• Title/Summary/Keyword: User Tracking

Search Result 600, Processing Time 0.029 seconds

Pre-processing Scheme for Indoor Precision Tracking Based on Beacon (비콘 기반 실내 정밀 트래킹을 위한 전처리 기법)

  • Hwang, Yu Min;Jung, Jun Hee;Shim, Issac;Kim, Tae Woo;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.58-62
    • /
    • 2016
  • In this paper, we propose a pre-processing scheme for improving indoor positioning accuracy in impulsive noise channel environments. The impulsive noise can be generated by multi-path fading effects by complicated indoor structures or interference environments, which causes an increase in demodulation error probability. The proposed pre-processing scheme is performed before a triangulation method to calculate user's position, and providing reliable input data demodulated from a received signal to the triangulation method. Therefore, we studied and proposed an adaptive threshold function for mitigation of the impulsive noise based on wavelet denoising. Through results of computer simulations for the proposed scheme, we confirmed that Bit Error Rate and Signal-to-Noise Ratio performance is improved compared to conventional schemes.

Usability Study through Project-based and Participatory Learning - Focused on Usability Improvement of Pointing Task using Wiimote - (과제 중심 및 참여학습을 통한 사용성 연구 사례 - Wiimote를 이용한 포인팅 작업의 사용성 개선을 중심으로 -)

  • Kim, Hye-Sun;Jung, Kwang-Tae
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.4 no.1
    • /
    • pp.22-29
    • /
    • 2012
  • Students have to effectively get lots of knowledge and technique for practical education. Usability is one of the most important factors that have to be considered for user-centered design. Students who study design have to recognize the importance of usability and learn the method of problem solving considering usability. For this, the application of project-based and participatory learning for usability education was studied. Study team was organized including graduate, undergraduate, and high school students. Students team identified a research topic, and then studied the topic. Usability evaluation and design improvement was performed in this study. Students could learn usablity evaluation method and design method through the process.

  • PDF

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Proposal of Emotion Recognition Mobile Application to Improve Depression in Young People (청년층의 우울증 개선을 위한 감정 인식 모바일 애플리케이션 제안)

  • Park, Jaewan;Choi, Bokgiu;Lee, Sangwon;Lee, Hyunju
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.594-606
    • /
    • 2020
  • On the contrary to the steady rise of social problems about depression, only a few take care of mental health themselves due to their negative perception of psychotherapy. In this study, we propose service design and user interface design of mobile applications that introduce an automatic emotional recognition system to prevent leaving depression unattended. First, we have come up with improvements in the usability of existing apps through literature research and case analysis, and draw out Personas from surveys and in-depth interviews of young people. As an essential element of the design of the Depression Improvement Service, we recommend having three components: writing a diary to manage schedule, recognize users' emotional state through avatar management, and tracking down emotional points to improve the cognitive system. Through this proposal, we want to prevent the development of depression and help to resolve the changes in perception of depression and longitude depression on our own. Ultimately, we publicize the necessity of mental health care application design and expect to lower the personal and social costs for psychiatric care.

The Implementation of Interconnection Modeling between Learning Management System(LMS) (학습관리시스템(LMS)간 상호 연동 모델 구현)

  • Nam, Yun-Seong;Yang, Dong-Il;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.640-645
    • /
    • 2011
  • The educational exchange through e-learning is working very well in such case as develop e-learning, development of various learning tools, cooperative practical use of e-learning contents, etc. However because there were no considerations of LMS(Learning Management System) interconnection when each systems were developed, the exchange through e-learning is starting to raise a problem. Hence in this thesis, this paper presents designed model about efficient LMS interconnection through analysis case of exchange through e-learning and deduce problem. In the first place essential part for is defied study such as lecture establishment data, lecture data, user data, class data, student learning tracking to interconnection data, then constituted data interconnection table used view by data interconnection process. By experiment result, the accessibility between students and professors was more convenience, and decreased work process by less data exchange. Henceforth there are researches in development of various essential parts for study, considered security of LMS interconnection.

The Characteristics of UV Generation and Aging Materials in According to Surface Discharge (연면방전에 의한 폴리머애자의 자외선 발생과 열화특성)

  • Shong, Kil-Mok;Bang, Sun-Bae;Kim, Chong-Min;Kim, Young-Seok;Jung, Jin-Su
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.9
    • /
    • pp.1606-1611
    • /
    • 2008
  • Recently, The diagnosis techniques of electric facilities are developed on live line. This paper describes the discharge characteristics of polymer insulator(EPDM A type). Keeping the facilities in good working order, the goal of this paper will provide the information to enable user to easily judge conditions of facilities on the spot. The performance of polymer insulator is assessed from the KS C IEC 60270 and CEA LWIWG-01(96)(Tracking Wheel Test). As the results, UV generation patterns of polymer insulator grow like a jellyfish shape follow the ramping voltage. Discharging UVs are detected at about 31.25% of breakdown voltage. Just then, dimension of UV image is about $0.84cm^{2}$. The dimension of max. UV image is about $297.4cm^{2}$ at $160kV(V_{bd})$. The position of UV generation due to surface discharge of polymer insulator is the center of insulator in the early, then moved the ground side and the last, UV image moved through the junction part of source side. Surface of aged polymer insulator is cracked and faded due to arc. UV absorption spectrum of polymer insulator are appeared the C-H bond of scissoring vib. at $1014cm^{-1}$ and C=O bond of recombination structure. Also, recombined UV absorption peak such as C-H, N-H, and O-H is detected at the $3321cm^{-1}$. Through the paper, there are inspection data which are the relations between surface discharge of polymer insulator and UV detecting image.

The feature of scanning path algorithm shown at natural visual search activities of space user (공간사용자의 본능적 시선탐색활동에 나타난 주사경로 알고리즘 특성)

  • Kim, Jong-Ha;Kim, Ju-Yeon
    • Science of Emotion and Sensibility
    • /
    • v.17 no.2
    • /
    • pp.111-122
    • /
    • 2014
  • This study has analyzed the scanning path algorithm shown at the process of exploring spatial information through an observation experiment with the object of lobby in subway station. In the estimation of observation time by section, the frequency of scanning type was found to increase as the observation time got longer, which makes it possible that the longer the observation lasts the more the observation interruptions occur. In addition, the observation slipped out of the range of imaging when any fatigue was caused from the observation or the more active exploration took place. Furthermore, when the trend line was employed for the examination of the changes to the scanning type by time section, "concentration" "diagonal or vertical" showed a sharp and a gentle increases along with the increase of time section respectively, while "circulation. combination, horizontal" showed a reduction. The observation data of the subjects observing a space include various visual information. The analysis of the scanning type found at "attention concentration" enabled to draw this significant conclusion. The features of increase and decrease of scanning types can be a fundamental data for understanding the scanning tendency by time.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.