• Title/Summary/Keyword: 태블릿 기반

Search Result 168, Processing Time 0.026 seconds

Development of STS Teaching-Learning Materials about Chemical Batteries for Specialized Vocational High School Students (특성화고 화학공업과 학생을 위한 화학전지 STS 교수-학습자료 개발)

  • Shin, Seo-Woo;Yoo, Hyun-Seok
    • 대한공업교육학회지
    • /
    • v.43 no.2
    • /
    • pp.24-42
    • /
    • 2018
  • Chemical batteries are indispensable materials, and technologies related to chemical batteries are important as they are linked to various social problems; further, they directly affect our lives. Thus, the topic of chemical batteries is suitable for industrial education. However, there has not been sufficient educational use of chemical batteries in Korea, and existing research materials do not correspond with the present curriculum. The STS teaching-learning materials about chemical batteries in this study were developed by the curriculum development model (preparation, development, improvement) for chemical engineering students in specialized vocational high schools. In the preparation stage, the study topic and the learning objective were selected by analyzing previous research about the STS and chemical battery. At the development stage, STS class plan and teaching-learning materials were developed. In the improvement stage, The STS curriculum plan and the teaching-learning materials were verified by a group of specialists and a survey regarding student satisfaction was conducted. As a result of conducting the class with the teaching-learning materials developed in this study, a positive effect in terms of students' perceptions, understanding and interest.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF

Effects of Display Size of Digital Media on the Reliability of the Information Contents (디지털미디어의 화면 크기로 인한 사용성의 차이가 기사 정보의 신뢰도에 미치는 영향)

  • Ki, Hyun-Young;Lee, Ju-Hwan
    • Science of Emotion and Sensibility
    • /
    • v.15 no.1
    • /
    • pp.65-72
    • /
    • 2012
  • People receive information through various media, such as newspapers, TV, radio, magazines, or internet, etc. In particular, through the development of the internet and smart-phone they can interact with media and receive information in real time via handheld devices. However the types of information and media could affect the reliability of news information. In this study, it was the main interest how the usability in the new media with the interactivity, such as a desktop, tablet, and smart-phone affects the user's evaluation on the contents displayed by the different new media. Therefore, the present study was conducted to investigate the effect of the usability from the different display size of media and the different contents of articles on the reliability of information empirically. The results showed that the contents of the articles interacting with different devices affect the reliability of information. These findings propose the considerations on the effects of characteristic usability of the new media in the stages of the development of the media contents.

  • PDF

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF

Design of an Efficient Control System for Harbor Terminal based on the Commercial Network (상용망 기반의 항만터미널 효율적인 관제시스템 설계)

  • Kim, Yong-Ho;Ju, YoungKwan;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.21-26
    • /
    • 2018
  • The Seaborne Trade Volume accounts for 97% of the total. This means that the port operation management system can improve port efficiency, reducing operating costs, and the manager who manages all operations at the port needs to check and respond quickly when delays of work and equipment support is needed. Based on the real-time location information confirmation of yard automation equipment used the existing system GPS, the real-time location information confirmation system is a GPS system of the tablet, rather than a port operation system that monitors location information for the entered information, depending on the completion of the task or the start of the task. Network configurations also reduce container processing delays by using commercial LTE services that do not have shading due to containers in the yard also reduce container processing delays. Trough introduction of smart devices using Android or IOS and container processing scheduling utilizing artificial intelligence, we will build a minimum delay system with Smart Device usage of container processing applications and optimization of container processing schedule. The adoption of smart devices and the minimization of container processing delays utilizing artificial intelligence are expected to improve the quality of port services by confirming the processing containers in real time to consumers who are container information demanders.

Process Optimization for the Industrialization of Transparent Conducting Film (투명 전도막의 산업화를 위한 공정 최적화)

