• Title/Summary/Keyword: User intervention

Search Result 192, Processing Time 0.023 seconds

Co-designing the Library Makerspace with Children: A Case Study of Seoul Children's Library with a Focus on 3D Printing

  • Kung Jin Lee;Min Cho;So Bin Lee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.1
    • /
    • pp.151-179
    • /
    • 2024
  • This study aimed to discuss the utilization of a makerspace regarding 3D printers in a children's library by conducting co-design sessions targeting the end-users, children. To achieve this, a program utilizing a 3D printer was conducted for seven children at the Seoul Children's Library, followed by interviews with both the children and their parents. The results revealed several key findings: First, during the design sessions, participating children showed interest in the physical realization of ideas through the use of a 3D printer. Researchers adjusted their level of intervention based on each child's tendency, playing a supportive role. Second, children became aware of various limitations associated with 3D printers and public library makerspace. Third, the rapport between children and researchers positively influenced the design sessions, driven by the active communication of children. This study suggests a reevaluation of the value and necessity of library makerspace from the perspective of user autonomy and creativity and emphasizes the need to closely understand the end user's requirements in establishing operational strategies for library makerspace.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Development of a Batch-mode-based Comparison System for 3D Piping CAD Models of Offshore Plants (Aveva Marine과 SmartMarine 3D간의 해양 플랜트 3D 배관 CAD 모델의 배치모드 기반 비교 시스템 개발)

  • Lee, Jaesun;Kim, Byung Chul;Cheon, Sanguk;Cho, Mincheol;Lee, Gwang;Mun, Duhwan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.1
    • /
    • pp.78-89
    • /
    • 2016
  • When a plant owner requests plant 3D CAD models in the format that a shipbuilding company does not use, the shipyard manually re-models plant 3D CAD models according to the owner's requirement. Therefore, it is important to develop a technology to compare the re-modeled plant 3D CAD models with original ones and to quantitatively evaluate similarity between two models. In the previous study, we developed a graphic user interface (GUI)-based comparison system where a user evaluates similarity between original and re-modeled plant 3D CAD models for piping design at the level of unit. However, an offshore plant consists of thousands of units and thus a system which compares several plant 3D CAD models at unit-level without human intervention is necessary. For this, we developed a new batch model comparison system which automatically evaluates similarity of several unit-level plant 3D CAD models using an extensible markup language (XML) file storing file location and name data about a set of plant 3D CAD models. This paper suggests system configuration of a batch-mode-based comparison system and discusses its core functions. For the verification of the developed system, comparison experiments for offshore plant 3D piping CAD models using the system were performed. From the experiments, we confirmed that similarities for several plant 3D CAD models at unit-level were evaluated without human intervention.

Design of service delivery for a child obesity prevention and management program using technology convergence (융합기술 기반 어린이 비만 예방.관리 프로그램 전달체계 설계)

  • Hwang, Ji-Yun;Park, Mi-Young;Kim, Kirang;Lee, Sang Eun;Shim, Jae Eun
    • Journal of Nutrition and Health
    • /
    • v.47 no.5
    • /
    • pp.374-384
    • /
    • 2014
  • Purpose: Health professionals and policy makers confront the failure of provider-administered, conventional behavioral interventions in the fight against obesity epidemic. The aim of this study was to develop a tailored, cost-effective delivery system for a child obesity prevention and management program through technology convergence using Web-enabled smart cellular phones. Methods: Assessment of service needs and development of a delivery system for the program were based on a comprehensive literature review and expert reviews, and results from in-depth interviews and a need-assessment survey. Results: The user- and site-centered service delivery system using Web-enabled cellular telephones as the hardware platform for obesity prevention and management has been developed. A tailored informational service and intervention will be provided interactively between stakeholders through the platform. The potential legal issues associated with the service design have also been considered. Conclusion: The user-centered convergence design and platform based on principles of Transtheoretical Model and Stages of Change using the Health Promoting School framework could enable effective intervention and promote acceptance in the long-run.

Context-aware Ontology Modeling using by Legacy Home Appliences (생활기기 센서를 이용한 상황인지 온톨로지 모델링)

  • Lee, Eunyoung;Min, Ukki;Won, Yusuk;Kim, Bonam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.737-740
    • /
    • 2013
  • The widespread use of smart home appliances with smart home networking is leading to a next generation of a new technology that exploit user contextual information to provide a richer experience. However, in the most part of home networking systems the intelligent personalization services between user and home appliances have not been adequately supplied in respect of the long lifespan of the legacy home appliances. In addition, without installing smart home appliances when constructing new building the users can not use this service. To use this service, the legacy home appliance need to attach enabler equipped with the various sensors just as it is smart home appliances. The goal is to create a service that enables appliances to exchange information and control their actions through the IoT gateway to achieve nonintrusive behavior and customized services without human intervention. In this paper, we propose a ontology model to represent the user context to be able to induce right service automatically and use it to discover, utilize and enhance different services in real time that the user may be interested in.

