• Title/Summary/Keyword: SmartView

Search Result 420, Processing Time 0.029 seconds

Community Model for Smart TV over the Top Services

  • Pandey, Suman;Won, Young Joon;Choi, Mi-Jung;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.577-590
    • /
    • 2016
  • We studied the current state-of-the-art of Smart TV, the challenges and the drawbacks. Mainly we discussed the lack of end-to-end solution. We then illustrated the differences between Smart TV and IPTV from network service provider point of view. Unlike IPTV, viewer of Smart TV's over-the-top (OTT) services could be global, such as foreign nationals in a country or viewers having special viewing preferences. Those viewers are sparsely distributed. The existing TV service deployment models over Internet are not suitable for such viewers as they are based on content popularity, hence we propose a community based service deployment methodology with proactive content caching on rendezvous points (RPs). In our proposal, RPs are intermediate nodes responsible for caching routing and decision making. The viewer's community formation is based on geographical locations and similarity of their interests. The idea of using context information to do proactive caching is itself not new, but we combined this with "in network caching" mechanism of content centric network (CCN) architecture. We gauge the performance improvement achieved by a community model. The result shows that when the total numbers of requests are same; our model can have significantly better performance, especially for sparsely distributed communities.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

A Study on User Perception of Public Library Information Service Using Smart Phones (스마트폰을 통한 공공도서관 정보서비스의 이용자 인식에 관한 연구)

  • Lee, Eun-Hee;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.3
    • /
    • pp.377-392
    • /
    • 2011
  • This paper aims to examine how users view information services that use today's rapidly expanding smart phones and what their demands are. The research focus is specifically on public libraries where related studies or the provision of services is still lacking. For this study, users of public libraries were targeted for surveys and interviews. The results that Public library users showed positive views on using library information services and e-contents service on smart phones. But the users viewed smart phones as another point of access in accessing information services, not as something revolutionary to the existing library information services.

Types and Characteristics of Digital Anthropometric Methods (디지털 인체 계측 방법의 유형 및 특성)

  • Kim, Rira
    • Journal of Fashion Business
    • /
    • v.25 no.5
    • /
    • pp.88-98
    • /
    • 2021
  • In this study, the characteristics of digital anthropometric methods were determined with case studies. These methods were broadly classified into two categories: non-wearable and wearable. Then, these categories were further classified into four types: 3D Scanning, mobile app, smart clothing, and smart tool Among the non-wearable types, the "3D scanning" technique was based on the use of 3D hardware equipment. With this technique, the body shape was measured and the internal body information was obtained. Therefore, it is used in fields of healthcare and fitness. Among the wearable types, "Smart clothing" involves a special clothing that measures human body and a smartphone application. Both the components are linked to a fashion platform, which is based on the measured sizes that help shoppers. The "Smart tool" has the characteristic of measuring only with smart tools and smartphone applications; it does not involve the measurement of images. The common advantage of digital anthropometric methods are as follows: they reduce the time and cost of measurement by enabling self-measurement. Moreover, simple measurements are used to determine the size of anthropometry. Thereafter, it accumulates this data to track the continuous changes in size. From an industrial point of view, digital anthropometric technology should be used to increase sales. The on-demand market can be expanded as global consumers would throng the Korean fashion market. For the consumer, an avatar should be created to fit the user's size. This would provide a fun experience to the user.

Factors affecting real-time evaluation of muscle function in smart rehab systems

  • Hyunwoo Joe;Hyunsuk Kim;Seung-Jun Lee;Tae Sung Park;Myung-Jun Shin;Lee Hooman;Daesub Yoon;Woojin Kim
    • ETRI Journal
    • /
    • v.45 no.4
    • /
    • pp.603-614
    • /
    • 2023
  • Advancements in remote medical technologies and smart devices have led to expectations of contactless rehabilitation. Conventionally, rehabilitation requires clinicians to perform routine muscle function assessments with patients. However, assessment results are difficult to cross-reference owing to the lack of a gold standard. Thus, the application of remote smart rehabilitation systems is significantly hindered. This study analyzes the factors affecting the real-time evaluation of muscle function based on biometric sensor data so that we can provide a basis for a remote system. We acquired real clinical stroke patient data to identify the meaningful features associated with normal and abnormal musculature. We provide a system based on these emerging features that assesses muscle functionality in real time via streamed biometric signal data. A system view based on the amount of data, data processing speed, and feature proportions is provided to support the production of a rudimentary remote smart rehabilitation system.

Study on Inventory Management in Smart Phone Environmkent (스마트폰 환경에서 창고관리에 관한 연구)

  • Xuchenlin, Xuchenlin;Lee, Hyun-Chang;Shin, Seong-Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.251-252
    • /
    • 2013
  • With the development of globalization, enterprises have improved the working efficiency and the competitiveness through smart office. Consequently, the enterprise resources planning, sales support, customer relations management and supply chain management with distinctive function of expansion are quite necessary. In view of this, through appropriate use of software, this study creates and implements the application programs of marketing management and inventory management in Smartphone environment.

  • PDF

A Study on User's Resist and Productivity Using Smart Device in the Smartwork Context (스마트워크 환경에서 스마트 기기 활용에 따른 사용자 저항과 개인 생산성에 관한 연구)

  • Park, Sang Cheol;Chae, Seong Wook
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.143-164
    • /
    • 2014
  • This study draws on status quo bias theoretic perspective as a meta-theoretic lens to explain why individuals have resists to adopt smart devices for their tasks. More specifically, we attempted to examine the relationships among user's resist, perceived usefulness and individual productivity in the smart work context. By employing the status quo bias theoretic perspective, we develop and test our research model by using a survey data from 235 individual users. We demonstrate that satisfaction on the current state influence users' resist, and also the users' resist is mediated by perceived usefulness on individual productivity. From the status quo bias view, this study presents an alternative meta-theoretical lens in order to understand individuals' resist in the smartwork context.

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.

Fabricator based on B+Tree for Metadata Management in Distributed Environment

  • Chae-Yeon Yun;Seok-Jae Moon
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.125-134
    • /
    • 2024
  • In a distributed environment, data fabric refers to the technology and architecture that provides data management, integration, and access in a consistent and unified manner. To build a data fabric, it is necessary to maintain data consistency, establish a data governance system, reduce structural differences between data sources, and provide a unified view. In this paper, we propose the Fabricator system, a technology that provides data management and access in a consistent and unified manner by building a metadata registry. Fabricator manages the addition and modification of metadata schemas and matching processes by designing a matching tool called MetaSB Manager that applies B+Tree. This allows real-time integration of various data sources in a distributed environment, maximizing the flexibility and usability of data.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.