• Title/Summary/Keyword: Smart Technologies

Search Result 1,661, Processing Time 0.027 seconds

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

Technical, Individual and Situational Factors Affecting Intention to Use of Mobile Easy Payment Service : Focusing on the Moderating Effects of Subjective Norms (기술, 개인, 상황 특성이 모바일 간편 결제서비스 이용의도에 미치는 영향 : 주관적 규범의 조절효과)

  • Park, Hyunsun;Kim, Sanghyun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.105-115
    • /
    • 2018
  • With the development of information and communication technologies, popularization of smart phones, and relaxation of the government regulation, mobile easy payment service is rapidly growing as a major financial service. Therefore, this study examines factors that influence the intention to use mobile easy payment service through empirical analysis. We collected 386 responses by survey and formed structural equation modeling with AMOS 22.0. The results show that technical factors(relative advantage, security), individual factor(self-efficacy), situational factors(trust in prior services and satisfaction of prior services) had a positive effect on the perceived value. In addition, perceived value had a positive effect on the intention to use mobile easy payment services. Lastly, subjective norms are closely related to the relationship between perceived value and intention to use mobile easy payment services. The results can be expected to provide useful references to the Fintech related industry fields.

A High-performance Lane Recognition Algorithm Using Word Descriptors and A Selective Hough Transform Algorithm with Four-channel ROI (다중 ROI에서 영상 화질 표준화 및 선택적 허프 변환 알고리즘을 통한 고성능의 차선 인식 알고리즘)

  • Cho, Jae-Hyun;Jang, Young-Min;Cho, Sang-Bok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.148-161
    • /
    • 2015
  • The examples that used camera in the vehicle is increasing with the growth of the automotive market, and the importance of the image processing technique is expanding. In particular, the Lane Departure Warning System (LDWS) and related technologies are under development in various fields. In this paper, in order to improve the lane recognition rate more than the conventional method, we extract a Normalized Luminance Descriptor value and a Normalized Contrast Descriptor value, and adjust image gamma values to modulate Normalized Image Quality by using the correlation between the extracted two values. Then, we apply the Hough transform using the optimized accumulator cells to the four-channel ROI. The proposed algorithm was verified in 27 frame/sec and $640{\times}480$ resolution. As a result, Lane recognition rate was higher than the average 97% in day, night, and late-night road environments. The proposed method also shows successful lane recognition in sections with curves or many lane boundary.

A Technical Planning for Emotion Evaluation of Art Performance using the Human Emotional Data (공연에 대한 고객감동 평가를 위한 감성데이터 활용 방안)

  • Moon, Hyo-Jung;Ko, Hee-Kyung;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.87-91
    • /
    • 2017
  • Recently, several kinds of researches using IoT wearable devices are active in the field of sports, design, emotional sciences and so on. The human bio data such as blood pulse, ECG, SKT signal, and GSR Signal producing from IoT wearable devices such as Watch, Smart-band, Grass can adapt to the meaningful future applications. Using the human's emotional data and a physical status with variation and so on, we can individually get the personal status. Due to knowing the personal emotion or physical status is related and connected to the valuable wallet of customers, the approach is more important in nowadays. Therefore, the personal information can effectively adapt to the marketing of the culture industry, which deals with emotions of customers. The research shows implementation steps for explaining overall architecture of the convergence research between Art and Technologies.

Sensual Aisthesis of the Communication Visualization through Twitter (트위터를 이용한 상호소통 시각화의 감각적 경험)

  • Yoo, Miohk;Park, Kyoungju
    • Journal of the Korea Computer Graphics Society
    • /
    • v.18 no.3
    • /
    • pp.29-35
    • /
    • 2012
  • As the distribution rate of the Smart mobile increased, the software technology and ideas for the ubiquitous systems advanced day after day to establish an environment where the public can easily access and experience such technologies. The communication between an individual and the many became more convenient through the social network services (SNS) and the individuals started to attempt to communicate in various methods. The communication methods and techniques became more diverse and the media art pieces focusing on the communications among many also became more interesting. This study attempted to create a prototype of the visual communication media art through the indirect participation of one of the widespread SNS, Twitter, for the communication and also to suggest the direct and indirect communication routes among the humans. In addition, the use of the typography in the pieces also attempted to examine a new type of work that combines the SNS and media art while delivering the text messages.

