• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

The Web Application of Constitution Analysis System - SCAT (Sasang Constitution Analysis Tool) - (웹 기반 통합체질진단 시스템 - SCAT (Sasang Constitution Analysis Tool) -)

  • So, Ji-Ho;Kim, Jang-Woong;Nam, Ji-Ho;Lee, Bum-Ju;Kim, Young-Su;Kim, Jong-Yeol;Do, Jun-Hyeong
    • Journal of Sasang Constitutional Medicine
    • /
    • v.28 no.1
    • /
    • pp.1-10
    • /
    • 2016
  • Objectives SCAT (Sasang Constitution Analysis Tool) is a system designed to provide the information needed to diagnose a sasang constitution diagnosis expert diagnosis. In order to determine the sasang constitution diagnosis requires the following four ways. This system provides objective information to the constitution diagnostic expert to collect such information.Methods SCAT was constructed by considering the user UI/UX to be easy to enter information. To provide a state of the subject in Table to make it easier to grasp the information of the subject also in constitution diagnostician.Results Provides objective data for experts to determine the constitutional history of the subject.Conclusions Professionals and ordinary users through the SCAT system can easily access the sasang constitution diagnosis. In the future through the advancement of the SCAT system will improve the user's convenience stability.

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application

  • Lee, Sungju;Sa, Jaewon;Cho, Hyeonjoong;Park, Daihee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6152-6168
    • /
    • 2017
  • Recently, the biometric-based authentication systems such as FIDO (Fast Identity Online) are increased in mobile computing environments. The biometric-based authentication systems are performed on the mobile devices with the battery, the improving energy efficiency is important issue. In the case, the size of images (i.e., face, fingerprint, iris, and etc.) affects both recognition accuracy and energy consumption, and hence the tradeoff analysis between the both recognition accuracy and energy consumption is necessary. In this paper, we propose an energy-efficient way to authenticate based on biometric information with tradeoff analysis between the both recognition accuracy and energy consumption in multimedia IoT (Internet of Things) transmission environments. We select the facial information among biometric information, and especially consider the multicore-based mobile devices. Based on our experimental results, we prove that the proposed approach can enhance the energy efficiency of GABOR+LBP+GRAY VALUE, GABOR+LBP, GABOR, and LBP by factors of 6.8, 3.6, 3.6, and 2.4 over the baseline, respectively, while satisfying user's face recognition accuracy.

Comparative Analysis of Visual Presentation and User Acceptability of Virtual/Augmented Reality Application for Architectural Design Review (설계검토를 위한 가상현실·증강현실 기술의 활용 효과 비교 분석)

  • Lee, Jin-Gang;Choi, Min-Ji;Lim, Yun-Ji;Seo, Joon-Oh
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • Visualized information platforms through building information modeling (BIM) such as virtual reality (VR) and augmented reality (AR) improves the efficiency of architectural information exchange. Despite that, less effort has been directed to evaluate the effectiveness of different BIM visualization platforms for architectural design review. This study fills these gaps and compares three BIM visualization tools for reviewing diverse architectural review factors and technology acceptance degree. Three main BIM visualization tools, which are desktop-based, virtual reality-based and augmented reality-based, were employed and different architectural review factors and user's technology acceptance degree was measured. As a result, VR and AR environment showed better visual presentation than desktop environment during design review. In terms of the technology acceptance level, VR and AR environments have received higher ratings compared to desktop environments. The detailed findings provide guidelines for participants and researchers involved in design review process to selectively adopt VR and AR system to various architectural design review components.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Development of Context Awareness Mobile Tour Information Service (상황인식 기반의 모바일 맛집 관광정보 서비스 개발)

  • Hong, Chang-Pyo;Ryu, Jong-Min;Kang, Kyung-Bo;Kang, Dong-Hyun;Jwa, Jeong-Woo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.355-359
    • /
    • 2006
  • Mobile network evolution and development of USN technologies introduce new business model based on context awareness. Cellular operators provide friend finding service using cell based location information and telematics service using GPS location information. Recently cellular operators provide yellow page service based cell based location information. In this paper, we develop mobile tour application on WIPI platform based on location information. Mobile tour information services provide the best information based on context awareness using user location information from LBSP (Location Based Service Platform), season, weather conditions, time from Web server, and personal preference information stored in database. Mobile tour information service application is developed on WIPI platform.

