• Title/Summary/Keyword: 애플리케이션 개발 방안

Search Result 132, Processing Time 0.021 seconds

A Proposal for SmartTV Development Plan by Applying Big Data Analysis Methodology (빅데이터 분석 방법을 적용한 스마트 TV의 발전 방안에 관한 제언)

  • Park, Nam-Gue;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.347-358
    • /
    • 2014
  • A smart TV is able to show terrestrial broadcasting and also can be used as a computer -VOD, games, image communications, application utilities and so on. In order to carry out Smart TV business, it has to contains contents, platforms, network terminal unit. If ill-equipped with any of these aboves, it must cooperate with other licensee. Therefore, Smart TV business is necessary to cooperate with each business agent. In this paper, we will look into domestic/foreign country Smart TV market, policy, vitalization strategy, and suggest the application of big data analysis methodology for Smart TV vitalization method - 1) hardware infrastructure building based on cloud computing 2) Network upgradability acceptable traffic increase 3) Technical development cooperation between each licensee 4) Variable Smart TV contents supply 5) Cooperation with party interested individuals in using UX/UI for N-Screen, network traffic estimation may increase, customized supply smart contents for consumer in real time.

User Needs and Uses of Mobile Services in Academic Libraries (대학도서관 모바일 서비스 이용자의 요구와 이용 분석 연구)

  • Kim, Sung-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.2
    • /
    • pp.205-230
    • /
    • 2013
  • Academic libraries are trying to develop fully mobile web sites and mobile applications so that users can access to their services even using mobile devices. As the mobilization trends of library services increase in quantity, we need to more focus on what mobile services users want, ultimately for the growth with quality. This study seeks to explore users' needs and uses of mobile library services and then suggests solutions for improving the mobile services in academic libraries. This study conducted on and off-line surveys with 608 students from two universities, which have provided active mobile services with both a mobile web site and an application. The questionnaire was designed to elicit information on respondents' frequency of mobile library visit, the purpose of visit, the reason to use/not use, how to access to the services, the preferred types of the services, satisfaction and dissatisfaction factors, and urgently needed improvements. Based on the findings, this study discussed strategies to improve the quality of mobile services and to increase in users' visit.

Study Curation Service Utilizing th Learner Pattern Information from the Smart Learning (스마트러닝에서의 학습자 패턴 정보를 활용한 큐레이션 서비스 제공 방안 연구)

  • Yun, Jun-soo;Hwang, Hyun-seo;Park, Jin-tae;Seo, Kyoung-teak;Moon, Il-young;Kwon, Oh-young;Kim, Byeong-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.903-906
    • /
    • 2015
  • Over the recent industry -wide virtual world and the real world, broadcasting and telecommunications, IT technology and traditional industries, such as the fusion research has been conducted in a variety of fields. And training in the field of education is changing the paradigm of creativity to break the intrusive training center. In addition, the quality of interactive educational content technology to foster self-directed future talent is a situation that is required. The market has already surpassed the smartphone PC, smart devices and e-learning technologies are appearing new service called 'smart learning' as a new form of convergence of the educational system. In this paper, based on the direct development of a content authoring applications and Web sites, and cloud environments to the students collect and analyze patterns. Utilizing this information, we studied the curation service plans that recommend the appropriate content to fit the tastes of the learner.

  • PDF

A Study of Directions for Development of Smart Clothing Based on the Consumer's Lifestyle (소비자 라이프 스타일 기반의 스마트 의류 기획을 위한 요인 연구)

  • Cho, Ha-Kyung;Kim, Jin-Sun;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.13 no.1
    • /
    • pp.11-20
    • /
    • 2010
  • According to diversity of life style, introduction of well-being trend and increase of demand based on the IT-convergence, Recently "smart clothing" study has been diversified on user applications such as entertainment, healthcare, business and sports. And the smart clothing's market has been progressed in diverse aspects. But, study of smart clothing based on consumer aspect and market diversification is insufficient. The purpose of this study is to identify consumer's needs on smart clothing and to suggest directions for development of smart clothing based on their lifestyle that focused on digital and fashion lifestyle that be closely connected with smart clothing product development. This study is focused on the ages of 20-30 who are considered to be high demand consumers on the smart clothing market. As a result of study, life style based on clothing and digital is categorized 3 types as trend-pursuit style, sensual information-pursuit style and practical function-pursuit style. we suggested direction for development of smart clothing based on consumer's needs of the smart clothing according to the customer's lifestyle types.

