• 제목/요약/키워드: A potential user

검색결과 731건 처리시간 0.032초

Glanceable and Informative WearOS User Interface for Kids and Parents

  • Kim, Siyeon;Yoon, Hyoseok
    • Journal of Multimedia Information System
    • /
    • 제8권1호
    • /
    • pp.17-22
    • /
    • 2021
  • This paper proposes a wearable user interface intended for kids and parents using WearOS smartwatches. We first review what constitutes a kids smartwatch and then design UI components for watchfaces to be used by kids and parents. Different UI components ranging from activity, education, voice search, app usage, video, location, health, and quick dial are described. These components are either implemented as complications or on watchfaces and may require on-device standalone function, cross-device communication, and external database. We introduce a theme-based amusing UI for kids whereas simple and easily accessible components are recommended to parents' watchface. To illustrate use cases, we present 3 scenarios for enhancing communication between parents and child. To show feasibility and potential of our approach, we implement our proof-of-concept using commercial smartwatches, smartphones, and external cloud database. Furthermore, performance of checking app usages on different devices are presented, followed by discussion on limitations and future work.

인터넷 익스플로러에서 사용자 정보 유출 가능성 (Possibility of Disclosure of User Information in Internet Explorer)

  • 이상호;맹영재;양대헌;이경희
    • 한국통신학회논문지
    • /
    • 제38B권12호
    • /
    • pp.937-943
    • /
    • 2013
  • 국내 인터넷 브라우저 시장 점유율 1위인 인터넷 익스플로러의 일부 버전에서 CORS(Cross-Origin Resource Sharing)를 이용한 사용자 정보의 유출이 가능함을 확인하였다. 이는 이전의 방법과는 달리 악성 프로그램 등의 설치 없이도 로그인한 계정의 정보를 유출할 수 있으며, 이를 이용하면 보안 프로그램의 영향을 받지 않고서도 SNS와 포털 사이트의 사용자 정보 혹은 계좌 정보나 카드 사용내역까지 얻을 수 있다. 인터넷 익스플로러 뿐만 아니라 일부 모바일 브라우저에서도 CORS를 이용한 공격이 가능함을 보였다. 이 논문에서는 인터넷 익스플로러로 접속한 은행사, 카드사, SNS, 포털 사이트를 대상으로 한 CORS를 이용한 공격으로 사용자 정보의 유출은 물론 2차 공격으로 이어질 수 있는 가능성과 개선방안을 살펴본다.

TOUSE: A Fair User Selection Mechanism Based on Dynamic Time Warping for MU-MIMO Networks

  • Tang, Zhaoshu;Qin, Zhenquan;Zhu, Ming;Fang, Jian;Wang, Lei;Ma, Honglian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4398-4417
    • /
    • 2017
  • Multi-user Multiple-Input and Multiple-Output (MU-MIMO) has potential for prominently enhancing the capacity of wireless network by simultaneously transmitting to multiple users. User selection is an unavoidable problem which bottlenecks the gain of MU-MIMO to a great extent. Major state-of-the-art works are focusing on improving network throughput by using Channel State Information (CSI), however, the overhead of CSI feedback becomes unacceptable when the number of users is large. Some work does well in balancing tradeoff between complexity and achievable throughput but is lack of consideration of fairness. Current works universally ignore the rational utilizing of time resources, which may lead the improvements of network throughput to a standstill. In this paper, we propose TOUSE, a scalable and fair user selection scheme for MU-MIMO. The core design is dynamic-time-warping-based user selection mechanism for downlink MU-MIMO, which could make full use of concurrent transmitting time. TOUSE also presents a novel data-rate estimation method without any CSI feedback, providing supports for user selections. Simulation result shows that TOUSE significantly outperforms traditional contention-based user selection schemes in both throughput and fairness in an indoor condition.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권2호
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

Prediction of Routes between Significant Locations Based on Personal GPS Data

  • Vo, Phuong T. H.;Hwang, Kyu-Baek
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(A)
    • /
    • pp.278-281
    • /
    • 2011
  • Mobile devices equipped with various sensors have the potential of providing context-aware services. Location is one of the most common forms of context, which can be applied to diverse applications. In this paper, we present methods for learning and predicting users' routes between significant locations, e.g., home and workplaces, based on personal GPS data. A user's significant locations and routes between them are learned by a set of rules as well as clustering. When the user is moving, our methods can predict which of the learned routes is being taken now. After the route prediction, the user's next location can also be inferred. Our methods have been applied to the real GPS datasets from four subjects. For the next location prediction task, the achieved accuracy was 84.8%.

