• Title/Summary/Keyword: user status

Search Result 1,024, Processing Time 0.03 seconds

Detecting user status from smartphone sensor data

  • Nguyen, Thu-Trang;Nguyen, Thi-Hau;Nguyen, Ha-Nam;Nguyen, Duc-Nhan;Choi, GyooSeok
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.28-30
    • /
    • 2016
  • Due to the high increment in usage and built-in advanced technology of smartphones, human activity recognition relying on smartphone sensor data has become a focused research area. In order to reduce noise of collected data, most of previous studies assume that smartphones are fixed at certain positions. This strategy is impractical for real life applications. To overcome this issue, we here investigate a framework that allows detecting the status of a traveller as idle or moving regardless the position and the direction of smartphones. The application of our work is to estimate the total energy consumption of a traveller during a trip. A number of experiments have been carried out to show the effectiveness of our framework when travellers are not only walking but also using primitive vehicles like motorbikes.

The Present Status of Development of Inductively Coupled Plasma Simulator based on Fluid Model (유체 모델을 기반으로 하는 유도 결합 플라즈마 시뮬레이터 개발 현황)

  • Kwon, D.C.;Yoon, N.S.
    • Journal of the Korean Vacuum Society
    • /
    • v.18 no.3
    • /
    • pp.151-163
    • /
    • 2009
  • The domestic development status of Inductively Coupled Plasma (ICP) simulator which is based on fluid model is explained. As each part which composes the unified simulator, electron heating module, charged and neutral particle transport module, surface reaction module including a sheath model, and GUI (Graphic User Interface) with pre- and post-processors are described in order. Also, we present data base status of chemical reaction and physical collision, which has been applied to the recently developed simulator until now. Lastly, some future plans of development are suggested.

Blockchain-Based Shared Electric Kickboard User Management Model (블록체인 기반 공유 전동킥보드 이용자 관리 모델)

  • Soojin Lee;Min-Jeong Park;Na-Hee Kim;Seung-Hyun Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.7
    • /
    • pp.217-226
    • /
    • 2023
  • As the use of shared electric kickboards is rapidly increasing, there are many cases of illegal parking of shared mobility. In order to solve this problem, local governments are taking measures such as towing illegally parked shared electric kickboards, but user management is not considered and the methods are inefficient. Accordingly, in this paper, we propose a blockchain-based shared electric kickboard user management model. The shared electric kickboard is equipped with a camera sensor and GPS that can check the parking status, and when the user ends the use of the shared electric kickboard, information on the parking status is collected through the installed sensors and the shared electric kickboard company You can check if the user has parked correctly. In addition, trust points are given according to the user's parking history and incentives are provided according to the trust points, inducing users to return the shared evangelism kickboard correctly. The information is shared through the consortium blockchain in which shared electric kickboard companies participate, enabling integrated user management of shared electric kickboard companies.

A Sensing Channel Scheduling Scheme for Improving the Cognition Ability in Cognitive Radio Systems (인지 라디오 시스템에서 주파수 상황인지 능력 향상을 위한 감지 채널 스케줄링 기법)

  • Han, Jeong-Ae;Jeon, Wha-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.130-138
    • /
    • 2008
  • The scheme for recognizing the channel availability is one of the most important research issues in cognitive radio systems utilizing unused frequency bands. In this paper, we propose a novel scheme of selecting sensing channel in order to improve the sensing ability of frequency status in cognitive radio ad hoc networks. To fully exploit the sensing ability of each cognitive radio user, we adopt a master for a cluster which is made of several cognitive radio users. By gathering and analyzing the sensing information from cognitive radio users in the cluster, the cooperative sensing is realized. Since the transmission range of a licensed user is limited, it is possible that a master determines different sensing channels to each cognitive radio users based on their location. By making cognitive radio users sense different channels, the proposed scheme can recognize the state of wireless spectrum fast and precisely. Using the simulation, we compare the performance of the proposed scheme with those of two different compared schemes that one makes cognitive radio users recognize the frequency status based on their own sensing results and the other shares frequency status information but does not utilize the location information of licensed user. Simulation results show that the proposed scheme provides available channels as many as possible while detecting the activation of licensed user immediately.

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.

