• Title/Summary/Keyword: 태블릿 기기

Search Result 163, Processing Time 0.027 seconds

A Study of Mobile Content Generation System using 2-Dimensional bar code in Smart Device Environment (스마트 기기 환경에서 2차원 바코드를 활용한 모바일 콘텐츠 생성 시스템 연구)

  • Jin, Byung-Wook;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.2349-2354
    • /
    • 2014
  • While the number of smart phone subscribers excessing 30 million people, Korea is leaping into the 'smart powerhouse' from IT powerhouse. The popularizat+ion of smart devices so called 'PC in the hand', brought surely change to people's life style, and also it had led to a revolutionary change to and also to business and government. In several corporations of each countries, a variety of smart devices smart devices such as smart phone, tablet PC and E-books have been developing. Nowadays, the usage of the smart phone is not only the simple function calling. It has become a culture of the terminal type in the hand anywhere at any time, which makes can communicate with the others in anywhere and anytime. However, some of the subscribers who visit the website for PC version with the mobile devices screen, can feel kind of discomfort while surfing the net on a smartphone devices because the install of the existing video and flash files and the screen size for computer is not available for mobile devices. Therefore, in this paper, we studied on effective mobile contents generation program using QR code that is two dimensions bar code under the smart device environment. Also, unlike previous QR code generator that decorate standardized design, we realize an original QR code generation system from user perspective.

Read Range Reduction in Passive UHF RFID Tag by Smart Device Signal Interference (스마트 기기 신호 간섭에 의한 수동형 UHF 대역 RFID 태그의 인식 거리 감소에 관한 연구)

  • Kwon, Jongwon;Song, Taeseung;Cho, Wonseo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.1
    • /
    • pp.83-91
    • /
    • 2014
  • The passive UHF RFID tags for item-level tagging are now explosively used in the supply chain and retail applications as they have several advantages, the two most relevant are cost and a longer read range. However, the signal interference problem between RFID tags and smart devices in real world is expected according to the smart-phone and tablet market growth together. The performance of RFID tags can be significantly less. The popular examples are the read-success rates and read range reduction. Especially, KT Corp. recently emphasized the serious signal interference at 900 MHz of LTE and old RFID frequencies through their public demonstration. By popular demands, this paper suggests the interference tolerance measurement method between the passive UHF RFID tag and the transmitted signal from a smart device. In addition, we selected three passive UHF RFID tags(Inlay) available on the market and quantitatively evaluated read range reduction results by interference signals using the PCR(Performance Change Rates) index. As a result, the LTE system is about three times as effective as the WCDMA system in terms of interference effects, and the read range performance of two RFID tags about 60 % drop.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

A Research Review of High-technology AAC Intervention for Individuals with Disabilities (장애인을 위한 하이-테크놀로지 보완·대체의사소통체계 실험 연구 동향 분석)

  • Song, Jaeok;Jeon, Byung-un
    • 재활복지
    • /
    • v.20 no.4
    • /
    • pp.203-228
    • /
    • 2016
  • The purpose of this study was to find out the recent trend of high-tech AAC intervention studies for individuals with disabilities. Electronic database searches were completed to identify studies published between 2009 and 2016. 46 studies were identified for inclusion in this review. The studies were classified as participants, research design, intervention settings, independent variables, dependent variables, communication skills by High-tech device, type of high-tech AAC device. Across these studies, intervention was provided to total of 126 participants. Most participants are aged 6-11 and the most common diagnosis was autistic spectrum disorder. Most common study designs were multiple probe design and multiple treatment design. The majority of studies implemented interventions in a special education school(classroom) setting. The majority of studies implemented interventions to compare the effect of high-tech and low-tech AAC device interventions. The majority of targeted behavioral outcomes were communication skills. Tablet PC was the most frequently used for intervention in both domestic and foreign studies. The most common softwares were 'My talky' in domestic studies and 'Proloquo2Go' in foreign studies. The synthesis of evidence describing views of users and providers and the implementation of high-tech AAC device can provide valuable data to inform intervention studies and functional outcome measures. Suggestions for the future research are discussed.

