• Title/Summary/Keyword: User Attribute

Search Result 365, Processing Time 0.031 seconds

Developing application system of forest information using digital photogrammetry and GIS

  • Jo, Myung-Hee;Heo, Young-Jin;Kim, Joon-Bum;Kim, In-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.911-913
    • /
    • 2003
  • Recently in order to process forest official task more effectively and scientifically the previous of that which is focused on document and inventory, should be applied with the spatial information technology. Especially, the forest information remote sensing system has to be developed using digital photogrammetry and GIS. In this study the forest information remote sensing system is implemented to manage forest resource and forest official effectively especially by constructing database of forest environment information and cadastral information, overlaying various thematic maps, and performing spatial analysis using GIS and aerial photograph. For this, the attribute data and spatial data of aerial photograph, digital topography map, forest cadastral map, forest type map, forest use map should be reprocessed and stored in Oracle. Also, the user interface is developed by using Visual Basic 6.0 and MapObjects 2.1 of ESRI based on CBD(Component Based Development).

  • PDF

A New Lightweight Mutual Authentication Protocol for Home Network (홈네트워크를 위한 새로운 경량화된 상호인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2384-2389
    • /
    • 2009
  • In this paper, we propose a lightweight mutual authentication protocol for secure and efficient home network service. Lee et al. recently proposed an attribute-base authentication key agreement protocol using public key in home network. Its protocol provided forward secrecy but don't diminish conspicious overhead of operation using ticket. Therefore the proposed protocol provided the security and efficiency using hash function and counter. Also it can provide secure home network service by check consumer electronics control level of users after created session key.

A Method to Minimize Classification Rules Based on Data Mining and Logic Synthesis

  • Kim, Jong-Wan
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1739-1748
    • /
    • 2008
  • When we conduct a data mining procedure on sample data sources, several rules are generated. But some rules are redundant or logically disjoint and therefore they can be removed. We suggest a new rule minimization algorithm inspired from logic synthesis to improve comprehensibility and eliminate redundant rules. The method can merge several relevant rules into one based on data mining and logic synthesis without high loss of accuracy. In case of two or more rules are candidates to be merged, we merge the rules with the attribute having the lowest information gain. To show the proposed method could be a reasonable solution, we applied the proposed approach to a problem domain constructing user preferred ontology in anti-spam systems.

  • PDF

User requirement analysis to derive quality attribute of web-based commerce system (웹기반 상거래시스템의 품질속성 도출을 위한 사용자 요구사항 분석)

  • 윤홍란;김유경;이서정;박재년
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.379-381
    • /
    • 2004
  • 소프트웨어 아키텍처는 소프트웨어 시스템의 중요한 요소를 정의하고 이들 요소간의 상호관계를 나타낸 전체 시스템의 기본 구조이다. 시스템의 변경과 확장에 용이하고 시스템의 상호 연동성을 확보하는데 있어 아키텍처 기반의 기술 접근은 필수적인 요소이다. 이러한 소프트웨어 아키텍처를 명가하기 위한 다양한 방법들이 제시되고 있으며, 이 방법들은 비즈니스요구를 반영하고 품질속성에 따른 시나리오를 만들어 그것을 기반으로 소프트웨어 아키텍처를 평가하게 된다. 이에 본 논문에서는 ISO9126에서 제시한 소프트웨어의 품질을 기반으로 아키텍처 평가에 적용되어질 품질속성을 도출하기 위하여, 웹기반 전자상거래시스템인 B2C에서의 사용자요구사항을 분석 해 보고자 한다.

  • PDF

Classification Scheme of Usability Problems : Literature Review and New Conceptual Framework (사용성 문제의 분류 체계 : 문헌분석 및 새로운 개념적 프레임워크)

  • Ham, Dong-Han
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.179-198
    • /
    • 2008
  • It is widely known that usability is a critical quality attribute of IT systems. Many studies have developed various methods for finding out usability problems. Usability professionals have emphasized that usability should be integrated into the development life cycle in order to maximize the usability of systems with minimal cost. To achieve this, it is essential to classify usability problems systematically and connect them into the activities of designing user interfaces and tasks. However, there is a lack of framework or method for these two problems and thus remains a challengeable research issue. As a beginning study, this paper proposes a conceptual framework for addressing the two issues. We firstly summarize usability-related studies so far, including usability factors and evaluation methods. Secondly, we review seven approaches to identifying and classifying usability problems. Based on this review and opinions of usability engineers in real industry as well as the review results, this paper proposes a framework comprising three viewpoints, from which more sound classification scheme of usability problems can be inductively developed.

