• Title/Summary/Keyword: 인지도 관리기법

Search Result 169, Processing Time 0.029 seconds

Study of Contdext-aware File Management for Hybrid Storage Systems (복합 저장 시스템을 위한 상황-인지 파일 관리에 대한 연구)

  • Byun, Si-Woo;Kang, Bong-Jik;Roh, Chang-Bae
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.383-384
    • /
    • 2007
  • 본 논문은 하이브리드 저장 장치를 위한 효율적인 병렬 저장 시스템 구조와 데이터 및 파일 관리 기술 개발을 목표로 한다. 기존의 플래시 메모리 기반의 기존의 데이터 저장 구조들을 분석하고, 병렬형 하이브리드 데이터 저장 시스템 구조와 비교 분석한다. 또한, 하이브리드 하드디스크의 데이터 저장 및 입출력 연산 수행을 효과적으로 지원할 수 있도록 플래시 메모리의 고유한 특성을 활용한 상황인지 데이터 및 파일 관리 기법을 제안한다.

  • PDF

Accurate Step-Count Detection based on Recognition of Smartphone Hold Position (스마트폰의 소지위치 인지 기반의 정확한 보행수 검출 기법)

  • Hur, Taeho;Yeom, Haneul;Lee, Sungyoung
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.374-382
    • /
    • 2017
  • As the walking exercise is emphasized in personalized healthcare, numerous services demand walking information. Along with the propagation of smartphones nowadays, many step-counter applications have been released. But these applications are error-prone to abnormal movements such as simple shaking or vibrations; also, different step counts are shown when the phone is positioned in different locations of the body. In this paper, the proposed method accurately counts the steps regardless of the smartphone position by using an accelerometer and a proximity sensor. A threshold is set on each of the six positions to minimize the error of undetection and over-detection, and the cut-off section is set to eliminate any noise. The test results show that the six position type were successfully identified, and through a comparison experiment with the existing application, the proposed technique was verified as superior in terms of accuracy.

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.

Search Performance Improvement of Column-oriented Flash Storages using Segmented Compression Index (분할된 압축 인덱스를 이용한 컬럼-지향 플래시 스토리지의 검색 성능 개선)

  • Byun, Siwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.1
    • /
    • pp.393-401
    • /
    • 2013
  • Most traditional databases exploit record-oriented storage model where the attributes of a record are placed contiguously in hard disk to achieve high performance writes. However, for search-mostly datawarehouse systems, column-oriented storage has become a proper model because of its superior read performance. Today, flash memory is largely recognized as the preferred storage media for high-speed database systems. In this paper, we introduce fast column-oriented database model and then propose a new column-aware index management scheme for the high-speed column-oriented datawarehouse system. Our index management scheme which is based on enhanced $B^+$-Tree achieves high search performance by embedded flash index and unused space compression in internal and leaf nodes. Based on the results of the performance evaluation, we conclude that our index management scheme outperforms the traditional scheme in the respect of the search throughput and response time.

Schemes for Managing Semantic Web Data in Ubiquitous Environment (유비쿼터스 환경을 고려한 시맨틱 웹 데이터 관리 기법 연구)

  • Kim, Youn-Hee;Kim, Jee-Hyun
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One important issue to generalize the ubiquitous paradigm is the development of user-centralized and intelligent ubiquitous computing systems. Sharing knowledge and correct communication between users and devices are needed to be aware of continuous changed context information and infer services for which users are suited. The goal of this paper is to describe and manage effectively the meaning of services or data which each device offers for interaction between users and devices based on semantic relationships and reasoning. In this paper, we represent semantic data using OWL and design a ubiquitous based intelligent system. We propose some index structures and strategies to process queries classified by each subsystem and adopt labeling schemes to identify classes and resources in the semantic data. We can find devices which satisfies various user's requests exactly and quickly using the proposed strategies.

  • PDF

Correlation between Building Facade Elements and Defects through "Pixelization Method" (픽셀화기법을 통한 건축물 외벽의 하자와 입면 구성 요소 간의 관계 분석)

  • Kim, Wooram;Jeon, Yongdeok;Shin, Jeongran;Jeong, Kichang;Lee, Jaeseob
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.4
    • /
    • pp.40-48
    • /
    • 2016
  • The construction industry has been made diversified on the design process depending on qualitative growth of customers' demands. But this approach has lead to problems such as falling of building values due to lack of awareness of defects caused by long term utilization. So, the relationship on the characteristics of buildings and defects should be clearly analyzed to prevent falling of building values. This study, therefore, proposed a technique to quantify the relationship between building facade elements and defects. The technique was developed by applying pixel concept to the outside of the buildings. It has a feature to determine the clear relationship by presenting quantitative data that have been recognized qualitatively. The proposed technique is referred to "Pixelization Method". It separates building facade into unit compartment and makes database by assigning a code depending on the characteristics. Through the method, this study is expected to create a foundation for the quantitative analysis of relationship between building facade elements and defects as a basis on active responding to the defects.