A Survey Study of IT Vocational Education Contents Development in Ubiquitous Learing for Persons with Hearing Impairments (u-Learning 기반 IT 직업교육과정 개발을 위한 청각장애인의 욕구조사)

  • Rhee, Kun Min;Kim, Dong Ok;Lee, Shin Young
    • 재활복지
    • /
    • v.15 no.4
    • /
    • pp.351-375
    • /
    • 2011
  • The purpose of this study is to research the actual condition of on-line and off-line computer education in order to create more opportunities for the possibility of effective learning and u-Learning - based IT vocational education development of persons with hearing impairments. To carry out this study, we had a preliminary education of this study for a sign language interpreters who had working in a association of the deaf in Daegu, and had conducted a survey study participating for 100 persons with hearing impairments living in Daegu-Kyungbook Region. The results of this study were as follows: First, during on-line and offline education environment for persons with hearing impairments, factors such as teaching methods and contents, screen organization, learning effects, offering lecture material and subtitle, subtitle and sign language video of position and size, offering computer instructor who have a sign language interpreter with IT mentoring, on-line educational user environment setting must be considered factors for u-Learning - based IT vocational education development. Second, 74% of the subjects showed their interest in taking a course, after u-Learning contents are developed for persons with hearing impairments. Third, the subjects preferred IT device was a tablet PCs and IT certification related courses as their IT vocational education curriculum. Also, to link between professional training and job opportunity, subjects will need a IT vocational education courses such as computer intermediate and advanced levels.

A Study on Web-based operating system (웹 기반 운영체제에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rae-Young;Park, Jeong-Su;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.674-677
    • /
    • 2012
  • An operating system acts as an intermediary between your computer hardware and computer users to perform, that the user can run the program provides an environment in which. Therefore, the main purpose of the operating system having a computer available for your convenience and to effectively manage computer hardware. The popularization of the people who use computers, improve hardware performance, advent of the internet, popularity of wireless networks, Smartphone and Tablet PC appearance, advent of virtualization technologies and cloud computing, etc. began making changes to the operating system. In particular, cloud computing environments based on server virtualization and using a variety of wired and wireless devices with internet connection, a Web-based operating system was born. In this paper, the definition of a Web-based operating system, types and characteristics, an analysis of the pros and cons, and find out about the future prospects.

  • PDF

Development of Mobile Application for Cadastre Information Service (지적정보 서비스 모바일 애플리케이션 개발)

  • Lee, Geun-Sang;Kim, Hyoung-Jun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.4
    • /
    • pp.55-64
    • /
    • 2012
  • This study developed a mobile application system for serving cadastral information needed to propel diverse cadastral works including cadastral resurvey efficiently. First, BlackPoint-Xr was selected as a spatial client engine to embody the cadastral information system based on mobile device including smart phone and tablet PC. The mobile cadastral information system contains functions such as finding location with GPS based on spatial information such as aerial photo, cadastral map, administrative map, and digital map, parcel search with address and lot number, finding land register including land address, the classification of land, and land price. Especially, this study developed functions which can analyze the measurement of distance, area, slope and cross-section elevation of land to apply construction work and land maintenance project. This system can support efficiently cadastral work and construction project by serving diverse cadastral information to users in field and can be also applied to the field of digital cadastral information.

Accessibility Analysis of Android-based Smart Phones Targeted at People with Upper Limb Dysfunctions (상지기능 장애인을 대상으로 한 안드로이드 기반 스마트 폰의 입력 접근성 분석)

  • Kim, Kyung Sik;Song, Byung Seop
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.10 no.4
    • /
    • pp.267-272
    • /
    • 2016
  • In the era of ultra high speed information communication technology represented by Smart phone and Tablet PC, the disable and the aged people came to be in a position of so-called 'relatively weak people' in the field of information communication due to inconvenience of use and difference in information acquisition and processing ability. Thus, a survey was conducted on Smart phone accessibility items based on previous studies of the disabled with crippled disorder, brain lesions, myelopathy and muscular disabilities having more inconvenience relatively in their use of smart phone due to upper limb dysfunctions. Especially, people with upper limb dysfunctions with relatively weak grip had big inconvenience in the conditions of uses requiring actions such as grabbing and rotating the devices, and due to the characteristics of touch screen input method of Smart phone, they had big inconvenience due to a lack of a guidance for keyboard in input. As a result of questionnaires by the type of disability, it turned out that severe myelopathy causes the most inconvenience in using smart phone.

Mobile App Privacy Checklist for Consumer (모바일 앱 프라이버시 보호를 위한 소비자 체크리스트)

  • Li, Hua-Yu;Kim, Lin-Ah;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.1-12
    • /
    • 2015
  • In recent years, the privacy concern for mobile consumers is emerging as the use of mobile application(apps) is growing according to the rapid spread of mobile devices such as smart phones and tablet PCs. To improve privacy protections in the mobile communications and apps, overseas organizations are announcing guidelines and/or checklists for stake holders. Although personal information protection guidelines for application developers have been prepared in the country, efforts to improve consumer privacy capability is insufficient. Thus, in this paper we first scope the app privacy related guidelines in both domestic and foreign affairs, then present the risk factors of privacy invasion by the stage of mobile application use based on the "Privacy Protection Act", offering privacy checklists for consumers. This checklist will enhance the self-management capability of consumer privacy and create virtuous cycle in the mobile ecosystem.

The Technology of Connected Car (커넥티드 카의 기술)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.590-598
    • /
    • 2016
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving.