• Title/Summary/Keyword: 스마트폰 서비스

Search Result 2,041, Processing Time 0.024 seconds

The Development of 1G-PON Reach Extender based on Wavelength Division Multiplexing for Reduction of Optical Core (국사 광역화와 광코어 절감을 위한 파장분할다중 기반의 1기가급 수동 광가입자망 Reach Extender 효율 극대화 기술 개발)

  • Lee, Kyu-Man;Kwon, Taek-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.229-235
    • /
    • 2019
  • As the demand for broadband multimedia including the Internet explosively increases, the advancement of the subscriber network is becoming the biggest issue in the telecommunication industry due to the surge of data traffic caused by the emergence of new services such as smart phone, IPTV, VoIP, VOD and cloud services. In this paper, we have developed WDM(Wavelength Division Multiplexing)-PON(passive optical network) based on the 1-Gigabit Reach Externder (RE) technique to reduce optical core. Particularly, in order to strengthen the market competitiveness, we considered low cost, miniaturization, integration technique, and low power of optical parts. In addition, we have developed a batch system by integrating all techniques for reliability, remote management through the development of transmission distance extension and development of capacity increase of optical line by using RE technology in existing PON network. Based on system interworking with existing commercial 1G PON devices, it can be worthy of achievement of wide nationalization and optical core reduction by using this developed system. Based on these results, we are studying development of 10G PON technology.

Spatial analysis based on topic modeling using foreign tourist review data: Case of Daegu (외국인 관광객 리뷰데이터를 활용한 토픽모델링 기반의 공간분석: 대구광역시를 사례로)

  • Jung, Ji-Woo;Kim, Seo-Yun;Kim, Hyeon-Yu;Yoon, Ju-Hyeok;Jang, Won-Jun;Kim, Keun-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.33-42
    • /
    • 2021
  • As smartphone-based tourism platforms have become active, policy establishment and service enhancement using review data are being made in various fields. In the case of the preceding studies using tourism review data, most of the studies centered on domestic tourists were conducted, and in the case of foreign tourist studies, studies were conducted only on data collected in some languages and text mining techniques. In this study, 3,515 review data written by foreigners were collected by designating the "Daegu attractions" keyword through the online review site. And LDA-based topic modeling was performed to derive tourism topics. The spatial approach through global and local spatial autocorrelation analysis for each topic can be said to be different from previous studies. As a result of the analysis, it was confirmed that there is a global spatial autocorrelation, and that tourist destinations mainly visited by foreigners are concentrated locally. In addition, hot spots have been drawn around Jung-gu in most of the topics. Based on the analysis results, it is expected to be used as a basic research for spatial analysis based on local government foreign tourism policy establishment and topic modeling. And The limitations of this study were also presented.

A Study on a Non-Voice Section Detection Model among Speech Signals using CNN Algorithm (CNN(Convolutional Neural Network) 알고리즘을 활용한 음성신호 중 비음성 구간 탐지 모델 연구)

  • Lee, Hoo-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.33-39
    • /
    • 2021
  • Speech recognition technology is being combined with deep learning and is developing at a rapid pace. In particular, voice recognition services are connected to various devices such as artificial intelligence speakers, vehicle voice recognition, and smartphones, and voice recognition technology is being used in various places, not in specific areas of the industry. In this situation, research to meet high expectations for the technology is also being actively conducted. Among them, in the field of natural language processing (NLP), there is a need for research in the field of removing ambient noise or unnecessary voice signals that have a great influence on the speech recognition recognition rate. Many domestic and foreign companies are already using the latest AI technology for such research. Among them, research using a convolutional neural network algorithm (CNN) is being actively conducted. The purpose of this study is to determine the non-voice section from the user's speech section through the convolutional neural network. It collects the voice files (wav) of 5 speakers to generate learning data, and utilizes the convolutional neural network to determine the speech section and the non-voice section. A classification model for discriminating speech sections was created. Afterwards, an experiment was conducted to detect the non-speech section through the generated model, and as a result, an accuracy of 94% was obtained.

Factors Influencing Acceptance Resistance of Personal Health Record Apps: Focusing on the Privacy Calculus Model (개인건강기록 앱 수용저항에 영향을 미치는 요인: 프라이버시 계산모형을 중심으로)

  • Sang Ho Kim;Eunkyung Kang;Sung-Byung Yang
    • Information Systems Review
    • /
    • v.25 no.1
    • /
    • pp.165-187
    • /
    • 2023
  • The continuous increase in life expectancy and high interest in health has brought about significant changes in the use of health information by the public according to the development of information technology represented by the Internet and smartphones. As the medical market expands to the mobile health environment, many health-related apps have been created and distributed, but the acceptance rate is slow as it has become challenging to provide services due to various regulations. In this study, perceived value, perceived risk factors (psychological risk, risk of time-loss, legal risk), and perceived benefits (usefulness, interaction, autonomy) were derived and verified as factors that affect the acceptance resistance of personal health record apps based on the privacy calculation model. In addition, by analyzing the moderating effect of trust in the manufacturer, how the perceived risk and perceived benefit affect the perceived value was verified. A survey was conducted on Korean college students who recognized the personal health record apps but did not use them, and 127 samples were analyzed using structural equations. As a result of hypothesis verification, perceived value has a negative effect on acceptance resistance, perceived risk (risk of time-loss) has a negative effect on perceived value, and perceived benefits (usefulness, interaction, autonomy) were found to have a positive effect on perceived value. Trust in manufacturers has weakened the impact of perceived risks (legal risk) on perceived values. This study is expected to play an important role in maintaining a competitive advantage in the personal health record app market environment by identifying and proposing detailed criteria for reducing the acceptance resistance of personal health record apps.

