• Title/Summary/Keyword: 모바일소프트웨어

Search Result 770, Processing Time 0.027 seconds

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Development of Mental Health Self-Care App for University Student (대학생을 위한 정신건강 자가관리 어플리케이션 개발)

  • Kang, Gwang-Soon;Roh, Sun-Sik
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.1
    • /
    • pp.25-34
    • /
    • 2019
  • The purpose of this study is to develop a mobile app for mental health self care of university student. User centered design is a research design that applies the subject's needs assessment, analysis, design, development, evaluation, modification and supplement to suit the subjects. In order to manage the mental health of university students, they consisted of four main areas of mental health problems: drinking, sleeping, depression, and stress. It is designed to enable self test content, analysis and notification of inspection results, and management plan for current status of each area. Based on this, I developed an Android based mental health self-care Application. The subject can enter his or her mental health status data to explain the normal or risk level for each result, and the subject can then select the appropriate intervention method that he or she can perform. In addition, we developed a mental health self care calendar that can display the present status of each of the four areas on a day by day basis, and the current status can be expressed in an integrated manner through animations and status bars. The purpose of this study was to develop a mental health self-care app that can be improved by continuous and improved programs.

A study on the Revitalization of Traditional Market with Smart Platform (스마트 플랫폼을 이용한 전통시장 활성화 방안 연구)

  • Park, Jung Ho;Choi, EunYoung
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.127-143
    • /
    • 2023
  • Currently, the domestic traditional market has not escaped the swamp of stagnation that began in the early 2000s despite various projects promoted by many related players such as the central government and local governments. In order to overcome the crisis faced by the traditional market, various R&Ds have recently been conducted on how to build a smart traditional market that combines information and communication technologies such as big data analysis, artificial intelligence, and the Internet of Things. This study analyzes various previous studies, users of traditional markets, and application cases of ICT technology in foreign traditional markets since 2012 and proposes a model to build a smart traditional market using ICT technology based on the analysis. The model proposed in this study includes building a traditional market metaverse that can interact with visitors, certifying visits to traditional markets through digital signage with NFC technology, improving accuracy of fire detection functions using IoT and AI technology, developing smartphone apps for market launch information and event notification, and an e-commerce system. If a smart traditional market platform is implemented and operated based on the smart traditional market platform model presented in this study, it will not only draw interest in the traditional market to MZ generation and foreigners, but also contribute to revitalizing the traditional market in the future.

Study on the development of automatic translation service system for Korean astronomical classics by artificial intelligence - Focused on system analysis and design step (천문 고문헌 특화 인공지능 자동번역 서비스 시스템 개발 연구 - 시스템 요구사항 분석 및 설계 위주)

  • Seo, Yoon Kyung;Kim, Sang Hyuk;Ahn, Young Sook;Choi, Go-Eun;Choi, Young Sil;Baik, Hangi;Sun, Bo Min;Kim, Hyun Jin;Lee, Sahng Woon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.2
    • /
    • pp.62.2-62.2
    • /
    • 2019
  • 한국의 고천문 자료는 삼국시대 이후 근대 조선까지 다수가 존재하여 세계적으로 드문 기록 문화를 보유하고 있으나, 한문 번역이 많이 이루어지지 않아 학술적 활용이 활발하지 못한 상태이다. 고문헌의 한문 문장 번역은 전문인력의 수작업에 의존하는 만큼 소요 시간이 길기에 투자대비 효율성이 떨어지는 편이다. 이에 최근 여러 분야에서 응용되는 인공지능의 적용을 대안으로 삼을 수 있으며, 초벌 번역 수준일지라도 자동번역기의 개발은 유용한 학술도구가 될 수 있다. 한국천문연구원은 한국정보화진흥원이 주관하는 2019년도 Information and Communication Technology 기반 공공서비스 촉진사업에 한국고전번역원과 공동 참여하여 인공신경망 기계학습이 적용된 고문헌 자동번역모델을 개발하고자 한다. 이 연구는 고천문 도메인에 특화된 인공지능 기계학습 기법으로 자동번역모델을 개발하여 이를 서비스하는 것을 목적으로 한다. 연구 방법은 크게 4가지 개발을 진행하는 것으로 나누어 볼 수 있다. 첫째, 인공지능의 학습 데이터에 해당되는 '코퍼스'를 구축하는 것이다. 이는 고문헌의 한자 원문과 한글 번역문이 쌍을 이루도록 만들어 줌으로써 학습에 최적화한 데이터를 최소 6만 개 이상 추출하는 것이다. 둘째, 추출된 학습 데이터 코퍼스를 다양한 인공지능 기계학습 기법에 적용하여 천문 분야 특수고전 도메인에 특화된 자동번역 모델을 생성하는 것이다. 셋째, 클라우드 기반에서 참여 기관별로 소장한 고문헌을 자동 번역 모델에 기반하여 도메인 특화된 모델로 도출 및 활용할 수 있는 대기관 서비스 플랫폼 구축이다. 넷째, 개발된 자동 번역기의 대국민 개방을 위해 웹과 모바일 메신저를 통해 자동 번역 서비스를 클라우드 기반으로 구축하는 것이다. 이 연구는 시스템 요구사항 분석과 정의를 바탕으로 설계가 진행 또는 일부 완료되어 구현 중에 있다. 추후 이 연구의 성능 평가는 자동번역모델 평가와 응용시스템 시험으로 나누어 진행된다. 자동번역모델은 평가용 테스트셋에 의한 자동 평가와 전문가에 의한 휴먼 평가에 따라 모델의 품질을 수치로 측정할 수 있다. 또한 응용시스템 시험은 소프트웨어 방법론의 개발 단계별 테스트를 적용한다. 이 연구를 통해 고천문 분야가 인공지능 자동번역 확산 플랫폼 시범의 첫 케이스라는 점에서 의의가 있다. 즉, 클라우드 기반으로 시스템을 구축함으로써 상대적으로 적은 초기 비용을 투자하여 활용성이 높은 한문 문장 자동 번역기라는 연구 인프라를 확보하는 첫 적용 학문 분야이다. 향후 이를 활용한 고천문 분야 학술 활동이 더욱 활발해질 것을 기대해 볼 수 있다.

