• Title/Summary/Keyword: Paper-smartphone devices

Search Result 249, Processing Time 0.027 seconds

A Study on Web-based operating system (웹 기반 운영체제에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rae-Young;Park, Jeong-Su;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.674-677
    • /
    • 2012
  • An operating system acts as an intermediary between your computer hardware and computer users to perform, that the user can run the program provides an environment in which. Therefore, the main purpose of the operating system having a computer available for your convenience and to effectively manage computer hardware. The popularization of the people who use computers, improve hardware performance, advent of the internet, popularity of wireless networks, Smartphone and Tablet PC appearance, advent of virtualization technologies and cloud computing, etc. began making changes to the operating system. In particular, cloud computing environments based on server virtualization and using a variety of wired and wireless devices with internet connection, a Web-based operating system was born. In this paper, the definition of a Web-based operating system, types and characteristics, an analysis of the pros and cons, and find out about the future prospects.

  • PDF

Smart mobile support for HTML5-based real-time Community Case Management System Development (스마트 모바일 지원을 위한 HTML5 기반의 사례관리 실시간 커뮤니티 시스템 개발)

  • Lee, Bong Soo;Kim, Bong Han;Oh, Dong Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.289-294
    • /
    • 2012
  • In this paper, we take advantage of the characteristics of mobile smartphones can be serviced without the constraints of time and space, and Study was developed by a variety of mobile services were done in a traditional offline can be implemented in real-time Case Management Community. To this end, in addition to general PC/laptop, smart mobile until the configuration interface provide the same environment for HTML5 Web Switching and Optimal Network on the same device-specific browser Size to the implementation of the next generation of Web standards, HTML5-based integrated case management Web and Mobile Web. Hybrid App Development OS supports various kinds of smart devices based on SenchaTouch Mobile Framework between the server real-time synchronization and message through the implementation of the Push Notification function, administrators and guardians real-time two-way communication between the subjects is a real-time implementation of the system was implemented Case Management Community.

Image Quality Assessment Considering both Computing Speed and Robustness to Distortions (계산 속도와 왜곡 강인성을 동시 고려한 이미지 품질 평가)

  • Kim, Suk-Won;Hong, Seongwoo;Jin, Jeong-Chan;Kim, Young-Jin
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.992-1004
    • /
    • 2017
  • To assess image quality accurately, an image quality assessment (IQA) metric is required to reflect the human visual system (HVS) properly. In other words, the structure, color, and contrast ratio of the image should be evaluated in consideration of various factors. In addition, as mobile embedded devices such as smartphone become popular, a fast computing speed is important. In this paper, the proposed IQA metric combines color similarity, gradient similarity, and phase similarity synergistically to satisfy the HVS and is designed by using optimized pooling and quantization for fast computation. The proposed IQA metric is compared against existing 13 methods using 4 kinds of evaluation methods. The experimental results show that the proposed IQA metric ranks the first on 3 evaluation methods and the first on the remaining method, next to VSI which is the most remarkable IQA metric. Its computing speed is on average about 20% faster than VSI's. In addition, we find that the proposed IQA metric has a bigger amount of correlation with the HVS than existing IQA metrics.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation (모바일 포렌식 증거능력 확보 방안 연구)

  • Eo, Soowoong;Jo, Wooyeon;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.135-152
    • /
    • 2016
  • Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.

A Study on Modified Mask for Edge Detection in AWGN Environment (AWGN 환경에서 에지 검출을 위한 변형된 마스크에 관한 연구)

  • Lee, Chang-Young;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2199-2205
    • /
    • 2013
  • In modern society the image processing has been applied to various digital devices such as smartphone, digital camera, and digital TV. In the field of image processing the edge detection is one of the important parts in the image processing procedure. The image edge means point that the pixel value is changed between background and object rapidly, and includes the important information such as magnitude, location, and orientation. The performance of the existing edge detection method is insufficient for the image degraded by AWGN(additive white Gaussian noise) because it detects edges by using small weighted masks. Therefore, in this paper, to detect edge in AWGN environment effectively, we proposed an algorithm that detects edge as calculated gradient of sorting vector which is transformed by estimated mask from new pixel according to each region.

SorMob: Computation Offloading Framework based on AOP (SorMob: AOP 기반의 연산 오프로딩 프레임워크)

  • Cho, Yeongpil;Cho, Doosan;Paek, Yunheung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.203-208
    • /
    • 2013
  • As smartphones are rapidly and widely spread, their applications request gradually larger computation power. Recently, in the personal computer, computing power of hardware has exceeded performance requirement of software sometimes. Computing power of smartphone, however, will not grow at the same pace as demand of applications because of form factor to seek thinner devices and power limitation by relatively slow technical progress of battery. Computation offloading is getting huge attention as one of solution for the problem. It has not commonly used technology in spite of advantages for performance and power consumption since the existing offloading frameworks are difficult for application developer to utilize. This paper presents an application developer-friendly offloading framework, named SorMob. Based on Aspect Oriented Programming model, SorMob provides a convenient environment for application development, and its performance was verified by comparing with the existing offloading framework.

Accuracy Comparison Between Image-based 3D Reconstruction Technique and Terrestrial LiDAR for As-built BIM of Outdoor Structures

  • Lee, Jisang;Hong, Seunghwan;Cho, Hanjin;Park, Ilsuk;Cho, Hyoungsig;Sohn, Hong-Gyoo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.6
    • /
    • pp.557-567
    • /
    • 2015
  • With the increasing demands of 3D spatial information in urban environment, the importance of point clouds generation techniques have been increased. In particular, for as-built BIM, the point clouds with the high accuracy and density is required to describe the detail information of building components. Since the terrestrial LiDAR has high performance in terms of accuracy and point density, it has been widely used for as-built 3D modelling. However, the high cost of devices is obstacle for general uses, and the image-based 3D reconstruction technique is being a new attraction as an alternative solution. This paper compares the image-based 3D reconstruction technique and the terrestrial LiDAR in point of establishing the as-built BIM of outdoor structures. The point clouds generated from the image-based 3D reconstruction technique could roughly present the 3D shape of a building, but could not precisely express detail information, such as windows, doors and a roof of building. There were 13.2~28.9 cm of RMSE between the terrestrial LiDAR scanning data and the point clouds, which generated from smartphone and DSLR camera images. In conclusion, the results demonstrate that the image-based 3D reconstruction can be used in drawing building footprint and wireframe, and the terrestrial LiDAR is suitable for detail 3D outdoor modeling.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

Study Curation Service Utilizing th Learner Pattern Information from the Smart Learning (스마트러닝에서의 학습자 패턴 정보를 활용한 큐레이션 서비스 제공 방안 연구)

  • Yun, Jun-soo;Hwang, Hyun-seo;Park, Jin-tae;Seo, Kyoung-teak;Moon, Il-young;Kwon, Oh-young;Kim, Byeong-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.903-906
    • /
    • 2015
  • Over the recent industry -wide virtual world and the real world, broadcasting and telecommunications, IT technology and traditional industries, such as the fusion research has been conducted in a variety of fields. And training in the field of education is changing the paradigm of creativity to break the intrusive training center. In addition, the quality of interactive educational content technology to foster self-directed future talent is a situation that is required. The market has already surpassed the smartphone PC, smart devices and e-learning technologies are appearing new service called 'smart learning' as a new form of convergence of the educational system. In this paper, based on the direct development of a content authoring applications and Web sites, and cloud environments to the students collect and analyze patterns. Utilizing this information, we studied the curation service plans that recommend the appropriate content to fit the tastes of the learner.

  • PDF