• Title/Summary/Keyword: User environment

Search Result 5,352, Processing Time 0.029 seconds

A Study on the Control technique of the Real-Time over the Environment of Graphic User Interface Using VxD. (VxD를 이용한 GUI환경에서의 실시간 제어기법에 관한 연구)

  • 장성욱;이진걸
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.120-120
    • /
    • 2000
  • In this study, in order to control real system under the environment of graphic user interface, study on the technique which can control real system without additional hardware drivers using virtual machine driver operated on the windows operating system. Consider the problem which is the error and the delay of a sampling time on the multi task processing through the load test of the experiment using graphic user interface.

  • PDF

Ontology Based User-centric Service Environment for Context Aware IoT Services (상황인지 IoT 서비스 제공을 위한 온톨로지 기반 사용자 친화적 서비스 환경)

  • Choi, Hoan-Suk;Lee, Jun-Young;Yang, Na-Ri;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.29-44
    • /
    • 2014
  • To provide context aware service, certain phenomena and situation information of the user should be detecting and monitoring using sensors. But, the sensor data has heterogeneity about system, syntax, structure, and semantics. So, it is difficult to apply to various services. To solve this issue, we should remove these heterogeneities and convert to context information that is easy to provide context aware services. Also, the existing context aware service mash-up environment require relevant sensor type, criteria of context, programing ability to define the service situation. So, it is difficult to create service for a non-technical user. Therefore, we propose ontology based user-centric service environment to provide context aware IoT services. It provide context awareness and user-desired services using data that acquired via IoT paradigm. The proposed environment consist of the ontology based semantic sensor data processing and the user-centric service environment. It provide convert the object data to the context information and service mash-up process to create user service in easy way.

Recommendation Method considering New User in Internet of Things Environment (사물인터넷 환경에서 새로운 사용자를 고려한 정보 추천 기법)

  • Kwon, Joonhee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.23-35
    • /
    • 2017
  • With the popularization of mobile devices, the number of social network service users is increasing, thereby the amount of data is also increasing accordingly. As Internet of Things environment is expanding to connect things and people, there is information much more than before. In such an environment, it becomes very important to recommend the necessary information to the user. In this paper, we propose a recommendation method that considers new users in IoT environment. In the proposed method, we recommend the information by applying the centrality-based social network analysis method to the recommendation method using the social relationships in the social IoT. We describe the seven-step recommendation method and apply them to the music circle scenario of the IoT environment. Through the music circle scenario, we show that we can recommend more suitable information to new users in the IoT environment than the existing recommendation method.

The environment for Verifying MS-DOS compatibility of HDL modeled microprocessor (HDL 모델 마이크로프로세서의 MS-DOS 호환성 검증 환경 구현)

  • 이문기;이정엽;김영완;서광수
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.7
    • /
    • pp.115-122
    • /
    • 1995
  • This paper presents the simulation environment that verifies whether a new microprocessor described with HDL is compatible with MS-DOS. The phrase 'compatible with MS-DOS' means that the microprocessor can execute MS-DOS without any modification of MS-DOS's binary code. The proposed verification environment consists of HDL simulator and user interface module. And the communications between them are performed by using sockets which UNIXprovide. The HDL simulator is equipped with several functions, which use PLI to emulate ROM-BIOS facilities. The ROM-BIOS emulation routine is described by using these functions. User interface module utilizes S/MOTIF and participates in emulating PC monitor and keyboard. The verification environment is tested by executing the MS-DOS commands (DIR, FORMAT, DATE, TIME etc.) with the HDL model of microprocessor, and the display of user interface module verifies that the environment works correctly. In this paper, the method of constructing the verification environment is presented, and the simulation results are summarized.

  • PDF

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.

User Modeling based Time-Series Analysis for Context Prediction in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 컨텍스트 예측을 위한 시계열 분석 기반 사용자 모델링)

  • Choi, Young-Hwan;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.5
    • /
    • pp.655-660
    • /
    • 2009
  • The context prediction algorithms are not suitable to provide real-time personalized service for users in context-awareness environment. The algorithms have problems like time delay in training data processing and the difficulties of implementation in real-time environment. In this paper, we propose a prediction algorithm with user modeling to shorten of processing time and to improve the prediction accuracy in the context prediction algorithm. The algorithm uses moving path of user contexts for context prediction and generates user model by time-series analysis of user's moving path. And that predicts the user context with the user model by sequence matching method. We compared our algorithms with the prediction algorithms by processing time and prediction accuracy. As the result, the prediction accuracy of our algorithm is similar to the prediction algorithms, and processing time is reduced by 40% in real time service environment.

Real-time user behavior monitoring technique in Linux environment (Linux 환경에서 사용자 행위 모니터링 기법 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.3-8
    • /
    • 2022
  • Security threats occur from the outside, but more often from the inside. In particular, since the internal user knows about the information service, the security threat damage caused by the internal user is greater. In this environment, the actions of all users accessing information services should be monitored and recorded in real-time. However, the current operating system records only the logs of system and application execution, so there is a limit to monitoring user behavior in real-time. In such a security environment, damage may occur due to user's unauthorized actions. To solve this problem, this study proposes an architecture that monitors user behavior in real-time in a Linux environment. As a result of verifying the function to confirm the effectiveness of the proposed architecture, the console input values and output angles of all users who have access to the operating system are monitored in real-time and stored. Although the performance of the proposed architecture is somewhat slower than the identification and authentication functions provided by the operating system, it was confirmed that the performance was not at a level that users would recognize, and thus it was judged to be sufficiently effective. However, since this study focuses on monitoring the console behavior, it is impossible to monitor the behavior of user applications running in the background, so additional research is needed.

A Study on the Development of the User Behavior Simulation Technology Using a Perceived Action Possibilities (내제된 행위 유발 가능성을 활용하는 사용자 행동 시뮬레이션 기술의 개발에 관한 연구)

  • Lee, Yun-Gil;Park, Chang-Hoon;Im, Dong-Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.11
    • /
    • pp.1335-1344
    • /
    • 2014
  • In architectural design, the user is one of the most important factors for the design task as well as the standard for evaluating the value of the built environment after its construction. Recently, accidents, such as fires and breakdowns, in huge and complicated buildings have increased the importance of user behavior simulation. The Korean government has tried to establish a regulation for the prevention of accidents in the built environment. This is regarded as a significant step forward for providing a safer and more appropriate environment for users. However, the existing technologies related to analyzing user behavior only simulate simplified situations. Such simulations are not enough to evaluate accurately the designed alternatives because buildings and spaces contain more complicated information than what we have conventionally considered. Thus, we propose that the advanced agent can interact with the architectural context. It can understand not only the physical situation but also how the users affect this situation. In order to realize this, we adopted the concept of affordances as the perceived action possibilities for the simulation environment.