• 제목/요약/키워드: user practices

검색결과 400건 처리시간 0.024초

An Efficient Monitoring Method for Ubiquitous System Platform Based on Autonomic Community Computing (자율적 커뮤니티 컴퓨팅 기반 유비쿼터스 시스템 플렛폼을 위한 효과적인 모니터링 방법)

  • Kwon, Sung-Hyun;Lee, Dong-Wook;Kim, Jai-Hoon;Cho, We-Duke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제14권1호
    • /
    • pp.86-90
    • /
    • 2008
  • Ubiquitous Smart pace connects many kinds of smart object to satisfy user's demands. Thus, not only excessive loads but also resource collisions occur among service objects while configurating services to fulfill the user's request. After all, as malfunction occurs between service objects, it offers wrong service to user or does not respond to service request. To solve these problems, Ubiquitous Smart Space is observed by monitoring system of function, performance, and status of objects. Therefore, optimized function, performance and duality of service of smart space service for user should be improved by recording log and analyzing recorded the log. In this paper, we suggest a novel monitoring system to optimize performance according to pattern of diverse services and execute self-recovery on system down and malfunction.

Development and Architecture of Video-to-Images to Enhance User Experience for Video Content Consumption (동영상 콘텐트 소비의 사용자 경험 향상을 위한 V2I(Video to Images) 기술 및 그 구조)

  • Jeon, Kyuyeong;Yang, Jinhong;Kim, Yongrok;Park, Hyojin;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • 제22권7호
    • /
    • pp.326-331
    • /
    • 2016
  • The proportion of video content consumption is growing dramatically but some users avoid it. The reasons are initial time to load, lack of the time to watch video content, and particularly a traffic issues on mobile devices. The proposed Video-to-Images(V2I) technology offers a new user experience to end users through converting video into images without content providers' or users' effort. Using the V2I technology, consumption methods of video content with new type of content by users and the advantages of the new user experience will be introduced. Furthermore, the overall architecture of the V2I will be explained.

Development of an Interface for Data Visualization and Controlling of Classified Objects based on User Conditions (사용 상황에 맞게 분류된 사물의 데이터 시각화와 제어를 위한 인터페이스 개발)

  • Park, Heesung;Han, Minseok;Choi, Yuri
    • KIISE Transactions on Computing Practices
    • /
    • 제22권7호
    • /
    • pp.320-325
    • /
    • 2016
  • By developing the IoT(Internet of Things) technology, devices for smart home environment have rapidly increased. With respect to mobiles, these applications are used to control and manage the various smart devices effectively. However, the existing mechanisms only provide simple information, and hence a difficulty to search or control the smart devices persists, since there is no meaningful relationship between them. In this research, we suggest an interface which visualizes the device's data and controls them effectively, based on the user's device using pattern. As a solution for this problem, we classify the user pattern based on a timeline for the associated circumstance, and visualize the device's data to make a group or to control individually in an easier approach. Also, all meaningful information could be confirmed by summarizing all the data of smart devices.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제10권3호
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제12권3호
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

Efficient Web Document Search based on Users' Understanding Levels (사용자의 이해수준에 따른 효율적인 웹문서 검색)

  • Shim, Sang-Hee;Lee, Soo-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제15권1호
    • /
    • pp.38-46
    • /
    • 2009
  • With the rapid increase in the number of Web documents, the problem of information overload is growing more serious in Internet search. In order to ease the problem, researchers are paying attention to personalization, which creates Web environment fittingly for users' preference, but most of search engines produce results focused on users' queries. Thus, the present study examined the method of producing search results personalized based on a user's understanding level. A characteristic that differentiates this study from previous researches is that it considers users' understanding level and searches documents of difficulty fit for the level first. The difficulty level of a document is adjusted based on the understanding level of users who access the document, and a user's understanding level is updated periodically based on the difficulty of documents accessed by the user. A Web search system based on the results of this study is expected to bring very useful results to Web users of various age groups.

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • 제23권6호
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.

Design and Implementation of Smart-Mirror Supporting Recommendation Service based on Personal Usage Data (사용 정보 기반 추천 서비스를 제공하는 스마트미러 설계 및 구현)

  • Ko, Hyemin;Kim, Serim;Kang, Namhi
    • KIISE Transactions on Computing Practices
    • /
    • 제23권1호
    • /
    • pp.65-73
    • /
    • 2017
  • Advances in Internet of Things Technology lead to the increasing number of daily-life things that are interconnected over the Internet. Also, several smart services are being developed by utilizing the connected things. Among the daily-life things surrounding user, the mirror can supports broad range of functionality and expandable service as it plays various roles in daily-life. Recently, various smart mirrors have been launched in certain places where people with specific goals and interests meet. However, most mirrors give the user limited information. Therefore, we designed and implemented a smart mirror that can support customized service. The proposed smart mirror utilizes information provided by other existing internet services to give user dynamic information as real_time traffic information, news, schedule, weather, etc. It also supports recommendation service based on user usage information.

An Associative Search System for Mobile Life-log Semantic Networks based on Visualization (시각화 기반 모바일 라이프 로그 시맨틱 네트워크 연관 검색 시스템)

  • Oh, Keun-Hyun;Kim, Yong-Jun;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제16권6호
    • /
    • pp.727-731
    • /
    • 2010
  • Recently, mobile life-log data are collected by mobile devices and used to recode one's life. In order to help a user search data, a mobile life-log semantic network is introduced for storing logs and retrieving associative information. However, associative search systems on common semantic networks in previous studies provide for a user with only found data as text to users. This paper proposes an associative search system for mobile life-log semantic network that supports selection and keyword associative search of which a process and result are a visualized graph representing associative data and their relationships when a user inputs a keyword for search. In addition, by using semantic abstraction, the system improves user's understanding of search result and simplifies the resulting graph. The system's usability was tested by an experiment comparing the system and a text-based search system.

Posture Recognition for a Bi-directional Participatory TV Program based on Face Color Region and Motion Map (시청자 참여형 양방향 TV 방송을 위한 얼굴색 영역 및 모션맵 기반 포스처 인식)

  • Hwang, Sunhee;Lim, Kwangyong;Lee, Suwoong;Yoo, Hoyoung;Byun, Hyeran
    • KIISE Transactions on Computing Practices
    • /
    • 제21권8호
    • /
    • pp.549-554
    • /
    • 2015
  • As intuitive hardware interfaces continue to be developed, it has become more important to recognize the posture of the user. An efficient alternative to adding expensive sensors is to implement computer vision systems. This paper proposes a method to recognize a user's postured in a live broadcast bi-directional participatory TV program. The proposed method first estimates the position of the user's hands by generation a facial color map for the user and a motion map. The posture is then recognized by computing the relative position of the face and the hands. This method exhibited 90% accuracy in an experiment to recognize three defined postures during the live broadcast bi-directional participatory TV program, even when the input images contained a complex background.