• Title/Summary/Keyword: User convenience

Search Result 1,297, Processing Time 0.03 seconds

Data processing techniques applying data mining based on enterprise cloud computing (데이터 마이닝을 적용한 기업형 클라우드 컴퓨팅 기반 데이터 처리 기법)

  • Kang, In-Seong;Kim, Tae-Ho;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2011
  • Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.

Satisfaction Factors and Determinants of Visitors in Taeanhaean National Park, Korea (태안해안국립공원 탐방객 만족요인 및 예측모형)

  • Baek, Jae-Bong;Kim, Dong-Pil
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.2
    • /
    • pp.101-107
    • /
    • 2010
  • This study was carried out to provide basic data for efficient park management by analysing visitors' satisfaction factors and estimated regression model through questionnaire survey method at Taeanhaean National Park in Korea. Performance(satisfaction) variables as 'touting', 'illegal merchant', 'noise', 'indiscreet use' and 'collection of natural plants or animals', and Importance variables as 'littering problem', 'water pollution act', 'careless cooking' and 'exorbitant pay' were relatively high score. It was clarified that the 'souvenir & special product', 'lack of use program' 'lack of public facility', 'lack of information facility', and 'lack of commercial facility' were 'concentrate here' ones by the Importance-Performance analysis. 'Facility management', 'Use management' and 'Resource management' factors were found out by Factor Analysis and the 'Facility management' was the biggest factor accounting for 32.6% of all. In the estimated model by Multiple Regression Analysis, 'lack of employee's guidance or kindness', 'lack of convenience facility', 'noise', 'lack of facilities to stay' and 'charge of user fee, parking fee' were the variables to impact visitors' satisfaction and to need concentrated management. These results were unique characteristics of marine national park and then the different management strategy and policy from mountain national park were necessary.

Study on the Urethane Restoration Filling Material and Adhesive for Stone Cultural Heritage (석조문화재 복원용 우레탄 메움제 및 접착제에 관한 연구)

  • Han, Won-Sik;Lee, Ho-Youn;Park, Gi-Jung;Hong, Tae-Kee;Wi, Koang-Chul
    • Journal of Conservation Science
    • /
    • v.27 no.1
    • /
    • pp.115-121
    • /
    • 2011
  • A Urethane resin restoration material was made to be used in the restoration of stone cultural assets. The Urethane resin restoration material showed strong adhesive strength and tensile strength similar to epoxy recovery material, which had been mainly used for the recovery of stone cultural assets. The sealing property, anti-shrinking property and paint-ability of Urethane resin restoration material are also similar to existing epoxy system restoration materials. Especially, this Urethane resin restration material is expected to give permanence and continuous stability in the restoration of cultural assets made in stone by resolving the two big issues of existing epoxy recovery material, which are 'yellowing' and 'ir-reversibility'. This Urethane resin restration material had been directly applied as a filling material and adhesive and it was dissolved again. The Urethane resin, which had been used for the recovery, was able to be perfectly removed, which means that this Urethane resin recovery material has perfect reversibility. This Urethane resin restoration material also has enhanced convenience since user can adjust the working-life dependent on work environment. It is believed that this Urethane resin restoration material can also be used as a filling material or adhesive for other cultural assets made of ceramic or metal heritage, in addition to stone, since it has strong adhesive strength and tensile strength.

A Research on the Implementation and Estimation of an Integrated System for Information Management in the Field of Nuclear Science and Engineering (원자력분야 학술정보 통합정보관리시스템 구현에 관한 연구)

  • Chun, Young-Choon
    • Journal of Information Management
    • /
    • v.34 no.4
    • /
    • pp.63-84
    • /
    • 2003
  • This research is a case study that describes the NUCLIS21(Nuclear Information System 21), an integrated web-based information management system of KAERI(Korea Atomic Energy Research Institute), implemented to carry out the role of a national nuclear information center with government support as an information infra implementation programme. Through its user-centered single interface, the system aims at building an infrastructure for the national nuclear information center, as well as improving the information management system of the TID(Technical Information Department) within the institute. The system consists of two major parts which are an integrated module of the MIS and six different kinds of system. These include the Integral search system with OPAC, My Library, the Acquisition system, the Catalogue system, the Information Supply system, and the Serial Publication system. The DB is composed of Bibliographical DB, Original text DB and Abstract DB. A special feature of this system was designed as a unified network system through connection to MIS(Management Integration System) of the institute, so users can get research information for projects. Therefore, they have access to available information easily and access to the ongoing service of this system. Furthermore, users can share information by using our system. The survey has it that 75.7%(200 persons), 62.1%(164 persons) and 78.4%(207 persons) of the respondents are satisfied with the fidelity, speediness, and convenience of the system respectively, and the overall satisfaction of the respondents is comparably high.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Questionnaire Analysis of Geo-Spatial Open Source Application (공간정보 오픈소스 활용 설문조사에 따른 현황 분석)

