• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

Mobile Malicious code Trends and Consideration (모바일 악성 코드 현황 및 대책)

  • Choi, A-bin;Ryu, Su-mi;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.671-674
    • /
    • 2013
  • Recently, as application that support a various functions is developing, through the smart phones penetration rate and applications market is increasing quickly, the user has been growing rapidly. An important data is stored in the smart phone because smart phone is closely connected to real life. Due to the malicious code caused by abuse with diversity purpose, the safety of the smart phone is being threatened.Accordingly in this paper, we will grasp about malicious code such as incidence, cause and attack type. Through this, it will be considered that problems is caused by malicious code each mobile OS spreaded lately.

  • PDF

Application of the Internet GIS on Rice Pest Information (인터넷 GIS를 이용한 벼 병해충 정보제공에 관한 연구)

  • 조정호;심정민;윤홍식
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.4
    • /
    • pp.383-391
    • /
    • 1999
  • This paper describe the interpretation of population density of rice pest in 1998 all over the country using GIS technique and the development of Internet GIS for sharing and analyzing information through Internee. Due to the widespread availability of computer network, GIS solution is available to users on your Internet via the web. Through Internet Rice Pest Information System developed visually the related information of rice pest all over the country and also interactive communication with the web interface concerning the existing system which provides simply static map, texts and numerical statement on the internet, the advantages of developed system are visually information, dynamic map, easy user interface and interactive map through the internet. This system provide more effective method of rice pest data to client.

  • PDF

Efficient User Interface on Smartphone Application using ART2 Algorithm (ART2 알고리즘을 이용한 스마트폰 어플리케이션에서의 효율적인 사용자 인터페이스)

  • Kim, Jae-Yong;Woo, Young-Woon;Yoon, Seok-Hyun;Kim, Kwang-Baek
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.421-423
    • /
    • 2010
  • 본 논문에서는 ART2 알고리즘을 이용하여 잠금 상태에서 스마트폰의 어플리케이션을 쉽고 빠르게 구동하기 위한 방법을 제안한다. 자신이 원하는 그림과 설치되어 있는 어플리케이션과의 대응 테이블을 만들기 위하여 학습 어플리케이션을 실행한다. 학습 어플리케이션의 동작 순서는 어플리케이션 실행 후 화면 하단에서 빠른 실행을 하고자 하는 어플리케이션을 선택하고 좌측상단에 위치하고 있는 입력 부분에 그림을 그린 후, 학습 버튼을 클릭한다. 그려진 그림의 배경은 0으로 그림은 1로 변환하고 ART2의 입력으로 사용할 수 있도록 일정한 크기로 정규화한다. 정규화 된 데이터를 팽창 연산을 통하여 학습에 용이하도록 최외각 픽셀을 확장하여 ART2의 입력 데이터로 적용한다. 학습이 끝난 후, 잠금 상태에서 액정 윗부분에 학습된 것과 같은 모양의 그림을 그리면 해당 어플리케이션이 실행된다. 제안된 방법은 기존의 방식인 잠금 해제 후, 어플리케이션을 탐색하고, 해당 어플리케이션을 실행하는 3 단계로 된 방식을 1 단계로 줄이기 때문에 원하는 어플리케이션을 실행하는데 시간이 적게 소요되는 장점이 있다.

  • PDF

A Method for Efficient Structure Management and Evaluation of Website (웹사이트의 효율적인 구조 관리와 평가 방법)

  • 유대승;엄정섭;이명재
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.306-315
    • /
    • 2002
  • With the rapid growth of WWW, the existing systems are integrated into web and various web-based systems are developed. Unlike the general applications, web aplications are developed by combining the various technologies and have their own complexities. So, we have much difficulties in the development and maintenance of web applications. To accommodate to the rapidly changing business environments and user requirements, the continuos evolution is required. In this paper, we present a method for supporting the effective development and maintenance of web applications. Our method involves the extraction of web application's structure information and analyzes web log ales containing the useful information about web site. We also describe a web testing method using the attracted information and our system developed for extracting hyperlink information and analyzing web log.

  • PDF

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Location Based Routing Service In Distributed Web Environment

  • Kim, Do-Hyun;Jang, Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.340-342
    • /
    • 2003
  • Location based services based on positions of moving objects are expanding the business area gradually. The location is included all estimate position of the future as well as the position of the present and the past. Location based routing service is active business application in which the position information of moving objects is applied efficiently. This service includes the trajectory of past positions, the real-time tracing of present position of special moving objects, and the shortest and optimized paths combined with map information. In this paper, we describes the location based routing services is extend in distributed web GIS environment. Web GIS service systems provide the various GIS services of analyzing and displaying the spatial data with friendly user - interface. That is, we propose the efficient architecture and technologies for servicing the location based routing services in distributed web GIS environment. The position of moving objects is acquired by GPS (Global Positioning System) and converted the coordinate of real world by map matching with geometric information. We suppose the swapping method between main memory and storages to access the quite a number of moving objects. And, the result of location based routing services is wrapped the web-styled data format. We design the schema based on the GML. We design these services as components were developed in object-oriented computing environment, and provide the interoperability, language-independent, easy developing environment as well as re - usability.

  • PDF

A Grading System of Word Processor Practical Skill Using HWPML (HWPML을 이용한 워드프로세서 실기 채점 시스템)

  • Ha, Jin-Seok;Jin, Min
    • Journal of The Korean Association of Information Education
    • /
    • v.7 no.1
    • /
    • pp.37-47
    • /
    • 2003
  • A grading system of practical word processor skills is designed and implemented by using HWPML(Hangul Word Processor Markup Language) which is a product of Hangul and Computer Co Ltd. By using HWPML, which is a markup tag structure of Hangul file, Hangul files can be edited in other application programs. Authorized users can make questions. However, only the manager is allowed to register answers to the questions in order to maintain the correctness of grading. The result of test is stored in the database and the statistics on pass or failure can be shown interactively. The number of taking test and scores for each user are stored in the database and they can be accessed to whenever the user wants them. Comments on the test results are provided by the manager so that learners can intensity their weak points.

  • PDF

A Study on User Authentication of Mobile Internet Environment Based on WPKI - (무선 인터넷 환경의 WPKI 기반 사용자 인증에 관한 연구)

  • Lee, Cheol-Seung;Park, Young-Ok;Lee, Ho-Young;Lee, Jeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.560-563
    • /
    • 2003
  • In this paper describes for use Authentication with the WPKI and Kerberos protocol. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key-based structure and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 with using WIM for complement an authentication protocol Kerberos and its disadvantages.

  • PDF

Software Teaching.Learning Strategy for Improvement of Software Adaptability (SW 적응력 향상을 위한 SW 교수.학습 전략)

  • Yoo, In-Hwan;Koo, Duk-Hoi
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.4
    • /
    • pp.501-510
    • /
    • 2004
  • The activation of the latest ICT(Information and Communication Technology)education has been putting more importance on the education of the application SW(software). By the way, the geometric progression of knowledge and the fast development of computer technology have continuously created new SW. Accordingly, the previous traditional SW learning paradigm runs into various problems. This study starts from the recognition of such problems. In this study, the SW adaptability is defined as the ability that learners can efficiently find and apply the suitable functions of SW to those problems in the problematic circumstances as well as promote retention and metastasis. With these premises, this paper makes an inquiry into the teaching-learning method. Besides, This paper explores the SW usability and the principles of UI(User Interface) design and deduces the SW learning strategy. Furthermore, it probes problems of the SW teaching-learning of the demonstration practice method and proposes the inquiring master for SW adaptability teaching-learning model.

  • PDF

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.