• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.029 seconds

Development of a Customer Management Application and a Mobile Advertisement Model based on PUSH Technology (PUSH 기술 기반 모바일 광고 모델 및 고객관리 앱 개발)

  • Yang, Gi-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.193-199
    • /
    • 2015
  • PUSH technology is a technology that can transfer server information without user's request and it is very useful in various areas along with mobile applications. This paper suggest a suitable application model that can utilizes the PUSH technology and mobile devices by finding a useful area. For this, AdMan, a mobile application which can utilize the PUSH technology and mobile devices has been developed. AdMan is a mobile application that developed once and can be able to run on both Android and iOS based mobile devices, since it was developed by using a tool called m-Bizmaker. AdMan is a customer management and advertisement system that can bring big efficiency by utilizing the PUSH technology and mobile application under the today's mobile environment, and it is a good model of ICT technology application of modern society. As an application that can maximize the utilization of the PUSH technology and mobile devices, AdMan can realize better effectiveness if it run on a PUSH server.

Assessment for Overseas Construction Information Classification Using Collaborative Filtering (협력적 필터링을 통한 건설정보 분류체계의 적정성 평가)

  • Choi, Wonyoung;Choi, Sangmin;Kwak, Seing-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.361-372
    • /
    • 2019
  • The Overseas Construction Engineering Information System (OVICE), which is operated by the Korea Institute of Construction Technology, uses the Overseas Construction Information Service classification system to service information required for overseas construction of domestic construction engineering companies. In this study, through the application of the recommendation system using collaborative filtering, identifying the relationship between the subjects for real users, verifying the adequacy of the overseas construction information classification system currently in service. Through this, I would like to propose an information service classification system that reflects actual user demand.

A New Class-Based Traffic Queue Management Algorithm in the Internet

  • Zhu, Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.575-596
    • /
    • 2009
  • Facing limited network resources such as bandwidth and processing capability, the Internet will have congestion from time to time. In this paper, we propose a scheme to maximize the total utility offered by the network to the end user during congested times. We believe the only way to achieve our goal is to make the scheme application-aware, that is, to take advantage of the characteristics of the application. To make our scheme scalable, it is designed to be class-based. Traffic from applications with similar characteristics is classified into the same class. We adopted the RED queue management mechanism to adaptively control the traffic belonging to the same class. To achieve the optimal utility, the traffic belonging to different classes should be controlled differently. By adjusting link bandwidth assignments of different classes, the scheme can achieve the goal and adapt to the changes of dynamical incoming traffic. We use the control theoretical approach to analyze our scheme. In this paper, we focus on optimizing the control on two types of traffic flows: TCP and Simple UDP (SUDP, modeling audio or video applications based on UDP). We derive the differential equations to model the dynamics of SUDP traffic flows and drive stability conditions for the system with both SUDP and TCP traffic flows. In our study, we also find analytical results on the TCP traffic stable point are not accurate, so we derived new formulas on the TCP traffic stable point. We verified the proposed scheme with extensive NS2 simulations.

IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration

  • Kum, Seung Woo;Kang, Mingoo;Park, Jong-Il
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3958-3971
    • /
    • 2016
  • With Internet of Things (IoT) technology, home environment becomes smarter than ever. Not only smart devices such as smart phone or smart TV, but also various IoT devices including sensor, smart thermostat, and smart scale has now become very common on the market. These devices have connectivity to the Internet, so that user can read data from the device or control the device using Internet technology. However, due to diversity of smart home requirements, device collaboration in smart home remains a challenging task still. Usually smart home is built with various technologies to fulfill its own purpose, and these purposes cover very wide area from controlling low-power sensor devices to controlling high-performance devices like smart TV and smart phone. This variety of smart home requirements makes smart home very complicated due to mixed network architecture, protocol and technology. In this paper, a framework to enable managing and collaborating heterogeneous IoT devices in smart home environment is proposed. Several programming models are defined in the proposed framework to make application development for heterogeneous devices more intuitive. The proposed framework has been implemented as a web service, and a case study with real-world smart home IoT devices is presented.

