• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.032 seconds

Brainwave-based Mood Classification Using Regularized Common Spatial Pattern Filter

  • Shin, Saim;Jang, Sei-Jin;Lee, Donghyun;Park, Unsang;Kim, Ji-Hwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.807-824
    • /
    • 2016
  • In this paper, a method of mood classification based on user brainwaves is proposed for real-time application in commercial services. Unlike conventional mood analyzing systems, the proposed method focuses on classifying real-time user moods by analyzing the user's brainwaves. Applying brainwave-related research in commercial services requires two elements - robust performance and comfortable fit of. This paper proposes a filter based on Regularized Common Spatial Patterns (RCSP) and presents its use in the implementation of mood classification for a music service via a wireless consumer electroencephalography (EEG) device that has only 14 pins. Despite the use of fewer pins, the proposed system demonstrates approximately 10% point higher accuracy in mood classification, using the same dataset, compared to one of the best EEG-based mood-classification systems using a skullcap with 32 pins (EU FP7 PetaMedia project). This paper confirms the commercial viability of brainwave-based mood-classification technology. To analyze the improvements of the system, the changes of feature variations after applying RCSP filters and performance variations between users are also investigated. Furthermore, as a prototype service, this paper introduces a mood-based music list management system called MyMusicShuffler based on the proposed mood-classification method.

Implementation of Realistic Experience Application Contents for Tourist Spots Object Recognition Using Augmented Reality Technology (증강현실을 적용한 관광지 사물인식 실감체험 앱 콘텐츠 구현)

  • Kim, Young Sang;Kim, Young Ick
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.122-129
    • /
    • 2016
  • In recent years, the Augmented Reality Technology is improving in order to support the user-oriented interaction depending on growing trend in smart phones. In this paper, we present the Realistic Experience App. Contents which help the smart phone users experience the real situations by using the Object Recognition Technology of the tourist attractions and the users' location information. The developed system pinpoints both the location of the user and that of the tourist spot object through the GPS of the smart phone and the information of Beacon, providing the realistic experience contents about the tourist attraction after estimating the distance and the direction between the user and the place. The Realistic Experience App. Contents are expected not only to impress the culture of Jeju on the tourists but also to increase the potential to uncover the unknown tourist attractions and improve the image of Jeju as one of the best sightseeing cities.

A Study on a Sign System in a Library (도서관 서고 유도 Sign System 현장 사례 연구 - S대학 중앙도서관 사례를 중심으로 -)

  • Park, Sang-Kun;Lee, Jae-Won
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.2
    • /
    • pp.339-359
    • /
    • 2019
  • The purpose of this study is to clarify the case and process of the application of the sign system in order to enable the user to reach the target site more efficiently in the library. For this purpose, a new sign system was applied to the S University library through procedures such as library structure, sign status, user observation, cyan production and preference survey. Detailed production process and user's reaction were identified. Based on this we suggested improvements to the library stacks signage system.

Role-Behavior Based Access Control on Mobile Agent System for Workflow Management System (워크플로우 응용을 위한 이동 에이전트 시스템에의 역할-행위 기반 접근통제 적용)

  • Shin, Wook;Lee, Dong-Ik;Yoon, Seok-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.11-28
    • /
    • 2000
  • In these days it is rapidly increasing that multi-user, multi-layered commercial software developments for companies or public institutions. Security services are necessary for most of systems and the access control service is the essential of security services. Current access control methods that are used as access control policies are classified as Discretionary Access Control Mandatory Access Control and Role Based Access Control. However there are some inefficiencies when those methods are applied to current multi-user, multi-layered systems. Therefore it is required that a new access control method that takes complex system resources into account from the side of policy. In this paper extending previous Role Based of 'Behavior' and a basic model of the method. And we simply implement the method on the mobile agent based workflow management system that is a representative example of multi-user. multi-layered softwares and shows implementation results to tap possibilities of real-world application.

Research on Technology, Process, and Strategic Fit of ICT Based Service Model (ICT 기반 융합 서비스 모델의 기술, 프로세스, 전략적 적합 연구)

  • Han, Hyun-Soo;Park, Keun-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.225-245
    • /
    • 2014
  • ICT based convergence application is one of the most prevalent industrial issue these days. Despite of criticalness and potential economic opportunities of the ICT based convergence, theoretical research to analyze the feasibility and estimate the economic impact of the application is rather limited. This paper is intended to fill this research gap. In this respect, we develop theoretical framework to quantitatively estimate the differential benefits of convergent applications, which necessarily include underling ICT technology's contribution attributes extractions, and resulting value increments engendered from user's process effectiveness when ICT based service application is adopted. The research model to assess the differential value of the ICT based service application is developed, grounded on theoretical framework of TPC (Technology-to-performance chain) and contingency fit theories. Scenario based survey method is adopted, and SmartPLS 2.0. is used for statistical analysis of the structural equation model using 312 questionnaire. Valid statistical results are presented to provide useful insight.

