• 제목/요약/키워드: User study

검색결과 12,957건 처리시간 0.048초

A Study on Image Acquisition and Usage Trace Analysis of Stick-PC (Stick-PC의 이미지 수집 및 사용흔적 분석에 대한 연구)

  • Lee, Han Hyoung;Bang, Seung Gyu;Baek, Hyun Woo;Jeong, Doo Won;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제6권7호
    • /
    • pp.307-314
    • /
    • 2017
  • Stick-PC is small and portable, So it can be used like a desktop if you connect it to a display device such as a monitor or TV anytime and anywhere. Accordingly, Stick-PC can related to various crimes, and various evidence may remain. Stick-PC uses the same Windows version of the operating system as the regular Desktop, the artifacts to be analyzed are the same. However, unlike the Desktop, it can be used as a meaningful information for forensic investigation if it is possible to identify the actual user and trace the usage by finding the traces of peripheral devices before analyzing the system due to the mobility. In this paper, We presents a method of collecting images using Bootable OS, which is one of the image collection methods of Stick-PC. In addition, we show how to analyze the trace of peripheral connection and network connection trace such as Display, Bluetooth through the registry and event log, and suggest the application method from the forensic point of view through experimental scenario.

Storm-Based Dynamic Tag Cloud for Real-Time SNS Data (실시간 SNS 데이터를 위한 Storm 기반 동적 태그 클라우드)

  • Son, Siwoon;Kim, Dasol;Lee, Sujeong;Gil, Myeong-Seon;Moon, Yang-Sae
    • KIPS Transactions on Software and Data Engineering
    • /
    • 제6권6호
    • /
    • pp.309-314
    • /
    • 2017
  • In general, there are many difficulties in collecting, storing, and analyzing SNS (social network service) data, since those data have big data characteristics, which occurs very fast with the mixture form of structured and unstructured data. In this paper, we propose a new data visualization framework that works on Apache Storm, and it can be useful for real-time and dynamic analysis of SNS data. Apache Storm is a representative big data software platform that processes and analyzes real-time streaming data in the distributed environment. Using Storm, in this paper we collect and aggregate the real-time Twitter data and dynamically visualize the aggregated results through the tag cloud. In addition to Storm-based collection and aggregation functionalities, we also design and implement a Web interface that a user gives his/her interesting keywords and confirms the visualization result of tag cloud related to the given keywords. We finally empirically show that this study makes users be able to intuitively figure out the change of the interested subject on SNS data and the visualized results be applied to many other services such as thematic trend analysis, product recommendation, and customer needs identification.

A Case Study on the Service Programs at the Presidential Library and Museum (대통령 기록관의 서비스 프로그램 사례 연구)

  • Jo, Min-Ji
    • Journal of Korean Society of Archives and Records Management
    • /
    • 제6권2호
    • /
    • pp.157-184
    • /
    • 2006
  • Presidential records which have produced during a presidency as a national center are the evidence of the presidency and main historical records. We have the responsibility to establish fundamental systems to produce such main historical records and to manage such main historical records which could help people and history to judge the presidency based upon the evidence of their activities. The historical appraisal could be achieved not by memory but by evidence. A draft of a proposed law on the management of presidential records which includes the establishment of presidential libraries for the presidential records Mecca is being moored at the National Assembly now. The presidential library is to be considered as a multi-functional national institution which is carrying out the role as an Archives, Museums and Center for the education. In addition, it is imperative for a presidential library to provide user-oriented services to enrich the usability and the value of records, recognizing the change of administration paradigm from a supplier-oriented system to a customer-oriented system. This dissertation, in order to develop presidential library service programs focusing on customers rather than the convenience of administration, reviewed programs of the U.S. presidential libraries as a developed case and proposes guidelines and applicable samples for the development of the Korean presidential library service programs.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • 제9호
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

Estimation of Land Surface Energy Fluxes using CLM and VIC model (CLM과 VIC 모형을 활용한 지표 에너지 플럭스 산정)

