• 제목/요약/키워드: External User

검색결과 525건 처리시간 0.021초

어린이의 안전한 보행을 위한 iZone 시스템 (The iZone System for Safety Walking of Children)

  • 민성희;오유수
    • 한국멀티미디어학회논문지
    • /
    • 제22권1호
    • /
    • pp.62-69
    • /
    • 2019
  • In this paper, we propose iZone system for safe walking of children. The proposed system recognizes the state that a child is down a roadway as a dangerous situation. And then it informs the surrounding adults and guardians of the child in the event of a dangerous situation. The iZone system consists of the iZone device that attaches to a child's bag or clothing, the iZone app for children, the iZone server, and external beacons. The proposed system uses the ultrasonic sensor of the iZone device and the GPS coordinates and external beacons information by the children's smartphone to determine the dangerous situation. The proposed system uses external beacons to calibrate the GPS coordinates. Moreover, it determines whether the child is down the roadway in sidewalk by measuring the height difference between the roadway and the sidewalk using ultrasonic sensor.

차세대 도서관 목록의 이용자 서평에 관한 고찰 (A Study on the User-contributed Reviews for the Next Generation Library Catalogs)

  • 윤정옥
    • 한국문헌정보학회지
    • /
    • 제46권2호
    • /
    • pp.115-132
    • /
    • 2012
  • 이 연구의 목적은 차세대 도서관 목록에서 이용자 서평 기능의 이용 현황 및 서지레코드에서 연결될 수 있는 외부 정보원의 이용자 서평의 영향 가능성을 살펴보는 것이다. 2012년 2월 16일부터 4월 4일 사이에 2010년에 출간된 열권의 책을 대상으로 WorldCat에서 소장도서관, 이용자 서평, 태그 및 독서 리스트의 현황 및 변동 추이, 그리고 서지레코드에 연결된 Amazon.com과 GoodReads.com의 이용자 서평 현황을 살펴보았다. WorldCat에서 아직 이용자 참여 기능의 활용도는 매우 낮았으며, 이용자 서평보다는 태그나 독서 리스트를 통한 참여가 더 많았다. 같은 책들에 대한 아마존과 굿리즈의 이용자 서평 참여도는 매우 높았고, 아마존에서 한 권의 책과 관련된 이용자 서평 사례 분석은 이용자 참여 기능이 왜곡될 수 있는 가능성을 암시하였다. 아직은 초기 단계인 도서관 목록에 대한 이용자 참여 기능의 확산 및 안정화 추이의 지속적 관찰, 그리고 이 기능이 이용자의 자료 선택에 미치는 영향의 심층적, 체계적 분석이 필요하다.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • 제12권5호
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

Social Media Performance: From the Perspective of Social Media Apathetic Behavior

  • Inwon Kang;Sungjoon Yoo
    • Journal of Korea Trade
    • /
    • 제26권3호
    • /
    • pp.1-22
    • /
    • 2022
  • Purpose - Social media platforms have presented individuals with an opportunity to create and maintain their social relationship through the use of social media services. However, such social relationship has a negative influence on users' interest in social media. Design/methodology - Using structural equation modeling, this study seeks to examines the effects of different social media conflicts (individual and social conflicts) on users' psychological internal state, especially user apathetic behavior Findings - The findings confirm that, among social media conflicts, social-related conflict, especially social interaction overload has a negative effect on cognitive resonance, while individual conflict has the highest effect on cognitive dissonance. Also, cognitive dissonance has a much greater effect than cognitive resonance on user resistance, this means that users' negative perception of social media has a greater influence on their resistance. Lastly, user's resistance was found to have a positive influence on user's apathetic behavior. Originality/value - In other to capture social media Apathetic behavior, this study focus on social media conflict perspective, which includes social-related conflict and individual conflict, which are found to influence users' internal states towards social media and further induce social media behavior. This study is unique because it is among the first to explore social media apathetic behavior by focusing on the influence of both external social media conflict and internal state. Also, this study proposed that social related conflict has a higher negative influence on WeChat user than individual related conflict.

Business Information Visuals and User Learning : A Case of Companies Listed on the Stock Exchange of Thailand

  • Tanlamai, Uthai;Tangsiri, Kittisak
    • Journal of Information Technology Applications and Management
    • /
    • 제17권1호
    • /
    • pp.11-33
    • /
    • 2010
  • The majority of graphs and visuals made publicly available by Thai listed companies tend to be disjointed and minimal. Only a little over fifty percent of the total 478 companies included graphic representations of their business operations and performance in the form of two or three dimensional spreadsheet based graphs in their annual reports, investor relations documents, websites and so on. For novice users, these visual representations are unlikely to give the big picture of what is the company's financial position and performance. Neither will they tell where the company stands in its own operating environment. The existing graphics and visuals, in very rare cases, can provide a sense of the company's future outlook. For boundary users such as audit committees whose duty is to promote good governance through transparency and disclosure, preliminary interview results show that there is some doubt as to whether the inclusion of big-picture visuals can really be of use to minority shareholders. These boundary users expect to see more insightful visuals beyond those produced by traditional spreadsheets which will enable them to learn to cope with the on-going turbulence in today's business environment more quickly. However, the debate is still going on as to where to draw the line between internal or external reporting visuals.

