• Title/Summary/Keyword: 개인 프로파일

Search Result 649, Processing Time 0.028 seconds

The Configuration of Web Services in LBS Platform (LBS 플랫폼에서의 Web Services 구성 방법)

  • Min, Kyoung-Wook;Park, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.689-692
    • /
    • 2003
  • 무선 인터넷 기술의 발달과 응용의 확산으로 인하여 위치 정보를 이용한 서비스 형태는 아주 다양하여 지고 있으며, LBS(Location-Based Services)라는 형태로 국내외 시장에서 급속히 확장하고 있다. LBS 플랫폼은 이러한 위치 기반 서비스를 가능하게 하는 핵심 요소이며, 위치 정보 제공 게이트웨이, 위치 응용 서버, 핵심 기능 제공 서버 등과의 상호 운용을 지원해야 하며, 개인 및 서비스에 대한 프로파일 관리, 과금 처리, 이동체 트리거 등의 기능을 제공하는 시스템이다. 즉, 모든 위치기반 서비스를 수행하려고 하는 개인 혹은 응용 서비스 제공자들은 이러한 LBS 플랫폼을 거쳐, 위치 및 다양한 핵심 기능의 조합 형태인 서비스를 제공 받게 된다. 표준화된 소프트웨어 기술인 웹서비스는 LBS 플랫폼과 타 시스템(솔루션, 핵심 기능 제공 서버, 위치 정보 제공 서버 등)과의 인터페이싱을 가능하게 하는 표준 인프라이다. LBS 플랫폼 웽 서비스는, 솔루션 서버에서 요청하는 서비스에 대한 과금 처리를 위한 자체 과금 비즈니스 모델을 포함하고 있으며, 이러한 과금에 대한 처리를 수행하면서 타 시스템과의 상호 운용은 여러 가지 형태로의 구성이 가능하다. 이에 본 논문에서는 LBS 플랫폼이 상호 운용하는 주요 시스템과의 인터페이싱을 위한 웹 서비스 구성 방법에 대한 방안을 제시하고자 한다.

  • PDF

Personalized Message Syndication As a Smart Media (스마트 미디어로서의 개인화된 메시지 신디케이션)

  • Lee, Seo-Young;Kim, Nam-Yun;Lee, Bong-Gyou
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Since the increasing use of smart devices such as smartphone and tablet PC improves the quality of convergence of broadcasting and telecommunication, many new media have been created. This smart device can provide personal environments based on user's profile (age, gender, and job) and current location. In addition, it can be regarded as a media platform with two-way communication. This paper proposes personalized message syndication, called PMS, based on smart devices and then analyzes its business and technical issues. The PMS service as a smart media provides consumers customized information and can be used for producer's marketing tools which can lead consumers' heart and participation.

Design and Implementation of File Access Control System using Multi PIN and Biometrics based on Java Card (JAVA CARD기반의 생체정보 및 다중PIN을 이용한 파일접근 제어 시스템 설계 및 구현)

  • Gu, Eun-Hee;Shin, In-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1075-1078
    • /
    • 2004
  • 급속한 정보기술 및 인터넷의 발달로 인해 네트워크를 통한 정보의 교류가 활발해지고 온라인 뱅킹 등 전자상거래와 관련된 산업의 규모가 커지면서 정보보안과 휴대용이 용이한 스마트카드는 여러 활용분야에서 사용되고 있다. 계속적인 하드웨어 기술의 발전으로 스마트카드의 표준으로 자리 잡고 있는 자바카드는 스마트카드 플랫폼에 자바의 기술을 접목시킨 것으로써 객체지향 중심의 기법으로 보안상 매우 좋은 이점을 지니고 있다. 또한 특성이 다른 하드웨어에서 같은 동작을 할 수 있는 개방형 운영체제를 가짐으로써 다양한 다수의 응용 프로그램을 수용할 수 있는 유연성을 가지게 한다. 본 논문에서는 이러한 자바카드의 특성을 이용하여 하나의 회원 카드로 다수의 사용자가 사용할 수 있는 접근통제가 가능한 회원카드를 설계하였다. 사용자에게 발급된 하나의 카드에 들어있는 정보를 개인이 아닌 다수의 사용자가 서로 다른 PIN을 이용하여 카드 내에 있는 사용자 정보를 접근하여 개인 정보의 확인, 관리내용 업데이트, 내용에 따른 청구를 카드 하나로 가능하게 하였다. 이때 사용자 인증수단으로 사용되는 PIN의 보안성을 높이기 위해 개인별로 고유한 생체인식의 한 구성요소인 서명 데이터를 이용하여 패스워드가 가지는 보안상의 취약요소를 없애 보다 안전한 사용자 인증을 하고자 한다. 이러한 자바카드의 이용기술과 생체인식 및 다중PIN을 이용한 사용자 인증, 파일의 보안 등급의 차등적인 접근권한을 설계하고 마지막으로 비주얼한 응용프로그램을 구현함으로써 카드를 보다 안전하고 편리하게 사용할 수 있기를 기대한다.

  • PDF

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

Predictive Modeling Design for Fall Risk of an Inpatient based on Bed Posture (침대 자세 기반 입원 환자의 낙상 위험 예측 모델 설계)

  • Kim, Seung-Hee;Lee, Seung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.51-62
    • /
    • 2022
  • This study suggests a design of predictive modeling for a hospital fall risk based on inpatients' posture. Inpatient's profile, medical history, and body measurement data along with basic information about a bed they use, were used to predict a fall risk and suggest an algorithm to determine the level of risk. Fall risk prediction is largely divided into two parts: a real-time fall risk evaluation and a qualitative fall risk exposure assessment, which is mostly based on the inpatient's profile. The former is carried out by recognizing an inpatient's posture in bed and extracting rule-based information to measure fall risk while the latter is conducted by medical staff who examines an inpatient's health status related to hospital fall risk and assesses the level of risk exposure. The inpatient fall risk is determined using a sigmoid function with recognized inpatient posture information, body measurement data and qualitative risk assessment results combined. The procedure and prediction model suggested in this study is expected to significantly contribute to tailored services for inpatients and help ensure hospital fall prevention and inpatient safety.

