• 제목/요약/키워드: User Application Information

Search Result 2,389, Processing Time 0.033 seconds

The Measuring Method of Web-Site Flow and Its Simulation Analysis (웹 사이트 플로우(Flow) 측정 방법론 및 시뮬레이션에 대한 연구)

  • Kwon, Soon-Jae
    • Knowledge Management Research
    • /
    • v.10 no.2
    • /
    • pp.49-63
    • /
    • 2009
  • In this study, sub domain of flow was investigated on literature survey, and suggested of the measuring method of web-site flow and its simulation analysis. Constructing of measuring method of flow, and using this method what-if analysis was simulated when several condition changed. Using causal map approach to extract knowledge from web-site domain experts and to derives a causal relationship of knowledge. Specially, in our study, describes method of developing and building causal map, and suggests guide line of this method on practical application. This research results show that web-site flow starts "direct searching" or "interesting of special issue(domain)", and when challenges of web-site were accorded with user's skills web-site flow grows. Further, in the web-site, information searching intention results in increase of user's duration time and experience flow to discovery new interesting issues in this process. If user's web-site of interaction is increased, awareness of environment conditions decreased, finally, user's telepresense results in increased web-site flow. This paper contained thai this method make used of measuring flow in the web-site and developing of practical strategy.

  • PDF

An Implementation of a Classification and Recommendation Method for a Music Player Using Customized Emotion (맞춤형 감성 뮤직 플레이어를 위한 음악 분류 및 추천 기법 구현)

  • Song, Yu-Jeong;Kang, Su-Yeon;Ihm, Sun-Young;Park, Young-Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.195-200
    • /
    • 2015
  • Recently, most people use android based smartphones and we can find music players in any smartphones. However, it's hard to find a personalized music player which applies user's preference. In this paper, we propose an emotion-based music player, which analyses and classifies the music with user's emotion, recommends the music, applies the user's preference, and visualizes the music by color. Through the proposed music player, user could be able to select musics easily and use an optimized application.

A Novel Method for Robots to Provide First Aid to Injured People Inside the Mines Using GIS Technology

  • Eman Galaleldin Ahmed Kalil
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.1-8
    • /
    • 2023
  • The artificial intelligence of robot is the weakness of digital intelligence of a person who able to train, self-realize and to develop competences, creative, professional and behavioral skills. A new methodology proposed for managing robots inside the mines using an electronic system designed for driving robots to injured people in seas, mines or wells who can not be reached by human force. This paper also explains the concept of managing and remote-controlling the process of searching and helping the injured. The user controls the robot through an application that receives all the reports that the robot sends from the injured person. The robot's tasks are to take a sample of the blood of the injured person, examine it, and measure the percentage of oxygen underground and send it to the user who directs the robot to pump a specific percentage of oxygen to the injured person. The user can also communicate with the person The patient and determine his condition through the camera connected to the robot equipped with headphones to communicate with the injured and the user can direct the camera of the robot and take x-rays from the injured.

Home Network Observation System Using Activate Pattern Analysis of User and Multimedia Streaming (사용자의 행동 패턴 분석과 멀티미디어 스트리밍 기술을 이용한 홈 네트워크 감시 시스템)

  • Oh Dong-Yeol;Oh Hae-Seok;Sung Kyung-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1258-1268
    • /
    • 2005
  • While the concept of Home Network is laying by and its interests are increasing by means of digitalizing of the information communication infrastructure, many efforts are in progress toward convenient lives. Moreover, as information household appliances which have a junction of connecting to the network are appearing over the past a few years, the demands against intellectual Home Services are increasing. In this paper, by being based upon Multimedia which is an essential factor for developing of various application services on ubiquitous computing environments, we suggest a simplified application model that could apply the information to the automated processing system after studying user's behavior patterns using authentication and access control for identity certification of users. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. And that made safe of user certification as adopting self-developed certification method which was used 'Hash' algorism through salt function of 12 byte. In order to show the usefulness of this proposed model, we did some testing by emulator for control of information after construction for Intellectual Multimedia Server, which ubiquitous network is available on as a scheme so as to check out developed applications. According to experimental results, it is very reasonable to believe that we could extend various multimedia applications in our daily lives.

  • PDF

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.

