• Title/Summary/Keyword: 사용자플랫폼

Search Result 2,055, Processing Time 0.032 seconds

Design and Implementation of a Framework Modeler for Intranet Construction Tool (인트라넷 구축 도구를 위한 프레임워크 모델러의 설계 및 구현)

  • Lee, Chang-Mog;Yoo, Cheol-Jung;Chang, Ok-Bae;Lee, Sang-Duck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.63-76
    • /
    • 2001
  • As reusability becomes recognized more importantly, with the introduction of ObjectOriented Programming Languages, developers not only want to reduce development duration, but also to develop a proper system robustly and safely by renovating the Hot Spot in order to reuse the existing framework. When we perform these works, we need the development environment which is the Rapid Application Development tool, and the RAD tools provide us with the convenient development environment. The need of RAD tools is recognized by every Object-Oriented programmer, and many business enterprises are developing them. In this paper, we will present a design and implementation of module-based modeler as a method for developing technique to constmct user-driven Intranet environment for the generation of the program based on the framework. The framework modeler used Java language that is independent on platform, and applied the technique of OMT editor that provides the UML notation partially. Additionally, The modeler also includes the notations that are not supported in OMT editor. In addition to this characteristic, it is structured to develop system consistently with applying the Agent pattern, which is a design pattern suggested by ourselves, to send messages occurred between various Views. The existing MVC(Model-View-Controller) architecture does not have this function. Thus, this tool has a flexibility when user's requirements are changed, or functions are extended.

  • PDF

The Exploratory Study of Creativity and Contents Creation in Social Media (소셜미디어 사용에서 창의성과 콘텐츠 제작에 대한 탐색적 연구)

  • Kang, Sora;Kim, Yoo Jung;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.335-343
    • /
    • 2016
  • Many users actively create and share digital contents in a variety of social media platforms. Social media users have become accustomed to posting or uploading their daily routines, and generating their contents by imitating others' contents or by creating their own unique contents on the basis of their creativity. Thus, this paper explores the relationship between individual creativity, imitation and creative behavior in using social media. In addition, the study demonstrates the moderating effect of individual characteristics such as age and educational level on the relationship between creativity and imitation. We conducted a three-month survey of 564 individuals using social media services and the results were used for hypotheses testing. The study results are summarized as follows. Firstly, creativity has a significant and positive impact on imitation, but not a direct impact on creative behavior. Secondly, the moderating effect of individual characteristics between creativity and imitation is not statistically significant. Based on these findings, this study presents practical and academic implications of the research.

Android Malware Detection Using Auto-Regressive Moving-Average Model (자기회귀 이동평균 모델을 이용한 안드로이드 악성코드 탐지 기법)

  • Kim, Hwan-Hee;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1551-1559
    • /
    • 2015
  • Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.

Personalized Service Recommendation for Mobile Edge Computing Environment (모바일 엣지 컴퓨팅 환경에서의 개인화 서비스 추천)

  • Yim, Jong-choul;Kim, Sang-ha;Keum, Chang-sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1009-1019
    • /
    • 2017
  • Mobile Edge Computing(MEC) is a emerging technology to cope with mobile traffic explosion and to provide a variety of services having specific requirements by means of running some functions at mobile edge nodes directly. For instance, caching function can be executed in order to offload mobile traffics, and safety services using real time video analytics can be delivered to users. So far, a myriad of methods and architectures for personalized service recommendation have been proposed, but there is no study on the subject which takes unique characteristics of mobile edge computing into account. To provide personalized services, acquiring users' context is of great significance. If the conventional personalized service model, which is server-side oriented, is applied to the mobile edge computing scheme, it may cause context isolation and privacy issues more severely. There are some advantages at mobile edge node with respect to context acquisition. Another notable characteristic at MEC scheme is that interaction between users and applications is very dynamic due to temporal relation. This paper proposes the local service recommendation platform architecture which encompasses these characteristics, and also discusses the personalized service recommendation mechanism to be able to mitigate context isolation problem and privacy issues.

