• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.036 seconds

A Study on the Smart Elderly Support System in response to the New Virus Disease (신종 바이러스에 대응하는 스마트 고령자지원 시스템의 연구)

  • Myeon-Gyun Cho
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.175-185
    • /
    • 2023
  • Recently, novel viral infections such as COVID-19 have spread and pose a serious public health problem. In particular, these diseases have a fatal effect on the elderly, threatening life and causing serious social and economic losses. Accordingly, applications such as telemedicine, healthcare, and disease prevention using the Internet of Things (IoT) and artificial intelligence (AI) have been introduced in many industries to improve disease detection, monitoring, and quarantine performance. However, since existing technologies are not applied quickly and comprehensively to the sudden emergence of infectious diseases, they have not been able to prevent large-scale infection and the nationwide spread of infectious diseases in society. Therefore, in this paper, we try to predict the spread of infection by collecting various infection information with regional limitations through a virus disease information collector and performing AI analysis and severity matching through an AI broker. Finally, through the Korea Centers for Disease Control and Prevention, danger alerts are issued to the elderly, messages are sent to block the spread, and information on evacuation from infected areas is quickly provided. A realistic elderly support system compares the location information of the elderly with the information of the infected area and provides an intuitive danger area (infected area) avoidance function with an augmented reality-based smartphone application. When the elderly visit an infected area is confirmed, quarantine management services are provided automatically. In the future, the proposed system can be used as a method of preventing a crushing accident due to sudden crowd concentration in advance by identifying the location-based user density.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

EDMS and Life-cycle of Records (EDMS와 기록물의 라이프사이클)

  • Kim, Ik-han
    • The Korean Journal of Archival Studies
    • /
    • no.5
    • /
    • pp.3-37
    • /
    • 2002
  • Today the market of EDMS is esteemed more than 100 billions won. It signifies a comming of age of electronic records. The traditional archival theories which are based on the paper records are confronted with a new challenge. In some leading countries of archival studies reorientation of archives management has been tried by a number of distinguished specialists such as Bearman and Hedstrom since 10 years. As a consequence new paradigm of archival theories has been developed. Also in Korea this new paradigm has been introduced by some expert such as Lee, Sang-Min, Sul, Moon-won, Lee, Seung-Eok. However their arguments are too general to offer a concrete clue for new paradigm. Faced by new age of electronic records, it's important to start a discussion for the reasonable methods of electronic records management at once. The most drastically changed part of record management by the electronic technique is the life-cycle of records. The commonly practiced three-stage life-cycle is to be reduced to the two-stage life-cycle, and the concept of the spatial movement of records is to be changed. It can be also pointed that the public emerges as user from the early creating stage of records beyond time and space. Thus is can be said that the method of the management features dynamic and cohesive. The method of appraisal must be also changed and reproduced, so that it can reflect the various levels considering dynamics of the electronic records. Supposedly it will be a core factor that causes the change of methodology in records management with the change of life-cycle theory. It must be noted that various subjects would be involved in the work of classification and description over time and space and that feedback between them is of important. Description also tends to be made at the crating stage of records and structured dynamically. It results from the change of life-cycle and the introduction of the concept of continuum. Such trend allows us to start discussions on the assumption that description of both creator and archival professionals act together an important role. Of course, it is linked with the methodology in which most descriptions are made automatically at the early drafting stage of the structure. The meat date is formed on the assumption that there should be feedback between areas of automatic description, description of creators and archival professionals. The most important thing in description is to develop a suitable way how it is structured. An alternative must be offered for managing data set. As iweb that is being operated by Myongji university shows, records created in daily business are managed not as electronic records but as date base. This is because they exist outside the repository in the EDMS system. Since data set often has various sources, an alternative for classification needs to be developed. It is now likely that database is filed according to the created year to be transferred automatically to the repository. Over a long-term the total management of database, electronic records and electronic information will be a topic. A right direction of new paradigm will be found for both iweb and E-government, when practice and studies of theories are combined and interacted.

Advisable Direction of Sensitivity-Quality Factors on Railroad Sector (철도분야의 감성품질 요소 정립방향)

  • Song, Min-Ho;Park, Jae-Hyun;Kwon, Sun-Bak;Song, Yong-Su
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2250-2255
    • /
    • 2011
  • There has been a growing interest toward railroad conjunction with opening of high-speed rail in 2004 and concurrent implementation of nation's green growth policies. Meanwhile, users' expectation on service of public transportation, especially railroad has been growing than since ever due to heightened quality of life, entering aging society, voice of equity for minorities, and greater interest in environments of communities. In order to come up with the expectations, actual improvements for user's convenience/comfort and its assessment strategies in terms of service quality level are necessary. This study defines the index of this aspect of service level as 'Sensitivity Quality'. This is conceived as one of the important factors to define travel cost as do the travel time and fare, but hardly taken into consideration when assessing a transportation system or policy-making for a transportation project. The elements included for the assessment of the sensitivity quality in this study are feeling of a ride, conformability and convenience what users feel and recognize using a train. This paper suggests that establishing sensitivity quality elements would contribute in foundation of assessing service quality and provide improved public transportation services through their scientific and objective development and management.