  • PDF

Security Enhancements for Distributed Ledger Technology Systems Based on Open Source (오픈소스 기반 분산원장기술 시스템을 위한 보안 강화 방안)

  • Park, Keundug;Kim, Dae Kyung;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.919-943
    • /
    • 2019
  • Distributed ledger technology, which is attracting attention as an emerging technology related to the 4th Industrial Revolution, is implemented as an open source based distributed ledger technology system and widely used for development with various applications (or services), but the security functions provided by the distributed general ledger system are very insufficient. This paper proposes security enhancements for distributed ledger technology systems based on open source. To do so, potential security threats that may occur under running an open source based distributed ledger technology systems are identified and security functional requirements against the security threats identified are provided by analyzing legislation and security certification criteria (ISMS-P). In addition, it proposes a method to implement the security functions required for an open source based distributed ledger technology systems through analysis of security functional components of Common Criteria (CC), an international standard.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

National Institution's Information Security Management on the Smart phone use environment (스마트폰 이용 환경에서 국가기관 정보보호 관리방안)

  • Kim, Ji-Sook;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.83-96
    • /
    • 2010
  • The rapid spread of smart phone in recent years changes not only personal life but also work environment of organizations. Moreover, smart phone provoke service combination between industries and transit the digital paradigm in our society because of the character that anyone can develop or use the application of smart phone. Under these circumstances, the government hastens the construction of mobile-government in order to improve national services and communication with people. However, since security threats on smart phone become more critical recently, we should hurry the counter measures against mobile threats or we will face obstacles to the activation of mobile-government. On this article, we suggest the methods of information security and the Mobile-government Information Security Management System(M-ISMS) on the smart phone use environment for building up the secure and convenient mobile system in the national institution.

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

A Study of the Beauty Commerce Customer Segment Classification and Application based on Machine Learning: Focusing on Untact Service (머신러닝 기반의 뷰티 커머스 고객 세그먼트 분류 및 활용 방안: 언택트 서비스 중심으로)

  • Sang-Hyeak Yoon;Yoon-Jin Choi;So-Hyun Lee;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.75-92
    • /
    • 2020
  • As population and generation structures change, more and more customers tend to avoid facing relation due to the development of information technology and spread of smart phones. This phenomenon consists with efficiency and immediacy, which are the consumption patterns of modern customers who are used to information technology, so offline network-oriented distribution companies actively try to switch their sales and services to untact patterns. Recently, untact services are boosted in various fields, but beauty products are not easy to be recommended through untact services due to many options depending on skin types and conditions. There have been many studies on recommendations and development of recommendation systems in the online beauty field, but most of them are the ones that develop recommendation algorithm using survey or social data. In other words, there were not enough studies that classify segments based on user information such as skin types and product preference. Therefore, this study classifies customer segments using machine learning technique K-prototypesalgorithm based on customer information and search log data of mobile application, which is one of untact services in the beauty field, based on which, untact marketing strategy is suggested. This study expands the scope of the previous literature by classifying customer segments using the machine learning technique. This study is practically meaningful in that it classifies customer segments by reflecting new consumption trend of untact service, and based on this, it suggests a specific plan that can be used in untact services of the beauty field.

Responsive Web of Prototype based on Implementation Structure (인터페이스 구조에 따른 프로토타입의 반응형 웹)

  • Jang, Seung-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.609-616
    • /
    • 2018
  • The purpose of this study is to describe the technologies necessary to design responsive web with the use of the responsive website based on implementation structure as a prototype. Responsive design means the process of analyzing prototype requirements on the basis of implementation and applying the analysis results to development. The design method based on the principle of priority in development was established, and then flexibility and variability through design formula were set up. After that, the user-oriented primary principle and secondary principle were drawn to establish implementation structure. In the way of discussing compression technologies, a method of combination was searched for, and then a method of asynchronous script scalability in line with a web prototype was found. Today, a website or a web application needs to be adopted and accessed regardless of device types. As a solution, a responsive website design method was found. Important technologies for the implementation structure for the responsive website design method and its relevant prototype website were came up with.