Research on Usability of Mobile Food Delivery Application: Focusing on Korean Application and Chinese Application (모바일 배달 애플리케이션 사용성 평가 연구: 한국(배달의민족)과 중국(어러머)을 중심으로)

  • Yang Tian;Eunkyung Kweon;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • The development and generalization of the Internet increased the popularity of food delivery service applications in Korea. The food delivery market based on online-to-offline service is growing rapidly. This study compares the usability of Korean food delivery service application between that of Chinese food delivery service application. This study suggests improvement points for Korean food delivery service applications. To conduct this study, we explore the status of various food delivery service applications and conduct interviews and surveys based on the honeycomb model developed by Peter Morville. This study obtained the following results. First, all restaurants participating in the Korean food delivery service must be able to accept order through the application. Second, the shopping cart function must be able to accept order of all restaurants simultaneously. Third, when users look for menu recommendation, their purchase history and shopping cart functions should appear at the first page of the website. Users should be able to perceive the improved usability of the website using those functions. Fourth, when the search window is fixed on the top of each page, users should be able to find the information they need. Fifth, the application must allow users to find the exact location of the delivery person and the estimated delivery time. Finally, the restaurants'address should be disclosed and fast delivery time should be confirmed to enhance users'trust on the application. This study contributes to academia and industry by suggesting useful insight into food delivery service applications and improving the point of food delivery service application in Korea.

Analysis of the Effects of E-commerce User Ratings and Review Helfulness on Performance Improvement of Product Recommender System (E-커머스 사용자의 평점과 리뷰 유용성이 상품 추천 시스템의 성능 향상에 미치는 영향 분석)

  • FAN, LIU;Lee, Byunghyun;Choi, Ilyoung;Jeong, Jaeho;Kim, Jaekyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.311-328
    • /
    • 2022
  • Because of the spread of smartphones due to the development of information and communication technology, online shopping mall services can be used on computers and mobile devices. As a result, the number of users using the online shopping mall service increases rapidly, and the types of products traded are also growing. Therefore, to maximize profits, companies need to provide information that may interest users. To this end, the recommendation system presents necessary information or products to the user based on the user's past behavioral data or behavioral purchase records. Representative overseas companies that currently provide recommendation services include Netflix, Amazon, and YouTube. These companies support users' purchase decisions by recommending products to users using ratings, purchase records, and clickstream data that users give to the items. In addition, users refer to the ratings left by other users about the product before buying a product. Most users tend to provide ratings only to products they are satisfied with, and the higher the rating, the higher the purchase intention. And recently, e-commerce sites have provided users with the ability to vote on whether product reviews are helpful. Through this, the user makes a purchase decision by referring to reviews and ratings of products judged to be beneficial. Therefore, in this study, the correlation between the product rating and the helpful information of the review is identified. The valuable data of the evaluation is reflected in the recommendation system to check the recommendation performance. In addition, we want to compare the results of skipping all the ratings in the traditional collaborative filtering technique with the recommended performance results that reflect only the 4 and 5 ratings. For this purpose, electronic product data collected from Amazon was used in this study, and the experimental results confirmed a correlation between ratings and review usefulness information. In addition, as a result of comparing the recommendation performance by reflecting all the ratings and only the 4 and 5 points in the recommendation system, the recommendation performance of remembering only the 4 and 5 points in the recommendation system was higher. In addition, as a result of reflecting review usefulness information in the recommendation system, it was confirmed that the more valuable the review, the higher the recommendation performance. Therefore, these experimental results are expected to improve the performance of personalized recommendation services in the future and provide implications for e-commerce sites.

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.

Multimedia Application and Ubiquitous English Education Environment (멀티미디어 기기 활용과 유비쿼터스 영어 교육환경)

  • Choi, Michelle Mi-Hee
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.393-399
    • /
    • 2012
  • New and creative skills must be developed, and adapted into a lesson, to motivate learners to acquire a second language easily and enjoyment, Multimedia tools which are of interest to learners, such as; smart phones, computers, and notebooks with wireless internet compatability, will provide learners opportunities to study, and do their work practically anywhere and anytime. Recently, podcasts, which are a type of digital media, consisting of a series of audio episodes or video files, subscribed to and downloaded through web syndication, or streamed online to a computer or mobile device, are used to facilitate ESL (English as a Second Language) learning. Development of a variety of teaching methods, using multimedia tools, is needed. There are advantages and disadvantages to using a variety of multimedia tools. The current research aims to study its characteristics and application, in order to maximize their effective use, in English education. The current study suggests a ubiquitous learning environment using multimedia content tools, internet media, video teleconferencing, cyber-learning, and one-to-one videos used in conjunction with, or as a digital textbook for the English lesson. This study also investigates future educational changes, using state-of-the-art equipment for the self-learning experience, and will present a new direction in English education, through a variety of instructional devices and a marginalized class system model.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.