The Structural Relationships among Innovation Characteristics, Consumer Characteristics, Innovation Resistance, and Intention to Acceptance of Wearable Device Customers: Based on Innovation Resistance Model and Theory of Perceived Risk (웨어러블 디바이스 소비자의 혁신특성, 소비자특성, 혁신저항, 그리고 수용의도와의 구조적 관계: 혁신저항모형과 인지된 위험이론을 기반으로)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.87-104
    • /
    • 2016
  • Purpose As the smartphone market arrived at its saturation, from world leading information and communications technologies (ICT) businesses to startups, companies are competing to develop innovative wearable device products and suitable contents. Utility, technology, design, price, and various killer contents development targeting every customer's need should be considered for a success in the wearable device market. Design/methodology/approach Prior studies on innovation technology of ICT field have mainly focused on the innovation diffusion theory, expectation confirmation theory, and technology acceptance model, this study suggested the innovation resistance factors of adopting the smart wearable devices based on the innovation resistance model and theory of perceived risk. The model comprises the following two characteristics factors: 1) innovation characteristics which include perceived relative advantages, perceived compatability, perceived complexity, and perceived risk, 2) consumer characteristics which include attitudes towards innovation and existing products (i.e., mobile devices and analog watches). This study developed an extended innovation resistance model to explain the intention to acceptance of wearable devices consumers and collected 284 online survey responses from the non-consumers of the wearable devices. Findings The findings of this study suggest that perceived relative advantage, perceived compatibility, perceived complexity, perceived risk, attitudes towards innovation and attitudes towards existing analog watches affected the innovation resistance which has negative influence on the intention to adoption of wearable devices.

A Swapping Red-black Tree for Wear-leveling of Non-volatile Memory (비휘발성 메모리의 마모도 평준화를 위한 레드블랙 트리)

  • Jeong, Minseong;Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.139-144
    • /
    • 2019
  • For recent decades, Non-volatile Memory (NVM) technologies have been drawing a high attention both in industry and academia due to its high density and short latency comparable to that of DRAM. However, NVM devices has write endurance problem and thus the current data structures that have been built around DRAM-specific features including unlimited program cycles is inadequate for NVM, reducing the device lifetime significantly. In this paper, we revisit a red-black tree extensively adopted for data indexing across a wide range of applications, and make it to better fit for NVM. Specifically, we observe that the conventional red-black tree wears out the specific location of memory because of its rebalancing operation to ensure fast access time over a whole dataset. However, this rebalancing operation frequently updates the long-lived nodes, which leads to the skewed wear out across the NVM cells. To resolve this problem, we present a new swapping wear-leveling red-black tree that periodically moves data in the worn-out node into the young node. The performance study with real-world traces demonstrates the proposed red-black tree reduces the standard deviation of the write count across nodes by up to 12.5%.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 그룹 콘텐츠 요청을 사용한 효율적인 콘텐츠 공유 방안)

  • Shin, Jooho;Lee, Juyong;Lee, Jihoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.817-821
    • /
    • 2014
  • As users generate lots of contents independently of time and places anytime and anywhere together with a rapid development of mobile wireless communication technologies and an explosive dissemination of smart devices, content centric networking (CCN) has emerged as a new networking architecture. However, as CCN is based on one to one message exchanges, it is not appropriate for ad hoc network environment that has frequent network topology changes, which results in high control overhead and low transmission throughput. So, this paper proposes the new content sharing methods using group interest messages in CCN ad hoc environment. It is shown from the simulation that the proposed method can provide low control overhead and high transmission throughput.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.