• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.037 seconds

A Study Mode of Synchronous & Asynchronous for Multimedia Distance Education System (동기 및 비동기 겸용모드의 멀티미디어 원격교육 시스템 개발에 관한 연구)

  • Kim, Sang-Jin;Kim, Seok-Soo;Park, Gil-Cheol;Hwang, Dae-Joon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.2985-2995
    • /
    • 1997
  • In this paper, we proposed the "synchronous & asynchronous distance education system" which is able to interact among teachers and students for open education in cyberspace, and it is based telecommunication technology and multimedia technology. Specially, This system gets rid of the nufamiliarity and inconvenient feeling during the distance education. Also it supports the mediation of floor mode, for a group lecture and supports the synchronous mode for face-to-face effective and asynchronous mode for self-learning. The asynchronous mode has the down load function and the consultant mode (between teacher and student). The element technologies of this system consists of application sharing technique, whiteboard, various video window display, audio support, user interface, environment setup, session management, access control, network control and media control for collaborative distance education.

  • PDF

A Study on Analysis and Design of Metadata Model for Intelligent e-Learning System (지능형 학습 시스템을 위한 메타데이터 모형 분석 및 설계 연구)

  • Jang, Jin-Cheul;Hong, Seong-Yong;Yi, Mun-Yang
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.211-217
    • /
    • 2011
  • Recent IT (information technology) environmental changes, such as emerging social network services or increasing user participation in multimedia environment, have made it necessary for e-learning systems to undergo changes in various ways. Metadata is an agreement for interoperability between different systems. The standardization of metadata for e-learning system has been driven by some domestic and international organizations, but applying diverse environmental changes into the design of e-learning metadata is in dire need. In this paper, we present a methodology for the analysis and design of modeling e-learning metadata and elicit the design requirements, on the basis of the metadata standard KEM 3.0, about the elements that are expected to be needed in future e-learning systems. Based on the requirements from the analysis, we present the three-layer model for classifying the requirements by the importance of metadata elements per Kana Model. An intelligent e-learning system is to be developed based on the proposed modeling design, which we hope to influence the development of an international standard in the future.

  • PDF

Minimization of Security Policies in Database Security System applying Role-Based Access Control (역할기반 접근 제어를 적용한 데이터베이스 보안 시스템에서의 보안 정책 최소화)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1364-1370
    • /
    • 2005
  • There are many security models for database systems using policy-based access control. RBAC (Role-based Access Control) is used for complementing MAC (Mandatory Access Control) and DAC (Discretionary Access Control) and is for performing flexibly security policies meet applied environment. We implemented the database security system that applies DAC, MAC, and RBAC to meet security requirements of users. However, security policies are constructed redundantly whenever security policies are needed to each user in this system. Even though the proposed security system can flexibly control more complicated 'read' access to various data sizes for individual users, it is obvious that there is a possibility that a new policy can be a duplication of existing policies. In this paper, we introduce the problem of policy duplication and propose the policy management module. With this proposed module, constructed policies are checked for duplication and deleted or merged with existing policies.

How to Detect and Block Ransomware with File Extension Management in MacOS (MacOS에서 파일확장자 관리를 통한 랜섬웨어 탐지 및 차단 방법)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.251-258
    • /
    • 2017
  • Most malware, including Ransomware, is built for the Windows operating system. This is because it is more harmful to target an operating system with a high share. But in recent years, MacOS's operating system share has steadily increased. As people become more and more used, the number of malicious code running on the MacOS operating system is increasing. Ransomware has been known to Korea since 2015, and damage cases are gradually increasing. MacOS is no longer free from Ransomware, as Ransomware for MacOS was discovered in March 2016. In order to cope with future Ransomware, this paper used Ransomware's modified file extension to detect Ransomware. We have studied how to detect and block Ransomware processes by distinguishing between extensions changed by the user and extensions changed by the Ransomware process.

Applicability of Geo-spatial Processing Open Sources to Geographic Object-based Image Analysis (GEOBIA)

  • Lee, Ki-Won;Kang, Sang-Goo
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.3
    • /
    • pp.379-388
    • /
    • 2011
  • At present, GEOBIA (Geographic Object-based Image Analysis), heir of OBIA (Object-based Image Analysis), is regarded as an important methodology by object-oriented paradigm for remote sensing, dealing with geo-objects related to image segmentation and classification in the different view point of pixel-based processing. This also helps to directly link to GIS applications. Thus, GEOBIA software is on the booming. The main theme of this study is to look into the applicability of geo-spatial processing open source to GEOBIA. However, there is no few fully featured open source for GEOBIA which needs complicated schemes and algorithms, till It was carried out to implement a preliminary system for GEOBIA running an integrated and user-oriented environment. This work was performed by using various open sources such as OTB or PostgreSQL/PostGIS. Some points are different from the widely-used proprietary GEOBIA software. In this system, geo-objects are not file-based ones, but tightly linked with GIS layers in spatial database management system. The mean shift algorithm with parameters associated with spatial similarities or homogeneities is used for image segmentation. For classification process in this work, tree-based model of hierarchical network composing parent and child nodes is implemented by attribute join in the semi-automatic mode, unlike traditional image-based classification. Of course, this integrated GEOBIA system is on the progressing stage, and further works are necessary. It is expected that this approach helps to develop and to extend new applications such as urban mapping or change detection linked to GIS data sets using GEOBIA.