Research on Metaverse Security Model (메타버스 보안 모델 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.95-102
    • /
    • 2021
  • As social interest in the metaverse increases, various metaverse platforms and services are appearing, and various security issues are emerging accordingly. In particular, since all activities are performed in a variety of virtual spaces, and the metaverse utilizes sensing data using various hardware devices, more information is accumulated than other Internet services, and more damage can occur if information security is not guaranteed. Therefore, in this paper, we propose a metaverse security model that considers the major issues mentioned in previous papers and the necessary evaluation factors for the security functions required in the metaverse platform. As a result of performing the performance evaluation of the proposed model and the existing attribute information collection model, the proposed model can provide security functions such as anonymity and source authentication, which were not provided by the existing models.

A Design Information Security Attributes of for Meta-Information System (메타정보체계를 위한 정보보호 속성의 설계)

  • 전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.53-62
    • /
    • 1999
  • The rapid growth of Internet supports a base that share useful information. It needs for mass of information that requires a fast processing capability. It needs a meta0information system. Meta-information system supports fast search service but occurs a problem in case of information security. In this paper we propose a information security attribute that are user access control for meta-information system to solve the problem.

Discovering Community Interests Approach to Topic Model with Time Factor and Clustering Methods

  • Ho, Thanh;Thanh, Tran Duy
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.163-177
    • /
    • 2021
  • Many methods of discovering social networking communities or clustering of features are based on the network structure or the content network. This paper proposes a community discovery method based on topic models using a time factor and an unsupervised clustering method. Online community discovery enables organizations and businesses to thoroughly understand the trend in users' interests in their products and services. In addition, an insight into customer experience on social networks is a tremendous competitive advantage in this era of ecommerce and Internet development. The objective of this work is to find clusters (communities) such that each cluster's nodes contain topics and individuals having similarities in the attribute space. In terms of social media analytics, the method seeks communities whose members have similar features. The method is experimented with and evaluated using a Vietnamese corpus of comments and messages collected on social networks and ecommerce sites in various sectors from 2016 to 2019. The experimental results demonstrate the effectiveness of the proposed method over other methods.

Relational Data Extraction and Transformation: A Study to Enhance Information Systems Performance

  • Forat Falih, Hasan;Muhamad Shahbani Abu, Bakar
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.265-272
    • /
    • 2022
  • The most effective method to improve information system capabilities is to enable instant access to several relational database sources and transform data with a logical structure into multiple target relational databases. There are numerous data transformation tools available; however, they typically contain fixed procedures that cannot be changed by the user, making it impossible to fulfill the near-real-time data transformation requirements. Furthermore, some tools cannot build object references or alter attribute constraints. There are various situations in which tool changes in data type cause conflicts and difficulties with data quality while transforming between the two systems. The R-programming language was extensively used throughout this study, and several different relational database structures were utilized to complete the proposed study. Experiments showed that the developed study can improve the performance of information systems by interacting with and exchanging data with various relational databases. The study addresses data quality issues, particularly the completeness and integrity dimensions of the data transformation processes.

A Study on the Action decision by Changing of Condition of Time-Space (시·공간의 환경변화에 따른 행태 결정에 관한 연구)

  • Kim, Bo-Ra;Hong, Il-Tae
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.6
    • /
    • pp.98-107
    • /
    • 2013
  • Space evolves from the concept of deterministic static location to a dynamic, connected area through the interference of the user. While this does incorporate physical changes of the space, it also reflects the changes of the program or characteristics of the space through the actions and changes of the user. Therefore, in this study we plan to review the characteristic of time appearing within space, thereby discussing the impact of changing of condition in time-space to the decision making of the user. Further, we plan to analyze the specific causes, and subsequently introduce a new perspective over space. In order to achieve this, we need to first understand the reason why the attribute of time needs to be discussed in space, and perform a fundamental analysis of factors for the changes of the users' actions following changes in space-time condition. This means that space is not limited to merely satisfying its innate objective as an area, but may have a basis for modifying its role to help the decision making of the users caused by changes in space-time conditions. Accordingly, we analyze the factors for change of environment that can appear in space following the flow of time caused by correlation in space-time, as well as psychological factors and variables for decision making by the users. Based on this, we analyze cases to study the influence of condition changes in time-space on the action decision judgment of the users. Through this, we propose that the actions of the users can be determined following changes in time-space conditions, and discuss the need for changes in our perspective of space.