  • PDF

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

Effectiveness of Internet-based Interventions on HbA1c Levels in Adult Patients with Diabetes: A Meta-Analysis of Randomized Controlled Trials (인터넷 기반 중재프로그램을 통한 성인 당뇨 환자의 HbA1c 중재효과: 메타분석)

  • Jung, Chang Suk;Noh, Hyun Jung;Gu, Min Jeong;Kim, Yi Young;Lee, Soon Young
    • Journal of health informatics and statistics
    • /
    • v.43 no.4
    • /
    • pp.307-317
    • /
    • 2018
  • Objectives: This study aimed to verify the effectiveness of Internet-based intervention programs for adults with diabetes by conducting a meta-analysis of studies conducted since 2000. Methods: We conducted a systematic review of research papers published in domestic and overseas journals from January 2000 to December 2015, and selected 9 papers that met the analysis criteria. Data analysis was performed using the open source statistical software R 3.5.0, to analyze the effectiveness of Internet-based interventions on experimental and control groups. Results: The analysis showed that intervention programs for controlling HbA1c levels in adult patients with diabetes most commonly comprised 7 sessions on Internet-based management (77.8%), and the most common frequency of application of intervention programs was 4 session in 6 months (33.4%). The present meta-analysis revealed statistically significant effects of Internet-based intervention activities (SMD = 0.92, 95% CI 0.45-1.40). The analysis of the effect size according to the intervention period showed that the 3-month, 6-month, and 12-month interventions reported in eight studies (89%) had a high effect on the Internet-based intervention group. Conclusions: The results of this study confirm the effectiveness of Internet-based intervention programs for adult patients with diabetes. The need for research on the utilization of Internet-based intervention programs for the steady management of diabetes, a chronic disease; for the development of specific guidelines for intervention activities; and for establishing appropriate protocols are acknowledged.

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

The new explore of the animated content using OculusVR - Focusing on the VR platform and killer content - (오큘러스 VR (Oculus VR)를 이용한 애니메이션 콘텐츠의 새로운 모색 - VR 플랫폼과 킬러콘텐츠를 중심으로 -)

  • Lee, Jong-Han
    • Cartoon and Animation Studies
    • /
    • s.45
    • /
    • pp.197-214
    • /
    • 2016
  • Augmented Reality, virtual reality in recently attracted attention throughout the world. and Mix them mixed reality etc., it has had a significant impact on the overall pop culture beyond the scope of science and technology. The world's leading IT company : Google, Apple, Samsung, Microsoft, Sony, LG is focusing on development of AR, VR technology for the public. The many large and small companies developed VR hardware, VR software, VR content. It does not look that makes a human a human operation in the cognitive experience of certain places or situations or invisible through Specific platforms or program is Encompass a common technique that a realization of the virtual space. In particular, out of the three-dimensional image reveals the limitations of the conventional two-dimensional structure - 180, 360 degree images provided by the subjective and objective symptoms such as vision and sense of time and got participants to select it. VR technology that can significantly induce the commitment and participation is Industry as well as to the general public which leads to the attention of colostrum. It was introduced more than 10 related VR works Year 2015 Sundance Film Festival New Frontier program. The appearance VR content : medical, architecture, shopping, movies, animations. Also, 360 individuals can be produced by the camera / video sharing VR is becoming an interactive tunnel between two possible users. Nevertheless, This confusion of values, moral degeneration and the realization of a virtual space that has been pointed out that the inherent. 4K or HUD, location tracking, motion sensors, processing power, and superior 3D graphics, touch, smell, 4D technology, 3D audio technology - It developed more than ever and possible approaches to reality. Thereafter, This is because the moral degeneration, identity, generational conflict, and escapism concerns. Animation is also seeking costs in this category Reality. Despite the similarities rather it has that image, and may be the reason that the animation is pushed back to the VR content creation. However, it is focused on the game and VR technology and the platform that is entertaining, but also seek new points within the animation staying in the flat Given that eventually consist of visual images is clear that VR sought. Finally, What is the reality created in the virtual space using VR technology could be applied to the animation? So it can be seen that the common interest is research on what methods and means applied.