군집화 기법을 이용한 B2B Marketplace상의 최적 파트너 검색 시스템 (An Optimized Partner Searching System for B2B Marketplace Applying Clustering Techniques)

  • 김신영;김수영
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2003년도 춘계공동학술대회
    • /
    • pp.572-579
    • /
    • 2003
  • With the expansion of e-commerce, E-marketplace has become one of the most discussed topics in recent years. Limited theoretical works, however, have been done to optimize the practical use of e-marketplace systems. Other potential issues aside, this research has focused on this problem: 'the participants waste too much time, effort and cost to find out their best partner in B2B marketplace.' To solve this problem, this paper proposes a system which provides the user-company with the automated and customized brokering service. The system proposed in this paper assesses the weight on the priorities of a user-company, runs the two-stage clustering algorithm with self-organizing map and K-means clustering technique. Subsequently, the system shows the clustering result and user guide-line. This system enables B2B marketplace to have more efficiency on transaction with smaller pool of partners to be searched.

  • PDF

이용자 연령별 지불의사 수준에 따른 북한산 산악철도 경제성 변화 연구 (Study on the change in Economic Efficiency for Developing Mountain Railway Based on User's Willingness to Pay by Age)

  • 이종성;엄진기;문대섭;이희성
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2010년도 춘계학술대회 논문집
    • /
    • pp.1310-1319
    • /
    • 2010
  • This paper has shown that Linear Induction Motor(LIM) and Rack and pinion type are efficient in selecting railway routes and systems after considering time, geo-spatial characteristics and the floating population by benchmarking domestic and overseas mountain trains. The benefit-cost analysis through the use of modeling on user's willingness to pay is conducted as a means that provides access to tourism resources. this paper concludes that the benefit-cost varies in response to changes in the amount of user's willingness to pay by age. It is expected that this paper serves as a reference data in the introduction stage of the mountain train project implemented by central or local governments with tourism resources in mountainous areas as the mountain train has turned out to be economically efficient while various potential benefits that have not been included in the benefit-cost analysis need to be quantified and remain to be studied further.

  • PDF

스마트 폰 잠금 화면을 통한 실시간 정보제공 서비스 모델의 개발 (Development of Real Time Information Service Model Using Smart Phone Lock Screen)

  • 오성진;장진욱
    • 한국IT서비스학회지
    • /
    • 제13권3호
    • /
    • pp.323-331
    • /
    • 2014
  • This research is based on real-time service model that uses lock screen of smart devices which is mostly exposed to device users. The potential for lock screen space is immense due to their exposing time for user. The effect can be maximized by offering useful information contents on lock screen. This service model offers real-time keyword with abridged sentence. They match real-time keyword with news by using text matching algorithm and extracts kernel sentence from news to provide short sentence to user. News from the lock screen to match real-time query sentence, and then only to the original core of the ability to move a user evaluation was conducted after adding. The report provided a key statement users feel the lack of original Not if you go to an average of 5.71%. Most algorithms allow only real-time zoom key sentence extracted keywords can accurately determine the reason for that was confirmed.

Spatial Decision Support System for Residential Solar Energy Adoption

  • Ahmed O. Alzahrani;Hind Bitar;Abdulrahman Alzahrani;Khalaf O. Alsalem
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.49-58
    • /
    • 2023
  • Renewable energy is not a new terminology. One of the fastest growing renewable energies is solar energy. The implementation of solar energy provides several advantages including the reduction of some of the environmental risks of fossil fuel consumption. This research elaborated the importance of the adaption of solar energy by developing a spatial decision support system (SDSS), while the Residential Solar Energy Adoption (RSEA) is an instantiation artifact in the form of an SDSS. As a GIS web-based application, RSEA allows stakeholders (e.g., utility companies, policymakers, service providers homeowners, and researchers) to navigate through locations on a map interactively. The maps highlight locations with high and low solar energy adoption potential that enables decision-makers (e.g., policymakers, solar firms, utility companies, and nonprofit organizations) to make decisions. A combined qualitative and quantitative methodological approach was used to evaluate the application's usability and user experience, and results affirmed the ability of the factors of utility, usefulness, and a positive user experience of the residential solar energy adoption of spatial decision support system (RSEA-SDSS). RSEA-SDSS in improving the decision-making process for potential various stakeholders, in utility, solar installations, policy making, and non-profit renewable energy domains.

초고속 통신망을 이용한 청소년의 정신건강관리 지원시스템 개발 (Development of a User Centered Web Site for Mental Health Management in Adolescents)

  • 배정이
    • 대한간호학회지
    • /
    • 제37권1호
    • /
    • pp.14-25
    • /
    • 2007
  • Purpose: A user centered web-based mental health management system may be particularly useful in Korea where there is widespread diffusion of personal computers and internet connectivity. The purpose of this paper was to describe the development of a web-based system for mental health management in adolescents using principals of a user centered design. Method: Our design process includes five distinct phases: needs assessment, analysis, design, development/testing/revision, and application release. Results: Web content includes an introduction, information about mental health management in adolescents, self-assessment and guidance, interventions for improving mental health, directory of self-help groups, and counseling and additional community resources. The web site was released using the URL: http://www.baejy.com/youth. Conclusion: The end result was a web based mental health management system for adolescents with a high degree of usability. The author believes that web-based mental health interventions in the future have true potential in helping Koreans who are suffering, or at risk, for mental health problems, particularly because of the stigma related to psychiatric therapy in Korea.