  • Nam, Hyeon-bin;Choi, Yo-seok;Kim, In-su;Kim, Gyung-jun;Park, Seong-su;Lee, Ja Hyun
    • Industry Promotion Research
    • /
    • v.9 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • In the rapidly advancing information society, electronic devices, including smartphones and tablets, are increasingly digitized and equipped with high-performance features such as flexible displays. This study focused on optimizing the manufacturing process for Transparent Conductive Films (TCF) by using the cost-effective conductive polymer PEDOT and transparent substrate PET as alternatives to expensive materials in flexible display technology. The variables considered are production speed (m/min), coating maximum temperature (℃), and PEDOT supply speed (rpm), with surface resistivity (Ω/□) as the response parameter, using Response Surface Methodology (RSM). Optimization results indicate the ideal conditions for production: a speed of 22.16 m/min, coating temperature of 125.28℃, and PEDOT supply at 522.79 rpm. Statistical analysis validates the reliability of the results (F value: 18.37, P-value: < 0.0001, R2: 0.9430). Under optimal conditions, the predicted surface resistivity is 145.75 Ω/□, closely aligned with the experimental value of 142.97 Ω/□. Applying these findings to mass production processes is expected to enhance production yields and decrease defect rates compared to current practices. This research provides valuable insights for the advancement of flexible display manufacturing.

Design Evaluation Model Based on Consumer Values: Three-step Approach from Product Attributes, Perceived Attributes, to Consumer Values (소비자 가치기반 디자인 평가 모형: 제품 속성, 인지 속성, 소비자 가치의 3단계 접근)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.57-76
    • /
    • 2017
  • Recently, consumer needs are diversifying as information technologies are evolving rapidly. A lot of IT devices such as smart phones and tablet PCs are launching following the trend of information technology. While IT devices focused on the technical advance and improvement a few years ago, the situation is changed now. There is no difference in functional aspects, so companies are trying to differentiate IT devices in terms of appearance design. Consumers also consider design as being a more important factor in the decision-making of smart phones. Smart phones have become a fashion items, revealing consumers' own characteristics and personality. As the design and appearance of the smartphone become important things, it is necessary to examine consumer values from the design and appearance of IT devices. Furthermore, it is crucial to clarify the mechanisms of consumers' design evaluation and develop the design evaluation model based on the mechanism. Since the influence of design gets continuously strong, various and many studies related to design were carried out. These studies can classify three main streams. The first stream focuses on the role of design from the perspective of marketing and communication. The second one is the studies to find out an effective and appealing design from the perspective of industrial design. The last one is to examine the consumer values created by a product design, which means consumers' perception or feeling when they look and feel it. These numerous studies somewhat have dealt with consumer values, but they do not include product attributes, or do not cover the whole process and mechanism from product attributes to consumer values. In this study, we try to develop the holistic design evaluation model based on consumer values based on three-step approach from product attributes, perceived attributes, to consumer values. Product attributes means the real and physical characteristics each smart phone has. They consist of bezel, length, width, thickness, weight and curvature. Perceived attributes are derived from consumers' perception on product attributes. We consider perceived size of device, perceived size of display, perceived thickness, perceived weight, perceived bezel (top - bottom / left - right side), perceived curvature of edge, perceived curvature of back side, gap of each part, perceived gloss and perceived screen ratio. They are factorized into six clusters named as 'Size,' 'Slimness,' 'No-Frame,' 'Roundness,' 'Screen Ratio,' and 'Looseness.' We conducted qualitative research to find out consumer values, which are categorized into two: look and feel values. We identified the values named as 'Silhouette,' 'Neatness,' 'Attractiveness,' 'Polishing,' 'Innovativeness,' 'Professionalism,' 'Intellectualness,' 'Individuality,' and 'Distinctiveness' in terms of look values. Also, we identifies 'Stability,' 'Comfortableness,' 'Grip,' 'Solidity,' 'Non-fragility,' and 'Smoothness' in terms of feel values. They are factorized into five key values: 'Sleek Value,' 'Professional Value,' 'Unique Value,' 'Comfortable Value,' and 'Solid Value.' Finally, we developed the holistic design evaluation model by analyzing each relationship from product attributes, perceived attributes, to consumer values. This study has several theoretical and practical contributions. First, we found consumer values in terms of design evaluation and implicit chain relationship from the objective and physical characteristics to the subjective and mental evaluation. That is, the model explains the mechanism of design evaluation in consumer minds. Second, we suggest a general design evaluation process from product attributes, perceived attributes to consumer values. It is an adaptable methodology not only smart phone but also other IT products. Practically, this model can support the decision-making when companies initiative new product development. It can help product designers focus on their capacities with limited resources. Moreover, if its model combined with machine learning collecting consumers' purchasing data, most preferred values, sales data, etc., it will be able to evolve intelligent design decision support system.