• Title/Summary/Keyword: 구글

Search Result 885, Processing Time 0.028 seconds

Evaluation on the Usability of Chatbot Intelligent Messenger Mobile Services -Focusing on Google(Allo) and Facebook(M messenger) (메신저 기반의 모바일 챗봇 서비스 사용자 경험 평가 -구글(Allo)과 페이스북(M messenger)을 중심으로-)

  • Kang, Hee Ju;Kim, Seung In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.271-276
    • /
    • 2017
  • This project has been conducted to improve the usability of Chatbot Services such as Google(Allo) and Facebook M(Messenger. Based on the evaluation, this study aims to suggest the solutions to improve the usability of domestic Chatbot services and future directions for their development. It provides the overall understanding of the AI Chatbot service and the feature of Chatbot service through literature search. Furthermore, we summarized the current standing and the prospect of domestic messenger-based assistant Chatbot services. For conducting user evaluation, Peter Morville's honeycomb model is applied to in-depth user interviews. The followings are elements that could be amended to improve the service. The service should be incorporated by intuitive elements for users' understanding its functions and eliminate any elements that interfere with usability. The accuracy should be increased to improve the user satisfaction. This research will provide the future guidelines to improve the usability of Chabot services through continuous evaluation by users.

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

방송통신사업자의 스마트미디어 전략에 대한 탐색적 연구: HTML5, 클라우드 컴퓨팅 등의 기술적 배경을 근간으로

  • Song, Min-Jeong
    • Broadcasting and Media Magazine
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2013
  • 다양한 스마트기기 간 및 앱(Application) 간 연동을 통한 스마트미디어 생태계 환경에서 애플(Apple), 구글(Google), 마이크로소프트(Microsoft) 등 SW(Software) 기반 OS(Operating System) 플랫폼들은 개별 체제 강화를 더욱 견고히 하고 있다. 생태계 내 타(他) 구성원들은 이들에 의한 제약이 더욱 심해지자, 웹 문서의 표준화(HTML5)나 클라우드 컴퓨팅(Cloud computing) 같은 개방화된 기술들을 환영한다. 실제로 최근 웹 애플리케이션(Web application) 개발과 개발자들의 OS 플랫폼 이탈은 이러한 변화의 단면을 보여주기 시작했다. 본 고는 SW 중심에서 서비스 중심으로 이동 중인 플랫폼 경쟁 환경에서 네트워크를 보유 중인 방송통신사업자들의 새로운 스마트미디어 전략 방향을 제시하는데 그 목적을 둔다. 이를 위해 두 가지 기술적 배경인 HTML5와 클라우드 컴퓨팅 기술들을 살펴본 후, 그 동안 SW 중심 플랫폼 경쟁 환경에서 주도권을 빼앗겼다고 깨달은 방송통신사업자가 취해야 할, 두 가지 새로운 기술적 환경에서의 스마트미디어 전략을 제시하였다. 분석 결과, HTML5가 모바일 분야의 핵심 기술이 될 전망이지만, 단기적으로는 여전히 미성숙 문제가 제기될 것으로 보이며, 기존 경쟁력을 유지하려는 OS 사업자들의 가치사슬 통합 전략이 가시화되고 있는 환경이 목격된다. 또한, 클라우드 서비스 제공도 이미 이들 OS사업자들의 기존 생태계 유지를 위한 핵심 툴로 이미 활용되기 시작했다. 그럼에도 불구하고 HTML5와 클라우드 컴퓨팅은 방송통신사업자들에게 생태계 주도권을 탈환할 수 있는 중요한 기술로 인식되고 있다. 따라서 본 연구에서는 이를 기반으로 세 가지 이용자 경험인 '경계 없는', '동질적인', '끊김 없는' 이용자 경험(User Experience) 제공을 위해 노력하는 선도적인 사례 탐색이 시도되었으며, 이를 통해 방송통신사업자들의 미래 스마트미디어 전략 방향이 도출되었다. '경계 없는' 서비스에서는 구글, 애플 외의 멀티OS 전략과 기존 OS의 앱 서비스 대항마인 아마존(Amazon), 페이스북(Facebook) 등과의 적극적 서비스 제휴, '동질적인' 서비스에서는 클라우드 기반 주요 콘텐츠 플랫폼 제휴와 방송통신 가입자 기반의 All-IP기반으로의 확대, 마지막으로 '끊김 없는' 서비스에서는 SNS, LBS, 가상현실 등과의 매쉬업(Mash-up)과 의료, 금융 등과의 융합서비스 개발을 통한 스마트홈 전략 추진, 인증 및 결제시스템의 개방화 등이 제시되었다.

Trend Analysis of Malwares in Social Information Based Android Market (소셜 기반 안드로이드 마켓에서 악성 앱 경향성 분석)

  • Oh, Hayoung;Goo, EunHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1491-1498
    • /
    • 2017
  • As the use of smartphones and the launch of various apps have increased rapidly, the number of malicious apps has also increased, and the damage is continuing. The Google Market where Android apps are registered is inevitably present at the same time as normal apps and malicious apps even though there are regulations for app registration. Especially, as social networks are activated, users are connected with social networks, and the ratings, downloads and awareness information are reflected in the number of downloaded apps. As a result, when users choose their apps by simply reflecting ratings, popularity, popular comments, and highly-categorized apps, malicious app downloads can sometimes cause significant harm. Therefore, this study first analyzed the tendency of malicious apps by directly crawling and analyzing long-term social information in the currently active Android market.

