• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.029 seconds

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Implementation of Carpal Tunnel Syndrome Prevention System Using Arduino (Arduino를 활용한 손목 터널 증후군 예방 시스템 구현)

  • Hwang, Woo-Jin;Woo, Youn-Ho;Noh, Yun-Hong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.531-532
    • /
    • 2016
  • Carpal tunnel syndrome, carpal tunnel becomes part of a narrower median nerve pain occurs pressed. How a stable wrist stretch for the prevention of carpal tunnel syndrome is required, it should life guides to fit the user is provided. In this research, users themselves recognize the risk of carpal tunnel syndrome, to be able to stretch, it implements the application. Application, based on the usage time set by the user, executes the alarm and lock. At this time, the user may utilize arduino and inertia sensor, it is possible to wrist stretch, to analyze usage patterns, it is possible to provide a medical information and life guides to suit the user. Data using Bluetooth 4.0 communication has been to meet the runaway. In order to evaluate the mounted system, targeting four subjects, the time and the touch frequency of usage of the 3-day smartphone measured, as a result of the questionnaire, it reduces the frequency of use of smartphones, a positive it was possible to prove the effect.

  • PDF

Implementation of Yoga Posture Training Application Using Google ML Kit (Google ML Kit를 이용한 요가 자세 훈련 애플리케이션 구현)

  • Kim, Hyoung Min;Yoon, Jong Hyeon;Park, Su Hyun;Yu, Yun Seop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.178-180
    • /
    • 2022
  • An application implementation that allows users to train yoga posture based on the landmark of yoga posture of yoga instructors obtained from the Google Firebase ML Kit was introduced. Using the ML Kit, the user's posture is classified and landmarks corresponding to each joint are obtained. The accuracy measurement reference value for the yoga posture is set through the angle formed by the joints of the obtained landmark. The accuracy between the reference landmark for the yoga posture of professional yoga instructors and the landmark for the user's pose through the ML Kit was compared. According to the accuracy reference value, information on malfunction and correct motion is provided to the user through Text-to-Speech (TTS). Users are managed effectively with Firebase, and a system that displays the amount of exercise through a counter and timer when the user performs an exercise that meets the accuracy reference value was explained.

  • PDF

Vibrotactile Glove Mouse (진동촉각 글러브 마우스)

  • Park, Jun-Hyung;Jeong, Ju-Seok;Jang, Tae-Jeong
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, We introduce the glove mouse using a Gyroscope, acceleration sensor, Pin-type Viboratctile Display Device and USB HID. The device recognize a user's wrist by Gyroscope and acceleration sensor in the glove and transmit the data to USB dongle which is recognized the manufactured mouse by Blutooth. Also, using a special application, We transmit the tactile information to user through the Pin-type Vibrotactile Display. We implement wearable system in the glove except USB device. If user want to use general spatial mouse, we recognize mouse USB dongle only without another application. If user want to feel the tactile sensationn, we can use by connecting PC serial communication port to USB dongle.

  • PDF

The Targeting for Users Data Service of 3D-mesh contents (맞춤형 Targeting 3차윈 컨텐츠 Data 서비스)

  • Jung Jong-Jin;Lee Jong-Sul;Lim Tae-Bum;Lee Seok-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.83-86
    • /
    • 2003
  • With the opening of digital broadcast services and development of wire/wireless Internet, the current multimedia broadcasting is provided for has various services. The user will be provided lots of various content through the various channel and media. Content provider and consumer want the various service using content with the better quality which is fit to user preference. For transmitting this content in the limited transmission channel capacity, it needs to transmit the highly compressed content which user wants. The content of 3D mesh model-based on MPEG-4 enables the various content service that provides the lower capacity and the better quality, and Targeting service enables just provide the contents that user more wants and likes. The adaption of Java application program and 3D program can provide the content service utilizing 3D mesh model, so content provider and consumer can share the more information about the content. This paper has presented the study on the targeting service using compression of 3D mesh model-based on MPEG-4 and the adaptation of Java application program using it