Effects on the System, Contents, and Service Quality of e-book User Purchase (전자책 이용자의 시스템, 콘텐츠 및 서비스 품질이 구매의도에 미치는 영향)

  • Na, Yun-Bin;Lee, Seoung-Ha;Myeong, You-Jin;Jo, Se-Ran
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.141-150
    • /
    • 2016
  • The e-book technology is developing day by day with the expansion of e-ink technology. However, consumers' complaint over contents which are relatively deficient compared to paper book, the issue of compatibility of file between bookstores is not improved as yet. This means that present e-book market needs study in the viewpoint of consumer who intend to accept requirement of market instead of viewpoint of technical development. Thus, this study intends to measure the quality of three main attributes such as system, contents and service based on IS Success Model which compose e-book to identify the influence on readers' purchase intention. Result, System quality is to device purchase intention, and Contents quality is to e-book pruchase intention, it showed a significant damaging effect on.

SoMA: A System of Making Avatars based on a Commercial Game Engine (SoMA: 상용 게임엔진 기반의 아바타 생성 시스템)

  • Kim, Byung-Cheol;Roh, Chang Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.373-380
    • /
    • 2017
  • We propose the SoMA(System of Making Avatars) based on a commercial 3D game engine. It first decomposes a given character into assemblable pieces, then gives the user them as prefab components so that he or she can reassemble and/or customize them to be plenty of characters. To accomplish this, it implements the character assembly structure as an hierarchy, the upper levels of which are categorized for gross assembly, and the lower levels of which are parameterized for detailed customization. It also defines a hierarchical naming convention for ease of access to the structure. Finally, it provides body, clothes, and attachment systems to make relevant characters.

Shot Type Detecting System using Face Detection (얼굴 검출을 이용한 숏 유형 감지 시스템)

  • Baek, Yeong-Tae;Park, Seung-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.49-56
    • /
    • 2012
  • In this paper, we propose the method that decides the shot types using face detection technique. The shot types, such as close-up shot, medium shot, and long shot, can be applied as useful information for understanding narrative structure of movies. The narrative structure of movie is builded by characters. Also their mental and emotional changes become inextricably bound up with them of narrative. The shot types are decided by distance between character and camera. If put together above them, shot types can be found by using detection technique of face size of characters and understand narrative of movie. To do this, we propose the methodology to detect shot type by face detecting and implement the system to do it. Additionally, we evaluate the performance of the system. The implementation system has been evaluated as 95% for close-up shot detection and 90% for medium shot detection, while 53.3% is just detected for long shots.

Mapping Tool for Semantic Interoperability of Clinical Terms (임상용어의 의미적 상호운영성을 위한 매핑 도구)

  • Lee, In-Keun;Hong, Sung-Jung;Cho, Hune;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.167-173
    • /
    • 2011
  • Most of the terminologies used in medical domain is not intended to be applied directly in clinical setting but is developed to integrate the terms by defining the reference terminology or concept relations between the terms. Therefore, it is needed to develop the subsets of the terminology which classify categories properly for the purpose of use and extract and organize terms with high utility based on the classified categories in order to utilize the clinical terms conveniently as well as efficiently. Moreover, it is also necessary to develop and upgrade the terminology constantly to meet user's new demand by changing or correcting the system. This study has developed a mapping tool that allows accurate expression and interpretation of clinical terms used for medical records in electronic medical records system and can furthermore secure semantic interoperability among the terms used in the medical information model and generate common terms as well. The system is designed to execute both 1:1 and N:M mapping between the concepts of terms at a time and search for and compare various terms at a time, too. Also, in order to enhance work consistency and work reliability between the task performers, it allows work in parallel and the observation of work processes. Since it is developed with Java, it adds new terms in the form of plug-in to be used. It also reinforce database access security with Remote Method Invocation (RMI). This research still has tasks to be done such as complementing and refining and also establishing management procedures for registered data. However, it will be effectively used to reduce the time and expenses to generate terms in each of the medical institutions and improve the quality of medicine by providing consistent concepts and representative terms for the terminologies used for medical records and inducing proper selection of the terms according to their meaning.

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.