Determinants of Tobacco Cessation Behaviour among Smokers and Smokeless Tobacco Users in the States of Gujarat and Andhra Pradesh, India

  • Sarkar, Bidyut K.;Arora, Monika;Gupta, Vinay K.;Reddy, K. Srinath
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.3
    • /
    • pp.1931-1935
    • /
    • 2013
  • Background: This study was undertaken to identify the socio-demographic determinants of quit attempts among smokers and smokeless tobacco users to identify correlates of tobacco cessation behaviour in India Materials and Methods: This was a cross-sectional study for the outcome of quit attempts made by current tobacco users in last 12 months in twelve districts in two states. Simple and multivariable logistic regression analysis was used to obtain the odds ratios (ORs) of socio-demographic variables (age, gender, education, occupation, socio-economic status, community, area, type of family) and tobacco user status (smoker/smokeless). Results: In the combined analysis, a smoker had higher predicted probability of attempting quitting (OR-1.41,CI 1.14-1.90), in comparison to a smokeless tobacco user and a tobacco user in the state of Gujarat was less likely to attempt quitting than a user in Andhra Pradesh (OR-0.60, CI 0.47-0.78). The probability of making a quit attempt was higher among tobacco users who were more educated (OR-1.40, CI 1.04-1.94), having a higher socio-economic status (SES) (OR-2.39, CI 1.54-3.69), and belonging to non-agricultural labourer occupational group (OR-1.90, CI 1.29-2.78). The effects were maintained even after adjusting for all other variables. In disaggregated analysis, findings were similar except in smokeless as a separate group, education level was not significantly associated with quit attempts and with lower odds (OR-0.91, CI 0.58-1.42). Conclusions: This is one of the first studies to provide useful insight into potential determinants for quit attempts of tobacco users in India including smokeless tobacco users, exploring the socio-demographic patterning of correlates of quit attempts.

Role-based User Access Control with Working Status for u-Healthcare System (u-Healthcare 시스템을 위한 RBAC-WS)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.173-180
    • /
    • 2010
  • Information technology is being applied to the development of ubiquitous healthcare system, which provides both efficient patient care and convenient treatment regardless of patient's location. However, the increasing number of users and medical information give rise to the problem of user management and the infringement of privacy. In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model. The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system. The RBAC model provides efficient user management and access control, but very vulnerable in case when one with valid role tries to leak confidential inner medical information. In order to resolve this problem, a RBAC-WS (Work Status with RBAC) model has been additionally developed which allows only qualified staffs to access the system while on duty. Th proposed RBAC and RBAC-WS model have been merged together and applied to the PACS (Picture Archiving and Communication System).

Service Status Analysis About the Spatial Information Open Platform based on the Analysis of Web Server Log and System Log (웹 및 시스템 로그 분석 기반 공간정보 오픈플랫폼 서비스 사용 현황 분석)

  • Jang, Han Sol;Hong, Seong Hun;Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.3
    • /
    • pp.45-54
    • /
    • 2015
  • Since the V-World, the Spatial Information Open Platform service, has started in 2012, a lot of people have increased explosively every year with their interest. It is necessary to know the specific service status in order to serve as indicators of the improvement of user's environment and the service to be added in the future based on the user's increasing need. However, there is difficulty to figure out more specific service status, such as the usage of hardware resources for 2D / 3D / Portal services and the actual user usage patterns, because the current system does not have the real-time monitoring system. Therefore, in this paper, through the analysis of the usage of system resources for 2D / 3D / Portal services based on web server log and the usage of hardware resources such as CPU, Memory based on system log, we analyze the usage of service in 2015 and compare with the results of the 2014, to present problems of the current system and the solutions about the problems.

A Study on the Real-Time Certificate Status Verification System Using VDN (VDN을 이용한 실시간 인증서 상태 검증 시스템의 관한 연구)

  • Lee, Kwang-Hyoung;Kim, Hyun-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.858-865
    • /
    • 2006
  • A certificate that is issued by the certification authority can be revoked within the period of validity by various reasons such as the loss of private key, disqualification or the change in key. Therefore, the certificate status verification must precede prior to use Currently, the CRL or the OCSP methods are used in most cases. But the CRL system can't guarantee the present status of the certificate, and the OCSP generates heavy network traffic by checking or requesting certificate status in real-time using high-capacity messages. In this paper, we propose a system that requests the certificate verification by creating VDN for user identity information. Through this system, the certification authority will be able to guarantee the certificate's status in real-time, and solve the problem of the sewer and network overload by verifying and finding user identity information from VDN, Based on the results, we propose a real-time certificate status verification system which can improve the speed of the verification. We confirmed the improvement in speed by testing and comparing it with the existing methods.

  • PDF

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.