• Title/Summary/Keyword: user attribute

Search Result 365, Processing Time 0.028 seconds

Development of GIS Application using Web-based CAD (Web기반 CAD를 이용한 지리정보시스템 구현)

  • Kim, Han-Su;Im, Jun-Hong;Kim, Jae-Deuk;Shin, So-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.3 no.3
    • /
    • pp.69-76
    • /
    • 2000
  • This study deals with development GIS application using web-based CAD, this application serves to user, designer, manager that more convenient and various functions. Development to this application, collect attribute data from fieldwork and geographic data from cadastral map and aerial survey map and then development to user interface using HTML, JavaScript, ASP, Whip ActiveX control. This application's characters are as follows ; First, system designer designed that anyone who have basic knowledge about web and CAD can develop this application. A system structure simplification by 2-Tier. Geographic information use DWF(drawing web format) file and attribute information use DBMS in consideration of extension. Second, system manager can service independently GIS in Web need not high priced GIS engine, so more economical. Third, internet user get service GIS information and function that search of information, zoom in/out, pan, print etc., if you need more functions, add function without difficultly. Developed application as above, not only save volume but fast of speed as use vector data exclude character and image data. Also, this application can used by means of commercial and travel information service but also various GIS service of public institution and private in web.

  • PDF

An Optimal Design Method for the Multidimensional Nested Attribute Indexes (다차원 중포 속성 색인구조의 최적 설계기법)

  • 이종학
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.194-207
    • /
    • 2003
  • This paper presents an optimal design methodology for the multidimensional nested attribute index (MD-NAI) that uses a multidimensional index structure for indexing the nested attributes in object databases. The MD-NAI efficiently supports complex queries involving both nested attributes and class hierarchies, which are not supported by the nested attribute index using one-dimensional index structure such as $B^+$-tree. However, the performance of the MD-NAI is very degraded in some cases of user's query types. In this paper, for the performance enhancement of the MD-NAI, we first determine the optimal shape of index page region by using the query information about the nested predicates, and then construct an optimal MD NAI by applying a region splitting strategy that makes the shape of the page regions of the MD-NAI as close as possible to the predetermined optimal one. For performance evaluation, we perform extensive experiments with the MD-NAI using various types of nested predicates and object distribution. The results indicate that our proposed method builds optimal MD-NAI regardless of the query types and object distributions. When the interval ratio of a three-dimensional query region is 1:16:236, the performance of the proposed method is enhanced by as much as 5.5 times over that of the conventional method employing the cyclic splitting strategy.

  • PDF

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

User Event-based Information Structure Modeling for Class Abstraction of Business System (사용자 이벤트 기반의 정보구조 모델링을 이용한 비즈니스 업무 분석에서의 클래스 추출 방법)

  • Lee Hye-Seon;Park Jai-Nyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1071-1078
    • /
    • 2005
  • Use case modeling is a widely used technique for functional requirements analysis of business system but it is difficult to identify a use cases at the right level and use case specifications are too long and confusing. It is also hard to determine a functional decomposition Phases·s of use cases. Therefore customer doesn't understand the use cases. This paper is defining concept of the Information Structure Modeling(ISM) and analyzing business system for the customer's perspective. ISM is an efficient mechanism for analyzing user requirements and for Identifying objects in a business system using Attribute Structure Diagram which is a major tool of the ISM that describes user event. This paper is also to show how the classes are classified and derived as event-asset-transaction type in ISM. It provides a user-friendly approach to visually representing business model.

The effects of dental medical institutions of user reactions by mobile message type (모바일메시지 속성별 이용자 반응이 치과의료 이용의사에 미치는 영향)