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution

  • Singh, Manmeet Mahinderjit;Ng, Ping Jie;Ya, Kar Ming;Husin, Mohd Heikal;Malim, Nurul Hashimah Ahamed Hassain
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.559-572
    • /
    • 2017
  • Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.

Response Time Simulation for 2-tier and 3-tier C/S System (2-계층과 3-계층 C/S 시스템의 응답시간 시뮬레이션)

  • Kim Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.45-53
    • /
    • 2004
  • The fact that the end-user response time could become unacceptable in the 2-tier C/S system has been well known to C/S system developers. But inexperienced new developers who want to provide mobile solutions using PDA sometimes do not realize the ominous consequences of the 2-tier C/S systems. Except for the easy of development. the 2-tier C/S system has many weak points like in application deployment, security, scalability, application reuse, heterogeneous DBMS support, availability. and response time. This paper analyzes the response time in the 2-tier and 3-tier C/S systems through simulation. Although the problem space is confined to the 2 and 3 tiers, the result could be equally applied to any multi-tier systems.

  • PDF

DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application (DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구)

  • Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.169-176
    • /
    • 2016
  • Android platform is designed to be user-friendly, yet sometimes its convenience introduces vulnerabilities that normal users cannot justify. In this paper, after making an overview of popular open source analysis tools for android applications, we point out the dangerous use of Permission Group in current Google Policy, and suggest a technique to mitigate the risks of privilege escalation that attackers are taking advantage of. By conducting the investigation of 21,064 malware samples, we conclude that the proposed technique is considered effective in detecting insecure application update, as well as giving users the heads-up in security awareness.

A Study on the Design of Automatic Billing Information Systems for Long-Term Home Care Services Business Using iBeacon (iBeacon을 활용하는 장기요양 재가 서비스 업무를 위한 자동청구 정보시스템의 설계에 관한 연구)

  • Jung, Sung Hwa;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.612-619
    • /
    • 2016
  • Applying evolved IT technology to increase the satisfaction of the consumer is a typical feature of the rapidly transformed service industry. Smart devices have taken a place as the mainstream of major media, moreover, IT service strategies utilizing smart devices have been constantly developed. Location recognition method of users has been proposed as one of the significant features to the IT service industry. The long-term care home services can be one example of user location recognition methods that real time computerization of service record utilize an attached tag to home of pensioners with RFID reader or an NFC function of mobile when a home carer provides service. And, the Homecare Electronics Management System (HEMS) and the various location recognition methods will be discussed to improve effectiveness of services. In this paper, we propose a home applicable electronic management system which insurer, home care service facilities, home cares, pensioners and guardians which enables to simultaneously check service records based on the improved system by use of iBeacon.

Development of a Sales Support Application Based on E-Business Cards (전자명함 기반의 영업지원 앱 개발)

  • Byun, Dae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.464-471
    • /
    • 2018
  • The business card is regarded as the simplest means as well as a tool the most likely to use as a means of sales. Every day, we are exchanging business cards with many customers, but the paper based business card is easy to discard and difficult for searching information on the business card. As a solution, if we take a photographed business card with a smart phone and make it into a database, we can easily obtain customer information we wanted for sales at any time. In this study, we develop an application solution based on electronic business card database that supports sales management. The system operates in a cloud environment and has various decision support functions such as customer's human network management, customer classification, and finding prospective customers.

Mobile App Service of Disaster and Safety Accident Response Scenario (재난·안전 사고 대응 시나리오 모바일 앱 서비스)

  • Kim, Ki-Hwan;Song, Joon-Hyuk;Jungil, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.254-257
    • /
    • 2018
  • In this paper, we implement the mobile application for disaster and safety accident response that can be easily accessed through smart phones to prevent the loss of life and poor awareness of safety to the increased number of disasters and accidents. A few of related mobile applications for accident response are served, and the most of them have the manual interfaces. In this paper, we implement the mobile application for scenario of the disaster such as earthquake and safety accident that can occur in daily life. It is organized in a form of a clear action option with user-friendly visual characters and can be used regardless of age group.

  • PDF