• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

Attribute Certificate Profile Research (속성인증서 프로화일 연구)

  • 윤이중;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.75-84
    • /
    • 2001
  • Existent public key certificates provide authentication information through some information on user\`s public key. However, an attribute certificate which stores and manage user\`s attribute information, provides various privilege information such as position, privilege and role. In recent, international organizations establishes standards on attribute certificate, and the researches and developments on attribute certificate have been widely made. In addition it may be expected to be used many real application area requiring for authorization information as well as authentication information. Therefore, this paper considers background and standardization trends of attribute certificate and describes the profile and related techniques of attribute certificate currently established by IETF. In addition, it introduces and access control system using attribute certificate and specifies applications of attribute certificate.

Development of a Targeted Recommendation Model for Earthquake Risk Prevention in the Whole Disaster Chain

  • Su, Xiaohui;Ming, Keyu;Zhang, Xiaodong;Liu, Junming;Lei, Da
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.14-27
    • /
    • 2021
  • Strong earthquakes have caused substantial losses in recent years, and earthquake risk prevention has aroused a significant amount of attention. Earthquake risk prevention products can help improve the self and mutual-rescue abilities of people, and can create convenient conditions for earthquake relief and reconstruction work. At present, it is difficult for earthquake risk prevention information systems to meet the information requirements of multiple scenarios, as they are highly specialized. Aiming at mitigating this shortcoming, this study investigates and analyzes four user roles (government users, public users, social force users, insurance market users), and summarizes their requirements for earthquake risk prevention products in the whole disaster chain, which comprises three scenarios (pre-quake preparedness, in-quake warning, and post-quake relief). A targeted recommendation rule base is then constructed based on the case analysis method. Considering the user's location, the earthquake magnitude, and the time that has passed since the earthquake occurred, a targeted recommendation model is built. Finally, an Android APP is implemented to realize the developed model. The APP can recommend multi-form earthquake risk prevention products to users according to their requirements under the three scenarios. Taking the 2019 Lushan earthquake as an example, the APP exhibits that the model can transfer real-time information to everyone to reduce the damage caused by an earthquake.

Explicating Personal Health Informatics Experience (퍼스널 헬스케어 디바이스 사용자 경험 연구)

  • Shin, Dong-Hee;Cho, Hoyoun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.550-566
    • /
    • 2017
  • Recent advances in wearable devices and quantified-self movement increase the number of personal informatics application that may cause an concern to health industry and user. In this light, the goal of this study is to identify more effective ways of design and evaluation of personal informatics application for self-tracking and delivering health information to users. For this goal, this study conducted areal-world study that processes such that user can assess, be aware of, and self-reflect on their data and behavior activity. In doing so, this study aims to determine the psychological effects of forms of health feedback (comparative vs. non-comparative) and presentation modes (text vs. image) on users' tendencies toward health conservation. Results from a between-subjects experiment revealed that health information in a comparative and textual format was more effective in encouraging health conservation in participants than identical information presented in a non-comparative and image format. In addition, participants' level of health consciousness emerged as a significant predictor. Through this analysis of quantitative data and inferences, this study make a number of contributions to the user affordance research and its methodology of health informatics study and designing personal informatics application that support user's behavior change in various contexts.

CoRapport: Proactive Display Application Supporting Presentation of Various Social Web Contents in Physical Spaces (CoRapport: 실세계에서 다양한 소셜 웹 콘텐츠 표현을 지원하는 능동형 디스플레이 애플리케이션)

  • Lee, Tae-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.127-139
    • /
    • 2010
  • The concept of Web 2.0, which means that internet users are producers and also consumers is evolved according to the development of web service technology. In the Web 2.0 space, the enormous amount of web contents are produced using many social web services. Proactive display system supports various types of users's web contents. Unfortunately, private web contents sharing facility is imperfect to date. In this paper, we develop a proactive display application which identifies people, displaying their social contents such as blogs and open cafes through wide display devices or multi-media players in physical spaces. For this, we develop a social contents presentation server where users can register their profiles and information on the social contents to be shared through the developed application. Also, we develop a social contents presentation client that proactively identifies the user in close proximity and displays the user's social contents through an intuitive user interface in physical spaces. In addition, we develop an on-the-spot feedback service which supports posting various types of replies and an on-the-spot scrap service which specifies direct sharing of the contents through the intuitive user interface.

The Effect of the Attractiveness of Mobile Music Applications on the Level of User Loyalty

  • Mengyu, Dong;Cho, Namjae
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.3
    • /
    • pp.63-72
    • /
    • 2017
  • The purpose of this study is to investigate the relationship between application attractiveness and loyalty to mobile music applications. The application attractiveness is operationalized into four dimensions: richness of music contents, music app design quality, music app functionality, and promotion. The hypotheses are postulated and tested using a sample of 370 student respondents from Henan Polytechnic University and Henan Institute of Technology, China. The result shows that there is a positive correlation between loyalty and three application attractiveness aspects: richness of music contents, music app design quality and music app functionality. Based on the results of this study, the research put forward constructive suggestions about improving mobile music application loyalty. Finally, several conclusions, managerial suggestions, limitations and future research are proposed.

