• Title/Summary/Keyword: user-tracing

Search Result 90, Processing Time 0.042 seconds

Ontology based Educational Systems using Discrete Probability Techniques (이산 확률 기법을 이용한 온톨로지 기반 교육 시스템)

  • Lee, Yoon-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.17-24
    • /
    • 2007
  • Critical practicality problems are cause to search the presentation and contents according to user request and purpose in previous internet system. Recently, there are a lot of researches about dynamic adaptable ontology based system. We designed ontology based educational system which uses discrete probability and user profile. This system provided advanced usability of contents by ontology and dynamic adaptive model based on discrete probability distribution function and user profile in ontology educational systems. This models represents application domain to weighted direction graph of dynamic adaptive objects and modeling user actions using dynamically approach method structured on discrete probability function. Proposed probability analysis can use that presenting potential attribute to user actions that are tracing search actions of user in ontology structure. This approach methods can allocate dynamically appropriate profiles to user.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Knowledge-Based System for Rule Scantling Based on Object-Oriented Knowledge Representation and Open Architecture Concepts (객체지향적 지식표현과 개방형설계에 의한 구조부재 치수 결정 지원 시스템 개발)

  • Kyung-Ho Lee;Dong-Kon Lee;Soon-Hung Han;Kyu-Yeul Lee;Kyu-Chul Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.2
    • /
    • pp.30-36
    • /
    • 1993
  • An expert system to help a novice engineer in designing midship section is developed. The system is developed based on a general-purpose expert system shell, NEXPERT. Firstly, the design knowledge is extracted from an existing rule scantling program. The knowledge has been grouped and structured into a hierarchy by applying object-oriented concepts. Secondly, the knowledge base is integrated with a database of existing ships and engineering analysis modules through the Application Programming Interface(API)technique. Graphical User Interface which is developed using Motif wiget set is adopted. These altogether enable construction of an user friendly expert system.

  • PDF

Appropriate App Services and Acceptance for Contact Tracing: Survey Focusing on High-Risk Areas of COVID-19 in South Korea (코로나 19 동선 관리를 위한 적정 앱 서비스와 도입: 고위험 지역 설문 연구)

  • Rho, Mi Jung
    • Korea Journal of Hospital Management
    • /
    • v.27 no.2
    • /
    • pp.16-33
    • /
    • 2022
  • Purposes: Prompt evaluation of routes and contact tracing are very important for epidemiological investigations of coronavirus disease 2019 (COVID-19). To ensure better adoption of contact tracing apps, it is necessary to understand users' expectations, preferences, and concerns. This study aimed to identify main reasons why people use the apps, appropriate services, and basis for voluntary app services that can improve app participation rates and data sharing. Methodology/Approach: This study conducted an online survey from November 11 to December 6, 2020, and received a total of 1,048 survey responses. This study analyzed the questionnaire survey findings of 883 respondents in areas with many confirmed cases of COVID-19. This study used a multiple regression analysis. Findings: Respondents who had experience of using related apps showed a high intention to use contact-tracing apps. Participants wished for the contact tracking apps to be provided by the government or public health centers (74%) and preferred free apps (93.88%). The factors affecting the participants' intention to use these apps were their preventive value, performance expectancy, perceived risk, facilitative ability, and effort expectancy. The results highlighted the need to ensure voluntary participation to address participants' concerns regarding privacy protection and personal information exposure. Practical Implications: The results can be used to accurately identify user needs and appropriate services and thereby improve the development of contact tracking apps. The findings provide the basis for voluntary app that can enhance app participation rates and data sharing. The results will also serve as the basis for developing trusted apps that can facilitate epidemiological investigations.

Building a Log Framework for Personalization Based on a Java Open Source (JAVA 오픈소스 기반의 개인화를 지원하는 Log Framework 구축)

  • Sin, Choongsub;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.8
    • /
    • pp.524-530
    • /
    • 2015
  • A log is for text monitoring and perceiving the issues of a system during the development and operation of a program. Based on the log, system developers and operators can trace the cause of an issue. In the development phase, it is relatively simple for a log to be traced while there are only a small number of personnel uses of a system such as developers and testers. However, it is the difficult to trace a log when many people can use the system in the operation phase. In major cases, because a log cannot be tracked, even tracing is dropped. This study proposed a simplified tracing of a log during the system operation. Thus, the purpose is to create a log on the run time based on an ID/IP, using features provided by the Logback. It saves an ID/IP of the tracking user on a DB, and loads the user's ID/IP onto the memory to trace once WAS starts running. Before the online service operates, an Interceptor is executed to decide whether to load a log file, and then it generates the service requested by a certain user in a separate log file. The load is insignificant since the arithmetic operation occurs in a JVM, although every service must pass through the Interceptor to be executed.