  • Kim, Daeun;Ray, Ram L.;King, Seokkoo;Choi, Minha
    • Journal of Wetlands Research
    • /
    • 제18권2호
    • /
    • pp.166-172
    • /
    • 2016
  • Accurate understanding of land surface is essential to analyze energy exchanges between earth surface and atmosphere. For the quantization of energy fluxes, the various researches about Land Surface Model(LSM) have been progressed. Among the various LSMs, the researches using Common Land Model(CLM) and Variable Infiltration Capacity(VIC) model are performed briskly. The CLM which is advanced LSM can calculate realistic results with few user defined parameters. The VIC model which is also typical LSM is widely used for estimation of energy fluxes and runoff in various fields. In this study, the energy fluxes which are net radiation, sensible heat flux, and latent heat flux were estimated using CLM and VIC model at Southern Sierra-Critical Zone Observatory(SS-CZO) site in California, United States. In case of net radiation and sensible heat flux, both models showed good agreement with observations, however, the CLM showed underestimated patterns of net radiation and sensible heat flux during precipitation period. In case of latent heat flux, the CLM represented better estimation of latent heat flux than VIC model which underestimated the latent heat flux. Through the estimation of energy fluxes and analysis of models' pros and cons, the applicability of CLM and VIC models and need of multi-model application were identified.

Efficiency of Radial Transit Routes (간선-지선 노선체계의 효율성)

  • Park, Jun-Sik;Kho, Seung-Young;Lee, Chung-Won
    • Journal of Korean Society of Transportation
    • /
    • 제26권5호
    • /
    • pp.227-235
    • /
    • 2008
  • This study analyzed the efficiency of a trunk with branches and a trunk with feeders route system comparing the user cost and operator cost of those route systems. Basically, a trunk with branches is more efficient than a trunk with feeders in the passengers' perspective if the transit system of a trunk and feeders are the same. In the case that the trunk system is hierarchically higher than the feeder system, a trunk with feeders has the competitive edge over a trunk with branches if the saving of travel cost induced by using the trunk line is larger than the increasing waiting and transfer cost. This result is consistent with the previous research by Park et al.(2007c), which analyzed the efficiency of hierarchical structure in a grid transit network. If the travel demand of each origins and destinations is low, increasing headway according to the travel demand can increase passenger load or operating efficiency in a trunk with feeders route system. In this case, a trunk with feeders route system is more prevalent as the operating cost, route length, and number of destinations increases, while it is less prevalent as the transfer cost and passengers' time value of the waiting time increases. In cases that central business district, which is located in the middle of a trunk line, generates travel demand, a trunk with feeders is more efficient than a trunk with branches with the increasing travel demand from and to the CBD. Therefore it can be concluded that to have a dual operating system between CBD and suburban is more efficient than one type transit system. The efficiency of that system can be increased through an efficient transfer system that can reduce the transfer cost.

Quality Evaluation for Usability of Internet Shopping Mall (인터넷 쇼핑몰 사용성에 대한 품질평가)

  • Lee, Myung-Sook;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • 제12권6호
    • /
    • pp.59-68
    • /
    • 2007
  • The purpose of this paper is to evaluate usability quality through investigating the factors of usability for internet shopping mall websites. For this study, previous studies were investigated and experts' discussions were held. In result, six characters of usability were chosen such as content satisfaction. customer attraction satisfaction, price information satisfaction, public security satisfaction, user interface satisfaction. and process of transaction satisfaction that affect usability of shopping mall websites and the evaluation models of 72 detailed measure factors were established. Since these 72 sub-factors inc)ode the key words of HTML, XML, JSP, and ASP from the target websites. 33 measurable sub-factors in the information were measured through usability evaluation experiment. In addition, a questionnaire about usability measure factors was executed after preferable websites and not preferable websites are selected. After that, we verified the reasonability of usability measure model factors comparing the results of the evaluation experiment with the result of the questionnaire. The time it takes to measure the usability of shopping mall websites can be reduced by using this measurement supporting tool. Also, this tool may be used to estimate the usability during the development of a shopping mall website.

