• Title/Summary/Keyword: 안드로이드 폰

Search Result 892, Processing Time 0.024 seconds

Design and Implementation of μ-Webpage based on QR Code (QR 코드 기반 마이크로 웹페이지 설계 및 구현)

  • Ha, Sunju;Eun, Seongbae;So, SeonSub;Yun, Young-Sun;Jung, Jinman
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.239-246
    • /
    • 2015
  • QR(Quick Response) Code has been developed to provide greater storage capacity and more functionality compared to 1D bar codes. With the emergence of increasingly mobile devices equipped with cameras such as smart-phones and tablets, QR codes have become very popular and more important in mobile businesses. Typically, most QR codes are used as a URL link for redirecting users to webpages. However, the URL based QR codes are required to be connected over the internet and to be run a server. This can incur unnecessary traffics in the Internet. Furthermore, it is not suitable for the country lagging behind others in its network infrastructure. In this paper, we propose a server-less ${\mu}$-webpage to provide mobile web services and be optimized for the capabilities and limitations of QR Code. We have implemented the ${\mu}$-webpage in Android, and the results showed that the proposed mechanism can provide web-services without requiring extra servers or incurring mobile traffic data compared to the URL-based QR Codes.

The Design and Implementation of Internet Outlet with Multiple User Interface Using TCP/IP Processor (TCP/IP프로세서를 이용한 다중 사용자 인터페이스 지원 인터넷 전원 콘센트의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.103-112
    • /
    • 2012
  • Recently, the infrastructure to be connected to the internet is much provided, there is more and more need to connect electric or electronic products to the internet to monitor or control them remotely. However, most of the existing products lack the network interface, so it was very inconvenient to be connected to the internet. Therefore, this article designs and realizes the internet outlet allowing real-time scheduling that can control the power remotely on the internet by using the hardware TCP/IP processor. The realized product consumes low production cost because it can be realized by using the hardware TCP/IP processor and the 8-bit small microprocessor. In addition, the product can be used widely in both wired and wireless environments with a variety of user interface, including the dedicated control program which provides the environment configuration functions; embedded web service that enables the webpage to be saved on the external flash memory; Android smartphone application; motion recognition control environment that uses the OpenCV computer vision library, etc.

A Behavior-based Authentication Using the Measuring Cosine Similarity (코사인 유사도 측정을 통한 행위 기반 인증)

  • Gil, Seon-Woong;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.17-22
    • /
    • 2020
  • Behavior-based authentication technology, which is currently being researched a lot, requires a long extraction of a lot of data to increase the recognition rate of authentication compared to other authentication technologies. This paper uses the touch sensor and the gyroscope embedded in the smartphone in the Android environment to measure five times to the user to use only the minimum data that is essential among the behavior feature data used in the behavior-based authentication study. By requesting, a total of six behavior feature data were collected by touching the five touch screen, and the mean value was calculated from the changes in data during the next touch measurement to measure the cosine similarity between the value and the measured value. After generating the allowable range of cosine similarity by performing, we propose a user behavior based authentication method that compares the cosine similarity value of the authentication attempt data. Through this paper, we succeeded in demonstrating high performance from the first EER of 37.6% to the final EER of 1.9% by adjusting the threshold applied to the cosine similarity authentication range even in a small number of feature data and experimenter environments.

Platform Independent Game Development Using HTML5 Canvas (HTML5 캔버스를 이용한 플랫폼 독립적인 게임의 구현)

  • Jang, Seok-Woo;Huh, Moon-Haeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3042-3048
    • /
    • 2014
  • Recently, HTML5 have drawn many people's attention since it is considered as a next-generation web standard and can implement a lot of graphic and multimedia-related techniques on a web browser without installing programs separately. In this paper, we implement a game independent of platforms, such as iOS and Android, using the HTML5 canvas. In the game, the main character can move up, down, left, and right not to collide with neighboring enemies. If the character collides with an enemy, the HP (hit point) gauge bar reduces. On the other hand, if the character obtains heart items, the gauge bar increases. In the future, we will add various items to the game and will diversify its user interfaces by applying computer vision techniques such as various gesture recognition.

