• Title/Summary/Keyword: User Management System

Search Result 3,222, Processing Time 0.028 seconds

Implementation of App System for Personalized Health Information Recommendation (사용자 맞춤형 건강정보 추천 앱 구현)

  • Park, Seong-min;Park, Jeong-soo;Lee, Yoon-kyu;Chae, Woo-Joon;Shin, Moon-sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.316-318
    • /
    • 2019
  • Recently, healthy life has become an issue in an aging society, and the number of people who have been interested in continuous health care for better life is increasing. In this paper, we implemented a personalized recommendation systm to provide convenient healthcare management for user. The PHR (Personal Health Record) of user could be stored in the server along with health related information such as lifestyle, disease, and physical condition. The users could be classified into similar clusters according to the PHR profile in order to provide healthcare contents to the users who had similar PHR profile. K-Means clustering was applied to generate clusters based on PHR profile and ACDT(Ant Colony Decision Tree) algorithm was used to provide personalised recommendation of health information stored in knowledge base. The app system developed in this paper is useful for users to perform healthcare themselves by providing information on serious diseases and lifestyle habits to be improved according to the clusters classified by PHR profile.

  • PDF

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

Efficient Construction of Open Source-based Sewage Facility Database (오픈소스 기반의 하수 시설물 데이터베이스의 효율적 구축)

  • Ko, Jeongsang;Xu, Chunxu;Yun, Heecheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.5
    • /
    • pp.393-402
    • /
    • 2022
  • Effective data management of underground facilities is very important in terms of human life. For this, input of up-to-date and high-accuracy data should be preceded. Therefore, it is important to have an efficient data input method. In this study, by developing a sewage facility site survey program using open source software, paper drawings could be replaced with tablet PCs. By using a tablet PC, figures and property information acquired from the field are transmitted in real time through a database server. PostGIS query is developed to automate structured editing to minimize manual work in constructing a GIS (Geographic Information System) database for sewage facilities. did. In addition, the database was built using the sewage facility GIS database building program. As a result of comparing and analyzing the existing sewage facility database construction, work process, and work time, the work process was simplified and work time was shortened. In addition, through simple customization of open source software, it will be able to be used for field surveys and database construction in other fields.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

A Study on Project Information Integrated Management Measures Using Life Cycle Information in Road Construction Projects (도로건설사업의 생애주기별 정보를 이용한 건설사업정보 통합관리방안 연구)

  • Kim, Seong-Jin;Kim, Bum-Soo;Kim, Tae-Hak;Kim, Nam-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.208-216
    • /
    • 2019
  • Construction projects generate a massive amount of diverse information. It takes at least five years to more than 10 years to complete, so it is important to manage the information on a project's history, including processes and costs. Furthermore, it is necessary to determine if construction projects have been carried out according to the planned goals, and to convert a construction information management system (CALS) into a virtuous cycle. It is easy to ensure integrated information management in private construction projects because constructors can take care of the whole process (from planning to completion), whereas it is difficult for public construction projects because various agencies are involved in the projects. A CALS manages the project information of public road construction, but that information is managed according to CALS subsystems, resulting in disconnected information among the subsystems, and making it impossible to monitor integrated information. Thus, this study proposes integrated information management measures to ensure comprehensive management of the information generated during the construction life cycle. To that end, a CALS is improved by standardizing and integrating the system database, integrating the individually managed user information, and connecting the system with the Dbrain tool, which collectively builds artificial intelligence, to ensure information management based on the project budget.

COBie-based Building Information Exchange System Framework for Building Facility Management (건축물 유지관리를 위한 COBie기반 건축정보교환체계 프레임웍 연구)

  • Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.370-378
    • /
    • 2020
  • The Construction Operations Building Information Exchange (COBie) collects and documents a large amount of information from different paths in one place during design and construction projects. This documented information is readily available as a means of continuously transferring data to the facility management systems used by building engineers. In this process, the COBie Worksheet, an open standard form, is used to input the information by simplifying the list required by the user. As a result, COBie was developed to improve dramatically how relevant information is obtained and updated to support operations, maintenance, and asset management at the design and construction stages. On the other hand, to use COBie, a great deal of manual work is required for information linkage and quality inspection with heterogeneous data models. These issues become obstacles to COBie-based facility management system development. This study analyzed the COBie information system and defined the framework for simpler operating maintenance information from BIM (Building Information Modeling). Moreover, the rules for facility management information submission, quality inspection, role definition of framework components, and information linkage were derived. COBie DB schema and support data linkages could be generated effectively based on the proposed framework in prototype development.

