• Title/Summary/Keyword: User Requirements Analysis

Search Result 399, Processing Time 0.029 seconds

A Study on the Uniform Design for Postmen (집배원 유니폼 디자인 개발에 관한 연구 -2000년도 착용 유니폼을 중심으로-)

  • 신혜영
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.7
    • /
    • pp.33-46
    • /
    • 2000
  • Uniform is the dress of distinctive design or fashion worn by members of a particular group or serving as a means of identification. The postman's uniform of Ministry of Communication should be distinctive or characteristic clothing to provide high functionality and symbolization of job characteristics, cost effectiveness and esthetic. In order to design the postman's new uniform available in 2000, there has been a satisfaction survey to 1,116 postmen. A thorough analysis of survey and informal and face-to-face discussion with postmen give the direction of design concept. One of the most important things in the design concept is to make the uniform high quality & refinement. The style is a refined jumper suit in consideration of form stability, wearing satisfaction, convenience in activity. The basic colors selected are navy and medium gray. The colors of jumper are MOC red ; C.I color Green : a representative color of youth, white : a symbolic color of bright future. All three colors are plaid on a basic nary color. In the selection of the textile, synthetic fiber (Polyester 65%, rayon 35%) equipped with UV cutting as well as water resistance etc. was recommended. In the uniform design process, the effective communication with user (postman) is critical to find the requirements and needs of uniform user (postman). Also. the uniform designer should reflect the above four key factors in design development. Therefore, the uniform should provide the user with high job performance and job pride in wearing the uniform.

  • PDF

A Study on the Analysis of Architectural Interior Space through Movement System focused on Hyangdan and Kwankajung (운동체계에 의한 건축공간 분석에 관한 연구 -향단과 관가정의 안채$\cdot$사랑채 실내공간분석 -)

  • Lee Kum-Jin;Choi Dong Hyeog
    • Journal of the Korean housing association
    • /
    • v.16 no.2
    • /
    • pp.55-65
    • /
    • 2005
  • 'Movement System' is made of the interaction of user and architectural spaces related to each other in order. 'Movement' meant in movement system is possible only in the status of user and architectural space together. Movement created and disappeared by the user is not subordinated to the existing architectural space but becomes the main element of formating movement system. It is required that movement conception applied to architecture should be derived from the essence of movement and this study presents the movement system. To explain the formating process of movement system, A. N. Whitehead's process philosophy theory is at the basis and transformed in architectural aspects. On basis of these theoretical backgrounds, the process of making movement system can be explained. There are unit movement, unit object, and elements for movement process as the basic requirements for movement system, each unit is apprehended by individual operation and the nexus is composed by associative operation of apprehended units. This nexus becomes the object of a new subject and forms multiple nexus. Relation of unit movement and unit object and nexus are apprehended as the continuation and extensive continuum is made. At that time, movement with multiple phases set inbetween systems and extended multiplied. Through above study, movement system is applied to Korean traditional houses.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe

  • zhu, Hong;Li, Hongbo;Cui, Zongmin;Cao, Zhongsheng;Xie, Meiyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5877-5897
    • /
    • 2018
  • With the popularity of mobile networks and smartphones, geo-textual publish/subscribe messaging has attracted wide attention. Different from the traditional publish/subscribe format, geo-textual data is published and subscribed in the form of dynamic data flow in the mobile network. The difference creates more requirements for efficiency and flexibility. However, most of the existing Top-k geo-textual publish/subscribe schemes have the following deficiencies: (1) All publications have to be scored for each subscription, which is not efficient enough. (2) A user should take time to set a threshold for each subscription, which is not flexible enough. Therefore, we propose an efficient and flexible Top-k geo-textual publish/subscribe scheme. First, our scheme groups publish and subscribe based on text classification. Thus, only a few parts of related publications should be scored for each subscription, which significantly enhances efficiency. Second, our scheme proposes an adaptive publish/subscribe matching algorithm. The algorithm does not require the user to set a threshold. It can adaptively return Top-k results to the user for each subscription, which significantly enhances flexibility. Finally, theoretical analysis and experimental evaluation verify the efficiency and effectiveness of our scheme.

