• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.037 seconds

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries

  • Porcel, Carlos;Ching-Lopez, Alberto;Bernabe-Moreno, Juan;Tejeda-Lorente, Alvaro;Herrera-Viedma, Enrique
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.653-667
    • /
    • 2017
  • The significant advances in information and communication technologies are changing the process of how information is accessed. The internet is a very important source of information and it influences the development of other media. Furthermore, the growth of digital content is a big problem for academic digital libraries, so that similar tools can be applied in this scope to provide users with access to the information. Given the importance of this, we have reviewed and analyzed several proposals that improve the processes of disseminating information in these university digital libraries and that promote access to information of interest. These proposals manage to adapt a user's access to information according to his or her needs and preferences. As seen in the literature one of the techniques with the best results, is the application of recommender systems. These are tools whose objective is to evaluate and filter the vast amount of digital information that is accessible online in order to help users in their processes of accessing information. In particular, we are focused on the analysis of the fuzzy linguistic recommender systems (i.e., recommender systems that use fuzzy linguistic modeling tools to manage the user's preferences and the uncertainty of the system in a qualitative way). Thus, in this work, we analyzed some proposals based on fuzzy linguistic recommender systems to help researchers, students, and teachers access resources of interest and thus, improve and complement the services provided by academic digital libraries.

A Study on Providing Information on Customized Styling Using an Android Application (안드로이드 앱을 이용한 맞춤형 스타일링 정보제공 연구)

  • Park, Sangil;Seo, Kyeongwon;Kim, Minsuk;Koo, Minjeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.35-40
    • /
    • 2016
  • This study is about developing an Android application that provides information on customized styling and the app was made to offer assistance in coordinating users' clothing. It keeps the record on clothing items users wore and uses it as coordination information, and prepares styling by referring to user-specific clothing management data. The photos can taken during shopping or can be taken from smart phone gallery, and the images searched through Daum OpenAPI can be saves in the app. Using the saved photos of items and clothes that were previously worn, the app provides styling recommendations.

Road Centerline Tracking From High Resolution Satellite Imagery By Least Squares Templates Matching

  • Park, Seung-Ran;Kim, Tae-Jung;Jeong, Soo;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.34-39
    • /
    • 2002
  • Road information is very important for topographic mapping, transportation application, urban planning and other related application fields. Therefore, automatic detection of road networks from spatial imagery, such as aerial photos and satellite imagery can play a central role in road information acquisition. In this paper, we use least squares correlation matching alone for road center tracking and show that it works. We assumed that (bright) road centerlines would be visible in the image. We further assumed that within a same road segment, there would be only small differences in brightness values. This algorithm works by defining a template around a user-given input point, which shall lie on a road centerline, and then by matching the template against the image along the orientation of the road under consideration. Once matching succeeds, new match proceeds by shifting a matched target window further along road orientation at the target window. By repeating the process above, we obtain a series of points, which lie on a road centerline successively. A 1m resolution IKONOS images over Seoul and Daejeon were used for tests. The results showed that this algorithm could extract road centerlines in any orientation and help in fast and exact he ad-up digitization/vectorization of cartographic images.

  • PDF

A Study on the Ship Cargo Hold Structure Data Model Based on STEP (STEP을 근거로 한 선체화물창부 구조 데이터 모델에 관한 연구)

  • 박광필;이규열;조두연
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.381-390
    • /
    • 1999
  • In this study, a pseudo ship structure data model for the :.hip cargo hold structure based on STEP is proposed. The proposed data model is based on Application Reference Model of AP218 Ship Structure which is the model that specifies conceptual structures and constraints used to describe the information requirements of an application. And the proposeddata model refers the Ship Common Model framework for the model architecture which is the basis for ongoing ship AP development within the ISO ship-building group and the ship product definition information model of CSDP research project for analyzing the relationship between ship structure model entities. The proposed data model includes Space, Compartment. Ship Structural System, Structural Part and Structural Feature of cargo hold. To generate this data model schema in EXPRESS format, ‘GX-Converter’was used which enables user to edit a model in EXPRESS format and convert schema file in EXPRESS format. Using this model schema, STEP physical file containing design data for ship cargo hold data structure was generated through SDAI programming. The another STEP physical file was also generated containing geometry data of ship cargo hold which was extracted and calculated by SDAI and external surface/surface intersection program. The geometry information of ship cargo hold can be then transferred to commercial CAD system, for example, Pro/Engineer. Examples of the modification of the design information are also Presented.