  • PDF

Energy Efficiency for Building Security Application of Adaptive Error Control and Adaptive Modulation (빌딩 보안 어플리케이션의 적응 오류제어와 적응 변조의 에너지 효율에 관한 연구)

  • Long, Bora;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.423-429
    • /
    • 2007
  • Since the wireless smart card has played a main role in the identification security application for the building access; this research has its purpose to improve the performance of the smart card system and aims to offer more convenient to user. The contactless cards do not require insertion into a card reader and can work up to centimeters away from the reading device. To be able to cope with this performance the controlling of power consumption through the adaptive modulation and error control is needed. This paper addresses a forward error control (FEC) scheme with the adaptive Reed-Solomon code rate and an M-ary frequency shift keying (M-FSK) modulation scheme with the varying symbol size M over the link. The result of comparing energy efficiencies of adaptive error correction and adaptive modulation to other various static schemes shows to save over 50% of the energy consumption.

  • PDF

A New Collaborative Filtering Method for Movie Recommendation Using Genre Interest (영화 추천을 위한 장르 흥미도를 이용한 새로운 협력 필터링 방식)

  • Lee, Soojung
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.329-335
    • /
    • 2014
  • Collaborative filtering has been popular in commercial recommender systems, as it successfully implements social behavior of customers by suggesting items that might fit to the interests of a user. So far, most common method to find proper items for recommendation is by searching for similar users and consulting their ratings. This paper suggests a new similarity measure for movie recommendation that is based on genre interest, instead of differences between ratings made by two users as in previous similarity measures. From extensive experiments, the proposed measure is proved to perform significantly better than classic similarity measures in terms of both prediction and recommendation qualities.

A Study on the Evaluation of Energy Consumption of the Air Compressor (공기압축기 소비에너지 평가에 관한 연구)

  • Jang, Ji Seong
    • Journal of Drive and Control
    • /
    • v.17 no.2
    • /
    • pp.38-44
    • /
    • 2020
  • Various efforts have been initiated to reduce the energy consumption of the compressor as it is one of the approaches to saving a large portion of the fixed cost of the production site. Various results of reducing the energy consumption of the compressor have been reported, but to reduce the energy consumption of the compressors fundamentally, regular management of the compressor should ensure optimum operation. This requires periodic on-site visits by experts, but is often overlooked as a cost issue, resulting in the use of the compressor in low-efficiency conditions. Thus, it is necessary to develop a low-cost evaluation technology for compressor condition monitoring and efficiency analysis to ensure that the compressor is always driven at the optimum efficiency without imposing undue burden on the compressor user. In this study, a sensor was installed at the inlet, outlet, and power supply of the compressor, and a method for evaluating the energy consumption of the compressor using the minimum sensor was derived. The experimental results are presented to show the validity of the proposed method. It was confirmed that the energy consumption of the compressor can be easily as well as efficiently evaluated by using the method developed in this study.

The Comparative Study of Software Optimal Release Time Based on Extreme Distribution Property (극값분포 특성에 근거한 소프트웨어 최적 방출시기에 관한 비교)

  • Kim, Hee-Cheul
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.43-48
    • /
    • 2011
  • Decision problem called an optimal release policies, after testing a software system in development phase and transfer it to the user, is studied. The infinite failure non-homogeneous Poisson process models presented and propose an optimal release policies of the life distribution applied extreme distribution which used to find the minimum (or the maximum) of a number of samples of various distributions. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, extreme value distribution as another alternative of existing the Poisson execution time model and the log power model can be verified using inter-failure time data.

Management System for Parking Free Space based on Open CV (Open CV를 기반으로 한 주차 여유 공간 관리 시스템)

  • Nam, Eun-Joo;An, Deouk-Kyi;Seo, You-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • This paper introduces the parking guide service developed to address the inconvenience of parking in areas where demand for parking spaces is high, such as busy streets and tourist attractions. Due to difficulties in measuring and developing the actual parking lot while driving the car, we created a temporary parking lot and created Arduino RC Car to replace the actual car. Video processing based on Open CV allows users to identify the entire parking lot, parking space, and completed parking space, and track moving cars, and this information has been developed to enable users to see through the application. The application allows the user to book the desired parking space and introduce a way-finding algorithm to guide them through the optimal path to the selected parking compartment.

Authorship Attribution of Web Texts with Korean Language Applying Deep Learning Method (딥러닝을 활용한 웹 텍스트 저자의 남녀 구분 및 연령 판별 : SNS 사용자를 중심으로)

  • Park, Chan Yub;Jang, In Ho;Lee, Zoon Ky
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.147-155
    • /
    • 2016
  • According to rapid development of technology, web text is growing explosively and attracting many fields as substitution for survey. The user of Facebook is reaching up to 113 million people per month, Twitter is used in various institution or company as a behavioral analysis tool. However, many research has focused on meaning of the text itself. And there is a lack of study for text's creation subject. Therefore, this research consists of sex/age text classification with by using 20,187 Facebook users' posts that reveal the sex and age of the writer. This research utilized Convolution Neural Networks, a type of deep learning algorithms which came into the spotlight as a recent image classifier in web text analyzing. The following result assured with 92% of accuracy for possibility as a text classifier. Also, this research was minimizing the Korean morpheme analysis and it was conducted using a Korean web text to Authorship Attribution. Based on these feature, this study can develop users' multiple capacity such as web text management information resource for worker, non-grammatical analyzing system for researchers. Thus, this study proposes a new method for web text analysis.