• Title/Summary/Keyword: User's path

Search Result 301, Processing Time 0.035 seconds

A Design and Implementation of Health Schedule Application

  • Ji Woo Kim;Young Min Lee;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.99-106
    • /
    • 2024
  • In this paper, we design and implement the HealthSchedule app, which records exercise data based on the GPS sensor embedded in smartphones. This app utilizes the smartphone's GPS sensor to collect real-time location information of the user and displays the movement path to the designated destination. It records the user's actual path using latitude and longitude coordinates. Users register exercise activities and destination points when scheduling, and initiate the exercise. When measuring the current location, a lime green departure marker is generated, and the movement path is displayed in blue, with the destination marker and a surrounding 25-meter radius circle shown in sky blue. Using the coordinates of the starting point or the previous location and the current GPS sensor-transmitted location coordinates, it measures the distance traveled, time taken, and calculates the speed. Furthermore, it accumulates measurement data to provide information on the total distance traveled, movement path, and overall average speed. Even when reaching the destination during exercise, the movement path continues to accumulate until the completion button is clicked. The completion button is activated when the user moves into the sky blue circular area with a radius of 25 meters, centered around the initially set destination. This means that the user must reach the designated destination, and if they wish to continue exercising without clicking the completion button, they can do so. Depending on the selected exercise type, the app displays the calories burned, aiming to increase user engagement and a sense of accomplishment.

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

Complexity Results for the Design Problem of Content Distribution Networks

  • Choi, Byung-Cheon;Chung, Jibok
    • Management Science and Financial Engineering
    • /
    • v.20 no.2
    • /
    • pp.7-12
    • /
    • 2014
  • Content Delivery Network (CDN) has evolved to overcome a network bottleneck and improve user perceived Quality of Service (QoS). A CDN replicates contents from the origin server to replica servers to reduce the overload of the origin server. CDN providers would try to achieve an acceptable performance at the least cost including the storage space or processing power. In this paper, we introduce a new optimization model for the CDN design problem considering the user perceived QoS and single path (non-bifurcated) routing constraints and analyze the computational complexity for some special cases.

Implementation of outgoing packet processor for ATM based MPLS LER System

  • Park, Wan-Ki;Kwak, Dong-Yong;Kim, Dae-Yong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1851-1854
    • /
    • 2002
  • The Internet with conventional routing scheme cannot meet user demands driven from drastic growth in the Internet user and various service and traffic type. MPLS(Multi Protocol Label Switching) was introduced to the Internet fur solution to resolve this problem. MPLS is a paradigm to integrate higher layer’s software routing functions including layer-3 routing with layer-2 switching. But, the exponential growth of Internet traffic brings out of label space. One scalable solution to cope with this problem is to introduce flow merge technique, i. e. a group of flows is forwarded using the same label. Specially, IETF(Internet Engineering Task Force) recommends that ATM based MPLS system may include VC merge function, so it is scalable to increase of internet traffic. We implemented the MPLS LER system that includes the look-up and forwarding function in incoming path and VC merging function and limited traffic management function in outgoing path. This paper describes the implementation of the LER’s outgoing parts.

  • PDF

Aeromagnetic Pre-processing Software Based on Graphic User Interface, KMagLevellingTM (그래픽 사용자 인터페이스 기반 항공자력탐사 전처리 S/W, KMagLevellingTM)

  • Ko, Kwang-Beom;Jung, Sang-Won
    • Geophysics and Geophysical Exploration
    • /
    • v.17 no.3
    • /
    • pp.171-178
    • /
    • 2014
  • Aeromagnetic survey generally require much more pre-processing steps than that of common land survey due to several complex and cumbersome steps included in pre-processing stage. Therefore it is desirable to use specific processing tool especially based on graphic user interface. For this purpose, aeromagnetic pre-processing software based on graphic user interface under the Windows environment, called $KMagLevelling^{TM}$ was developed and briefly introduced. In an aspect of its user-friendliness and originality, three noticeable features of $KMagLevelling^{TM}$ are summarized as the following (1) function of representation and handling for large amount of aeromagnetic data set as a visualization in the form of flight-path (2) function of selective exclusion of unwanted data by using survey area information expressed as polygon, and (3) function of selective removal processing for the irregular flight-path data acquired within the entire survey area by implementing the segmentation of flight-path technique.