Real-Time Scheduling Method to assign Virtual CPU in the Multocore Mobile Virtualization System (멀티코아 모바일 가상화 시스템에서 가상 CPU 할당 실시간 스케줄링 방법)

  • Kang, Yongho;Keum, Kimoon;Kim, Seongjong;Jin, Kwangyoun;Kim, Jooman
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.227-235
    • /
    • 2014
  • Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device. A smartphone, a single wireless device, might have one virtual environment for business use and one for personal use. Mobile virtualization might also allow one device to run two different operating systems, allowing the same phone to run both RTOS and Android apps. In this paper, we propose the techniques to virtualize the cores of a multicore, allowing the reassign any number of vCPUs that are exposed to a OS to any subset of the pCPUs. And then we also propose the real-time scheduling method to assigning the vCPUs to the pCPU. Suggested technology in this paper solves problem that increases time of real-time process when interrupt are handled, and is able more to fast processing than previous algorithm.

An Improvement of the Public Library Application Service -Focused on the Young-In Si Library Application Service- (시립 도서관 애플리케이션 서비스 방안 연구 -용인시 도서관 애플리케이션을 중심으로-)

  • Kim, Da-Eun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.301-306
    • /
    • 2017
  • With the popularization of smart-phone, a variety of application service user is a rising trend now. In contrast, studies concerning library application service that cast a long shadow over the life of students and citizens still lacking in many ways. This study evaluates user experience of Young-in Si public library application service, and investigates user requirements. I searched the real user reviews about Young-in Si library application both App store and Android market. As the final outcome, I found inconveniences and improvements of this service. The application is intuitive, but requires consistent design, strong identity and customizing main page. It will be suggested specific guidelines for the public library mobile services in other areas.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

Design and Implementation of Green Light Optimal Speed Advisory Based on Reference Mobility Models (GLOSA-RMM) in Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 참조이동모형 기반 녹색신호 최적화 가속도 조언의 설계 및 구현)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.544-554
    • /
    • 2014
  • In this paper, we introduce a cyber-physical intersection systems (CPIS) which intimately interconnects roadside units (RSU) located at intersection, on-board units (OBU) of moving vehicles, and smartphone apps. Based on the architecture of CPIS, we also present a green light optimal speed advisory based on the reference mobility models (GLOSA-RMM) to reduce intersection stopping time (IST) and fuel consumption. Based on several reference mobility models, the GLOSA-RMM determines the appropriate speed advisory by taking into account the current mobility and the intersection traffic light status, and then provides screen/voice GLOSA instructions to minimize the driver's distraction. We show that the GLOSA-RMM can reduce both the IST and the fuel consumption through the numerical results obtained from the prototype of the CPIS consisting of the OBU, the RSU and the smartphone app.

E-book to sign-language translation program based on morpheme analysis (형태소 분석 기반 전자책 수화 번역 프로그램)

  • Han, Sol-Ee;Kim, Se-A;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.461-467
    • /
    • 2017
  • As the number of smart devices increases, e-book contents and services are proliferating. However, the text based e-book is difficult for a hearing-impairment person to understand. In this paper, we developed an android based application in which we can choose an e-book text file and each sentence is translated to sign-language elements which are shown in videos that are retrieved from the sign-language contents server. We used the korean sentence to sign-language translation algorithm based on the morpheme analysis. The proposed translation algorithm consists of 3 stages. Firstly, some elements in a sentence are removed for typical sign-language usages. Secondly, the tense of the sentence and the expression alteration are applied. Finally, the honorific forms are considered and word positions in the sentence are revised. We also proposed a new method to evaluate the performance of the translation algorithm and demonstrated the superiority of the algorithm through the translation results of 100 reference sentences.

A Method of Recovery for Damaged ZIP Files (손상된 ZIP 파일 복구 기법)

  • Jung, Byungjoon;Han, Jaehyeok;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1107-1115
    • /
    • 2017
  • The most commonly used PKZIP format is a ZIP file, as well as a file format used in MS Office files and application files for Android smartphones. PKZIP format files, which are widely used in various areas, require structural analysis from the viewpoint of digital forensics and should be able to recover when files are damaged. However, previous studies have focused only on recovering data or extracting meaningful data using the Deflate compression algorithm used in ZIP files. Although most of the data resides in compressed data in the ZIP file, there is also forensically meaningful data in the rest of the ZIP file, so you need to restore it to a normal ZIP file format. Therefore, this paper presents a technique to recover a damaged ZIP file to a normal ZIP file when given.