• Title/Summary/Keyword: 안드로이드앱

Search Result 312, Processing Time 0.024 seconds

An Improvement of the Public Library Application Service -Focused on the Young-In Si Library Application Service- (시립 도서관 애플리케이션 서비스 방안 연구 -용인시 도서관 애플리케이션을 중심으로-)

  • Kim, Da-Eun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.301-306
    • /
    • 2017
  • With the popularization of smart-phone, a variety of application service user is a rising trend now. In contrast, studies concerning library application service that cast a long shadow over the life of students and citizens still lacking in many ways. This study evaluates user experience of Young-in Si public library application service, and investigates user requirements. I searched the real user reviews about Young-in Si library application both App store and Android market. As the final outcome, I found inconveniences and improvements of this service. The application is intuitive, but requires consistent design, strong identity and customizing main page. It will be suggested specific guidelines for the public library mobile services in other areas.

Smart Elderly-care System using Smart-phone (스마트폰을 이용한 고령자용 스마트 간병 시스템)

  • Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.129-135
    • /
    • 2017
  • In this paper, we propose a system to monitor the condition of elderly people who are uncomfortable by using smart-phone and biometric sensor at any time and for care-givers to provide with the best medical service anytime and anywhere. The proposed system monitors the status of the elderly through various bionic sensors installed in the hospital ward based on the Arduino system and not only provides the physiological and medical services required by the elderly, but also informs the guardian so that he can cope with the emergency. In conclusion, this paper suggests that a reading light used by elderly people can operate as a home server with a biosensor using Arduino and Android applications (Apps.), and the smart-phone of care-givers is configured as a remote management and a emergency call system. Therefore, this study suggests important ways to improve the satisfaction of medical service for the both elderly people and care-givers of chronic diseases in the future.

Implementation of A Mobile Application for Spam SMS Filtering Using Set-Based POI Search Algorithm (집합 기반 POI 검색 알고리즘을 활용한 스팸 메시지 판별 모바일 앱 구현)

  • Ahn, Hye-yeong;Cho, Wan-zee;Lee, Jong-woo
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.815-822
    • /
    • 2015
  • By the growing of SMS phishing victims, applications for processing spam messages are being released in succession. However most spam messages that cleverly modified the content like separating the consonants and vowels are fail to be filtered. In this paper, we implemented an application 'AntiSpam' which is able to identify spam strings in the text message to solve this problem. 'AntiSpam' searches spam strings in the text message by using set-based POI search algorithm, and then calculate the possibility of whether it is spam or not in accordance with the search results. In addition, it catches skillfully disguised spam messages in order to avoid missing the spam filtering. Users, who received a message, can check the result in spam message possibility decision result and the contents of the message and they can choose how to handling the message.

Implementation of Home Security System using a Mobile App (모바일 앱을 이용한 홈 시큐리티 시스템 구현)

  • Kwon, Young-Il;Jeong, Sam-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we aim to respond efficiently to crime by using Arduino and smartphone apps in response to increasing number of house-breaking crimes. It receives the signal of the sensor installed in the house and connects it with the app of the smartphone. To use the app, you can download the app from the user's smartphone, launch the app, and operate the operation outside the home, not only inside the house, by linking the executed app. Among the sensors installed in the house, the movement detection sensor is used to enhance the security, and the gas leakage sensor and the flame detection sensor can be used to easily detect the risk of fire and to prevent the fire early. Security is further enhanced by the ability to remotely control the front door with a smartphone. After that, various sensors can be added and it can be developed as a WiFi module in addition to the Bluetooth module.

Design and Implementation of Green Light Optimal Speed Advisory Based on Reference Mobility Models (GLOSA-RMM) in Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 참조이동모형 기반 녹색신호 최적화 가속도 조언의 설계 및 구현)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.544-554
    • /
    • 2014
  • In this paper, we introduce a cyber-physical intersection systems (CPIS) which intimately interconnects roadside units (RSU) located at intersection, on-board units (OBU) of moving vehicles, and smartphone apps. Based on the architecture of CPIS, we also present a green light optimal speed advisory based on the reference mobility models (GLOSA-RMM) to reduce intersection stopping time (IST) and fuel consumption. Based on several reference mobility models, the GLOSA-RMM determines the appropriate speed advisory by taking into account the current mobility and the intersection traffic light status, and then provides screen/voice GLOSA instructions to minimize the driver's distraction. We show that the GLOSA-RMM can reduce both the IST and the fuel consumption through the numerical results obtained from the prototype of the CPIS consisting of the OBU, the RSU and the smartphone app.

An Image Denoising Algorithm for the Mobile Phone Cameras (스마트폰 카메라를 위한 영상 잡음 제거 알고리즘)

  • Kim, Sung-Un
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.5
    • /
    • pp.601-608
    • /
    • 2014
  • In this study we propose an image denoising algorithm appropriate for mobile smart phone equipped with limited computing ability, which has better performance and at the same time comparable quality comparing with previous studies. The proposed image denoising algorithm for mobile smart phone cameras in low level light environment reduces computational complexity and also prevents edge smoothing by extracting just Gaussian noises from the noisy input image. According to the experiment result, we verified that our algorithm has much better PSNR value than methods applying mean filter or median filter. Also the result image from our algorithm has better clear quality since it preserves edges while smoothing input image. Moreover, the suggested algorithm reduces computational complexity about 52% compared to the method applying original Laplacian mask computation, and we verified that our algorithm has good denoising quality by implementing the algorithm in Android smart phone.

A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App (모바일 포렌식 증거 수집방안 연구: 제조사 백업 앱 기반 데이터 획득 기법)

  • Choi, Jaewon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.95-110
    • /
    • 2018
  • With the widespread use of smartphones, various personal information of users is being recorded on a smartphone in real time. For the purpose of preventing the loss of important personal information of users, manufacturer provides a smartphone backup applications. Recently, not only backup programs for PC but also backup mobile apps for smart phones have been provided. From the point of view acquiring forensic data, it is important not to compromise the acquisition possibilities and the integrity of the original data. Especially, in the case of Android smartphones, various studies are being carried out to acquire the data without damaging the integrity of the original data. However, there are limitations to apply the existing research methods. In this paper, we describe the process of acquiring data using the backup mobile app provided by the manufacturer without compromising the integrity of the latest smartphone.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Using the Android Communication Module and Sensor the Movement Method Output System of According to Accelerated (안드로이드 통신모듈 및 센서를 이용한 가속에 따른 이동방법 산출 시스템)

  • Park, Sung-Hyun;Jang, Ki-Man;Yuk, Jung-Soo;Huh, Tae-Sang;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.672-674
    • /
    • 2014
  • Mobile communication technology was one of the GPS technology, SmartPhone, Tablet PC is equipped with a GPS. So the user has a navigation, speed and his position to send and receive a variety of information. Therefore, in this paper, Mobile devices, GPS, Wi-Fi and mobile networks, and the communication module uses algorithms to analysis of acceleration and output, the user is currently using the system to find out the kind of transportation. This is the users who are using a particular transport unnecessary information and apply it to different areas do not think I will be able to.

  • PDF

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.