Decision Model of the Effectiveness for Advanced that Security Visualization (발전된 보안 시각화 효과성 결정 모델)

  • Lee, Min-Sun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.147-162
    • /
    • 2017
  • With the advent of various services and devices in the change of IT environment, increasing the complexity of the data, and increasing scale of IT, Many organizations are experiencing the difficulty of analyzing and processing with a large amounts of data for security situations awareness. Therefore, propose the enhancement of security situational awareness through visualization in order to solve the problems of slow response and security situational awareness in organizational risk management. In this paper, we selected the evaluation factors and alternatives for effective visualization by considering user type, situational awareness step, and information visualization attributes through various studies on visualization. And established AHP layer model. Based on this, by using the AHP method for solving the problem of multi-criteria decision making, by calculating the factors for effectively visualizing and the importance of alternative by factor, try to propose a visualization method that can improve the effectiveness of the security situational awareness according to the purpose of visualization and the type of user.

The Directory Service System for Efficient Shared-Object Access in Collaborative-Authoring (공동저작에서의 효율적인 공유객체 액세스를 위한 디렉토리 서비스 시스템)

  • 전재우;오삼권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.233-235
    • /
    • 1999
  • 공동저작 관리 시스템은 효율적인 공동저작을 위해 공유객체관리기능, 세션관리기능, 텔리포인팅(telepointing) 기능, 그리고 공동저작 인지(collaboration awareness) 기능들을 제공해야 한다. 이 중 공유객체관리기능은 저작자로 하여금 등록된 공유객체들을 편리하게 액세스 할 수 있도록 하고 저작에 필요한 공유객체들을 등록, 변경, 그리고 삭제할 수 있도록 함으로써 작업효율을 증대시킬 수 있는 핵심기능이다. 최근의 연구는 주로 등록된 공유객체의 변경 및 불필요한 정보전송으로 인한 작업지연, 그리고 공유객체 액세스 권한의 효율적인 관리를 위한 플로어 제어(floor control)에 그 초점을 맞추고 있으나 공유객체관리를 위한 기법이나 구조에 관한 연구는 미흡하다. 편리한 공동저작을 위해서는 분산환경의 특징상 가 저작자들의 시스템에 자연스럽게 분산되어 있는 공유객체들을 저작자나 공유객체들의 실제 위치에 상관없이 액세스할 수 있도록 하고, 저작자로 하여금 공유객체의 등록 시에 유일명 부여(unique naming)를 가능하게 하여 필요한 공유객체를 쉽게 검색할 수 있도록 해야 한다. 이를 위해 본 논문은 공유객체 디렉토리 서비스(shared-object directory service)를 제안한다. 공유객체 디렉토리 서비스는 일반 디렉토리(normal directory)와 세션 디렉토리(session directory)를 저작자에게 제공하여 공유객체의 등록시에 유일명 부여를 가능하게 하고 필요한 공유객체 검색을 용이하게 한다.

  • PDF

User Profile Management for Personalized Services in smart home environment (스마트 홈 환경에서의 개인화된 서비스를 위한 사용자 프로파일 관리 기법)

  • Suh, Young-Jung;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.672-677
    • /
    • 2006
  • 유비쿼터스 컴퓨팅 환경에서 상황 인지 서비스 제공을 위한 프레임워크들은 환경에 있는 응용 서비스들로 하여금 사용자 행동 패턴을 지속적으로 모니터링하며, 하나의 중앙집중식 서버에서 축적된 사용자 프로파일을 관리하도록 개발되어 왔다. 그러나, 전체 환경이 사용자 개개인의 서비스에 대한 요구 및 선호도를 파악하고 관리하는 일은 비효율적이다. 그리하여, 사용자 프로파일 관리 서버를 사용하지 않고 개인화된 서비스를 제공하기 위하여 휴대용 정보 단말기가 직접 사용자의 서비스에 대한 선호도를 인식하고 관리하는 사용자 프로파일 관리 프레임워크를 제안한다. 스마트 홈 환경의 이동형 사용자의 컨텍스트 인식을 위해서는 사용자 몸에 부착되어 있는 센서들이 사용자에 대한 정보를 휴대용 정보 단말기로 전달하며, 각 정보 단말기는 다양한 센서들로부터 획득한 정보와 정보단말기를 통해 제공되는 사용자의 직접적인 요구정보를 서비스 목적에 맞게 재해석하여 사용자 선호도에 맞는 서비스 내용을 제공하도록 하는 것이다. 제안된 프레임워크는 휴대용 정보 단말기를 통해 사용자와 환경과의 상호작용을 필요로 하는 유비쿼터스 기술이 활용 가능한 다양한 어플리케이션에 광범위하게 활용될 수 있다. 더 나아가, 사용자의 사적인 정보 보호를 보장하면서 개인화된 서비스 제공을 가능하게 할 수 있다.

  • PDF

Analyzing Patterns in User's Information Seeking Behavior on the Web (웹 이용자의 정보탐색행위 패턴 분석)

  • Kim, Sung-Jin
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.197-214
    • /
    • 2006
  • A Web-based environment has very various and heterogeneous users. The emphasis on their individual characteristics may make it hard to reach the general understanding of how they seek and use information on the Web. The purpose of this study is to find common patterns in information seeking behavior on the Web by analyzing a series of cognitive movement of users in interaction with the Web. Based on Dervin's concept and Timeline interview methodology, this study collected 37 Web experience descriptions from 21 respondents, which consisted of 302 steps. Findings addressed that Web information seeking behavior can be classified into seven types : Starting, Searching, Viewing/B row sing , Examining/comparing, Finding/compiling, Deciding/Acting, and Ending. Movement paths in the seven-type information seeking process showed that user's interaction with the Web was repeated and circulated at the Viewing/Browsing step and that information seeking behavior on the Web was multi-directional and non-linear.