  • PDF

Analysis on Interesting Element of Mobile Application Using User Reviews (사용자 리뷰를 이용한 모바일 어플리케이션의 관심 요소 분석)

  • Kim, Kyoung-Nam;Choi, Dong-Seong;Lee, Kang-Moo;Lee, Myoun-Jae
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.431-438
    • /
    • 2012
  • Recently, many mobile applications have been developed and published by increasing popularity of smart phone's market. However, a lack of research work is an issue for mobile applications' favoritism to users. In this paper, we have determined the acceptance factors on the existing smart phone applications in order to fit into mobile user's requirements. In addition, we have defined the modification of acceptance factors which are the interesting element of mobile applications, code users reviews of top 20 paid applications among android market applications, and analyse on what element can attract users' interest of mobile applications. As a result, we propose a development method of mobile applications based on the analyzed interesting elements. Our contribution is to provide useful information to mobile application companies for helping them to develop and publish successful mobile applications.

Design and Implementation of Job Training Management System by Considering Multi-Devices (다양한 디바이스를 고려한 직업훈련관리 시스템 설계 및 구현)

  • Kim, Ho-Jin;Kim, Chang-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.934-940
    • /
    • 2014
  • Recently, the emergence of a variety of devices to be able to access web have brought many technological changes in the field of web development. However some web sites are still operating with a focus on computers, especially exclusive and slow developing job training related web sites which utilize a User Interface that targets only PCs. In this paper, we propose the job training management system which has a menu configuration and functions to be applied to a variety of devices, and also an applicable technologies for training students to access more easily. Finally, we evaluated its efficiency by applying the implemented system in the actual field.

A Virtual Makeup Program Using Facial Feature Area Extraction Based on Active Shape Model and Modified Alpha Blending (ASM 기반의 얼굴 특징 영역 추출 및 변형된 알파 블렌딩을 이용한 가상 메이크업 프로그램)

  • Koo, Ja-Myoung;Cho, Tai-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1827-1835
    • /
    • 2010
  • In this paper, facial feature areas in user picture are created by facial feature points extracted by ASM(Active Shape Model). In a existing virtual make-up application, users manually select a few features that are exactly. Users are uncomfortable with this method. We propose a virtual makeup application using ASM that does not require user input. In order to express a natural makeup, the modified alpha blendings for each cosmetic are used to blend skin color with cosmetic color. The Virtual makeup application was implemented to apply Foundation, Blush, Lip Stick, Lip Liner, Eye Pencil, Eye Liner and Eye Shadow.

The analysis of Windows 7·8 IconCache.db and its application (Windows 7·8 IconCahe.db 파일 포맷 분석 및 활용방안)

  • Lee, Chan-Youn;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.135-144
    • /
    • 2014
  • Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis, "Iconcache.db" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.

Spatial Decision Support System for Residential Solar Energy Adoption

  • Ahmed O. Alzahrani;Hind Bitar;Abdulrahman Alzahrani;Khalaf O. Alsalem
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2023
  • Renewable energy is not a new terminology. One of the fastest growing renewable energies is solar energy. The implementation of solar energy provides several advantages including the reduction of some of the environmental risks of fossil fuel consumption. This research elaborated the importance of the adaption of solar energy by developing a spatial decision support system (SDSS), while the Residential Solar Energy Adoption (RSEA) is an instantiation artifact in the form of an SDSS. As a GIS web-based application, RSEA allows stakeholders (e.g., utility companies, policymakers, service providers homeowners, and researchers) to navigate through locations on a map interactively. The maps highlight locations with high and low solar energy adoption potential that enables decision-makers (e.g., policymakers, solar firms, utility companies, and nonprofit organizations) to make decisions. A combined qualitative and quantitative methodological approach was used to evaluate the application's usability and user experience, and results affirmed the ability of the factors of utility, usefulness, and a positive user experience of the residential solar energy adoption of spatial decision support system (RSEA-SDSS). RSEA-SDSS in improving the decision-making process for potential various stakeholders, in utility, solar installations, policy making, and non-profit renewable energy domains.