A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.162-166
    • /
    • 1997
  • A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

  • PDF

The Effect of Mobile EMR's Technological Characters on System Qualities and User Satisfaction (모바일 전자의무기록(EMR)의 기술적 특성이 시스템 품질과 사용자 만족에 미치는 영향)

  • Lee, In Tae
    • Korea Journal of Hospital Management
    • /
    • v.19 no.3
    • /
    • pp.43-52
    • /
    • 2014
  • We empirically show that the effect of mobile EMR's technological characters on system qualities and user satisfaction. For the study, the relationship among technological characters of mobile, EMR's system quality, EMR's information quality, and user satisfaction were modelled and validated with hypotheses. An empirical test was performed for a path model using structural equation modeling on samples of 148 nurses in hospitals from various size and region. This study find that, for the overall sample, there are positive relationships among the technological characters of mobile, EMR's system quality, EMR's information quality, and user satisfaction. And the results support that mobile is an effective method for EMR. Findings of this study have several theoretical and practical implications as follows : First, this study empirically tested the relationship among technological characters of mobile, EMR's system quality, EMR's information quality. Second, the study shows that the technological characters of mobile should be considered for advance of EMR system's quality in mobile environment. And lastly, this study can practically suggest mobile healthcare information system for process effectiveness.

  • PDF

A Study on a Packet Forwarding Scheme based on Interworking Architecture (연동 구조 기반의 패킷 포워딩 기법에 대한 연구)

  • Kim, Seok-Hoon;Ryoo, In-Tae
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.97-106
    • /
    • 2005
  • Generally, network QoS is determined by timeliness, bandwidth, and reliability, As IT technologies are growing day by day, the bandwidth and reliability factors are expected to be able to satisfy user's requirements. The timeliness factor, however, has not fully met user's requirements yet. In this paper, we propose a packet forwarding scheme named POSIA (Packet forwarding Scheme based on Interworking Architecture) that can provide quite a good QoS (quality of service) by minimizing processing time which is the major part of the timeliness factor. Based on path and resource reservation mechanism, the proposed POSIA makes routers on the packet forwarding path synchronize with each other and then forward packets, The POSIA has been verified to outperform the existing MPLS packet forwarding scheme through computer simulations using OPNET.

  • PDF

A Causal Model on the Relationship between Resources of Natural Parks and User's Satisfaction (자연공원의 자원과 이용 만족도간의 관계에 관한 인과모형 -국립공원과 도립공원을 중심으로-)

  • 장병문;배민기
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.3
    • /
    • pp.12-24
    • /
    • 2002
  • The purpose of this paper is to decompose the effect of resources of natural parks(NP) on user's satisfaction to answer the research question: What are the causal effects of resources of natural parks on user\ulcorner After reviewing the literature, classification of resources of NP, various approaches and analysis methods employed, we constructed the conceptual framework and have formulated the hypothesis of this research. We had obtained data through a questionnaire, which surveyed 414 visitors at 6 of the 73 NP in Korea in 2001, based on a stratified sampling method. We have analyzed the data using descriptive statistical methods, Pearson's correlation analysis, and a path analysis method. We found that 1) While the indirect effect of topographical feature and valley(TFV), socio-cultural resources(SCR), and climate, sound, and scent(CSS) turned out to be 2.75, 1.20, and 2.00 times higher than that of wild animal and plant(WAP), the direct effect of TFV, SCR, and landscape turned out to be 2.95, 2.88, and 2.64 times higher than that of CSS, 2) The magnitude of causal effects of the three exogeneous variables of TFV, WAP, and SCR and two intervening variables of CSS and landscape on User's satisfaction turned out to be 0.403, 0.048, 0.323, 0.188, and 0.243, respectively, 3) Total direct effect of the exogeneous and intervening variables on user's satisfaction is 0.871, while that of indirect effect is 0.334, and 4) Causal effect of tangible resources is 1.80 times higher than that of intangible while total effect of tangible resources are 1.36 times higher than that of intangible. The research results suggest that 1) Criteria for designation and maintenances of NP and results of previous studies on resources turned out to be unreliable and distorted, 2) In the criteria of planning and maintenance of NP, intangible resources must be included, 3) Remedial directions to increase user's satisfaction should be focused on maintenance of TFV and landscape in NP, and 4) The approach and path analysis adopted by this research is valid and highly useful for other resource based recreation area. It is recommended that more empirical study on seasonal variation of resources in NP based user's preference be performed in the future.

Development of User Customized Path Finding Algorithm for Public Transportation Information (대중교통 정보제공을 위한 맞춤형 경로탐색 알고리즘 개발)

  • Shin, Sung Il;Park, Je Jin;Lee, Jong Chul;Ha, Tae Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3D
    • /
    • pp.317-323
    • /
    • 2008
  • Mass transit information can contribute many benefits to users. Especially, transportation information technology is developing highly with information technology in Korea recently. Hereafter, it is expected to give customized transportation information to users individually with the advent of ubiquitous age in earnest. This public transportation information service can be realized by path finding algorithm in public transportation networks including travel and transfer attributes. In this research, constraints are constructed with the primary facts influencing users. Moreover, the method reducing user's path finding condition arbitrarily is proposed by making the maximum value as variables. In this study, transfer frequency, total travel time, seat confirmation, transfer time and travel time become constraint condition based on k path finding algorithm considering service time constraint condition. Moreover, case study about user customized transfer information is performed in Seoul and metropolitan subway networks.