• Title/Summary/Keyword: 지도 애플리케이션

Search Result 1,144, Processing Time 0.025 seconds

Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer (애플리케이션 계층에서 트래픽 분석을 위해 부하 차단기를 적용한 네트워크 트래픽 모니터링 시스템)

  • Son Sei-Il;Kim Heung-Jun;Lee Jin-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.53-60
    • /
    • 2006
  • As it has been continuously increased the volume of traffic over Internet, it is hard for a network traffic monitoring system to analysis every packet in a real-time manner. While it is increased usage of applications which are dynamically allocated port number such as peer-to-peer(P2P), steaming media, messengers, users want to analyze traffic data generated from them. This high level analysis of each packet needs more processing time. This paper proposes to introduce load shedder for limiting the number of packets. After it determines what application generates a selected packet, the packet is analyzed with a defined application protocol.

  • PDF

Design and Implementation of Web Service Applying SOA Based on Workflow (SOA 기반의 워크플로우를 응용한 웹 서비스 설계 및 구현)

  • Lee, Seong-Kyu;Kim, Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.122-129
    • /
    • 2009
  • Incorporating proprietary existing it solutions like legacy systems or vendor specific with new technologies is an expensive and time consuming task. Such situations take place due to the lack of ability of proprietary software to cooperate with other parties or to cooperation only with specific vendor products. Such a situation is undesirable and causes a prolonged adaptation period for new applications. This thesis is to show the new approach to creation of Internet applications in Service Oriented Architecture through loose coupling, introduces fare more flexibility into a system composed of connected applications. This approach allows one to integrate through XML based Web Service and reuse a number of arbitrary services available over the Internet in a complex processes specified as a workflow model.

  • PDF

Management Plan for Mobile Contents Bypassing In App Billing Application (모바일 컨텐츠 인앱 결제 우회 애플리케이션에 대한 대처 방안)

  • Lee, Sang-Ho;Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.21-26
    • /
    • 2015
  • As mobile contents grow up, In App Billing is brisk at applications including mobile contents. But some of users don't pay and use charged content for free to use cheating payment module or hacking through applications. Call this bypass payment. Applications, helping bypass, are Freedom, IAP Cracker, and DNS server suggested by the hacker named Borodin. In case of mobile game, Despite sell a lot of charged content but income is different revenue in sales log with real profits. Because of users using bypass payment application. Management plan to bypass payment are checking OrderID, encrypting public key and verifying receipt.

  • PDF

A Study on Flash Mobile Game Application Using Adobe AIR (어도비 에어를 이용한 플래시 모바일 게임 애플리케이션에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Korea Game Society
    • /
    • v.15 no.2
    • /
    • pp.73-82
    • /
    • 2015
  • This study makes a proposal about Flash mobile game applications using Adobe AIR. In developing a mobile game, the developer programs in Flash ActionScript, and distributes and publishes the program using Adobe AIR so that the game can be played on an Android mobile device. In order to run the game, the player downloads and installs Android Adobe AIR onto the mobile device and sets up the published app. This study designed and implemented a mobile game application and showed that a mobile game is executed on a smart phone. This outcome may be applicable to various genres of apps. Moreover, this study analyzed the trends of mobile games, focusing on their genres and characteristics, and according to the results, most of them were mobile games using Kakao Talk. The analysis results also showed that the popularity ranking of games varied little among sites.

Development of a Field-Experience Learning Support Android LBS Application (현장체험학습 지원을 위한 안드로이드 LBS 애플리케이션 개발)

  • Hyun, Dong-Lim;Kim, Jong-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.4
    • /
    • pp.579-587
    • /
    • 2011
  • In this study, we developed the filed-experience learning support application. Because teachers want to use LBS in education area. In order to select fit functions, we carried out survey about functions that teachers want. Then, we analysed the result of survey and implemented the functions. Also, for survey about application's effectiveness, we selected elementary school teachers. Then we demonstrated and explained the application to them. The result of survey about application's effectiveness shows that application have higher utilization in education area.

  • PDF

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.

A Study on Implementation of Efficient Patient Care Application System Using RFID (RFID를 이용한 효율적인 환자관리 애플리케이션 시스템 개발에 관한 연구)

  • Hong In-Sik;Baek Jang-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1142-1151
    • /
    • 2005
  • Various kinds of studies for building up U-Korea are now underway. Especially, RFID comes into the spotlight as a core technology of Ubiquitous. Though, the development of higher levels of application is far behind the hardware-based technology in RFID application system. For that reason, In this paper suggests technology using RFID on Ubiquitous and embodies the effective health care application which is one of the application services of user-centered environment It realizes the system which enables us to manage and send data about changing prescriptions and locations of patients effectively under the basis of RFID tag and mobile devices. It also provides the high quality of practical effectiveness of entire system throughout the realization of applications of application server and mobile device. on the basis of framework for providing the various kinds of services and physical elements.

  • PDF

The Impact of Smartphone Application Quality Factors on Trust and the Users' Continuance Intention according to Gender (스마트폰 애플리케이션 품질이 신뢰 및 지속적 사용의도에 미치는 영향 : 성별의 조절효과를 중심으로)

  • Choi, Hun;Choi, Yoo-Jung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.151-162
    • /
    • 2011
  • Mobile applications are growing fast and the rising popularity of smartphones, which was supposed to take the market even further. The purposes of this study are as follows. First, we find out what really drives the trust and the intention to continuance use the mobile applications. Second, we explore gender differences in perceptions and relationships between the quality factors and trust. The 231 sets of data collected from 120 male and 111 female, who use the smartphones, were tested against the model using PLS 2.0. The results of this study are as follows. First, perceived usefulness and connectivity had an effect on trust and continuance intension. Second, gender had moderate effect on the relationship between quality factors and trust.

Design of Low-area Encryption Circuit Based on AES-128 Suitable for Tiny Applications (소형 애플리케이션에 적합한 AES-128 기반 저면적 암호화 회로 설계)

  • Kim, Hojin;Kim, Soojin;Cho, Kyeongsoon
    • Journal of IKEEE
    • /
    • v.18 no.2
    • /
    • pp.198-205
    • /
    • 2014
  • As the development of information technology, the interests in tiny applications such as wearable devices, portable devices and RFID are increased and the importance of low-area encryption circuit is emphasized. This paper proposes a compact architecture of AES-based encryption circuit suitable for tiny applications. The circuit area is reduced by minimizing storage space and sharing computation resources. The synthesized gate-level circuit using 65nm standard cell library consists of 2,241 gates and two $8{\times}16$-bit SRAMs. It can process data at a rate of 50.57Mbits per second. Therefore, the proposed encryption circuit is suitable for various applications requiring very small encryption circuit.

Space Syntax-based Application to Recommend Paths for Female's Safe Leisure Life (Space Syntax 기반 여성의 안전한 여가활동 경로 추천 애플리케이션)

  • Lim, Won-Jun;Lee, Kang-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.127-135
    • /
    • 2015
  • In this paper, we propose and implement an application that recommends safe paths for outdoor leisure activity of women based on Space Syntax theory. Compared to general navigation systems which focuses on the shortest time or the shortest distance, the proposed application makes safe paths the first priority. It generates path recommendation with regard to accessibility of travel time and correlation of regions and considers various risk factors for searching for the safest path. Concludingly, the employed Space Syntax algorithm enables the women users to select their own customized paths.