• Title/Summary/Keyword: IT 대중화

Search Result 486, Processing Time 0.023 seconds

Study on Arduino Kit VR contents modularization based on virtualization technology in software education field (소프트웨어교육 현장에서 가상화 기술에 기반한 아두이노 키트 VR콘텐츠 모듈화 연구)

  • Park, Jong-Youel;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.293-298
    • /
    • 2018
  • In the fourth industrial revolution era triggered by the popularization of smart phones, Human daily life and all industrial sites are becoming software and intelligent. With the universal software education for all students nationwide from 2018, Demand is surging, and hardware is interlocked using software technology and Arduino. However, expensive control boards and dozens of different electronic components have to be prepared separately and problems are occurring. In addition, if the same training is repeated, Significantly many parts are lost or destroyed. Being prepared to start a new class is also becoming a very serious problem. In this study, we implement VR technology based on virtualization technology of Arduino board and various electronic parts. In addition, 3D graphics realistic Arduino kit and various electronic components are provided in API form. In this paper, we propose a method of interworking software and virtual hardware on virtualization base.

Vulnerabilities Analysis of the OTP Implemented on a PC (PC에 탑재된 OTP의 취약점 분석)

  • Hong, Woo-Chan;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password) is a user authentication using secure mechanism to authenticate each other in a way to generate a password, an attacker could intercept the password to masquerade as legitimate users is a way to prevent attacks. The OTP can be implemented as H/W or S/W. Token and card type OTP, implemented as H/W, is difficult to popularize because of having problem with deployment and usability. As a way to replace it implemented as S/W on Mobile or PC is introduced. However, S/W products can be target of malicious attacks if S/W products have vulnerability of implementation. In fact, FSA said the OTP implemented on a mobile have vulnerability of implementation. However, the OTP implemented on a PC have no case about analysis of vulnerability. So, in this paper derive security review and vulnerabilities analysis of implemented on a PC.

Bikinis in the United States, from 1946 to the 1960s (비키니 수영복에 관한 연구 -1946년에서 1960년대까지 미국을 중심으로-)

  • Lee, Yhe-Young
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.7 s.107
    • /
    • pp.142-151
    • /
    • 2006
  • Bikini, a brief two-piece bathing suit revealing the wearer's navel, was first introduced in Paris, in 1946. However, it was not until the late 1950s that Americans were ready to adopt bikinis. Therefore, I focused on the following research questions to understand the popularization process of bikinis in the United States, from 1946 to the 1960s: 1. Why were Americans initially hesitant to adopt the bikini? 2. What were the factors that influenced the popularization of the bikini among Americans in the late 1950s? Primary sources including Bazaar. Madmoiselle, Vogue, The New York Times, and Life were reviewed. I referred to secondary sources on the history of fashion and American popular culture to interpret primary sources. According to the primary sources, Americans were hesitant to adopt the bikini, partly due to the excessive demand on the wearer's figure. However, the conservative social atmosphere during Cold War would not accept immorality and obscenity which would threaten America's future. Therefore, the campaigns against the sex industry, which developed prominently after WWII, predominated American society during the 1950s. Under this atmosphere, a small number of pictures and articles on bikinis appeared in the primary sources. Bikinis were only found in advertisements including sun lotions and hair removers. However, American society had to accept the change in sexual mores by the end of the 1930s. Body-revealing fashions including miniskirts, hot pants, and see-through material reflected the change in social convention. By the end of the 1950s, the number of pictures and articles on bikinis also began to increase in the primary sources. More Americans adopted bikinis with the increasing number of private pools and European trips. The vogue of sun-tanning and movies featuring bikinis further contributed to their popularity in the late 1930s and into the 1960s.

Still Image Identifier based over Low-frequency Area (저역주파수 영역 기반 정지영상 식별자)

  • Park, Je-Ho
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.393-398
    • /
    • 2010
  • Composite and compact devices equipped with the functionality of digital still image acquisition, such as cellular phones and MP3 players are widely available to common users. In addition, the application of digital still images is becoming common among security and digital recording devices. The amount of still images, that are maintained or shared in personal storage or massive storage provided by various web services, are rapidly increasing. These still images are bound with file names or identifiers that are provided arbitrarily by users or that are generated from device specific naming method. However, those identifiers are vulnerable for unexpected changing or eliminating so that it becomes a problem in still image search or management. In this paper, we propose a method for still image identifier generation that is created from the still image internal information.

Modifications of DCF Scheme to Alleviate Jitter Property in WLANs (무선 랜의 지터 성능 개선을 위한 DCF 개선 방안)

  • Kang, Dong-Hun;Seok, Seung-Joon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.153-163
    • /
    • 2008
  • Almost literature has so far proposed the modifications to IEEE 802.11 DCF MAC protocol to improve system throughput and average delay. Jitter(variance in packet delays) is, however, considered as an important QoS parameter for real-time streaming service which is popularized increasingly. Unfortunately, legacy access protocol for WLAN can't support the jitter. This paper proposes two schemes modifying the DCF MAC protocol to reduce the average value of jitter for multimedia frames arrived at received nodes. The one scheme, referred to as DCW-DCF(Decreasing Contention Window-DCF), reduces CW(Contention Window) size by half whenever a transmitted frame collided against other frames and back-off happens. Also, it increase initial CW size according as the link utilization and the collision probability increase. The other scheme, referred to as D-DIFS(Differential-DIFS), assigns different values to DIFS. That is, the DIFS interval is deceased as the number of back-off for a frame increases. In this paper, the two schemes are evaluated through simulation using ns2 and simulation results show that the proposed schemes are effective for improving the jitter property of standard WLAN.

  • PDF

Study on SNS Application Data Decryption and Artifact (SNS 애플리케이션의 데이터 복호화 및 아티팩트 연구)

  • Shin, Sumin;Kang, Soojin;Kim, Giyoon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.583-592
    • /
    • 2020
  • With the popularization of smartphones, Social Networking Service (SNS) has become the means of communication for modern people. Due to the nature of the means of communication, SNS generates a variety of archive and preservation evidence. Therefore, it is a major analysis target in terms of digital forensic investigation. An application that provides SNS stores data in a central server or database in a smartphone inside for user convenience. Some applications provide encryption for privacy, which can be anti-forensic in terms of digital forensic investigation. Therefore, the study of the encryption method should be continuously preceded. In this paper, we analyzed two applications that provide SQLite-based database encryption through SQLCipher module. Each database was decrypted and key data was identified.

A Study of On/Off-line Trust on Customer's Repurchase Intention in Hotel Industry (온/오프라인 호텔기업의 신뢰와 고객의 재구매의도에 관한 연구)

  • Min, Bo-Young
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.412-422
    • /
    • 2009
  • With the development of the Internet, online community has been made possible to buy a product in hotel industry. It is expanded gradually the customers buy various banquet services as well as guest rooms or restaurant use. From the 1950s, research has been conducted on trust and various study is achieved in connection with in social psychology or industry marketing. But there is much to be desired on research on trust in on/off-line company and customer's repurchase intention. Verifying the study model and hypothesis established through proceeding research, we would like to know that whether trust in on-line basis can be connected with the trust that already formed about the hotel in off-line basis. Furthermore, how on-line and off-line trust made in hotel industry can affects to customer's repurchase intention. The trust between on-line basis and off-line basis in hotel industry is mutually related. The trust based on off-line hotel company also affects to customer's repurchase intention. But, on-line trust in hotel industry is not related to the customer's repurchase intention.

Transition of Domestic Corporate Symbol Mark - Chiefly Focusing on Portfolio of CI Specialized Companies - (국내 기업심볼마크의 변천 - CI 전문회사들의 포트폴리오를 중심으로 -)

  • Lee, Jae-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.207-214
    • /
    • 2007
  • Symbol mark started with expressing the symbolic form through the long history of human beings, in order to transmit self or group's life and thoughts, and since the Industrial Revolution, symbol mark has beer used for the business activities of enterprise, along with the acquirement of term 'CI'. The symbol mark design of A.E.G, designed by Peter Behrens in 1907 is the onset of symbol mark in the CI concept, and the concept of CI and symbol mark was introduced to our nation in the early of 1970s. Since then, until now, CI has reflected the phase of the times as a key factor of CI, while repeating numerous changes, and recently, it is a state that the expression methods of symbol mark have been varied with the popularization of trend, appealing to emotion in the whole society and culture. Accordingly, this thesis examines the corporate symbol mark through the portfolio of representative CI specializes companies from the introduction period of CI to the present, and analyze the features of the time in order to present the basis of the direction of symbol mark design for the creation of future corporate images.

Design of a Personalized Service Model for Developing Research Support Tool (연구지원 도구의 개인화 서비스 모델 설계)

  • Choi, Hee-Seok;Park, Ji-Young;Shim, Hyoung-Seop;Kim, Jae-Soo;You, Beom-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.8
    • /
    • pp.37-45
    • /
    • 2015
  • With advancement in information technologies and a better mobile environment, the paradigm of service is shifting again from web portals to networked-applications based on individual application programs. Furthermore, as more investment is being made in R&D, the efforts to enhance R&D productivity are becoming important. In this paper, we designed a personalized service model for developing a tool to assist researchers in their R&D activities. To do this, we first compared services and tools in terms of information activities of researchers in R&D. In addition, we also analyzed changes of information environment such as open expansion of information and data, enhancement of personal information protection, popularization of social networking service, very big contents, advances in web platform technology in terms of personalization, and defined some directions of developing a personalized service. Subsequently we designed a personalized service model of research support tool in the views of functions, contents, operation, and defined personalized design goals and principles for implementing it as standard, participation, and open.

Efficient k-Nearest Neighbor Query Processing Method for a Large Location Data (대용량 위치 데이터에서 효율적인 k-최근접 질의 처리 기법)

  • Choi, Dojin;Lim, Jongtae;Yoo, Seunghun;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.619-630
    • /
    • 2017
  • With the growing popularity of smart devices, various location based services have been providing to users. Recently, some location based social applications that combine social services and location based services have been emerged. The demands of a k-nearest neighbors(k-NN) query which finds k closest locations from a user location are increased in the location based social network services. In this paper, we propose an approximate k-NN query processing method for fast response time in a large number of users environments. The proposed method performs efficient stream processing using big data distributed processing technologies. In this paper, we also propose a modified grid index method for indexing a large amount of location data. The proposed query processing method first retrieves the related cells by considering a user movement. By doing so, it can make an approximate k results set. In order to show the superiority of the proposed method, we conduct various performance evaluations with the existing method.