Construct Validation of the Sensory Profile for Children with Congenital Cerebral Palsy (뇌성마비 아동을 대상으로 한 감각프로파일(Sensory Profile)의 구성타당도 연구)

  • Yoo, Doo Han;Hong, Deok Gi;Hwang, Sun Jung
    • 재활복지
    • /
    • v.18 no.4
    • /
    • pp.315-330
    • /
    • 2014
  • The purpose of this study was to verify the construct validity of the Sensory Profile for children with congenital cerebral palsy. Parents of 87 children(the ages of 3 to 10) with congenital cerebral palsy participated in this study. The data were analyzed through Winstep version 3.81 using the Rasch model to examine the uni-dimensionality of the fit of each item, the distribution of difficulty of each item, and the reliability and appropriateness of the rating scale. Based on a Rasch analysis, four out of the 87 children were considered to be inappropriate participants, and 15 item of the Sensory Profile was determined to be an inappropriate item. The items of high-level difficulty are needed as new items of the Korean Sensory Profile. The rating scale of three categories were appropriate than those of the five categories. The person and item separation reliability of three categories was above 0.90, which is a relatively excellent value. Finally, it will be need to verify of validity for Korean version of Sensory Profile, to develop new item of a high level of difficulty and convert into three point rating scale.

Power Consumption Patterns Analysis Using Expectation-Maximization Clustering Algorithm and Emerging Pattern Mining (기대치-최대화 군집 알고리즘과 출현 패턴 마이닝을 이용한 전력 소비 패턴 분석)

  • Jin Hyoung Park;Heon Gyu Lee;Jin-Ho Shin;Keun Ho Ryu;Hiseok Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.261-264
    • /
    • 2008
  • 전력 회사의 효율적인 운용과 전력 시장에서의 경쟁을 위하여 고객의 전력 소비 패턴 분석 및 정확한 예측이 이루어져야 한다. 이를 위해서 이 논문에서는 원격 검침 시스템에 의한 전국의 고압 고객 데이터를 대상으로 고객의 전력 소비 패턴을 정확히 예측할 수 있는 마이닝 기법을 제안하였다. 먼저, 국내 계약종별 고객 특성에 맞는 부하 패턴의 정확한 구별을 위한 9가지의 특징 벡터를 추출하였고, 기대치-최대화 군집화 알고리즘을 사용하여 고객의 34개 대표 부하프로파일을 생성하였다. 마지막으로 추출된 특징 벡터로부터 각 대표 프로파일에 대한 출현 패턴 기반의 분류 모델을 구성하여 고객의 전력 소비 패턴을 분류하였다. 국내 원격 검침 시스템에 의해 측정된 총 3,895명의 고압 고객 데이터에 대한 실험 결과 약 91%의 분류 정확성을 보였다.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Appraisal method for Determining Whether to Upgrade Software for Appraisal (감정 대상 소프트웨어의 업그레이드 여부 판정을 위한 감정 방법)

  • Chun, Byung-Tae;Jeong, Younseo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2020
  • It can be seen that the infringement of copyright cases is increasing as the society becomes more complex and advanced. During the software copyright dispute, there may be a dispute over whether the software is duplicated and made into upgraded software. In this paper, we intend to propose an analysis method for determining whether to upgrade software. For the software upgrade analysis, a software similarity analysis technique was used. The analysis program covers servers, management programs, and Raspberry PC programs. The first analysis confirms the correspondence between program creation information and content. In addition, it analyzes the similarity of functions and screen composition between the submitted program and the program installed in the field. The second comparative analysis compares and analyzes similarities by operating two programs in the same environment. As a result of comparative analysis, it was confirmed that the operation and configuration screens of the two programs were identical. Thus, minor differences were found in a few files, but it was confirmed that the two programs were mostly made using the same or almost similar source code. Therefore, this program can be judged as an upgrade program.

Classification of Student's School Violence During Middle School: Applying Multilevel Latent Profile Models to Test Individual and School Effects (다층 잠재프로파일 분석을 적용한 중학생의 학교폭력 집단 분류와 개인 및 학교요인 검증)

  • No, Unkyung;Lee, Eunsoo;Lee, Hyunjung;Hong, Sehee
    • Survey Research
    • /
    • v.18 no.2
    • /
    • pp.67-98
    • /
    • 2017
  • The purposes of this study are to identify the latent classes of school violence depending on bullying and victimized experience by type and the influences of individual-level and school-level variables on determining these latent profiles. For these research goals, the present study utilized data from the Seoul Education Longitudinal Study(SELS) 5th wave, containing data from 2,195 middle school students who experienced school violences more than once. Multilevel latent profile models were applied to examine school violence among students. Our results indicated that there were four latent classes; high-level bullying and victimized group (1.7%), mainly bullying group(2.1%), mainly victimized group(3.7%), verbal bullying and victimized group(92.5%). Gender, resilience, self-control, peer relationship, parental relationship were significant determinants of the latent profiles at student level. Teacher-student relationships, school violence prevention, gender ratio of school were significant determinants of the latent profiles at school level. The present study contributed to extending theoretical discussions by classifying students into groups based on frequency and different forms of bullying and victimization. Moreover, this study examined determinants of student and school level simultaneously by dealing with multilevel data.