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

A Study on the Park Using Pattern Focusing on user Behavior in River-eco-park (하천생태공원 이용자의 이용행태에 따른 시설이용패턴에 관한 연구)

  • Back, Jun Wook;Park, Jong Min;Kim, Jong Gu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2157-2168
    • /
    • 2013
  • This study is about facilities using pattern for 'River-eco-park' that is Hwa-myeong Eco-park, Sam-rak Eco-park, Maek-do Eco-park. Through doing surveys, most patterns could be divided 5 patterns; 'Eco observation facility pattern', 'Promenade pattern', 'Bike path pattern', 'Sports facility pattern', 'Fitness center pattern'. Then we find channel of movement of user patterns by follow-up surveys. On the basis of this surveys, we are going to suggest some directions for River-eco-park design.

Visual Feedback System for Manipulating Objects Using Hand Motions in Virtual Reality Environment (가상 환경에서의 손동작을 사용한 물체 조작에 대한 시각적 피드백 시스템)

  • Seo, Woong;Kwon, Sangmo;Ihm, Insung
    • Journal of the Korea Computer Graphics Society
    • /
    • v.26 no.3
    • /
    • pp.9-19
    • /
    • 2020
  • With the recent development of various kinds of virtual reality devices, there has been an active research effort to increase the sense of reality by recognizing the physical behavior of users rather than by classical user input methods. Among such devices, the Leap Motion controller recognizes the user's hand gestures and can realistically trace the user's hand in a virtual reality environment. However, manipulating an object in virtual reality using a recognized user's hand often causes the hand to pass through the object, which should not occur in the real world. This study presents a way to build a visual feedback system for enhancing the user's sense of interaction between hands and objects in virtual reality. In virtual reality, the user's hands are examined precisely by using a ray tracing method to see if the virtual object collides with the user's hand, and when any collision occurs, visual feedback is given through the process of reconstructing the user's hand by moving the position of the end of the user's fingers that enter the object through sign distance field and reverse mechanics. This enables realistic interaction in virtual reality in real time.

Development of an Autonomous Navigation System for Unmanned Ground Vehicle

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.244-250
    • /
    • 2008
  • This paper describes the design and implementation of an unmanned ground vehicle (UGV) and also estimates how well autonomous navigation and remote control of UGV can be performed through the optimized arbitration of several sensor data, which are acquired from vision, obstacle detection, positioning system, etc. For the autonomous navigation, lane detection and tracing, global positioning, and obstacle avoidance are necessarily required. In addition, for the remote control, two types of experimental environments are established. One is to use a commercial racing wheel module, and the other is to use a haptic device that is useful for a user application based on virtual reality. Experimental results show that autonomous navigation and remote control of the designed UGV can be achieved with more effectiveness and accuracy using the proper arbitration of sensor data and navigation plan.

  • PDF

Knowledge-based system for ship structural design based on visualization techniques (가시화 기법을 통한 선박 구조설계 지원 전문가시스템 개발)

  • 이경호;한순흥;이동곤;김은기
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1993.04a
    • /
    • pp.98-105
    • /
    • 1993
  • 본 논문에서는 설계 경험이 적은 설계자가 효율적으로 선급규정을 이용하여 선체설계를 할 수 있도록, 범용 전문가시스템 쉘(Shell)인 NEXPERT를 이용하여, 선체 구조설계를 지원할 수 있는 전문가시스템을 개발하였다. 먼저, 선급규정집(LLoyd Rule)과 기존의 rule scantling프로그램으로부터 지식을 추출하고, 이를 바탕으로 객체지향개념에 의해 지식의 그룹핑과 계층화를 시도하였다. 또한, NEXPERT가 갖고 있는 외부 프로그램과의 접속기능 (Cellable Interface)을 이용하여 각종 설계에 필요한 프로그램과 실적선 데이타베이스를 접속하였다. 특히, Motif를 이용한 그래픽 사용자 인터페이스(Graphical User Interface:GUI)를 도입하였고, 설계자가 결과에 대해 검토를 할 수 있도록 Knowledge tracing기능을 부여함으로써, 사용자 지향의 구조부재 치수 결정 지원 전문가 시스템을 개발하였다. 이러한 연구를 통해 범용 전문가시스템이 선박설계에 이용될 수 있다는 가능성을 보였으며, 그 추구해야할 방향을 설정하였다. 특히, 어떤 설계결정에 이르는데 관여한 규칙들을 보여주며, 객체로 정의된 설계부재들의 값을 확인하게 함으로써 설계자가 효율적인 설계를 수행할 수 있게 되었다.