  • PDF

Development of Video Watermark System for Low-specification System as Android Platforms (저 사양 안드로이드 기반 동영상 보안을 위한 워터마크 시스템 개발)

  • Hwang, Seon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • 제19권7호
    • /
    • pp.141-149
    • /
    • 2014
  • This paper describes a method to insert and detect watermark or fingerprint to/from videos in low-computing powered system as Android platforms. Fingerprint, which is a kind of watermark, has features such as patterns that contain information. The inserting frame numbers in video-stream and the positions in a picture were chosen from the encrypted user ID to insert the watermarks. The used encrypt algorithm is the HIGHT algorithm which was developed for low-computing powered systems by KISA(Korean Internet & Security Agency). Subtracting an inferred picture from the previous picture was used to extract a candidate feature. Median filtering was used to get rid of noise and stabilize the candidate feature. New algorithm that reduces calculating steps of the median filtering was developed and applied for low-specification systems. The stabilized features were accumulated over 150 times and calculated by correlation coefficient method to recognize the patterns. We examined 22 videos and successfully detected the patterns from 21 videos. The correlation coefficient r values that we examined through this study exceeded over 0.79 more than the threshold (0.7).

A Study on the Development and Activation of Marina Port for the Expansion of the Marine Leisure Sports (해양레포츠 확산을 위한 마리나항만 개발과 활성화 전략)

  • Kim, Hong-Seop
    • Journal of Korea Port Economic Association
    • /
    • 제29권1호
    • /
    • pp.215-245
    • /
    • 2013
  • In this world, the interest in the marine leisure-sports, nature friendly oriented, has been increased. The width of leisure activities has became enlarged because of expansion of leisure time and the changes of recognition on the rational management and use of marine resources. Marina ports influence significantly marine leports and this paper reviewed the maria ports status and problems. This Country has strived to develop marina ports in local areas, designing the 1st basic National Plan of Marina Development. We have keen interest in Marina but have no detail strategy and preparation. This paper suggested how marina port shall be developed for the expansion of marine leports and what strategies shall be adopted for the activation of the facilities. After reviewing the previous researches and with the results of questionnaire survey, this paper suggested two types strategies. First on the policy oriented point, it suggested 10 alternatives on the perspectives of development and operation areas. Secondly, it proposed some strategies for the activation of marina ports on the aspects of 4Ps of marketing. This paper theoretically groped the activation schemes with the knowledge and experiences of experts, but it is recommended furthermore some survey on the practical field and user attitude must be progressed.

Image Processing Algorithms for DI-method Multi Touch Screen Controllers (DI 방식의 대형 멀티터치스크린을 위한 영상처리 알고리즘 설계)

  • Kang, Min-Gu;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • 제48권3호
    • /
    • pp.1-12
    • /
    • 2011
  • Large-sized multi-touch screen is usually made using infrared rays. That is because it has technical constraints or cost problems to make the screen with the other ways using such as existing resistive overlays, capacitive overlay, or acoustic wave. Using infrared rays to make multi-touch screen is easy, but is likely to have technical limits to be implemented. To make up for these technical problems, two other methods were suggested through Surface project, which is a next generation user-interface concept of Microsoft. One is Frustrated Total Internal Reflection (FTIR) which uses infrared cameras, the other is Diffuse Illumination (DI). FTIR and DI are easy to be implemented in large screens and are not influenced by the number of touch points. Although FTIR method has an advantage in detecting touch-points, it also has lots of disadvantages such as screen size limit, quality of the materials, the module for infrared LED arrays, and high consuming power. On the other hand, DI method has difficulty in detecting touch-points because of it's structural problems but makes it possible to solve the problem of FTIR. In this thesis, we study the algorithms for effectively correcting the distort phenomenon of optical lens, and image processing algorithms in order to solve the touch detecting problem of the original DI method. Moreover, we suggest calibration algorithms for improving the accuracy of multi-touch, and a new tracking technique for accurate movement and gesture of the touch device. To verify our approaches, we implemented a table-based multi touch screen.