• Title/Summary/Keyword: 메시지 플랫폼

Search Result 203, Processing Time 0.025 seconds

A Study on Consumer Preferences for Partnership Model of Smartphone App (스마트폰 앱 광고 제휴모델에 대한 소비자 선호도 연구)

  • Nam, You-Jung;Kim, Myung-Gwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.223-227
    • /
    • 2012
  • The core parties operating application stores can be categorized into two major groups. One of which is an application store that offers manufacturing and platforms while the other being telecommunication company orientated. Each group has an affiliated partnership. In a larger group, there are three major types of partnership such as "partnership that causes an increase in traffic","partnership through the sales within the application contents" and "partnership through advertisements". In order to find out whether teenagers and potential consumers in their twenties would prefer a "message-type advertising" or an "application-type advertising". Through experiment, we also figured out which type of advertising worked more effectively between the two given types.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

IPMP(Intellectual Property Management and Protection) Service Interfaces based on MPEG Multimedia (MPEG 멀티미디어 미들웨어에 기반한 보호관리 서비스 인터페이스)

  • Choo, Hyon-Gon;Bang, Gun;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.325-334
    • /
    • 2007
  • In order to increase the promotion of multimedia processing techniques in MPEG standard, MPEG Multimedia Middleware (M3W) which supports middleware interface for multimedia processing is set up. In this paper, multimedia protection and management service interfaces based on MPEG Multimedia Middleware (M3W) are introduced. The service interfaces are based on component models of M3W and support normative IPMP messages. The proposed interfaces are composed of Tool interfaces and Trust management interfaces: Tool interfaces provide the functionality supporting terminal and tool based on the governed decoder model and Trust management interfaces provide the supporting functionality such as license managing and authentication required in DRM devices. As an application of the proposed interfaces, a JAVA based player simulator is shown. The proposed interfaces can be easily implemented under various device and application environments as an ISO/IEC 23004-2 standard middleware platform.

  • PDF

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

HBase-based Automatic Summary System using Twitter Trending Topics (트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템)

  • Lee, Sanghoon;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.63-72
    • /
    • 2014
  • Twitter has been a popular social media platform where people post short messages of 140 characters or less via the web. A hashtag is a word or acronym created by Twitter users to open a discussion about certain topics and issues that have a very high percentage of trending. Since the hashtag posts are sorted by time, not relevancy, people who firstly use Twitter have had difficulty understanding their context. In this paper, we propose a HBase-based automatic summary system in order to reduce the difficulty of understanding. The proposed system combines an automatic summary method with a fuzzy system after storing the streaming data provided by Twitter API to the HBase. Throughout this procedure, we have eliminated the duplicate of contents in the hashtag posts and have computed scores between posts so that the users can access to the trending topics with relevancy.

Network analysis of issue diffusion on the sanitary pad cancer-causing agent via Twitter and Youtube (트위터와 유튜브를 통해 확산된 생리대 발암물질 이슈에 대한 네트워크 분석)

  • Hong, Juhyun
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.15-26
    • /
    • 2018
  • This study focused on the difference of the volume of sanitory pad issue and The aim of this study is to explore the relationship between the characteristics of SNS and the diffusion of issue in the process of crisis issue. SNS is categorized into communication diffusion, communication restriction,, diffusion, restriction base on the media interactivity and the user interactivity, In case of Twitter, media interactivity is low and user interactivity is low. In case of Youtube, media interactivity and user interactivity are all high. Crisiss issue is interactively diffused via Youtube compared to via Twitter. There was a negative public opinion in social media even if the government and the manufacturer said that there was no harm in the sanitary goods. In conclusion, this study highlights the importance of social media environment in the diffusion of information. The government prepared for the use of SNS in crisis because there was a negative opinion on the government and the manufacturer via SNS.

Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL (경량화 암호의 GEZEL을 이용한 효율적인 하드웨어/소프트웨어 통합 설계 기법에 대한 연구)

  • Kim, Sung-Gon;Kim, Hyun-Min;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.593-605
    • /
    • 2014
  • In this paper, we propose the efficient HW/SW co-design method of light-weight cryptography such as HIGHT, PRESENT and PRINTcipher using GEZEL. At first the symmetric cryptographic algorithms were designed using the GEZEL language which is efficiently used for HW/SW co-design. And for the improvement of performance the HW optimization theory such as unfolding, retiming and so forth were adapted to the cryptographic HW module conducted by FSMD. Also, the operation modes of those algorithms were implemented using C language in 8051 microprocessor, it can be compatible to various platforms. For providing reliable communication between HW/SW and preventing the time delay the improved handshake protocol was chosen for enhancing the performance of the connection between HW/SW. The improved protocol can process the communication-core and cryptography-core on the HW in parallel so that the messages can be transmitted to SW after HW operation and received from SW during encryption operation.

A implement Android OS-based black-box system in the vehicle (안드로이드 OS 기반의 차량용 블랙박스 시스템 구현)

  • Song, Min-Seob;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.483-486
    • /
    • 2011
  • Recently, large and small vehicle accidents due to human life and property due to loss of function similar to that used on the plane with a black box mounted on the vehicle by the driver of the vehicle in order to analyze the cause of the accident vehicle you are using a black box. The black box used in the existing operating system, unlike the Android OS portability is good compared to other OS support an open platform for the development of additional costs or proven, which includes many libraries need to use any external libraries there are no advantages. In addition, the existing black box on the incident can not be sent automatically to report an accident notification has a problem. In this paper, another advantage of the OS used in a black box with an Android-based acceleration sensor on the test board GPS module and smart phones using the information, and incident detection capability to send a message to the specified number of black boxes with was implemented.

  • PDF

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.