Critical Steps in Building Applications with Visual Basic and UML: Focusing on Order Processing Application (Visual Basic과 UML을 사용한 애플리케이션 개발시의 핵심적 단계: 주문처리 업무를 중심으로)

  • Han, Yong-Ho
    • IE interfaces
    • /
    • v.16 no.2
    • /
    • pp.268-279
    • /
    • 2003
  • This paper presents critical steps in building client/server application with UML and Visual Basic, which are derived from the implementation case of a typical order processing system. To begin with, we briefly review the software architecture, the diagrams and the object-oriened building process in the UML. In the inception phase, it is critical to define the project charter, to draw use case diagrams, and to construct a preliminary architecture of the application. In the elaboration phase, it is critical to identify classes to be displayed in the class diagram, to develop user interface prototypes for each use case, to construct sequence diagram for each use case, and finally to design an implementation architecture. Steps to construct implementation architecture are given. In the construction phase, it is critical to design both the database and components. Steps to design these components are described in detail. Additionally the way to create the Internet interface is suggested.

A Longitudinal Study on the Effect of the Application Usage Period on the Change of Digital Shadow Work Type: Focused on LBS-based Help Apps Service (애플리케이션 사용자의 사용기간이 디지털그림자노동의 유형 변화에 미치는 영향에 대한 종단 연구: LBS 기반 도와줘 앱 서비스를 중심으로)

  • Jung-Sik, Song;Woong-Kyu, Lee;Byeong Hoon, Lee;Joon, Koh
    • Journal of Information Technology Services
    • /
    • v.21 no.6
    • /
    • pp.91-116
    • /
    • 2022
  • This research shows how the perception of digital shadow work varies depending on the user's period of use of digital services in applications, which are key areas of digital services. The purpose of this research is to investigate how the digital shadow work type changes over time. This research adopted a qualitative research method for location-based service "help application" users and examined the change in perception from the app service acceptance stage to the app service continuous use stage with two-times interviews of ten users by a longitudinal research design. This study conducted a longitudinal analysis focusing on how digital shadow work occurs in the application subscription process, exploring phenomenologically how the type changes throughout the process over time.

User Authentication of a Smart City Management System (스마트시티 매니지먼트 시스템에서의 사용자인증보안관리)

  • Hwang, Eui-Dong;Lee, Yong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • In this paper, we introduce the UTOPIA Smart City Security Management System which manages a user authentication for smart cities. Because the smart city management system should take care of huge number of users and services, and various kinds of resources and facilities, and they should be carefully controlled, we need a specially designed security management system. UTOPIA is a smart city system based on ICT(Information and Communication Technology), and it has a three tier structure of UTOPIA portal system, UTOPIA processing system and UTOPIA infrastructure system. The UTOPIA processing system uses the smart city middleware named SmartUM. The UTOPIA Smart City Security Management System is implemented in the application security layer, which is the top layer of the SmartUM middleware, and the infrastructure security layer, which is the lowest layer. The UTOPIA Smart City security management system is built on the premise that it supports all existing user authentication technologies. This paper introduces the application security layer and describes the authentication management in the application security layer.

Intention to Disclose Personal Information in LBS : Based on Privacy Calculus Perspective (스마트폰 위치기반서비스에서 정보제공의도 : 프라이버시 계산 관점을 중심으로)

  • Kim, Jong-Ki;Kim, Sang-Hee
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.55-79
    • /
    • 2012
  • LBS(Location-Based Service) is one of the smartphone application services which has been receiving great attention recently. Various applications of smartphone use LBS to provide innovative services. However, use of LBS raises privacy concerns because the location information of users is constantly exposed. Privacy calculus perspective attempts to understand the characteristics of the user's privacy. It is based on the risk-benefit analysis in the economics' perspective. That is, when the benefit expected through personal information disclosure is higher than risk, we are willing to provide personal information. This research suggested a research model based on the privacy calculus perspective to clarify the effect of information disclosure intention of smartphone LBS application users. Based on the main factors of privacy calculus, perception of privacy risk and privacy benefit, the relationship of the perceived value and the information disclosure intention was empirically analyzed by utilizing structural equation modeling(SEM) methodology. According to the results of the empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between privacy concern and information disclosure intention. This study showed a strong evidence of antecedent factors based on privacy calculus of personal information disclosure in smartphone LBS applications.

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Kim, Bum-Sik
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.481-486
    • /
    • 2006
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and Implementation the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition its application becomes possible in the system requiring multi-users certifications.

  • PDF