• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

Fault Detection System Using Spatial Index Structure (공간자료구조를 활용한 단층인식 시스템)

  • Bang, Kap-San
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1205-1208
    • /
    • 2005
  • By adding user interface to the usual router, an improved functional router is implemented in this paper. Due to the massive amount of spatial data processing, spatial information processing area has been rapidly grown up in recent years based on powerful computer hardware and software development. Spatial index structures are the core engine of geographic information system(GIS). Analyzing and processing of spatial information using GIS has a lot of applications and the number application will be increased in the future. However, study on the under ground is in its infancy due to invisible characteristic of this information. This paper proposes the sub-surface fault detection system using the sub-surface layer information gathered from elastic wave. Detection of sub-surface fault provides very important information to the safety of above and sub-surface man made structures. Development of sub-surface fault detection system will serve as a pre-processing system assisting the interpretation of the geologist.

  • PDF

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

AI Chatbot Providing Real-Time Public Transportation and Route Information

  • Lee, So Young;Kim, Hye Min;Lee, Si Hyun;Ha, Jung Hyun;Lee, Soowon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.9-17
    • /
    • 2019
  • As the artificial intelligence technology has developed recently, researches on chatbots that provide information and contents desired by users through an interactive interface have become active. Since chatbots require a variety of natural language processing technology and domain knowledge including typos and slang, it is currently limited to develop chatbots that can carry on daily conversations in a general-purpose domain. In this study, we propose an artificial intelligence chatbot that can provide real-time public traffic information and route information. The proposed chatbot has an advantage that it can understand the intention and requirements of the user through the conversation on the messenger platform without map application.

Ontology-based Sensor Network Information Sharing

  • Lee, Jiapei;Lee, Hyun-chang;LIU, Xiao-wen;Yan, xuebo;Jin, Chan-Yong;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.375-378
    • /
    • 2016
  • The difficulty of "information sharing", "information reusing" issues happening in Wireless Sensor Network is due to the heterogeneity of the application environment, data processing, communication protocol etc. Based on the introduction of the Ontology theory, though analyzing the sensor characteristic a general type of sensor ontology contains the definition of concept, frame structure and OWL design was proposed from the standpoint of sensor observation. The paper expounded a system framework of the domain ontology through the expansion of knowledge base on the general sensor could achieve the information sharing and reuse by semantic communication between the general sensor ontology and user. The research of this method would bring new idea to the semantic sensor network construction.

  • PDF

Integrated Application Strategies for Natural Disaster Information (자연재해정보의 통합적 활용방안 연구)

  • Yeon, Young-Kwang;Han, Jong-Gyu;Chi, Kwang-Hoon;Ryu, Kun-Ho
    • Economic and Environmental Geology
    • /
    • v.40 no.6
    • /
    • pp.785-795
    • /
    • 2007
  • Recently, the knowledge and use of information production and service in integrated information has been changing from intra-organizational to inter-organizational and even international. In particular, since natural disasters are complexly related, it is increasingly important to use integrated information from related areas in the reduction and prevention of such events. In this study, we suggest strategies for the use of integrated information from natural disasters based on that expanding need. This study analyzes information user surveys, the interrelated information technologies, trends, and case studies to determine user access to the information, the status of the information used, and the supply and distribution of that information. From the survey results, we can draw conclusions about the effectiveness of the strategies of integrated information used in domestic natural disaster information.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Design and implementation of information offering application for the handicapped and the volunteer (장애우 및 자원봉사자를 위한 정보 제공 애플리케이션의 설계 및 구현)

  • Kim, Dae-il;Yang, Hyun-tae;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.542-544
    • /
    • 2014
  • The handicapped are so desperate for other's help, but it is not enough. The number of social workers who offers help for the handicapped has annually increased, it is still not enough of these compared to the number of the handicapped. And then volunteers are needed information to service about welfare centers and the procedure. In this paper, we developed offering help and information of welfare android application for the handicapped of the vulnerable class of the society. This application was developed for the handicapped who are in need of help and the volunteers who want to help the handicapped. It basically displays position of welfare centers surrounding user on Google map. The handicapped who needs help of another indicates their current position with messages, the handicapped positions are displayed for volunteers. In addition, we developed bulletin board to be transaction and swapping for assisting device information.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.

A Research on Personal Environment Services for a Smart Home Network (스마트 홈 네트워크를 위한 개인환경서비스 연구)

  • Ro, Kwang-Hyun;Kim, Seung-Cheon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.46-55
    • /
    • 2012
  • Recently, the concept of PES(Personal Environment Service) is being widely discussed on various standardization organizations such as ITU-R, ETSI, 3GPP, TTA and etc. The purpose of PES is to introduce the services which can dynamically, automatically and intelligently reconfigures the electronic, electrical, and mechanical equipment surrounding the user according to the user preferences included in a user's profile by using a smartphone embedding WPAN radio technologies such as bluetooth and WiFi. This research introduces an Android Platform-based PES system which consists of a PES app, PES devices and a PES server. A smartphone platform is Android 2.2(Froyo) version and 4 simulated PES devices were implemented by using Galaxy Tab. It has shown that the PES would be a killer application of M2M(Machine-to-Machine) or D2D(Device-to-Device) in the future and it would need to study how to update a user's profile based on analyzing user's behaviour for enhancing the PES user's satisfaction.