• Title/Summary/Keyword: User data

Search Result 8,969, Processing Time 0.031 seconds

Development of a Graphic User Interface Program for Suspension Design (현가장치 설계용 그래픽 사용자 접속 프로그램 개발)

  • Kim, H.K.;Yoo, H.H.;Choi, K.R.;Lee, M.S.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.6 no.6
    • /
    • pp.7-14
    • /
    • 1998
  • A graphic user interface program for the design of vehicle suspension system is developed in this work. Graphic templates are designed by using a graphic language and a library and given to users for interactive data input. Several suspension types are graphically given, and the information of hard points can be directly provided on the graphic templates by users. The information is saved in a data structure which can be efficiently accessed, and transformed into another data format. The data transformation is for the interface to an analyzer by which suspension design characteristics can be calculated.

  • PDF

Understanding User Continuance of Stock Investment Information in an Online Trading Environment (온라인 거래 환경에서 주식 투자 정보의 지속 사용에 대한 이해)

  • Kim, Hye Min;Chung, Sunghun;Han, Ingoo;Kim, Byoungsoo
    • Knowledge Management Research
    • /
    • v.12 no.4
    • /
    • pp.41-54
    • /
    • 2011
  • Given the prevalence of home trading systems, it has become important to examine user behaviors in a stock investment environment. In this vein, this paper developed an integrated model to deeply understand the key determinants of user's continuance intention to use investment information through constructs prescribed by incorporating trust and perceived risk into expectation-confirmation model. The proposed research model was tested by using survey data collected from 160 users who have experience with stock investment. PLS (partial least squares) was employed for the analysis of the data. The findings of this study showed that the proposed framework provides a statistically significant explanation of the variation in continuance intention to search investment information. The findings revealed that trust and perceived risk are more prevalent predictors of continuance intention to use investment information compared to perceived usefulness. It was also found that user satisfaction serves as the salient antecedents of continuance intention to use investment information. The theoretical and practical implications of the findings were described.

  • PDF

A Study on the Effect Degree of the Use of Computer Assisted Reporting on the User Satisfaction and Job Performance (컴퓨터활용취재(Computer Assisted Reporting)의 사용도가 만족도 및 직무성과에 미치는 영향 연구)

  • Park Hyun Soo;Yang Kyung Sik;Kim Hyun Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.3
    • /
    • pp.117-135
    • /
    • 2004
  • The purpose of this research is to examination whether End-User Computing relative factors are ap-plied in Computer Assisted Reporting. Computer Assisted Reporting is closely related to End-User Computing, because IT and IS be used by reporting for data gathering and analysis. For the purpose, we've produced a survey, and then studied the effects of the use of Computer Assisted Reporting tools on the report's satisfaction and job performance. As a result, The degree of use of Computer Assisted Reporting significantly affects the degree of satisfaction and job performance. for this reason, this research can give an insight for the extension of End-User Computing relative research.

  • PDF

Development of Smart Healthcare Scheduling Monitoring System for Elderly Health Care

  • Cho, Sooyong;Lee, Sang Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.51-59
    • /
    • 2018
  • Health care has attracted a lot of attention, recently due to an increase in life expectancy and interest in health. Various biometric data of the user are collected by using the air pressure sensor, gyro sensor, acceleration sensor, and heart rate sensor to perform the Smart Health Care Activity Tracker function. Basically, smartphone application is made and tested for biometric data collection, but the Arduino platform and bio-signal measurement sensor are used to confirm the accuracy of the measured value of the smartphone. Use the Google Maps API to set user goals and provide guidance on the location of the user and the points the user wants. Also, the basic configuration of the main UI is composed of the screen of the camera, and it is possible for the user to confirm the forward while using the application, so that accident prevention is possible.

Collaborative Filtering Algorithm Based on User-Item Attribute Preference

  • Ji, JiaQi;Chung, Yeongjee
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.135-141
    • /
    • 2019
  • Collaborative filtering algorithms often encounter data sparsity issues. To overcome this issue, auxiliary information of relevant items is analyzed and an item attribute matrix is derived. In this study, we combine the user-item attribute preference with the traditional similarity calculation method to develop an improved similarity calculation approach and use weights to control the importance of these two elements. A collaborative filtering algorithm based on user-item attribute preference is proposed. The experimental results show that the performance of the recommender system is the most optimal when the weight of traditional similarity is equal to that of user-item attribute preference similarity. Although the rating-matrix is sparse, better recommendation results can be obtained by adding a suitable proportion of user-item attribute preference similarity. Moreover, the mean absolute error of the proposed approach is less than that of two traditional collaborative filtering algorithms.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.

A Study on the Form Analysis Tools Based on the User's Emotional Response (사용자의 감성반응에 기초한 형태 분석 도구에 대한 연구)

  • Choi, Min-Young
    • Science of Emotion and Sensibility
    • /
    • v.12 no.2
    • /
    • pp.233-242
    • /
    • 2009
  • Recently the studies on user-centered design and form-development have become issues of general interest as the key methods for successful design. For form analysis on user it is important needs that an integrated approach of existing methods and development of expert tool for designer. Moreover analysis methods and tools have to meet with the designers needs of visual result, clear direction, concrete formative factor, user's emotional response and designer-friendly interface. This study proposed the main concepts of form analysis tool based on the user's emotional response ; integrated management, variables set-up, visual result of analysis, in-depth analysis with data mining and correlation, and reinforcement of user-centered analysis. Specific analysis tool consists of 5 functions: Project Management, Analysis Frame Set-up, Data Input-output, Basic Analysis, and In-depth Analysis. The feasibility of proposed tool was verified by a case study of mobile phone design in under-graduate class.

  • PDF

Research on Correlating Data Loading with User Experience (데이터 로딩과 사용자 경험의 상관관계 분석에 관한 연구)

  • In-sik Yun;Il-young Moon
    • Journal of Practical Engineering Education
    • /
    • v.16 no.2
    • /
    • pp.185-193
    • /
    • 2024
  • With the advent of smartphones, people can access various information through the internet anytime and anywhere. Even in the vehicle environment, users can use the internet. Users interact with web and applications every day and get information. However, as the amount of data to be processed by the program increases, users inevitably receive a message to wait. User waiting is an inconvenient experience, but minimizing user waiting is the best way because there is time required for data processing. However, if the service processing time exceeds the expected time, users experience more severe boredom and pain. Therefore, various methods and researches are being conducted to alleviate the boredom of user waiting. The most commonly used method to alleviate user waiting boredom is loading. In this study, we investigated the effect of skeleton loading, the latest loading technique, on user waiting experience, and how attractive it is as a design technique in terms of UI compared to other loading techniques.