  • PDF

Design and Application of User-Centered Design Concept in Smart City (스마트시티의 User Centered Design 개념 설계 및 활용)

  • An, Se-Yun;Kim, So-Yeon;Ju, Hannah
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.440-451
    • /
    • 2019
  • Smart City is a future-oriented city that provides users with desired services through various devices anytime and anywhere using Information and Communication Technologies (ICTs). In order to provide the smart city service desired by the user, the user-oriented design concept should be based on above all. The design and development process must be based on the opinions and needs of everyone involved and needs to ideally reflect all user information and feedback, including users, designers and stakeholders at all levels. Participatory design approaches can be seen as an attempt to better understand and engage real users, and they are essential and important to create more appropriate and user-friendly smart-city services. This study has recognized the importance of developing a smart city service from the viewpoint of user - centered design and examined the methodology of design thinking and service design process for smart city service development. User - centered design concept model for smart city service design was designed, and serviceability case developed based on concept model was verified.

A Study on Two-Dimensional Analysis with the Acceptance of High-Tech New Product - Focusing on Smart-Phone's Usefulness Expectancy referring to Product and Application - (하이테크 신제품 수용의 2차원 연구 - 스마트폰의 제품과 애플리케이션 유용성 기대를 중심으로-)

  • Lim, Yang Whan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.151-162
    • /
    • 2011
  • This study defined acceptance of high-tech new product as user's active using the product such as utilizing application software rather than purchasing it. As exploring factors to effect on customer's acceptance, usefulness expectancy was examined from product side and application side. When investigating the exogenous variables to influence on usefulness expectancy from the product side, customer's product knowledge and social influences are put forward to support the hypothesis. From the application side, customer's knowledge about the application and its trust are put to explain usefulness expectancy of the application. Smart phone users were good subjects for this study and most hypotheses were tested using structural equation model and the results are followings. First usefulness expectancy of the product and of application significantly effect on customer's intention to use high-tech new product and also usefulness expectancy of the product positively effects on which of the application. Second customer's perceived knowledge about the product and social influences impact usefulness expectancy of the product. But third customer's perceived trust toward application didn't any positive impact usefulness expectancy of the application. Through the result, there will be several implications. First, from both of side; product and application, customer's usefulness expectancy should be satisfied to be successful in high-tech products market. Second, customer should be Ieant about advantages of the product and knowledge about the application as well, and then trigger their usefulness expectancy.

The Automatic Extraction System of Application Update Information in Android Smart Device (안드로이드 스마트 기기 내의 애플리케이션 업데이트 정보 자동 추출 시스템)

  • Kim, Hyounghwan;Kim, Dohyun;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.345-352
    • /
    • 2014
  • As the utilization rate of smart device increases, various applications for smart device have been developed. Since these applications can contain important data related to user behaviors in digital forensic perspective, the analysis of them should be conducted in advance. However, lots of applications get to have new data format or type when they are updated. Therefore, whether the applications are updated or not should be checked one by one, and if they are, whether their data are changed should be also analyzed. But observing application data repeatedly is a time-consuming task, and that is why the effective method for dealing with this problem is needed. This paper suggests the automatic system which gets updated information and checks changed data by collecting application information.

Valley Search Application Using Android Smart Phones (안드로이드 스마트폰을 이용한 계곡검색 애플리케이션)

  • Lee, Tae-Kwon;Kwon, DooWy;Park, SuHyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.536-537
    • /
    • 2014
  • In this paper, it suggested Android smart phone application for users who want to find valley at summer. To provide correct information, we used Korea Tourism Organization's tourism information database and to provide tourism information and map service at once we linked Naver map. Search valley application can search valley by using country's region name and keyword by using map and GPS. we can find restaurants accomodations around your location. we can get restaurants and accommodations by control distance so we can get phone number, pictures and detail information about searched data. Also, you can bookmark valley where you want to go and you can search of delete bookmarked valley whenever you want. you can share opinion by writing postscribe about the valley where application user went. for developer and users amicable communication we made Q&A board.

  • PDF

Efficient Re-Establishment Mechanism of Diameter Security Association lost in MIP Application (MIP 환경에서의 Diameter Security Association 정보 분실시의 재설정 기법)

  • 유희종;김말희;김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.39-48
    • /
    • 2003
  • AAA(Authentication, Authorization, Accounting) protocol is a framework that propose functions of AAA on multiple networks and platforms. AAA protocol is extending from previous RADIUS protocol to Diameter protocol. There are some Diameter applications for variety purpose. Diameter CMS Application makes Diameter messages more secure by using PKI. Diameter CMS Application establish DSA(Diameter Security Association) for end to end security. However the Application has some problems to establish DSA(Diameter Security Association), which can make Diameter system unstable. If one system lose DSA information for some system error - for example, reboot -, the secure communication between two nodes may not be possible. At the application such as MIP, even user registration can't be done. In this paper, we propose a mechannism for DSA re-establishment, and also show the result of the implementation.