A Design and Implementation of Online Exhibition Application for Disabled Artists

  • Seung Gyeom Kim;Ha Ram Kang;Tae Hun Kim;Jun Hyeok Lee;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.77-84
    • /
    • 2024
  • In this paper, we design and implement an online exhibition application based on an Android platform that can showcase the artistic works of disabled artists. This application considers user convenience for disabled artists, particularly providing STT(Speech-to-Text) and TTS(Text-to-Speech) features for visually and hearing impaired individuals. Additionally, for the exhibition of works by disabled artists, the application implements disability certification during registration using disability certificates and registration numbers, ensuring that only authenticated disabled artists can exhibit their works. The database storing personal information of disabled artists and information about art pieces is implemented using MySQL. The server module utilizes RestAPI to transmit data in Json format. To address the large data size of art piece information, it is stored using Firebase Storage, eliminating data size limitations on the server. This application can alleviate issues such as a lack of exhibition space for disabled artists and a lack of communication with the general public.

wow-UCAM: Unified Context-aware Application Model for Wearable Computing) (wear-UCAM : 착용형 컴퓨팅을 위한 정형화된 맥락 인식 응용 모형)

  • Hong, Dong-Pyo;Woo, Woon-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.105-113
    • /
    • 2006
  • In this paper we propose wear-UCAM, which is a toolkit for context-aware application model in wearable computing. As the rapid developments of mobile technologies and relevant technologies, the interests in wearable computer also become indispensible in both academic and industrial fields. However, there are few research activities on the application framework or toolkit for wearable computing. Hence, we suggest wear-UCAM as the development toolkit for wearable computing applications, where we focus on how to collect relevant user context, manage it, and provide services based on the recognized context. The proposed wear-UCAM includes the abstraction of context processing as well as independence among sensors and services with other components. For the sake of rapid prototyping of the proposed toolkit, we utilize PDA with wireless LAN as a wearable computer. The detail explanation of the implementation and its discussion are presented in this paper.

The Effectiveness of Jeju Island Mixed Reality Tourism Application: Focusing on the Moderating Role of Users' K-Culture Involvement

  • Yoo, Seungchul;Jung, Kwanghee;Nguyen, Vinh T.;Piscarac, Diana
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.116-128
    • /
    • 2020
  • In this study, we introduce a multi-modal mixed reality (MR) application for advertising the main touristic landmarks on Jeju Island, and evaluate its effectiveness based on the Technology Acceptance Model (TAM) with a focus on the user's involvement in Korean culture (K-Culture). Specifically, we deployed several stimuli to enable users to retrieve information, visualize a variety of heritage content such as text, images, videos, virtual artifacts, and immerse in a VR environment to experience the heritage locations. The results of the online survey with 436 participants showed that for consumers with low K-Culture involvement, Perceived Usefulness and Perceived Ease-of-Use did not affect their Intention to Visit the island. Still, it had a significant impact on their Intention to Use the application. On the other hand, for the group with high K-Culture involvement, Perceived Usefulness had no effect on the Intention to Use and Intention to Visit. However, Perceived Ease-of-Use had a significant impact on their Intention to Use the application and Intention to Visit Jeju Island. Therefore, when user involvement in K-Culture is high, convenience of use has played a significant role in sensory media usage and the intention to visit, regardless of the usefulness of the mixed reality content. In contrast, users with low K-Culture involvement primarily focused on the functional aspects of the application. These findings open the path for follow-up studies on K-Culture involvement and immersive media tourism marketing, which will benefit digital tourism marketing and Korea's tourism industry.

Design and Implementation of a Flexible Application Permission Management Scheme on Android Platform (안드로이드 플랫폼에서 유연한 응용프로그램 권한관리 기법 설계 및 구현)

  • Kim, Ik-Hwan;Kim, Tae-Hyoun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.151-156
    • /
    • 2011
  • Google Android, which is one of the popular smart phone platforms, employs a security model based on application permissions. This model intends to reduce security threats by protecting inappropriate accesses to system resources from applications, but this model has a few problems. First, permission requested by an application cannot be granted selectively. Second, once the permission has been granted it is maintained until the application is uninstalled. Third, applications may acquire powerful permissions through user ID sharing without any notice to users. In order to overcome these limitations, we designed and implemented a flexible application permission management scheme. The goal of our scheme is to enhance security and user convenience while keeping compatibility to original platform. We also verified the operation of our scheme with real applications on Android emulator.