  • Im, Ae-Jung;Han, Soo-Yeoun;Lim, Hee-Jung
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.20 no.2
    • /
    • pp.81-91
    • /
    • 2019
  • Objectives: It helps dental clinic to work 1:1 consulting and select the properties of the Kakao Talk message. The study was designed to determine the influence of users cognitive and emotional responses by message attribute that affect intention of use of dental clinic. Methods: This study targeted 297 peple Kakao Talk users aged 20-50 s, in Seoul, Gyeonggi-do and Incheon from, February 6 to April 7, 2017. We analyzed the data with frequency analysis, t-test, one-way ANOVA, and multiple regression analysis by using SPSS ver 24.0(SPSS Inc, Chicago, USA). The significance level for significance was set at 0.05. Results: Among the user's responses about the event type Kakao talk message, the ease(${\beta}=0.121$, p<0.01), usefulness(${\beta}=0.148$, p<0.001), affinity(${\beta}=0.471$, p<0.001), satisfaction(${\beta}=0.249$, p<0.001). affected intention of use of dental clinic. Among the user's responses about the dental information type, the ease(${\beta}=0.150$, p<0.05), expertise(${\beta}=0.151$, p<0.05), satisfaction(${\beta}=0.237$, p<0.001) affected intention of use of dental clinic(p<0.05). Among the user's responses about the general public relations type, the expertise(${\beta}=0.254$), affinity(${\beta}=0.193$), satisfaction(${\beta}=0.474$) affected intention of use of dental clinic(p<0.001). Conclusion: It is necessary to elicit a positive intention of use of dental clinic through a highly emotional response from the users to improve the image of the dental clinic and to attract patients.

APDM : Adding Attributes to Permission-Based Delegation Model

  • Kim, Si-Myeong;Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • Delegation is a powerful mechanism that allocates access rights to users to provide flexible and dynamic access control decisions. It is also particularly useful in a distributed environment. Among the representative delegation models, the RBDM0 and RDM2000 models are role delegation as the user to user delegation. However, In RBAC, the concept of inheritance of the role class is not well harmonized with the management rules of the actual corporate organization. In this paper, we propose an Adding Attributes on Permission-Based Delegation Model (ABDM) that guarantees the permanence of delegated permissions. It does not violate the separation of duty and security principle of least privilege. ABDM based on RBAC model, supports both the role to role and user to user delegation with an attribute. whenever the delegator wants the permission can be withdrawn, and A delegator can give permission to a delegatee.

Transmission of Information on Equipment and Shopping Mall with VISIO (VISIO를 이용한 기자재 및 쇼핑몰에 대한 정보 전달)

  • Kim Kil Choon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.201-209
    • /
    • 2004
  • In this paper, You can design drawing to safekeep and manage equipments in order to utilize efficiently by making use of Visio, and can convert stored data into Office data after inputting user attributes of each equipment. that means that you can analyze each data by using functions of Excel after changing Visio safe attributes into Excel data and XML data, and control and utilize data effectively by converting XML data into DB ones. Additionally. you can use on deliveration of useful information on shopping mall. At last, we present how to share and utilize transformed equipments on the web by designing and making and transforming Data type for good management of equipments of computers existed in university.

  • PDF

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW (스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인)

  • Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

A Study on Viewer's activity and Satisfaction on the Changed TV (수용자에게 요구된 능동성과 이용만족도 관계 연구 - TV의 변화에 따른 수용자 행태 변화와 만족도에 대한 연구)

  • Baik, So-Yeon;Ji, Yong-Gu
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.179-184
    • /
    • 2008
  • Changed TV, that has multi-channel and interactive attribute, requires viewer's activity. Also, broadcasting environment and TV user interface require same things equally. But, the viewer feels uncomfortable in current situation because they recognize the TV as passive media. especially, TV interface can't overcome limitation of TV media. And such interface is provided as it is. This problem brings viewer's confusion and dissatisfaction more and more. This study raises a question about viewer's activity and satisfaction, analyzes the relation and effect between activity and satisfaction.

  • PDF

The Design and Implementation of SGML Document Editing System Using Document Structure Information (문서 구조정보를 이용한 SGML 문서 편집 시스템의 설계 및 구현)

  • Kim, Chang-Su;Jo, In-June;Jung, Hoe-Kyung
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.21-27
    • /
    • 1998
  • This paper describes the design and implementation of system for editing SGML document instance using document structure information of SGML DTD. For make use of structure window for logical structure expression of document to SGML document editing without editing mistake of user and easy update the using support to editing process of elements, attributes, entities tools and product document, and valid using SGML parser. Also, in order to support Korean and English text using KS 5601. In this paper, the proposed SGML document editing system is used common controls support of window 95 for window user interface

  • PDF