• Title/Summary/Keyword: personal computer

Search Result 2,594, Processing Time 0.034 seconds

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering

  • Jeong, Woon-Hae;Kim, Se-Jun;Park, Doo-Soon;Kwak, Jin
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.157-172
    • /
    • 2013
  • There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is 'collaborative filtering', which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such information profiles. Collaborative filtering systems, however, have in their nature both technical issues such as sparsity, scalability, and transparency, as well as security issues in the collection of the information that becomes the basis for preparation of the profiles. In this paper, we suggest a movie recommendation system, based on the selection of optimal personal propensity variables and the utilization of a secure collaborating filtering system, in order to provide a solution to such sparsity and scalability issues. At the same time, we adopt 'push attack' principles to deal with the security vulnerability of collaborative filtering systems. Furthermore, we assess the system's applicability by using the open database MovieLens, and present a personal propensity framework for improvement in the performance of recommender systems. We successfully come up with a movie recommendation system through the selection of optimal personalization factors and the embodiment of a safe collaborative filtering system.

Design of Home&Mobile Healthcare System Based on Smart Phone PMG(personal mobile gateway) (스마트폰 PMG(personal mobile gateway) 기반의 홈&모바일 헬스케어 시스템 설계)

  • Jean, Jae-Hwan;Kim, Sung-Hyun;Gang, Seong-In;Kim, Kwan-Hyung;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.757-759
    • /
    • 2011
  • 본 논문에서는 홈 헬스케어에서 건강측정을 위하여 가장 많이 사용되는 개인 건강 기기(personal health device)인 혈당계, 혈압계, 심박측정계(heart rate monitor), 산소포화도 측정계(pulse-oximeter), 심전도 측정계(ECG monitor)의 5가지 홈 헬스케어 의료기기를 구성하고 표준 핵심 기술 요소인 ISO/IEEE 11073, HL7을 준용하는 게이트웨이 플랫폼을 스마트폰에 적용하여 기존의 홈 헬스케어 시스템을 구성하는 단말기 형태의 게이트웨이나 홈 서버 하드웨어 구성을 필요로 하지 않으면서 집안의 고정된 게이트웨이로 인해서 생기는 위치종속성 문제를 해결할 수 있는 PMG(personal mobile gateway) 기반의 홈&모바일 헬스케어 시스템을 개발하고자 한다.

  • PDF

Personal computer-based fatigue testing automation and improvements in fatigue behavior monitoring (퍼스널 컴퓨터에 의한 疲勞試驗自動化 및 疲勞擧動 測定의 精密化)

  • 박준래;송지호;엄윤용;김정엽;강기주
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.12 no.1
    • /
    • pp.123-130
    • /
    • 1988
  • Two kinds of 16bit-personal computer-based fatigue testing automation and monitoring system were constructed; one is Single-System utilizing a personal computer, the other si Dual-System consisting of two personal computers. The system developed in this study permits to perform multi-step programmed loading and pseudo-random loading fatigue tests, three parameters such as load, total displacement and subtracted displacement can be measured simultaneously. For improvements in measurements of fatigue behavior, two kinds of signal noise reduction software was developed. In addition, a software was also designed to automatically measure the crack opening point and crack length using the unloading elastic compliance technique.

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Analysis on the Impact of Knowledge of Personal Information Protection on Their Behaviors in Elementary School (초등학생의 개인정보보호에 관한 지식이 행동에 미치는 영향 분석)

  • Lee, Kyungchan;Kim, Jamee;Lee, Wongyu
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.3
    • /
    • pp.299-310
    • /
    • 2015
  • This study was conducted with the goal to identify the degree to which elementary school students' knowledge about personal information protection practices impacted their actual behavior with regard to privacy protection. To fulfill this goal, knowledge about personal information protection was set as (1) knowledge about concepts of personal information, (2) knowledge of the rights of information holders, (3) knowledge about the code of conduct for information protection, and (4) awareness of the value of personal information. As for students' behaviors to ensure their personal information protection those were set as their habits to comply with the personal in-formation protection code of conduct and their efforts to respond and recover from any personal information violation. This study was conducted targeting 510 elementary students. The degree of the students' knowledge and their behaviors was measured by first distributing a self-report survey to the students and then analyzing their responses. The results of the analysis revealed the following: First, it was found that there are no differences among the four factors of knowledge and behavior according to the status of their education. Second, the two factors that primarily affected their personal information protection behavior were found to be their awareness of the information protection code of conduct and awareness of the value of personal information. This study holds significance in that it makes suggestions as to how personal protection practices should be taught to public school students.

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Machine Learning based Personal Information Classification System in Large Image Files (머신러닝 기반의 대규모 이미지 파일에서 개인 정보 분류 시스템)

  • Kim, Ki-Tae;Yun, Sang-Hyeok;Seo, Bo-in;Lee, Sei-hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.293-294
    • /
    • 2020
  • 본 논문에서는 현재 이슈가 되고 있는 개인 정보 보안에 대해서 Keras 라이브러리를 사용하여 개인 정보 관련 데이터를 학습한 후, 한글 인식률 증가된 Tesseract-OCR 활용하여 사람들이 가지고 있는 데이터의 개인 정보 유무를 판단하여 분류한다.

  • PDF

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

Influence of Mobile SNS on Personal Relationship Enhancement and Self-esteem of Married Women in Their 30s and 40s: Based on Usage Acceleration Factors (모바일 SNS 사용이 30~40대 기혼여성의 대인관계 강화와 자존감에 미치는 영향: 사용촉진 요인을 중심으로)

  • Kim, Jongki;Han, Ji-Yeon
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.53-71
    • /
    • 2014
  • The center of networking is moving toward mobile from PC based computing environment. The number of smartphone users are increasing rapidly today. One of the most popular smart phone applications is mobile SNS such as Kakao Story, Facebook, Twitter, Mobile Cyworld, etc. Mobile SNS means social network services based on mobile communication technology. This research focused on mobile SNS usage of married women who have not enough time for face-to-face communication with their friends to enhance their friendship. Married women in their 30s and 40s have lots of things to do like housework and caring their children. Mobile SNS would help their communication in aspect such of free of space and time. Through Mobile SNS married women can reinforce their personal relationship and self-esteem. Social Information Processing Theory (SIP) is an interpersonal communication theory developed by Walther(1992). Once established, online personal relationships may demonstrate the same relational dimensions and qualities as face-to-face relationships. The theory explains how people get to know one another online, without nonverbal cues, and how they develop and manage relationships in the computer-mediated environment. The result of empirical analysis indicates that marred women's Mobile SNS activities reinforce their personal relationship and self-esteem.