Development of data analysis tool for combat system integration

  • Shin, Seung-Chun;Shin, Jong-Gye;Oh, Dae-Kyun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.5 no.1
    • /
    • pp.147-160
    • /
    • 2013
  • System integration is an important element for the construction of naval combat ships. In particular, because impeccable combat system integration together with the sensors and weapons can ensure the combat capability and survivability of the ship, the integrated performance of the combat system should be verified and validated whether or not it fulfills the requirements of the end user. In order to conduct systematic verification and validation, a data analysis tool is requisite. This paper suggests the Data Extraction, Recording and Analysis Tool (DERAT) for the data analysis of the integrated performance of the combat system, including the functional definition, architecture and effectiveness of the DERAT by presenting the test results.

Smart Card Based User Authentication Scheme Secure Against Password Guessing Attack

  • Joo, Young-Do
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.182-188
    • /
    • 2011
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, this paper proposes the improved user authentication scheme based on the hash functin and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the proposed scheme is more secure and efficient than Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

A Study on the User Authentication Scheme with Forward Secrecy (순방향 비밀성을 제공하는 사용자 인증 스킴에 관한 연구)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.183-191
    • /
    • 2011
  • Recently Wang-Li proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we described the Wang-Li and Yoon et al.'s authentication scheme simply, and we prove that the Wang-Li's scheme is vulnerable to a password guessing attack and impersonation attack in case that the attacker steals the user's smart card and extracts the information in the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and generalized ElGamal signature scheme that can withstand many possible attacks including a password guessing attack, impersonation attack and replay attack, and that can offer the function of forward secrecy. The result of comparative analysis, the our proposed scheme is much more secure and efficient than the Wang-Li and Yoon et al.'s scheme.

사용자 인터페이스 디자인과 개발 User Interface Design and development

  • 천진향
    • Archives of design research
    • /
    • v.13 no.1
    • /
    • pp.29-38
    • /
    • 2000
  • Many computer system; (or program;) have been desigoc>d without taking their users needs into accOlmt To provide a practical and comprehensive introduction to the design and development of user interfaces, desigrer (or developer) is suggested to analyze and evaluate requirements from the view point of users and to design more effective program;. The su~ect of this thesis is to analyze and criticize tre details of Wonder-land, that is a demo multimedia ill-ROM title, in respect to User Interface Design and Development. By applying the coocepts, teclmiques and ideas to a real life study and analyzing and criticizing it from the view point of users, desigrer lets the program revised and developed by users. For User Interface Design and Development purposes this tresis analyzes and criticize the characteristics of the program already made, the current user interface design, mental models and users learning about the program. As a result it is founded that the program requires to be analyzing and criticizing continuously from a cognitive point of view to design and develop it successfully.

  • PDF

An Improved User Authentication Scheme Based on Random Nonce (랜덤 Nonce 기반 사용자 인증 스킴의 안전성 개선에 관한 연구)

  • Joo, Young-Do;An, Young-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.33-40
    • /
    • 2010
  • Recently Yoon et al. proposed the remote user authentication scheme using smart cards. But their scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we prove that Yoon et al.'s scheme is vulnerable to a password guessing attack in case that the attacker steals the user's smart card and extracts the information from the smart card. Accordingly, we propose the improved user authentication scheme based on the hash function and random nonce that can withstand various possible attacks including a password guessing attack. The result of comparative analysis demonstrates that the our proposed scheme is much more secure and efficient than the Yoon et al.'s scheme, with a trivial trade-off to require just a few more exclusive-OR operations.

Analysis on Interesting Element of Mobile Application Using User Reviews (사용자 리뷰를 이용한 모바일 어플리케이션의 관심 요소 분석)

  • Kim, Kyoung-Nam;Choi, Dong-Seong;Lee, Kang-Moo;Lee, Myoun-Jae
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.431-438
    • /
    • 2012
  • Recently, many mobile applications have been developed and published by increasing popularity of smart phone's market. However, a lack of research work is an issue for mobile applications' favoritism to users. In this paper, we have determined the acceptance factors on the existing smart phone applications in order to fit into mobile user's requirements. In addition, we have defined the modification of acceptance factors which are the interesting element of mobile applications, code users reviews of top 20 paid applications among android market applications, and analyse on what element can attract users' interest of mobile applications. As a result, we propose a development method of mobile applications based on the analyzed interesting elements. Our contribution is to provide useful information to mobile application companies for helping them to develop and publish successful mobile applications.