• Title/Summary/Keyword: Personal-usage

Search Result 471, Processing Time 0.026 seconds

Radio Beacon-based Seamless Indoor and Outdoor Positioning for Personal Navigation Systems (개인 휴대용 네비게이션을 위한 라디오 비컨 기반 실내외 연속측위 시스템)

  • Kim, Sang-Kyoon;Jang, Yoon-Ho;Bae, Sang-Jun;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.84-92
    • /
    • 2009
  • In this paper, using the received signal strength of radio beacon such as Wi-Fi, Bluetooth, CDMA and GPS signal from the satellite, we propose the system of positioning which considered indoor and outdoor based on the Place Lab. Conventional Place Lab utilize the various positioning parameters to estimate the indoor location. However, this conventional system has limitations with respect to the range and efficiency of usage. Therefore, we defined the converged model of multisensor data and re-organized the Place Lab to overcome the limitation of a conventional system. Proposed system uses the radio beacon signal and GPS signal together to estimate the location. Furthermore, it provides the seamless PNS service with many mobile devices because this system realized by the OSGi bundle. This proposed system has evaluated the performance with SAMSUNG T*OMNIA SCH-M490 smart phone and the result shows the system is able to support the PNS service.

  • PDF

Comparison between the Internet and Mobile Phone Addiction of Adolescent with Structural Equation Model and Dominance Analysis (구조 방정식 모형과 우세 분석을 통한 청소년의 인터넷.휴대폰 중독 비교)

  • Park, Chan-Jung;Hyun, Jung-Suk;Ha, Hwan-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.11-22
    • /
    • 2013
  • Due to the advent of new smart devices, the new technology addiction problems have been much severer than the Internet addiction recently. A lot of research about each technology addiction has been proposed, but the research about the changes in the addictions has been rare. In this paper, we analyze how the environmental factors such as parents and friends affect the personal factors such as time perspectives and technology usage time. In addition, we get the relative importances among the factors which influence on the Internet and mobile phone addictions. As a result, we can analyze the relationships among the factors and the differences between the two addictions with time perspective. In order to achieve our goals, we surveyed on 1,420 primary and secondary school students. We also provided the results produced by structural equation model and Budescu's Dominance analysis. Based on these analyses, we described the differences between the Internet and mobile phone addictions and proposed an alternative to prevent new technology addictions.

  • PDF

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Personalized Recommendation based on Context-Aware for Resource Sharing in Ubiquitous Environments (유비쿼터스 환경에서 자원 공유를 위한 상황인지 기반 개인화 추천)

  • Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.19-26
    • /
    • 2011
  • Users want to receive customized service using users' personal device. To fulfill this requirement, the mobile device has to support a lot of functions. However, the mobile device has limitations such as tiny display screens. To solve this limitation problem and provide customized service to users, this paper proposes the environment to provide services by sharing resources and the method to recommend user-suitable resources among sharable resources. For the resource recommendation, This paper analyzes user's behavior pattern from usage history and proposes the method for recommending customized resources. This paper also shows that the approach is reasonable one for resource recommendation through the satisfaction evaluation.

A Study on Implementation of Family Tree Authoring System for Family Contents (가족콘텐츠 스토리족보(가계도) 저작시스템 설계 및 구현에 관한 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2014
  • This research paper is applying Family Tree with Story Authoring System on the previous research study about writing tool data model on interactive storytelling about family history. In this study, primary personal information holding identity of the person such as name, birthday and family tree, given at birth, was categorized into secondary function defined as "family contents" consisting of family achievements, episodes and experiences. Family contents was restructured to be used as creative ingredients to increase the value and usage of family contents...Family Tree with Story writing system enables users to create text, images, videos and digital contents based on experimental knowledge collected from the first and second generations.

Study on the Application Methods of Big Data at a Corporation -Cases of A and Y corporation Big Data System Projects- (기업의 빅데이터 적용방안 연구 -A사, Y사 빅데이터 시스템 적용 사례-)

  • Lee, Jae Sung;Hong, Sung Chan
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.103-112
    • /
    • 2014
  • In recent years, the rapid diffusion of smart devices and growth of internet usage and social media has led to a constant production of huge amount of valuable data set that includes personal information, buying patterns, location information and other things. IT and Production Infrastructure has also started to produce its own data with the vitalization of M2M (Machine-to-Machine) and IoT (Internet of Things). This analysis study researches the applicable effects of Structured and Unstructured Big Data in various business circumstances, and purposes to find out the value creation method for a corporation through the Structured and Unstructured Big Data case studies. The result demonstrates that corporations looking for the optimized big data utilization plan could maximize their creative values by utilizing Unstructured and Structured Big Data generated interior and exterior of corporations.

Research about Benchmark System Design for Efficient Web Server Management (효율적인 웹 서버 관리를 위한 평가시스템 설계에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.1-6
    • /
    • 2007
  • It is important to manage and correctly evaluate the performance of server in order to improve he performance of server. That is, with the aim of finding whether resources are properly utilized, it is a method to improve both software and hardware aspects. Conventional method in evaluating the server performance involved installing software between server and client and generating the load and by simulating the process, it evaluated the handing efficiency of work load generated per packet volume. Therefore, this paper aims to pro-vide precise measurement method by distinguishing the characteristics of web server and the users' usage pattern and by evaluating the work load management through applying various standards. Specially, it presents the evaluation method from web service of personal and business.

  • PDF

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

The Development and Application of Web-Based Learning System for Correct Use of Internet Communication Words in Elementary Schools ("바른말 고운말" 교실 웹기반 학습시스템 개발 및 적용)

  • Yoon, Hee-Soo;Kim, Dong-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.2
    • /
    • pp.191-201
    • /
    • 2004
  • In accordance with wide spread of personal computer and the expansion of network access, the use of internet has been popular and communication by text message is much more normal than that of voice and image. Accordingly, the side effect of communication language brings about gap between diverse social class, the isolation of communication between generations, abusive expressions, obstacles of juvenile mental development and so on. It appears by the form of slang and vulgar word and has a negative effect on education of mother tongue and usage of children's real language. To deal with these problems, we developed new web-based education system through the analysis of learners' requirement; "Barun Mal, Goeun Mal class". So we verified its efficiency to apply to real class. We also found that this system increased the learners' interest and educational effectiveness. Also, this system contributed to the proper use of language.

  • PDF

Information Seeking, Evaluation, and Use on the Internet: A Case Study of Science and Engineering Scholars (인터넷의 정보의 탐색, 평가 및 활용:대학 이공계 연구자의 사례를 중심으로)

  • 이해영;이수영
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.163-181
    • /
    • 2001
  • The Internet offers a challenging information seeking environment for users due to a great amount of information, heterogeneous objects, and diverse information quality. The purpose of this study was to identify the ways of information seeking, evaluating, and using in the Internet by looking at search behaviors of science and engineering scholars in Korean university. The research problems addressed in the study include the utility of web information, information searching strategies, the extent of search engines usage, and scholarly value of information in the Internet. The data were collected through individual interviews with 28 scholars recruited from science and engineering fields at the Myongji University. It was found that the scholars in this study less likely turn to search engines for finding research information than types of information while they use search engines primarily for searching personal information such as travel and hobbies. This is partly because the scholars believe that the information, especially research-related information, in the Internet lacks the value as scholarly information. They also tend to believe that foreign literature available in the Internet is more credible, professional, and recent than domestic literature. In conclusion, the implications for search engine developers, librarians, and researchers as users and producers in the Internet are discussed.

  • PDF