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

A Transmission Service Method for Processing Visual Recognition of Sender Information (발신자 정보에 대한 시각적 인식 처리를 위한 전송 서비스 기법)

  • 김기현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.328-336
    • /
    • 2004
  • Recently a mobile service is changing into a system environment that offers the customer various contents service. Representative example of service is a Calling Identity Del ivory Service(CID). Such service has the problem in the case which the receiver cannot remember the phone number of the sender; it has a difficult problem that cannot easily confirm whose the phone number it is. Therefore, it is desirable to design and implement visual services that can enhance the recognition of users. In this paper, we propose the architecture that is similar to a Calling Identity Delivery Service. We propose the architecture for communication service and system that is able to visually display the information of the sender using 2D image data in mobile environment. After that we set the image information to represent the user and this method is able to visually display the information of the sender by transmitting an image data through channels from switch station or base station using the server. When the receiver receives a phone call from the sender, this method provides an efficient service by transmitting visual data with bell sound. That is, the image information of sender is appeared on liquid crystal display(LCD) of the receiver at the same time. We investigate the concepts for processing real-time transmission of image data and describe an example of the implementation result that is based on system. This technology has a potential influence on the marketing and presents an efficiency of this method.

The Effects of Perceived Risk and Review Diagnosticity on the Acceptance of Food Delivery Application (지각된 위험 및 리뷰 진단성이 배달앱 수용에 미치는 영향)

  • Roh, Minjung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.581-592
    • /
    • 2019
  • This study investigates the factors that stimulate or suppress the use of food delivery applications. As potential antecedent factors, the present research examined the review diagnosticity, descriptive norms, and multidimensional risk perception. Based on this, users' data were collected from major metropolitan cities where the food delivery application business is most active. The results of structural equation modeling confirmed that users' approach to food delivery apps becomes more favorable when the review diagnosticity and descriptive norms were improved and when the perceived multidimensional risk expected to be associated with app use is mitigated. Additionally, we found that the positive influence of these attitudes on the actual intention to accept delivery applications became weaker at higher levels of perceived risk. These empirical results may contribute to the formation of strategic and systematic guidelines for promoting the expansion of the recently emerging O2O service platform across diverse sectors. Namely, the significance of this study lies in that it has raised awareness regarding the strategic considerations that such new O2O service providers should take into account for their market positions, in addition to discovering factors that could aid the prompt expansion of the applications' user base.

ROUTE/DASH-SRD based Point Cloud Content Region Division Transfer and Density Scalability Supporting Method (포인트 클라우드 콘텐츠의 밀도 스케일러빌리티를 지원하는 ROUTE/DASH-SRD 기반 영역 분할 전송 방법)

  • Kim, Doohwan;Park, Seonghwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.849-858
    • /
    • 2019
  • Recent developments in computer graphics technology and image processing technology have increased interest in point cloud technology for inputting real space and object information as three-dimensional data. In particular, point cloud technology can accurately provide spatial information, and has attracted a great deal of interest in the field of autonomous vehicles and AR (Augmented Reality)/VR (Virtual Reality). However, in order to provide users with 3D point cloud contents that require more data than conventional 2D images, various technology developments are required. In order to solve these problems, an international standardization organization, MPEG(Moving Picture Experts Group), is in the process of discussing efficient compression and transmission schemes. In this paper, we provide a region division transfer method of 3D point cloud content through extension of existing MPEG-DASH (Dynamic Adaptive Streaming over HTTP)-SRD (Spatial Relationship Description) technology, quality parameters are further defined in the signaling message so that the quality parameters can be selectively determined according to the user's request. We also design a verification platform for ROUTE (Real Time Object Delivery Over Unidirectional Transport)/DASH based heterogeneous network environment and use the results to validate the proposed technology.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

A Study of Perceived Value and Intention to Use for Car Sharing Service : Based on User Experiences Serviced by Seoul Car Sharing (차량공유 서비스에 대한 지각된 가치와 이용의향에 관한 연구 : 서울시 나눔카 서비스 이용자를 중심으로)

  • Park, Keon Chul;Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.109-118
    • /
    • 2019
  • The purpose of this study is to deliver both market-practical and civil-centric political implication for sharing economy by investigating the nature of consumer-adoption for car-sharing service. With the global interest and market proliferation of the sharing economy, various service models for sharing idle resources have also been released in Korea. Particularly, in case of car sharing service, public - private partnership projects are spreading rapidly in various local governments including Seoul, along with the growing demand for alternative transportation system centering on the urban area. This study conducted an empirical study on the process of accepting the car sharing service by analyzing the data collected from users of the car sharing service "Sharing Car(Nanum Car)" of Seoul Metropolitan Government. A survey was conducted on 281 users in their twenties who are in the age of main use among the experienced users of the "Sharing Car(NaNum)" residing in Seoul. The result of analysis on the relationship between these users' perceived value and intention to use the vehicle sharing service would provide implications for establishing consumer(citizen)-centeric policies as well as market implications.