  • PDF

A study on module of biometric information binary using QRcode (QRcode를 이용한 생체정보 바이너리 모듈 연구)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lim, Il-Kown;Lee, Jae-Gwang;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.431-434
    • /
    • 2012
  • The network traffic increases due to the web service and mobile application use while the smart device user increases rapidly. This paper presented the QRcode application as network data loss problem in the u-Health mobile environment and encryption module alternative. Therefore, the bio-information of the patient was collected and QRcode was produced in the PC based. In addition, the rate of reading recognized in the polution and damage was confirmed. The data traffic loss ratio using the network performance measurement equipment was tested.

  • PDF

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

BMT-Model Based Evaluation of Power Consumption of Mobile Context-Aware Application (BMT 모델 기반 모바일 상황인지 어플리케이션의 전력 소비 평가)

  • Jeon, Jaehong;Baek, Dusan;Kim, Kyung-Ah;Lee, Jung-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.411-418
    • /
    • 2016
  • Context-aware application has a lot of power consumption because it creates context by using a number of smartphone's sensors. Furthermore, only few kinds of researches have been conducted that provide information for the evaluation result of power consumption in the aspect of applications. In addition, evaluation of power consumption do not consider user's usage pattern or provide only total amount of power consumption, and inform developers power consumption of sensors undistinguishable. It makes developers hard to develop a power consumption-considered application. If developers could get information for power consumption of context-aware application in detail, a development of power-considered context-aware applications would be possible. Consequently, this paper proposes a BMT(Bench Mark Test) model which is able to inform developers useful evaluation criteria and result about power consumption of smartphone's components and sensors with usage pattern considered.

TPEG based RFID application service for terrestrial-DMB (지상파DMB를 위한 TPEG 기반 RFID 응용서비스)

  • Kim Hyun-Gon;Jeong Yong-Ho;Ahn Chung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.14-24
    • /
    • 2006
  • The terrestrial-DMB (T-DMB) provides one-way broadcasting service in intial phase and two-way interactive data services through a return channel of mobile communications network are commercialized recently. The possible evolution of the T-DMB will be fully convergence between the T-DMB and other communication services such as telematics, RFID and so on. From this evolution point of view, a framework should be defined for supporting telematics and RFID applications on T-BMB platform. In this paper, we propose an integrated service model that could support RFID application services on the interactive T-DMB. To realize the model, we design a service scenario, a network reference model, functionalities of each entity, a data transmission mechanism messages, and coding rules. The service model could allow users to support the identical RFID application services over the T-DMB network even if T-DMB terminal doesn't have RFID reader capability. In addition, in the case for providing the interactive TTI(Traffic and Travel Information)service, users could utilize the current location based RFID application service using by the TPEG-Location application that forms the basis of user location referencing. The messages structure is designed by following TPEG standardization

Proposal of Muscular Strength Improvement Application Design for the Elderly : Focusing on the Case of S city (노인층의 근력향상 애플리케이션을 위한 디자인 제안 : S시 사례를 중심으로)

  • Cho, Yeong Ran;Choi, Min Joo;Paik, Jin Kyung
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.7
    • /
    • pp.953-963
    • /
    • 2022
  • We suggest the development of a mobile muscular savings account application as a more effective and consistent strategy to avoid sarcopenia, one of the elderly diseases, based on the researcher's experience conducting a handwritten 'muscle saving account' in the S city of the metropolitan area. The analysis of currently existent healthcare-related applications shows that muscle strength improvement and maintenance applications are needed to improve easy use and access without burden for elderly users because there are many functions, and it can be difficult for the elderly to use the application. A survey of participants who used handwritten 'muscle savings accounts' was conducted before the design development to measure user satisfaction. Based on this, the suggested application's design is similar to the handwritten type, functionalities are modified for easy usage by the elderly, and information is intuitively comprehended and presented properly using color contrast and Sans serif font. We plan to conduct a survey of the elderly who did not participate in the project as part of follow-up research, and afterward continue the research on the development of customized applications optimized for the prevention of sarcopenia in the elderly for muscle strength improvement and maintenance based on the results.

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.