• Title/Summary/Keyword: User Attribute

Search Result 365, Processing Time 0.033 seconds

Development and Application of the Park Tree Management Information System (공원수목관리정보체계 구축 및 활용)

  • 이규석;김광식;황국웅;심경구
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.21 no.3
    • /
    • pp.89-98
    • /
    • 1993
  • It is necessary for the park tree manager to have the current information about the status of trees, which can help him with right decisions. However, there are many problems in the existing management method such as huge amount of data, tedious work, and the difficult update work due to the lack of necessary data or the inappropriate data record and management method. The sole use of database management system(DBMS) cannot slove these problems because it cannot handle graphic data based on the locational information. So, it is imperative for the park manager to have locational data as well as attribute data of the park tree concerned. Therefore, the purpose of this study is to develop the personal computer-based, user friendly park tree management information system, which deals with attribute data(DBMS) and graphic data(using the CAD) together within the integrated environment. The park tree management information system developed in this study provides a complete operating environment for data input, update, query, delete, and retrieve. The major advantages of this system are as follows: 1) To search the location and distribution of trees. 2) To record, store, and manage data easily. 3) When the manager is changed, delivery of the park tree work is convenient. 4) The system can help the manager with the correct information for the efficient park tree management.

  • PDF

Privacy measurement method using a graph structure on online social networks

  • Li, XueFeng;Zhao, Chensu;Tian, Keke
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.812-824
    • /
    • 2021
  • Recently, with an increase in Internet usage, users of online social networks (OSNs) have increased. Consequently, privacy leakage has become more serious. However, few studies have investigated the difference between privacy and actual behaviors. In particular, users' desire to change their privacy status is not supported by their privacy literacy. Presenting an accurate measurement of users' privacy status can cultivate the privacy literacy of users. However, the highly interactive nature of interpersonal communication on OSNs has promoted privacy to be viewed as a communal issue. As a large number of redundant users on social networks are unrelated to the user's privacy, existing algorithms are no longer applicable. To solve this problem, we propose a structural similarity measurement method suitable for the characteristics of social networks. The proposed method excludes redundant users and combines the attribute information to measure the privacy status of users. Using this approach, users can intuitively recognize their privacy status on OSNs. Experiments using real data show that our method can effectively and accurately help users improve their privacy disclosures.

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

Indoor Semantic Data Dection and Indoor Spatial Data Update through Artificial Intelligence and Augmented Reality Technology

  • Kwon, Sun
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1170-1178
    • /
    • 2022
  • Indoor POI data, an essential component of indoor spatial data, has attribute information of a specific place in the room and is the most critical information necessary for the user. Currently, indoor POI data is manually updated by direct investigation, which is expensive and time-consuming. Recently, research on updating POI using the attribute information of indoor photographs has been advanced to overcome these problems. However, the range of use, such as using only photographs with text information, is limited. Therefore, in this study, and to improvement this, I proposed a new method to update indoor POI data using a smartphone camera. In the proposed method, the POI name is obtained by classifying the indoor scene's photograph into artificial intelligence technology CNN and matching the location criteria to indoor spatial data through AR technology. As a result of creating and experimenting with a prototype application to evaluate the proposed method, it was possible to update POI data that reflects the real world with high accuracy. Therefore, the results of this study can be used as a complement or substitute for the existing methodologies that have been advanced mainly by direct research.

  • PDF

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

UCQM: A Quality Model for Practical Evaluation of Ubiquitous Computing Systems (유비쿼터스 컴퓨팅 시스템의 실용적 품질 평가 모델)

  • Oh, Sang-Hun;Kim, Soo-Dong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.342-358
    • /
    • 2007
  • Ubiquitous Computing System (UCS) is a system where the user can get information through computer network anytime and anywhere regardless of the places. Since UCS is a personalized system, it should interact with other systems. UCS will bring a remarkable change in production, consumption, politics, economy, community, culture, and other areas related to our daily life. That is, a high-quality UCS results in high-quality services provided to users. Hence, this paper proposes a systematic quality model based on ISO/lEC 9126 in order to evaluate the ubiquitous computing system, based on ISO/lEC 9126. And, we identify key characteristics of UCS and derive the set of quality attributes based on identified characteristics. We define metrics for each quality attribute and Ubiquitous Computing Quality Model CUCQM) so that we can evaluate overall environment and important characteristics of UCS.

Analysis of Factors Affecting on Mobile Video Services' Satisfaction (모바일 동영상 서비스 만족도 결정요인 분석)

  • Kim, Min-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.35-45
    • /
    • 2016
  • The purpose of this study is to examine factors that influence mobile video services' satisfaction. 362 users who use both DMB and mobile video services complete the questionnaires measuring 6 attribute level satisfactions and total satisfaction of mobile video services, TV contents broadcasting status in mobile video services. The data are analyzed by using frequency analysis, Chi-square test, t-test/F-test, multiple regression and moderated multiple regression. The results of the study are as follows: First, diverse contents, image quality, video streaming quality, user convenience, and data consumption volume affect total satisfaction of mobile video services. Second, TV contents broadcasting status in mobile video services doesn't show positive moderation effect on the relationship between attribute level satisfaction and total satisfaction. Based on the results, the implications and limitations of this study are discussed.

Context Prediction based on Sequence Matching for Contexts with Discrete Attribute (이산 속성 컨텍스트를 위한 시퀀스 매칭 기반 컨텍스트 예측)

  • Choi, Young-Hwan;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.4
    • /
    • pp.463-468
    • /
    • 2011
  • Context prediction methods have been developed in two ways - one is a prediction for discrete context and the other is for continuous context. As most of the prediction methods have been used with prediction algorithms in specific domains suitable to the environment and characteristics of contexts, it is difficult to conduct a prediction for a user's context which is based on various environments and characteristics. This study suggests a context prediction method available for both discrete and continuous contexts without being limited to the characteristics of a specific domain or context. For this, we conducted a context prediction based on sequence matching by generating sequences from contexts in consideration of association rules between context attributes and by applying variable weights according to each context attribute. Simulations for discrete and continuous contexts were conducted to evaluate proposed methods and the results showed that the methods produced a similar performance to existing prediction methods with a prediction accuracy of 80.12% in discrete context and 81.43% in continuous context.

The Effect of Presence and Engagement in HMD(Head Mounted Display) Virtual Reality Advertising on Attitude and Memory (HMD(Head Mounted Display) 가상현실 광고가 현존감과 인게이지먼트 수준에 따라 태도와 기억에 미치는 효과)

  • Han, Kwang-Seok;Cho, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.139-146
    • /
    • 2019
  • In this study, we examined how consumers who experience HMD virtual reality advertising differ in their ad attitudes and memory effects according to Presence (cognitive presence, emotional presence, media presence) and engagement level. Particularly, in the case of memory effect, the information that the user memorizes through the advertising is divided into "Attribute-Related Memory (ARM)" and "Global-Related Memory (GRM)" Respectively. First, the attitudes toward HMD based virtual reality ads are positive regardless of the type of presence. Second, in the virtual reality advertising, if the level of engagement is low, ARM that memorizes the information of the product attribute is increased, whereas if the level of engagement is high, the GRM which is the memory of the attitude-based evaluation information about the product is increased appear. Third, if cognitive presence and media presence are low, then ARM is more memorable than GRM.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.