• Title/Summary/Keyword: External User

Search Result 525, Processing Time 0.03 seconds

A Study on the Direction-Establishment of Church Building Design by the User Recognizing and Image-Evaluation (인지분석과 이미지평가에 의한 교회건축 방향설정에 관한 연구)

  • Choi, Sung-Yun;Kim, Hwa-Jeong;Han, Kyu-Young
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.11 no.1
    • /
    • pp.47-56
    • /
    • 2009
  • According to the user recognizing, the propose of this study is to establish the systematic church-design and the plan of rational process. When the plan of church design is rational come out, the local community will be risen and there is the possibility which will raise the essential function of church construction and design. The results from the study are as follow. Firstly, the area of the front-window and the number of the external entrance are correlated with the accessibility of the building. Secondly, the height of a bell-tower is related with the feelings of a tediously and a intimate degree. Thirdly, the ground clearance of the whole surface is correlated with the church-character and the community formation of a local society.

  • PDF

Safe and Reliable Intelligent Wheelchair Robot with Human Robot Interaction

  • Hyuk, Moon-In;Hyun, Joung-Sang;Kwang, Kum-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.120.1-120
    • /
    • 2001
  • This paper proposes a prototype of a safe and reliable wheelchair robot with Human Robot Interaction (HRI). Since the wheelchair users are usually the handicapped, the wheelchair robot must guarantee the safety and reliability for the motion while considering users intention, A single color CCD camera is mounted for input user´s command based on human-friendly gestures, and a ultra sonic sensor array is used for sensing external motion environment. We use face and hand directional gestures as the user´s command. By combining the user´s command with the sensed environment configuration, the planner of the wheelchair robot selects an optimal motion. We implement a prototype wheelchair robot, MR, HURI (Mobile Robot with Human Robot Interaction) ...

  • PDF

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on Determinants of Category Diversification of Internet Portals in Korea (인터넷포털의 카테고리 다각화 결정변수에 대한 연구)

  • Park, Kyung-Min
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.4
    • /
    • pp.1-12
    • /
    • 2008
  • The study suggests an answer to the question of what determines category diversification of Internet portals in Korea. First, as external factors, competition intensity and market growth are hypothesized to have influence on the degree of category diversification. Second, an internal factor, user loyalty to portals, is hypothesized to influence negatively category diversification. The study performed empirical analysis based on weekly portal-specific panel data of eighteen internet portals in Korea during the period between 2001 and 2004. The result shows that category diversification increases as competition intensity increases, and that category diversification decreases as user loyalty increases. There was no effect of market-level growth rate on category diversification.

A Research Framework for the Success Factors of Information

  • Yoo, Sangjin;Soongoo, I-Iong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.3 no.1
    • /
    • pp.117-139
    • /
    • 1998
  • This study is intended to identify the factors affecting the successful information warehouse (IW) implementation through the technology acceptance model. As the IW has played an important role with the organizations, it has become a strategic management tool. However, because the building of an IWS requires a great amound of financing and a multi-period, managers should consider identifying the variables as a predictor of IWS success. The related research areas, such as TAM , TRA, and innovation diffusion theory, and previous research associated with the EWS success factors are reviewed in this paper. Based on the hypotheses presented , the study will empirically test the relationships between six external variable-user involvement, computer self-efficacy, OLAP characteristics, problem difficulty , user training and top management support-and system utilization via user's perceptions of ease of use, unusefulness. This study semmes to be a first attempt in this research area, and its results will provide general guidclines for IWS project managers to enhancement the like hood of system succes.

Age and Gender in Reddit Commenting and Success

  • Finlay, S. Craig
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.3
    • /
    • pp.18-28
    • /
    • 2014
  • Reddit is a large user generated content (USG) website in which users form common interest groups and submit links to external content or text posts of user-created content. The web site operates on a voting system whereby registered users can assign positive or negative ratings to both submitted content and comments made to submitted content. While Reddit is a pseudonymous site, with users creating usernames but providing no biographical data, an informal survey posted to a large shared interest community yielded 734 responses including age and gender of users. This provided a large amount of contextual biographical data with which to analyse user profiles at the first level of Computer Mediated Discourse Analysis (CMDA), articulated by Susan Herring. The results indicate that older Reddit users both formulate more complex writing and enjoy more success when rated by other users. Gender data was incomplete and as such only tentative results could be proposed in that regard.

The Smart User Interface Platform for Mobile Devices (휴대단말을 위한 지능형 사용자 인터페이스 플랫폼)

  • Park, Kyung Min;Choi, Hoon;Lee, Ghang-Gun;Whang, In-Tae;Lee, Chil-Woo
    • Smart Media Journal
    • /
    • v.1 no.4
    • /
    • pp.44-51
    • /
    • 2012
  • A software platform for the next-generation, smart user-interface of mobile devices is described as in this paper. The proposed platform is developed to adapt new devices that may appear in the future through extending the Android platform. Dynamic loading function of software module is developed in order to download and install new software modules for the new devices. Also, platform technology for utilizing external devices to improve quality of service and dynamic switching of wireless interface to reduce power consumption of platform are developed.

  • PDF

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

Classification and Characteristics of Augmented Reality Contents of Fashion Brands (패션 브랜드의 증강현실(AR) 콘텐츠 유형 및 특성)

  • Lee, Hyun-Jin;Ku, Yang-Suk
    • Fashion & Textile Research Journal
    • /
    • v.22 no.3
    • /
    • pp.310-322
    • /
    • 2020
  • This study investigated the classification and characteristics of augmented reality (AR) content of fashion brands. The AR contents of fashion brands were classified according to user participation space and content delivery method. Based on these types, eight case studies were conducted, along with a discussion of AR characteristics in terms of presence, interactivity, and immersion. The results showed that AR content could be divided into four types: offline visit-external information type, offline visit-internal experience type, online utilization-external information type, and online utilization-internal experience type. It was also found that there were differences in characteristics for each type of AR content. First, the offline visit-external information type requires various new content that can provide entertainment immersion to users. Second, the offline visit-internal experience type requires a powerful inducement for users to visit a specific space providing AR content and to participate in augmented environments. Third, the online utilization-external information type needs a series of AR content that can consistently incite users' curiosity about brands and products. Fourth, the online utilization-internal experience type needs effective content to improve users' shopping experience with the virtual fitting of fashion accessories, such as eyewear, hats, jewelry, and watches. Accordingly, fashion companies should create contents that can provide appropriate presence, interactivity, and immersion by AR type.