• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

Characteristics of Smartphone User in Application Usage and Implications for Applications Business Model (스마트폰 사용자들의 앱 이용 특성과 앱 비즈니스 모델에의 시사)

  • Yun, Hyung Bo;Wang, Boram;Park, Jiyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.32-42
    • /
    • 2013
  • As the smartphone market grows, the needs for its new business model are also increased. However, most previous researches on smartphone applications focused on Technology Acceptance Model(TAM) and Rogers' Diffusion of Innovation Theory so that there was lack of researches on characteristics for actual smartphone users. In this research, we divided the smartphone applications into five category functions (Call & Text/Music & Video/Information Search/Game/Social Network Service (SNS)). We analyzed characteristic differences of users who used the each application category and found that the differences were statistically significant in both demographic and smartphone usage characteristics (frequency of downloading applications, and download experience of paid applications). Additionally, the smartphone usage characteristic is closely related to the usage duration. The representative result is that the characteristics of people used Music & Video function actively were women in their 20s who downloaded applications more than three times per week, and had a download experience of paid applications. It is positive result for players in the application markets, because it means the users are willing to pay for downloading the paid applications. However, large companies already occupied most of the market share in music applications so that small and medium-sized players should develop an innovative and distinguishable business model in order to success. We believe this research result would provide significant implications for the players in planning the successful business model and developing an user-specific application product.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

Online Monitoring System based notifications on Mobile devices with Kinect V2 (키넥트와 모바일 장치 알림 기반 온라인 모니터링 시스템)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1183-1188
    • /
    • 2016
  • Kinect sensor version 2 is a kind of camera released by Microsoft as a computer vision and a natural user interface for game consoles like Xbox one. It allows acquiring color images, depth images, audio input and skeletal data with a high frame rate. In this paper, using depth image, we present a surveillance system of a certain area within Kinect's field of view. With computer vision library(Emgu CV), if an object is detected in the target area, it is tracked and kinect camera takes RGB image to send it in database server. Therefore, a mobile application on android platform was developed in order to notify the user that Kinect has sensed strange motion in the target region and display the RGB image of the scene. User gets the notification in real-time to react in the best way in the case of valuable things in monitored area or other cases related to a reserved zone.

The open API for reconfiguration in 4G network (4G network에서 재구성성을 위한 개방형 API)

  • Hong Sung-June;Lee Young-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.219-226
    • /
    • 2005
  • This paper describes the open API with integration of semantic web service with PARLAY X based open API in 4G mobile network. It can be expected that the intelligence such as the context-awareness, adaptation and personalization in 4G mobile network will be deployed. But the existing PARLAY based network lacks in considering context-awareness, adaptation and personalization. Therefore, the object of this paper is to support the architecture and the Application Programming Interface (API) of the network service for the context-awareness, adaptation and Personalization in 4G mobile network The open API is to provide users with the adaptive network service to the changing context constraints as well as detecting the changing context and user's Preference. For instance, the open API can Provide users with QoS in network according to the detected context and user's preference, after detecting the context such as location and speed and user's preference.

  • PDF

Proposal of Traffic Management Strategy between Hierarchical Mobile-WiMAX/WLAN Networks (계층적 Mobile-WiMAX/WLAN 네트워크에서의 트래픽 관리 전략에 관한 연구연구)

  • Moon, Tae-Wook;Kim, Moon;Cho, Sung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.153-160
    • /
    • 2009
  • A hierarchical network between Mobile-WiMAX and WLAN systems is to make it possible to utilize wireless internet services including time sensitive applications such as VoIP, VOD, visual telephony etc. During the process of vertical handoff decision from Mobile-WiMAX to WLAN hotspot, vertical handoff delay causes user dissatisfaction because it doesn't provide the seamless wireless internet service. We make use of type of service (ToS) parameters in IEEE 802.16e specification as the criterion parameter of vertical handoff decision process in hierarchical Mobile-WiMAX/WLAN networks. In this paper, we propose the process of vertical handoff decision for seamless wireless internet service which is sensitive to time delay. If type of service is time sensitive application, the decision of vertical handoff is withdrawn until the service is terminated. In focus on user satisfaction, if the proposed traffic management strategy in hierarchical Mobile-WiMAX/WLAN networks is used, user will utilize seamless wireless internet services including time sensitive applications.

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

Efficient and Scalable Overlay Multicast Mechanism for Real-time Tree Construction (효율적이고 확장성 있는 실시간 트리 구성을 위한 오버레이 멀티캐스트 메커니즘)

  • Nam, Yun-Seung;Im, Dong-Gee;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1399-1406
    • /
    • 2009
  • In the internet broadcast, efficient and scalable mechanism of multicast is needed for the communication between groups. Furthermore, Optimization of the multicast tree is required to improve the performance of overlay multicast. This optimization is well-known as NP-complete. If a node in the tree has limited out-degree, a user who wants to join the group has to find parent user who has already joined. In this paper, the users who want to join the group need to setup their level using delay test from source node. And then new users can find candidate parent nodes effectively using ACK-SEND approach and take proper position by comparing level. The closer node of the user to root node should be located in lower level. Also, even if a barrier is caused, fast recovery will be guaranteed using ACK-SEND approach. Through this, the newcomer node can fine their location in the multicast tree and join the group fast and effectively.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

A Study on the User Context Awareness based on the Smart Phone (스마트 폰 기반의 사용자 상황인지 플랫폼에 관한 연구)

  • Kim, Kee-Baek;Jang, Won-Seok;Choi, Jae-Wan;Lim, Chul-Su;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.109-119
    • /
    • 2012
  • As it is developing and growing up the mobile telecommunication, commercial mobile, and the application on it, the smart phone is attracting public attention techniques, hereafter. In this paper, we can make the context-awareness platform to supply users with the interface for their appropriate contexts using the smart phone. Therefore, we use the sensors in the smart phone, and the values from them are analyzed. As a result, we can estimate the user's contexts, such as the sitting and standing, movement, the lights, positions, locations, etc. In addition, we happen the suitable events from them for users. Therefore, we can provide the perspective interfaces for them. In addition, to prove the more efficiency of the proposed platform, we implemented the shooting game, and could know that the performance is the more advanced than the others. The proposed algorithm can be used for the mobile environments, which high efficiency is required such as the game, or the implementation of mobile applications which are more efficient to the user interfaces, etc.

A Co-Development Environment for Visual Programs (시각 프로그램을 위한 공동 개발 환경)

  • Cho Yong Yoon;Yoo Chae Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.125-132
    • /
    • 2005
  • Visual programs consist of user interfaces and process logics. Because most visual IDEs(Integrated Development Environment) are utilized by only one developer, many developers can't cooperate simultaneously in one large-scaled visual Program to promote the development efficiency. This paper suggests a co-development environment for visual programs through which developers can cooperate with each other in the type of distribution. Developers can maintain the coincidence and the confidence of cooperation through a communication window and a job controller to process the Priority of the events that developers make in co-development work. Especially in large-sealed visual Program, the suggested environment reduces the burden that developer takes about the heavy development work, and many developers can divide and take the complex and large program modules according to their ability. We hope that the suggested environment can improve the development productivity and effectivity because it can reduce the time and effort for developing user interfaces in visual programs.

  • PDF