Fig. 1. Proposed network model
Fig. 2. Image upload and save keyword
Fig. 3. Search and find image that has keyword
Fig. 4. Image upload screen
Fig. 5. Image list screen
Fig. 6. Smart device application screen
Table 1. Google Cloud Vision API Feature
Table 2. Apache Cordova Plugin API Services
Table 3. USER table scheme
Table 4. IMAGE table scheme
Table 5. KEYWORD table scheme
Table 6. Image file processing time
참고문헌
- S. U. Kang & Y. S. Choi. (2014). Design of Open Collaboration Solution's Server for Smart Work. Journal of the Institute of Electronics and Information Engineers, 51(7). 133-141. https://doi.org/10.5573/ieie.2014.51.7.133
- J. S. Kim & K. S. Han. (2016). The key technology factors of Smart work and the situations in Korea and overseas. The Korea Contents Association Review 14(1), 14-20. https://doi.org/10.20924/CCTHBL.2016.14.1.014
- S. E. Yoo & S. Y. Lee. (2013). An Analysis on Types of Smart Workplace and its Planning Strategies. Journal of Korea Design Knowledge, 25, 279-288. https://doi.org/10.17246/jkdk.2013..25.027
- S. H. Lee, H. J. Jun & T. S. Kim. (2018). A Study on Cyber Security Risk Management for Diffusion of Korean Smart Factories. The Journal of Korean Institute of Communications and Information Sciences, 43(10). 1741-1750. https://doi.org/10.7840/kics.2018.43.10.1741
- S. H. Paik, S. K. Kim & H. B. Park. (2010). Design and Implementation of Network Access Control for Security of Company Network, The Institute of Electronics Engineers of Korea - Telecommunications, 47(12), 90-96.
- W. R. Jeon, J. Y. Kim, Y. S. Lee & D. H. Won. (2011). Analysis of Threats and Countermeasures on Mobile Smartphone, Journal of the Korea Society of Computer and Information, 16(2), 153-163. https://doi.org/10.9708/jksci.2011.16.2.153
- B. I. Kang & S. J. Kim. (2014). Study on Security Grade Classification of Financial Company Documents, Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1319-1328. https://doi.org/10.13089/JKIISC.2014.24.6.1319
- Y. J. Lee, Y. H. Jang & S. C. Park (2016). Design and Implementation of App Control System for Improving the Security of the Mobile Application, Journal of The Korea Contents Association, 16(2), 243-250. https://doi.org/10.5392/JKCA.2016.16.02.243
- J. H. Lee, D. H. Lee & H. K. Kim. (2012). Decision Support System to Detect Unauthorized Access in Smart Work Environment. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 797-808.
- C. Kwan. (2015). Rethinking of Situational Context and Characteristic of Industrial Secrets Leakage: Some National Security and Psychological Perspectives. The Korean Journal of Forensic Psychology, 6(1), 1-11.
- J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure, Journal of Korean Institute of Information Technology, 10(6), 133-143.
- K. S. Sung, D. Y. Oh, J. J. Kim, W. S. Na & H. S. Oh. (2008). Study on the Efficiency System Design for Minimize the Information Leak of the E-Document Store Service, The Journal of The Korean Institute of Communication Sciences, 33(10), 350-358.
- B. H. Kang. (2018). 5 Topics for Education and Research in Business Ethics. Journal of Digital Convergence, 16(8), 137-150. https://doi.org/10.14400/JDC.2018.16.8.137
- Google. (2018). Firebase Documentation. Firebase(Online). https://firebase.google.com/docs
- Apache Cordova. (2018). Apache Cordova Documentation. Apache Cordova Documentation(Online). https://cordova.apache.org/docs/en/latest