• Title/Summary/Keyword: User Ability

Search Result 621, Processing Time 0.024 seconds

A Study on the improvement to GIS based Student Placement & School Establishment support System (GIS기반 학생배치·학교설립시스템 개선방안 연구)

  • Cho, Chang-Hee;Dong, Jae-Uk;Lee, Hwa-Ryong
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.26 no.1
    • /
    • pp.9-16
    • /
    • 2019
  • The recent decline in the school-age population has led to a more conservative and conservative approach to the establishment of schools. In the judgment of school establishment, it is required to make a decision method that can make objective and comprehensive judgment of various situations rather than local analysis of a single school. In this changing situation, EduFine system and placement establishment system were introduced to comprehensively analyze the feasibility of student placement and school establishment. However, the EduFine system of the Ministry of Education has few users because it is difficult to use education and it is difficult for users to use. Based on the GIS, the placement establishment system was able to analyze the number of students and the status of apartment buildings in a comprehensive manner. But placement establishment system has been used mainly in support of investment assessment rather than research. Therefore, there is a need to increase the utilization of users by linking two systems or integrating them into one system. In this study, we want to derive the functions to improve the GIS - based layout establishment system through user analysis such as comparative analysis and survey of existing systems. In particular, the purpose of the study is to improve the function of system, to improve the students' placement ability and the school establishment work ability and to improve the user satisfaction.

A Study on the Development of Physical Examination with VR Content and User Satisfaction (VR 콘텐츠를 이용한 신체검사 개발 및 사용자 만족도 연구)

  • An, Ho-Won;Kim, Jun-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.318-326
    • /
    • 2021
  • This study aims to the effectiveness of physical examination using VR contents to solve problems such as the increase in chronic diseases and shortage of professional manpower in the health care field according to the aging and low birth rate, and to provide efficient healthcare. Therefore, this study implemented a one-stop VR content physical examination system by wearing HTC VIVE Pro VR and a stick controller. The system is from step 1 to step 5, and the final body age is determined and a simple solution is provided through five steps sequentially: color blind test, memory test, audiogram test, reaction speed test, and instantaneous cognitive ability test. In addition, for the one-stop VR content physical examination system developed by this study, as a result of verifying the user satisfaction for normal people who visited the health examination center and VR/AR clinical trial center of certified tertiary hospital in Daejeon, the overall satisfaction and the intention to reuse Was high, and according to gender, there was a significant difference in the 5-step test, and according to the age, there were significant differences in the 4-step test and the 5-step test.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

A Study on the Quality Determinant Factors of User-Support Service under Web-based Information System (웹정보시스템(WIS) 사용지원 서비스의 품질결정요인에 관한 연구)

  • 정상철;임형수
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.25-53
    • /
    • 2000
  • As Information Technology has developed, The structure of information system used in organizations is changing from centralized computing structure to distributed computing structure. The roles of information department have expanded, which is not only develope and maintain system but also provide usage-support service to end-user. If organization support end-user properly, they get many benefits. if they don't do it properly, they waste many resource. Therefore, the purpose of this study is the search for quality determinant factors and type of information that provide user effective service under web-based information system. The result of this study is as follow First, when SERVQUAL is used, the quality determinant factors of usage-support service are categorized three, which is responsibility and assurance, empathy and tangable, and reliability. When SERVPERF is used, the determinant factors consist of five, but the use of assurance as a factor is cautious. Second, reliability and tangability among determinant factors affect general service quality, and tangibility is most important factors. third, When the locations of user are distributed the degree of general service quality is not different whether formal or informal information center provide usage-support service. This study may suggest practical implication as follows; First, as user are good at to use information system the degree of importance for tangibility are decreased. when user are individualized and improve their ability to use information system, empathy will not be important factors any more, therfore it assume that reliability will be most important factors. Second, if organizations promote not only formal informaton center but also informal inforamtion center they may support end-user more effectively. However, this study has the following limitations: First, it is difficult to generalize the result of this study Second, service quality determinant factors used in this study don't explain the influence to general service quality fully. Third, this study analyze a simple relation between service quality determinant factor and general service quality. Finally, this study don't distinguish between information system service and information support service.