  • Yoo, Hee-Young;Lee, Ki-Won;Lee, Kwang-Jae;Kim, Yong-Seung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.106-119
    • /
    • 2013
  • As open source can reduce costs and apply to various fields rapidly, many countries have actively adopted open source. However, geo-spatial open source in Korea is not actively promoted yet comparing to other countries having similar infra environments. In this study, we analyzed the perception of geo-spatial open source, utilization status, the development possibility and future direction using questionnaire survey completed by experts dealing with spatial information. The survey result shows that many experts have experiences of using geo-spatial open source but they got a lack of understanding about open source license or regulations and only a few people got professional training. Insufficient references, the difficulty of maintenance, lack of support and low technical reliability have hindered the adoption of geo-spatial open source. Only some part of geo-spatial open source software or libraries in some field have been used in the country. However, many researchers rate highly development potential and plan to use geo-spatial open source soon. If user's convenience, reference materials, technical trust and policy support are improved, open source field for spatial information will be developed greatly in the future.

Authentication Mechanism Using Three-Dimensional Optical Memory (3차원 광메모리를 이용한 인증 기법)

  • Park, CheolYong;Ryou, JaeCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1361-1373
    • /
    • 2016
  • Recently the need for user authentication with increasing, there are a variety of mechanisms, such as password, graphic authentication, token, biometrics and multiple authentication. in particular, the data of the 2-dimensional(2D) factors such as password, graphic authentication, biometrics is used because of the convenience. The stored information is problematic in that additional data recording needs to be performed whenever authentication data is updated. Furthermore, this storage method is problematic in that the time it takes to perform authentication increases because the time it takes to compare storage data with authentication data increases in proportion to an increase in the amount of the storage data. Accordingly, authentication through the rapid comparison of storage data with authentication data is a very important factor in data recording and authentication technology using memory. Using the three-dimensional(3D) optical memory by variously changing the recoding elements during recoding of data constitutes the way that multiple recoding different data storage. This enables high-density recoding in this way, and by applying the possible parallel processing at the time of recording and restoring method, provided that it is possible to quickly record and restore the data. In addition, each time to solve problems that require additional data recorded by a combination of the stored data record in the old data using a combination of the authentication. The proposed mechanism is proposed an authentication method using scheme after the recoding data in 3D optical memory to apply the conditions corresponding to the recoding condition when restoring the recorded data and through the experiment it was confirmed possible application as an authentication mechanism.

A Study on Controlling IPTV Interface Based on Tracking of Face and Eye Positions (얼굴 및 눈 위치 추적을 통한 IPTV 화면 인터페이스 제어에 관한 연구)

  • Lee, Won-Oh;Lee, Eui-Chul;Park, Kang-Ryoung;Lee, Hee-Kyung;Park, Min-Sik;Lee, Han-Kyu;Hong, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.930-939
    • /
    • 2010
  • Recently, many researches for making more comfortable input device based on gaze detection have been vigorously performed in human computer interaction. However, these previous researches are difficult to be used in IPTV environment because these methods need additional wearing devices or do not work at a distance. To overcome these problems, we propose a new way of controlling IPTV interface by using a detected face and eye positions in single static camera. And although face or eyes are not detected successfully by using Adaboost algorithm, we can control IPTV interface by using motion vectors calculated by pyramidal KLT (Kanade-Lucas-Tomasi) feature tracker. These are two novelties of our research compared to previous works. This research has following advantages. Different from previous research, the proposed method can be used at a distance about 2m. Since the proposed method does not require a user to wear additional equipments, there is no limitation of face movement and it has high convenience. Experimental results showed that the proposed method could be operated at real-time speed of 15 frames per second. Wd confirmed that the previous input device could be sufficiently replaced by the proposed method.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Factors Affecting the Continuous Use of Mobile Music Contents (모바일 음악콘텐츠의 지속적 사용에 영향을 미치는 요인에 관한 연구)

  • Yang, Seung-Kyu;Park, Seong-Won;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.291-305
    • /
    • 2008
  • Previous study about Mobile Music Contents was mainly focused on Industry factors & enterprise factors like Technology. This study is not only focused on Technology factors, but also Customer & System factors like TAM of original, and also, this study first tried to find the Mobile Internet medium's customer purchase by each property's Mobile Music Contents from assorting the Mobile music Contents property and defining them. So to speak of this study have tried to concretely verify the factors of purchase. And also, I proposed an transformated model, and added independent variable factors, 'distinction', 'speed of system', 'speed of network', 'a career of use', 'amount of use', 'preservation', 'customization', 'information', 'confidence', 'omni presentation', 'potential possibility of reproduce'. By applying TAM this study has measured how the product property. user property, and system property causes effect to customer purchase of Mobile Music Contents. In results, First, success 8 factors were determined to be the purchase of 'Ringtone'. Second, 8 factors were determined to be the purchase of 'Ring-Back tone', but, 'The use of convenience' was not influenced 'Intention of Purchase'. Third, 6 factors were determined to be the purchase of 'Full Track Download of Music'. At the Conclusion this study presented a scheme that these study results could be applied in actual company and academic world.

  • PDF