  • PDF

Home Network 게이트웨이에서 효율적인 MSAC 설계 및 구현 (Design and Embodiment in Home Network at Gateway is Stabilization MSAC)

  • 윤운관;최경호;김귀남
    • 융합보안논문지
    • /
    • 제6권1호
    • /
    • pp.105-110
    • /
    • 2006
  • 홈 게이트웨이는 가정 내 홈네트워크를 구성하는 유비쿼터스 컴퓨팅(Ubiquitous Computing) 환경에서 통신과 제어 및 모니터링의 중심 역할과 더불어 외부 인터넷으로의 연결을 물리적으로 제공해 주는 장비이다. 홈게이트웨이를 통하여 홈네트워크 제어를 포함하는 다양한 서비스가 제공되고 있으며 홈 게이트웨이가 댁내망의 매체들간에 중재역할을 할 때 서비스 외부 공격 요인들로부터 데이터의 분석, 도청, 위/변조 등으로부터 대응할 수 있는 효율적인 보안기법을 채택하고, 홈 게이트웨이시스템을 최적의 상태론 유지함으로서 전송매체들간에 송/수신되는 데이터의 무결성을 보장하는 구조적인 보안시스템을 제시하고자 한다.

  • PDF

외부 입력기기 사용 정보 기반 셋톱박스 대기모드 전환 기술 (A Standby Mode Transition Scheme for Set-top Box Power Saving by the Use Information of External Device)

  • 김용호;최윤범;오남걸;김훈
    • 정보통신설비학회논문지
    • /
    • 제9권4호
    • /
    • pp.124-130
    • /
    • 2010
  • This paper considers a power saving technique of set-top box (STB) that turns the signal into content which is then displayed on the television (TV) screen. A traditional power saving scheme, Auto Power Down (APD), was devised to reduce the power consumption of STB. APD checks whether the user is watching TV over a period of time and enforces STB into stand-by mode when the check result reveals the user is not watching TV. This paper proposes an enhanced power saving scheme that transits STB operation mode to 'stand-by' immediately when STB recognizes the change of TV's external input signal. The proposed scheme does not require the monitoring time to check the users' watching TV, and transits to standby mode faster than the conventional APD, which results in better performance in power saving. The simulation result shows that the proposed scheme achieves 2 to 11% improvement in power consumption compared with the conventional APD.

  • PDF

멀티센서 기반 스마트의류에서 상황인지를 위한 디지털필터연구 (A Study of Digital filter for context-awareness using multi-sensor built in the smart-clothes)

  • 전병찬;박현문;박원기;이성철
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.911-913
    • /
    • 2013
  • 사용자의 행동 추론에서는 수신된 센서 데이터의 신뢰성이 중요하다. 하지만 외 내부 환경, 온도, 진동 등에 따라 센서의 측정값이 달라진다. 이러한 잡음 환경은 센서로부터 수집되는 정보의 신뢰성에 영향을 준다. 때문에 잡음을 감소시키고 사용자의 행동을 추론하는 디지털 필터와 추론 알고리즘이 요구된다. 본 연구는 사용자 행동의 잡음 제거, 왜곡 방지로 칼만 필터와 지수 가중이동 평균 필터의 비교실험을 하였다. 또한 본 제안된 확장가중 이중필터 법과 비교하였다. 결과적으로 제안된 필터가 다른 필터에 비해 잡음 환경에 견고하였다.

  • PDF

유비쿼터스 홈 네트워크에서의 정보보호 기술 연구 (Be study technical information protection in ubiqutious home networks)

  • 천재홍;박대우
    • 한국컴퓨터정보학회지
    • /
    • 제15권1호
    • /
    • pp.65-75
    • /
    • 2007
  • 본 논문에서는 유비쿼터스 홈 네트워크에서의 개인정보보호를 위해 유비쿼터스와 홈 네트워크의 보안을 위협하는 다양한 보안 위협사항과 요구사항에 대해 분석하고 연구하였다. 보안기능을 강화한 홈 보안 게이트웨이를 설계를 통해 외부에서의 정당한 사용자 접근 시 인증절차와 검증절차를 마련함으로써 홈 네트워크의 보호를 강화하였다. 또한 DoS, DDoS, IP Spoofing 공격을 실시하여 홈 네트워크 보안 게이트웨이에서의 방어실험을 함으로써 외부 서비스 거부 공격에 대한 보안이 이루어졌음을 확인하였다. 실험을 통해 유비쿼터스 홈 네트워크에서의 기기와 사용자에 대한 보안을 강화하고, DoS, DDoS, IP Spoofing과 같은 외부 공격에 대한 방어를 확인함으로써 본 논문의 홈 네트워크 보안 모델을 유비쿼터스 홈 네트워크에서의 개인정보보호를 강화할 수 있는 방안으로 제시한다.

  • PDF

Development of 3-D viewer for indoor location tracking system using wireless sensor network

  • Yang, Chi-Shian;Chung, Wan-Young
    • 센서학회지
    • /
    • 제16권2호
    • /
    • pp.110-114
    • /
    • 2007
  • In this paper we present 3-D Navigation View, a three-dimensional visualization of indoor environment which serves as an intuitive and unified user interface for our developed indoor location tracking system via Virtual Reality Modeling Language (VRML) in web environment. The extracted user's spatial information from indoor location tracking system was further processed to facilitate the location indication in virtual 3-D indoor environment based on his location in physical world. External Authoring Interface (EAI) provided by VRML enables the integration of interactive 3-D graphics into web and direct communication with the encapsulated Java applet to update position and viewpoint of user periodically in 3-D indoor environment. As any web browser with VRML viewer plug-in is able to run the platform independent 3-D Navigation View, specialized and expensive hardware or software can be disregarded.