  • PDF

Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy (LTE에서 사용자 위치 정보 보호를 위한 보안 향상 인증 프로토콜)

  • Hahn, Changhee;Kwon, Hyunsoo;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.715-727
    • /
    • 2014
  • The number of subscribers in 4th generation mobile system has been increased rapidly. Along with that, preserving subscribers' privacy has become a hot issue. To prevent users' location from being revealed publicly is important more than ever. In this paper, we first show that the privacy-related problem exists in user authentication procedure in 4th generation mobile system, especially LTE. Then, we suggest an attack model which allows an adversary to trace a user, i.e. he has an ability to determine whether the user is in his observation area. Such collecting subscribers' location by an unauthorized third party may yield severe privacy problem. To keep users' privacy intact, we propose a modified authentication protocol in LTE. Our scheme has low computational overhead and strong secrecy so that both the security and efficiency are achieved. Finally, we prove that our scheme is secure by using the automatic verification tool ProVerif.

VA Design of Personalized e-Learning System for the Driver's License Test in Korea (개인 맞춤형 운전면허 학습시스템 설계)

  • Oh, Yong-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.1055-1060
    • /
    • 2009
  • In this paper, we design an e-Learning system for the Driver's License Teste studying through the Internet. The proposed system make users to be arrived at the goal for the license in a shorter time by offering learning contents and items according to the item-responses made by the users based on the Item Response Theory. Moreover we design the scheme to give the optimum items and the most necessary content to the user during the learning procedure in the form of concept-based objects. All the items in the problem bank DB maintain their difficulties, discriminations, and guessing parameters as is the case of 3-parameter logistic model. In addition user profile DB stores users' status informations, item responses, and ability parameters. Using these structures and combining agents, we can offer the optimum learning process or dynamic personalized studying structure to the user. We can construct interface agent and content selection and feedback agent with the DB's described above. User can study without any awareness of system operations or personal fitting scheme.

  • PDF

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

Study of Mobile Code Security Service in Active Network Environment (액티브 네트워크 환경에서의 이동코드 보안서비스 제공에 관한 연구)

  • 한인성;김진묵;유황빈
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.29-34
    • /
    • 2004
  • As the number of internet users grows rapidly, the services which users required becomes various. However, for fulfilling these various user requirements, the existing passive network should be standardized for a long time. To resolve the delay on providing services, active network as a new technology was suggested. Its router or switch with DARPA as center has the program running ability, so user oriented network can be composed. However, active network's architecture can resolve the user required service using mobile code on the network node, but it is more complex, easy-to-attack, various than the passive network. Many researchers have tried to resolve this problem. So, this paper studied the mobile code security service in active network environment to provide user's convenience and accommodation, and introduced ANASP system as an alternative.

  • PDF

A Study on Academic Library User's Information Literacy (학술연구정보 이용자에 관한 연구: 정보요구, 정보이용행태, 정보활용능력을 중심으로)

  • Yoo, Jae-Ok
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.2
    • /
    • pp.241-254
    • /
    • 2004
  • This study reviews academic library users' information needs, use behaviors, and information literacy by examining previous literature related to academic library use study. The information academic library users want most is information about how to use library such as a circulation policy. Only about 10% of library users' information needs requires reference librarian's professional knowledge and skills. The sign and information system of the library should be improved and revised in order to reduce the redundant how-to questions. When academic library users attempt to do subject searches through online library system, they experience difficulties to find the right menu on the library's interface. The study recommends that special efforts should be made for user education for utilizing research information since user's information utilizing ability is unexpectedly low.

  • PDF

User-oriented Adaptive English Typing Program Implementation using Python (파이썬을 이용한 사용자 중심의 적응적 영문 타이핑 프로그램 구현)

  • Kim, Hye-Suk;Lee, Ho-Jun;Tak, Dong-Kil
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1575-1584
    • /
    • 2018
  • In this paper, we implemented a user - oriented adaptive English typing program using class and function structure provided by Python to get English learning effect while effectively typing English on PC. The user of the implemented English typing program creates a text file of required English example sentences and links them to use it for direct English typing exercise. In addition, based on the English sentence used in the English typing exercise, it is possible to obtain the English learning effect by providing the ability to perform the memorization test. The interface of the program is structured in the form of a game so that it can be accessed interestingly, and the ranking among the users is disclosed to provide a positive function. We expect that the implemented program will improve the user's English typing speed and improve the English learning effect.