Design and Implementation of a Smart Glass Application for XR Assisted Training of Core Nursing Skills

  • Kim, Sun Kyung;Yoon, Hyoseok;Shin, Choonsung;Choi, Jongmyung;Lee, Youngho
    • Journal of Multimedia Information System
    • /
    • v.7 no.4
    • /
    • pp.277-280
    • /
    • 2020
  • Extended reality-assisted training offers repeatable learning opportunities at a low cost. This paper proposes a smart glass application for training core nursing skills to nursing students, who often need to memorize and practice training sequences. The proposed smart glass application interactively presents a series of instructions to help students remember and perform two core nursing skills in the correct order. We conducted a usability test on 30 undergraduate nursing students in their third year using the smart glass application. Our initial findings show that many students have positively evaluated the possibility of using smart glasses for training, but have also encountered several challenges with the smart glass application's user interface, which takes time to adapt.

A Study on Method for User Gender Prediction Using Multi-Modal Smart Device Log Data (스마트 기기의 멀티 모달 로그 데이터를 이용한 사용자 성별 예측 기법 연구)

  • Kim, Yoonjung;Choi, Yerim;Kim, Solee;Park, Kyuyon;Park, Jonghun
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.147-163
    • /
    • 2016
  • Gender information of a smart device user is essential to provide personalized services, and multi-modal data obtained from the device is useful for predicting the gender of the user. However, the method for utilizing each of the multi-modal data for gender prediction differs according to the characteristics of the data. Therefore, in this study, an ensemble method for predicting the gender of a smart device user by using three classifiers that have text, application, and acceleration data as inputs, respectively, is proposed. To alleviate privacy issues that occur when text data generated in a smart device are sent outside, a classification method which scans smart device text data only on the device and classifies the gender of the user by matching text data with predefined sets of word. An application based classifier assigns gender labels to executed applications and predicts gender of the user by comparing the label ratio. Acceleration data is used with Support Vector Machine to classify user gender. The proposed method was evaluated by using the actual smart device log data collected from an Android application. The experimental results showed that the proposed method outperformed the compared methods.

Smartphone-User Interactive based Self Developing Place-Time-Activity Coupled Prediction Method for Daily Routine Planning System (일상생활 계획을 위한 스마트폰-사용자 상호작용 기반 지속 발전 가능한 사용자 맞춤 위치-시간-행동 추론 방법)

  • Lee, Beom-Jin;Kim, Jiseob;Ryu, Je-Hwan;Heo, Min-Oh;Kim, Joo-Seuk;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.154-159
    • /
    • 2015
  • Over the past few years, user needs in the smartphone application market have been shifted from diversity toward intelligence. Here, we propose a novel cognitive agent that plans the daily routines of users using the lifelog data collected by the smart phones of individuals. The proposed method first employs DPGMM (Dirichlet Process Gaussian Mixture Model) to automatically extract the users' POI (Point of Interest) from the lifelog data. After extraction, the POI and other meaningful features such as GPS, the user's activity label extracted from the log data is then used to learn the patterns of the user's daily routine by POMDP (Partially Observable Markov Decision Process). To determine the significant patterns within the user's time dependent patterns, collaboration was made with the SNS application Foursquare to record the locations visited by the user and the activities that the user had performed. The method was evaluated by predicting the daily routine of seven users with 3300 feedback data. Experimental results showed that daily routine scheduling can be established after seven days of lifelogged data and feedback data have been collected, demonstrating the potential of the new method of place-time-activity coupled daily routine planning systems in the intelligence application market.

Context categorization of physiological signal for protecting user's privacy (사생활 보호를 위한 생체 신호기반 컨택스트 분석 및 구분기법)

  • Choi, Ah-Young;Rashid, Umar;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.960-965
    • /
    • 2006
  • Privacy and security are latent problems in pervasive healthcare system. For the sake of protecting health monitoring information, it is necessary to classify and categorize the various contexts in terms of obfuscation. In this paper, we propose the physiological context categorization and specification methodology by exploiting data fusion network for automatic context alignment. In addition, we introduce the methodologies for making various level of physiological context on the context aware application model, which is wear-UCAM. This physiological context has several layers of context according to the level of abstraction such as user-friendly level or parametric level. This mechanism facilitates a user to restrict access to his/her monitoring results based on the level of details in context.

  • PDF

Design of User Authentication Mechanism based on WPKI

  • Lee Cheoi Seung;Park Do Jun;Shin Myung Souk;Lee Jeong Gi;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.519-523
    • /
    • 2004
  • In this paper we challenge the user Authentication using KerberosV5 authentication protocol in WPKI environment. This paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key based structure and transmission hierarchical security back of a WAP forum, and a server client holds for user authentication of an application layer all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol KerberosV5 and its disadvantages.

  • PDF