• Title/Summary/Keyword: 사용자 개입

Search Result 207, Processing Time 0.022 seconds

A Study on the Characteristics of Children's Experience Exhibition Based on Tangible User Interface (TUI(Tangible User Interface)기반의 어린이 체험전시 특성 분석 연구)

  • Lee, Tae-Eun;Lee, Chang-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.341-348
    • /
    • 2020
  • This study is a basic research towards diffusion of discourse regarding TUI-based experience exhibition. In that purpose this study tries to find out the development type of children's experience exhibition using TUI by analyzing children's experience exhibition phenomena that are changing in digital environment. For the sake of this research, cases of experience exhibitions were analyzed and characteristics were derived based on TUI(Tangible User Interface) and on the types of tangibles. As results of this study, TUI elements were found in the order of interactive planes, connection of bits and atoms, and environmental media and Tangibles were ranked in the order of stuff, planes, devices, and space types. This fact shows that TUI is actively used in experience exhibitions where children's active participation and extended experience is necessary.

A Blockchain-Based Content Authentication Scheme for CCN (블록체인 기반 CCN 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.975-985
    • /
    • 2018
  • ICN architecture, one of future Internet technologies, proposes that content request packets toward a content source can be responded by several distributed nodes. So, ICN can solve network congestion which is happened around content sources and provide a seamless content distribution service regardless of the network and system statuses of content sources. Especially, CCN implements content caching functionality in network nodes so that such intermediated network nodes can themselves respond to content requests. However, when receiving content from distributed nodes, users receiving content cannot authenticate the nodes providing the content. So CCN is vulnerable to various attacks such as an impersonation attack, a data pollution attack, and so on. This paper first describes CCN content authentication and its weakness. Then it proposes an improved content authentication scheme based on a blockchain and evaluates the performance of the proposed scheme.

The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment (분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구)

  • Kim, DaeYoub
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.9
    • /
    • pp.235-242
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P, CDN, and CCN. These technologies take a common approach that content request packets is responded by distributed network nodes or hosts, not by a single content distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

A Study on the integration of UGC in broadcast journalism: An evidence from Bangladesh (방송 저널리즘의 UGC 이용에 관한 연구: 방글라데시의 사례를 중심으로)

  • Saiful, Hoque;Park, Jaeyung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.301-311
    • /
    • 2019
  • Digital convergence put a huge challenges for broadcast media in terms of integrating user generated content (UGC). Keeping this in mind, objective of the study is to explore the factors that affecting UGC's integration in Broadcast channel from developing countries' perspective. We explored how and why UGC are appearing in Bangladeshi Television news. In-depth interview was used and news editorial level staffs were selected from leading Bangladeshi television channels. Findings suggest that, state interventions in crisis events and lack of experiences to handle crisis reporting played a crucial role to incorporate UGC in television news bulletins. One of the significant findings is that, mere traditional guidelines and work policy of the media houses will not be enough to handle user generated content as well as citizen's participation in news media. Thus, we recommend to formulate a comprehensive user generated content integration policy in the context of Bangladesh.

Generating an Autonomous Landing Testbed of Simulated UAV applied by GA (GA를 적용한 모의 UAV의 자율착륙 테스트베드 구축)

  • Han, Changhee
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.93-98
    • /
    • 2019
  • In case of unmanned aerial vehicles used in modern society, there has been a problem where a human operator should be still needed to control the UAV because of a lower level of autonomy. In this paper, genetic algorithm is selected as a methodology for the autonomy accomplishment and then we verify a possibility of UAV autonomy by applying the GA. The landing is one of the important classical tasks on aerial vehicle and the lunar Landing is one of the most historical events. Autonomy possibility of computer-simulated UAV is verified by landing autonomy method of a falling body equipped with a propulsion system similar to the lunar Lander. When applying the GA, the genom is encoded only with 4 actions (left-turn, right-turn, thrust, and free-fall) and applied onto the falling body, Then we applied the major operations of GA and achieved a success experiment. A major contribution is to construct a simulated UAV where an autonomy of UAV can be accomplished while minimizing the sensor dependency. Also we implemented a test-bed where the possibility of autonomy accomplishment by applying the GA can be verified.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

Design of Air Vehicle Test Equipment for Inspecting On-board Equipment in UAV (무인항공기 탑재장비 점검을 위한 통합 점검 장치 설계)

  • Go, Eun-kyoung;Kwon, Sang-Eun;Song, Yong-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.108-114
    • /
    • 2021
  • AVTE(Air Vehicle Test Equipment) is a device to check status of on-board aircraft equipment before and after flight for performing successful UAV(Unmanned Aerial Vehicle) missions. This paper describes software design and test sequence of the AVTE for enabling easy-manual check by the operator and convenient automatic check of on-board electric equipment respectively. The proposed AVTE inspects BIT(Built-In Test) results of on-board LRUs(Line Replacement Units) including avionics and sensor sub-system devices. Also, it monitors all the LRU status and check the normality of aircraft equipment by means of setting specific values of the LRUs and confirming the expected test results. The AVTE prints the test results as a form of report to easily check the normal conditions of the aircraft equipment and operates automatically without operator interaction, thus being thought to effectively reduce workload of the operator.

On-line Finite Element Model Updating Using Operational Modal Analysis and Neural Networks (운용중 모드해석 방법과 신경망을 이용한 온라인 유한요소모델 업데이트)

  • Park, Wonsuk
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.1
    • /
    • pp.35-42
    • /
    • 2021
  • This paper presents an on-line finite element model updating method for in-service structures using measured data. Conventional updating methods, which are based on numerical optimization, are not efficient for on-line updating because they generally require repeated eigenvalue analyses until convergence criteria are met. The proposed method enables fully automated on-line finite element model updating, almost simultaneously with vibration measurement, without any user intervention or off-line procedures. The automated covariance-driven stochastic subspace identification (Cov-SSI) method is utilized to identify modal frequencies and vectors, and the identified modal data is fed to the neural network of the inverse eigenvalue function to produce the updated finite element model parameters. Numerical examples for a wind excited 20-story building structure shows that the proposed method can update the series of finite element model parameters automatically. It is also shown that sudden changes in the structural parameters can be detected and traced successfully.

A Study on the Creation of Interactive Text Collage using Viewer Narratives (관람자 내러티브를 활용한 인터랙티브 텍스트 콜라주 창작 연구)

  • Lim, Sooyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.297-302
    • /
    • 2022
  • Contemporary viewers familiar with the digital space show their desire for self-expression and use voice, text and gestures as tools for expression. The purpose of this study is to create interactive art that expresses the narrative uttered by the viewer in the form of a collage using the viewer's figure, and reproduces and expands the story by the viewer's movement. The proposed interactive art visualizes audio and video information acquired from the viewer in a text collage, and uses gesture information and a natural user interface to easily and conveniently interact in real time and express personalized emotions. The three pieces of information obtained from the viewer are connected to each other to express the viewer's current temporary emotions. The rigid narrative of the text has some degree of freedom through the viewer's portrait images and gestures, and at the same time produces and expands the structure of the story close to reality. The artwork space created in this way is an experience space where the viewer's narrative is reflected, updated, and created in real time, and it is a reflection of oneself. It also induces active appreciation through the active intervention and action of the viewer.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.