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.

A Generalized Adaptive Deep Latent Factor Recommendation Model (일반화 적응 심층 잠재요인 추천모형)

  • Kim, Jeongha;Lee, Jipyeong;Jang, Seonghyun;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.249-263
    • /
    • 2023
  • Collaborative Filtering, a representative recommendation system methodology, consists of two approaches: neighbor methods and latent factor models. Among these, the latent factor model using matrix factorization decomposes the user-item interaction matrix into two lower-dimensional rectangular matrices, predicting the item's rating through the product of these matrices. Due to the factor vectors inferred from rating patterns capturing user and item characteristics, this method is superior in scalability, accuracy, and flexibility compared to neighbor-based methods. However, it has a fundamental drawback: the need to reflect the diversity of preferences of different individuals for items with no ratings. This limitation leads to repetitive and inaccurate recommendations. The Adaptive Deep Latent Factor Model (ADLFM) was developed to address this issue. This model adaptively learns the preferences for each item by using the item description, which provides a detailed summary and explanation of the item. ADLFM takes in item description as input, calculates latent vectors of the user and item, and presents a method that can reflect personal diversity using an attention score. However, due to the requirement of a dataset that includes item descriptions, the domain that can apply ADLFM is limited, resulting in generalization limitations. This study proposes a Generalized Adaptive Deep Latent Factor Recommendation Model, G-ADLFRM, to improve the limitations of ADLFM. Firstly, we use item ID, commonly used in recommendation systems, as input instead of the item description. Additionally, we apply improved deep learning model structures such as Self-Attention, Multi-head Attention, and Multi-Conv1D. We conducted experiments on various datasets with input and model structure changes. The results showed that when only the input was changed, MAE increased slightly compared to ADLFM due to accompanying information loss, resulting in decreased recommendation performance. However, the average learning speed per epoch significantly improved as the amount of information to be processed decreased. When both the input and the model structure were changed, the best-performing Multi-Conv1d structure showed similar performance to ADLFM, sufficiently counteracting the information loss caused by the input change. We conclude that G-ADLFRM is a new, lightweight, and generalizable model that maintains the performance of the existing ADLFM while enabling fast learning and inference.

The Mobile Voting Scheme Providing Voting Fairness Assured by Candidates (후보자들에 의한 선거의 공정성을 제공하는 모바일 투표 기법)

  • Yun, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.161-169
    • /
    • 2012
  • It requires a lot of costs and manpower to manage the election system. The electronic voting scheme is needed to make the election system to be economic and fair. Especially, wide spread use of smart phones and wireless networks makes the mobile voting is of major concern. In mobile voting scheme, a smart phone user can vote regardless of the places. In this paper, the mobile voting scheme is proposed where candidates can guarantee fairness of the election system. We analyze mobile voting requirements and create the mobile ID which has legal binding forces and PKI based digital signature keys. In the proposed scheme, a voter's ballot is signed by all candidates using undeniable multi-signature scheme. During the counting stage, the multi-signature on the ballot is not verified without help of all candidates.

A Study on Post-Occupancy Evaluation of Home Automation System at Digital Home (디지털 홈의 홈오토메이션 시스템에 대한 거주 후 평가에 관한 연구)

  • Kwon, Oh-Jung
    • Journal of Families and Better Life
    • /
    • v.26 no.6
    • /
    • pp.51-69
    • /
    • 2008
  • The purpose of this study was to identify the level of awareness, uses, and satisfaction on home automation systems by the digital home residents, to reveal the existing problems using home automation systems, and to clarify residents' positive or negative life changes after using home automation systems. Two apartment complexes, which were relatively well equipped with home automation systems compared to other recently built apartments, were selected to perform the survey by digital home residents who were housewives and have lived in current home more than 6 months. The researcher developed a survey questionnaire for each apartment complex and collected data from 501 residents from May to June, 2008. The results of the study found low awareness and low uses of remote control systems of electric appliances through a cellular phone or PC from outside. Also, the significant variables which showed group differences in level of uses and satisfation were age, annual income, duration of residence, and level of considering home automation system before decision to move in. The results of the study also revealed that frequent breakdown was the most critical problem using home automation systems. Generally, using home automation systems affected to residents' life changes positively. More findings and suggestions for development of more user-friendly digital home services were discussed.