Field Communication) technology', 'authentication system using communication with server, according to context awareness to application system. Our system extracts several context-awareness elements that happen through the user's printing with server communication. The proposed system property elements contain as print time, number of printing and name of document, etc. based on working memory operation as DB. This proposed system provide with context-awareness weight algorithm and analyzes the service which decides success or failure of user's printing. The develop app service is formed and applied when approved user who gets request. Approved user according to these context awareness tech will be provided with final service after authenticating again for the certain NFC card to reader. This results cab be contributed an authentication service based on context awareness weight algorithm and improved performance of management service in secure service applications.

  • PDF

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Design and Prototype Implementation of a Smartphone Functional Application for Learning Chinese Language (중국어 학습을 위한 스마트폰 기능성 어플리케이션 설계 및 프로토타입 구현)

  • Maeng, Soo Yeon;Lee, Eun Ryoung
    • Journal of Digital Contents Society
    • /
    • v.17 no.4
    • /
    • pp.265-272
    • /
    • 2016
  • Recently Chinese education market and social interest has been extended. Accordingly, smart learning based on smartphone applications became part of new educational paradigm. Also, there are more active research and development of applications for the Chinese language education. In this paper, we designed and implemented the smartphone functional application prototype for learning basic Chinese characters. Expression of Chinese characters, the comparison, listening in pronunciation, voice recording and listening, related content learning, and implement testing presented using casual user interface. In the future study, we will develop the prototype with user interface for learning Chinese conversation and individual index of evaluation can be effective learning Instrument without additional tools.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Generating Augmented Lifting Player using Pose Tracking

  • Choi, Jong-In;Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • This paper proposes a framework for creating acrobatic scenes such as soccer ball lifting using various users' videos. The proposed method can generate a desired result within a few seconds using a general video of user recorded with a mobile phone. The framework of this paper is largely divided into three parts. The first is to analyze the posture by receiving the user's video. To do this, the user can calculate the pose of the user by analyzing the video using a deep learning technique, and track the movement of a selected body part. The second is to analyze the movement trajectory of the selected body part and calculate the location and time of hitting the object. Finally, the trajectory of the object is generated using the analyzed hitting information. Then, a natural object lifting scenes synchronized with the input user's video can be generated. Physical-based optimization was used to generate a realistic moving object. Using the method of this paper, we can produce various augmented reality applications.

Friendship Influence on Mobile Behavior of Location Based Social Network Users

  • Song, Yang;Hu, Zheng;Leng, Xiaoming;Tian, Hui;Yang, Kun;Ke, Xin
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.126-132
    • /
    • 2015
  • In mobile computing research area, it is highly desirable to understand the characteristics of user movement so that the user friendly location aware services could be rendered effectively. Location based social networks (LBSNs) have flourished recently and are of great potential for movement behavior exploration and datadriven application design. While there have been some efforts on user check-in movement behavior in LBSNs, they lack comprehensive analysis of social influence on them. To this end, the social-spatial influence and social-temporal influence are analyzed synthetically in this paper based on the related information exposed in LBSNs. The check-in movement behaviors of users are found to be affected by their social friendships both from spatial and temporal dimensions. Furthermore, a probabilistic model of user mobile behavior is proposed, incorporating the comprehensive social influence model with extent personal preference model. The experimental results validate that our proposed model can improve prediction accuracy compared to the state-of-the-art social historical model considering temporal information (SHM+T), which mainly studies the temporal cyclic patterns and uses them to model user mobility, while being with affordable complexity.

Exploring User Perceived Usability Characteristics of Applications on Smart Phones: A Grounded Theory Analysis of User Reviews (사용자 관점에서 본 스마트폰 애플리케이션의 특성에 관한 연구)

  • Lee, Jung-Woo;Im, Hun-Hyouk;Kim, Joo-Hyung;Kang, Sun-Ju;Kim, Min-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.615-627
    • /
    • 2012
  • The market penetration of the smart phones has brought significant changes to the related industries. As the mobile phone market as well as the smart phone application market are growing rapidly, competition among small-size application developers has become severe. However, due to the severe competition and expensive market entry costs, the developers argue that it is necessary to develope the applications from the perspective of the users. However, studies on application development from the users' perspectives are still in the early stages and they have not provided various approaches. Therefore, based on the Open Coding method of Ground Theory, this study collected data on applications review from related communities and blogs of Korean web portal sites, and identified indices which users consider important when they use the applications. In addition, we conduct a comparative analysis between those indices by calculating their frequency of exposure. As a result, a total of 30 sub-categories of indicators such as amusement, controllability, versatility and ease of use appeared to be predominant to users and those lower categories were grouped into five categories; sensibility, design, technology, price, and social skills. The results of this study suggest to the application developers the guidelines of user oriented design and development. It can be used to develop the evaluation tool for application usability.

A Study on the Web Mapping Method and Application of the Topographic Information in an Open Environment (개방환경에서 지형정보의 웹지도화 방법과 적용에 관한 연구)

  • Kim, Nam-Shin
    • Journal of the Korean association of regional geographers
    • /
    • v.13 no.5
    • /
    • pp.563-575
    • /
    • 2007
  • This study aims to investigate a possibility of using topographic information by web mapping in open environments. Web mapping intends to focus on a map analysis and application of the function and geo-visualization. Functions of Web topographic info-map include a spatial analysis, enlargement and minimization, movement, landuse information, user-controling 3 dimension map, landform cross-section analysis, shortest path analysis. The web system adopts SVG(scalable vector graphics), MYSQL, PHP, XML for mapping. SVG has open source policy, so everyone can use it, as well, it is effective on flexible database linkage, cartographic representation. 3D map is intended to represent 3D map by user-controlled sunshine putting pixel opacity by elevation values after making DEM. Landform is designed to show a cross-section analysis and statistics by retrieving height information from database engine with clicking two points on the map. Shortest path analysis within regions uses Dijkstra's algorithm. Near future, resultantly, the area of WebGIS will have to meet more social demands for use-created geo-information and application, so more researches are needed to be web mapping more applicable for users.

  • PDF

A EJB Component-based WAP Application Generator (EJB 컴포넌트 기반 WAP 응용 생성기)

  • Eum, Doo-Hun;Kang, I-Zzy
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.125-139
    • /
    • 2005
  • Mobile e-business is in wide use with the rapid growth of wireless internet users. To meet the growing requests for mobile e-business the productivity of mobile applications has been demanded. The WAPSiteGen, introduced in this paper, automatically generates a 3-tier WAP application that needs a new application database or that already has an application database to increase the productivity. The WAPSiteGen generates the EJB components that handle business logic and the JSP Web components that process user-made queries and the WAP Push feature. For a presentation layer, it also generates the HTML forms for an application manager and the WML decks for end users, which consists of many cards. The WAPSiteGen enhances extendibility, reusability and portability of generated 3-tier applications by comprising such component technologies as EJB and JSP. Furthermore, it supports the WAP Push services for generated applications that provide necessary information to wherever and at whenever a user wants. Since the applications generated by the WAPSiteGen provide the information on an interested entity as well as the information on all the directly or indirectly related entities to the interested one, it shows faster information accessibility. In this paper, we explain the functionality and implementation of the WAPSiteGen and then show its merits by comparing the WAPSiteGen to commercial WAP application generators.

  • PDF