  • PDF

Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment (이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2061-2066
    • /
    • 2016
  • Currently, cloud systems are not interoperable due to low interoperability between cloud systems as operators build up cloud environments with their own way. For example, users of the Google cloud system can not use the Microsoft (Microsoft) cloud system unless they go through an additional log-in process. In order for Google cloud system's users to use MS cloud system services, they must log in to the MS cloud system again after logging out of Google cloud system. In order to solve these problems, Cloud Service Broker(CSB) technology has emerged to resolve the interoperability problem between cloud systems, but many researches and developments are still needed. In this paper, we design an integrated user authentication system, which is a fundamental problem of cloud user interoperability among CSB (Cloud Service Broker) technologies, which is emerging as a service intervention technology of heterogeneous distributed cloud environment.

Quantum Inspired Eco-system Transformation in Augmented Reality (양자 기법 기반 증강현실 객체 간 생태계 변형)

  • Kim, Ju-Hwan;Jo, Dongsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.573-575
    • /
    • 2019
  • Recently, augmented reality (AR) technology has been widely used in a variety of fields such as defense, medical, education, and entertainment. In the augmented reality environment, a user can interact a virtual object by the user 's specific behaviors. Also, it is necessary to use a technique to automatically interacts among the generated virtual objects. In this paper, we propose an authoring model to apply augmented reality environments based on quantum computing inspired entanglement and overlapping phenomenon. For example, it is possible to allow the user to automatically increase and decrease the number of the object with the characteristics of the virtual object without user intervention. As a tested platform for this purpose, this paper provide an augmented reality eco-system environment with automatic interaction among virtual animals.

  • PDF

The Effect of the User Attitude towards Digital Device of the Middle and Older Adults on Life Satisfaction: Mediating Effect of the Utilization Performance of Digital Device (장노년층의 디지털기기 이용태도가 삶의 만족도에 미치는 영향 : 디지털기기 이용성과의 매개효과)

  • Kim, Su Kyoung;Shin, Hye Ri;Kim, Young Sun
    • The Journal of Information Systems
    • /
    • v.30 no.1
    • /
    • pp.85-104
    • /
    • 2021
  • Purpose This study aims to verify the mediating effect of the utilization performance of digital device on the relationship between user attitude and life satisfaction. Design/methodology/approach Using the data of 2018 Digital Divide Survey conducted by the National Information Society Agency(NIA), the mediating effect was verified by Baron & Kenny (1986)'s 3 step process, targeting 1,662 adults older than 55. Findings The result is as follows: first, the user attitude of middle and older aged people has a positive effect on their life satisfaction. Second, the effect of user Attitude towards Digital Device of middle and older citizens is partially mediated by the utilization performance of digital device. The results of this study indicate that when providing informatization education in the local community to promote the use of digital devices for the elderly, efforts should be made to grasp the level and inclination of informatization individually, and furthermore present improvements for wireless devices that the elderly can easily access in their daily lives. This study is expected to be a groundwork for a practical intervention to boost positive attitude towards using digital device to enhance the utilization performance of digital device and the life satisfaction of middle and older aged people.

A Cloud Storage Gateway to Guarantee the Confidentiality of User Data (사용자 데이터 기밀성을 보장하기 위한 클라우드 스토리지 게이트웨이)

  • Kim, Hong-Sung;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.131-139
    • /
    • 2012
  • The cloud storage has the client lend and use the device as a form of service rather than owning it, and thus the client pays the charge for the service that he or she actually uses, making it beneficial over the self-managed data center. When the storage service is provided on public cloud, however, the clients does not have any control over the user data, which brings a problem of violating data confidentiality. In this paper, we propose a gateway that works between the public cloud and the client for the purpose of guaranteeing the confidentiality of user data stored in cloud. The gateway encrypts or decrypts, and then delivers the user data without the client's intervention. In addition, it provides the function of exchanging keys to allow the client to access through another gateway. The proposed idea has been tested on a commercial public cloud and verified to satisfy security and compatibility.

Greedy Heuristic Resource Allocation Algorithm for Device-to-Device Aided Cellular Systems with System Level Simulations

  • Wang, Xianxian;Lv, Shaobo;Wang, Xing;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1415-1435
    • /
    • 2018
  • Resource allocation in device-to-device (D2D) aided cellular systems, in which the proximity users are allowed to communicate directly with each other without relying on the intervention of base stations (BSs), is investigated in this paper. A new uplink resource allocation policy is proposed by exploiting the relationship between D2D-access probability and channel gain among variant devices, such as cellular user equipments (CUEs), D2D user equipments (DUEs) and BSs, etc., under the constraints of their minimum signal to interference-plus-noise ratio (SINR) requirements. Furthermore, the proposed resource-allocation problem can be formulated as the cost function of "maximizing the number of simultaneously activated D2D pairs subject to the SINR constraints at both CUEs and DUEs". Numerical results relying on system-level simulations show that the proposed scheme is capable of substantially improving both the D2D-access probability and the network throughput without sacrificing the performance of conventional CUEs.