An Analysis on Current Research Funding and Open Access Status for Science and Technology Articles Published by S University Faculties (이공계 학술논문의 연구비 지원 및 오픈액세스 현황 분석:S대를 중심으로)

  • Shin, Eun-Ja
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.1-21
    • /
    • 2010
  • To identify current status of research funding and open access, this study analyzed the data available in science and technology articles had been published by S university's faculty members. The study showed that 71% of the articles funded by their universities or other research sponsors, whereas very few of articles have been self-archived for open access. So, government-sponsored research outputs could not be found in search engine Google Scholar. In developed countries, researchers who have received grants by the public or private sponsors should not only publish articles on scholarly journals but also deposit their digital research outputs in the repositories. Therefore, it is advisable for Korea research sponsors to strengthen and carry out open access mandate related laws. It is very important for universities as well as for their faculties that published articles' impact can be maximized by enabling open access. So, universities may as well construct their repositories and collect the contents with enthusiasm.

Investigating the Status of Mine Hazards in North Korea Using Satellite Pictures (위성사진을 활용한 북한 지역 광산의 광해 현황 연구)

  • Yoon, Sungmoon;Jang, Hangsuk;Yun, Seong-Taek;Kim, Duk-Min
    • Journal of the Korean Society of Mineral and Energy Resources Engineers
    • /
    • v.55 no.6
    • /
    • pp.564-575
    • /
    • 2018
  • Recently, the possibility of promoting inter-Korean economic cooperation is increasing because the tension between South and North Korea is being reduced. Consequently, the interest in North Korea's mine development projects is growing as one of the aspects of inter-Korean economic cooperation. In the promotion of cooperation in mining development, mine hazard risk management should be considered. However, there is a lack of information pertaining to mine hazards in North Korea. To this end, this study was performed to determine the status of mining-related hazards in 12 mines in North Korea by using the image analysis feature of Google Earth. From the results obtained, we observed some mining-related hazards such as tailing dam failures, yellow boy phenomenon, and land subsidence.

LMS-based Edutech Teaching and Learning Platform Model Design Study (LMS 기반 에듀테크 교수학습 플랫폼 모형 설계 연구)

  • Yoon, Seung­-Bae;Yang, Seung Hyuk;Park, Hyunsoon
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.29-38
    • /
    • 2021
  • Purpose: This is a study to design an optimal Edutech teaching-learning platform model that can be linked with various types of LMS to activate e-learning. Methods: For this purpose, the contents of e-learning systems that can be used in the 4th industrial technology of cyber universities and general universities were cross-sectionally analyzed. Results: Cyber universities relied entirely on LMS, and general universities supplemented and utilized different Edutech methods for each professor such as Google Classroom, Zoom video communication, and YouTube in addition to LMS. It was considered that it would be meaningful to provide a minimal algorithm mapping to LMS to share metadata such as Google and YouTube for the Edutech teaching and learning platform model. Conclusion: Therefore, this study is expected to contribute to the improvement of teaching methods and academic achievement through the LMS-based Edutech teaching and learning platform model.

A Study on Naver and Google's Eventful Brand Experience Design (네이버와 구글의 이벤트성 브랜드 경험 디자인에 관한 연구)

  • Jeong, Yeong-Gyeong;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.355-361
    • /
    • 2019
  • The purpose of this study is to analyze how brands are perceived to be most positive when they are presented to users in brand experience design, and to help them communicate more effectively. Originally, brands changed their logos periodically with the aim of communicating anniversaries. These days, not only this information but also emotional communication with users. As a research method, two major portal sites were selected for use in Korea, and a preference survey and in-depth interview were conducted based on the case of the event logos. From the results of the study, we were able to obtain results that the event logos act as a more positive factor when they provide users with various emotional motivations. In the future, we anticipate that users will be given higher value if they have a design approach that will elicit more diverse emotions from the brand experience.

Implementation of a Classification System for Dog Behaviors using YOLI-based Object Detection and a Node.js Server (YOLO 기반 개체 검출과 Node.js 서버를 이용한 반려견 행동 분류 시스템 구현)

  • Jo, Yong-Hwa;Lee, Hyuek-Jae;Kim, Young-Hun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • This paper implements a method of extracting an object about a dog through real-time image analysis and classifying dog behaviors from the extracted images. The Darknet YOLO was used to detect dog objects, and the Teachable Machine provided by Google was used to classify behavior patterns from the extracted images. The trained Teachable Machine is saved in Google Drive and can be used by ml5.js implemented on a node.js server. By implementing an interactive web server using a socket.io module on the node.js server, the classified results are transmitted to the user's smart phone or PC in real time so that it can be checked anytime, anywhere.

The Detection of Android Malicious Apps Using Categories and Permissions (카테고리와 권한을 이용한 안드로이드 악성 앱 탐지)

  • Park, Jong-Chan;Baik, Namkyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.907-913
    • /
    • 2022
  • Approximately 70% of smartphone users around the world use Android operating system-based smartphones, and malicious apps targeting these Android platforms are constantly increasing. Google has provided "Google Play Protect" to respond to the increasing number of Android targeted malware, preventing malicious apps from being installed on smartphones, but many malicious apps are still normal. It threatens the smartphones of ordinary users registered in the Google Play store by disguising themselves as apps. However, most people rely on antivirus programs to detect malicious apps because the average user needs a great deal of expertise to check for malicious apps. Therefore, in this paper, we propose a method to classify unnecessary malicious permissions of apps by using only the categories and permissions that can be easily confirmed by the app, and to easily detect malicious apps through the classified permissions. The proposed method is compared and analyzed from the viewpoint of undiscovered rate and false positives with the "commercial malicious application detection program", and the performance level is presented.