• Title/Summary/Keyword: 애플리케이션 효과

Search Result 334, Processing Time 0.023 seconds

A Study Funology for Reformatting to App Book: Focused on 'Moo, Baa, La La La!' of App Book (앱북(App Book)으로의 매체 전환을 위한 퍼놀로지(Funology)에 관한 연구: '무, 바, 라라라!(Moo, Baa, La La La!)' 앱북(App Book)을 중심으로)

  • Kwon, Jieun;Kim, Boyoung
    • Cartoon and Animation Studies
    • /
    • s.30
    • /
    • pp.221-243
    • /
    • 2013
  • Recently, traditional books based on printing on the paper have expanded to e-book media in smart device because of developing digital technology. Especially, app book applied application makes users' experience increase and provides immersion to them, because it allows them basically delivering information, educational effect and fun elements with multimedia technology. There are various experimental trials to make enhance effect of reformatting for application media. The purpose of this study is to analyze reformatting effect for app book with funology which is convergence of digital technology and a fun. Then this article would provide design guide and be applied to new application contents. For this research, the first of all, we would discuss concept and elements of funology by publication including thesis, articles, and books. Secondly, this article will be focused on 'Moo, Baa, La La La!' which is reformatting application for iPad to analyze type of funology. Thirdly, we would make sure that app book makes users get emotional effect comparing original book by FGI(Focus Group Interview). In conclusion, sensitive funology used the sound allows user emotional effect and they prefer to intuitive and immediate motion and response of interactive funology. In other way, funology of fun in itself which is strong concept in original book diminishes in app book. Then users concentrate interactive factors like game structure. This results make that app books could be created by strength of original contents and advantage of funology. Therefore this makes us expect the possibility of reformatting effect with funology and we need to discuss the points of issue that there are considerations and limitations to successful app book for users.

Androfilter: Android Malware Filter using Valid Market Data (Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터)

  • Yang, Wonwoo;Kim, Jihye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1341-1351
    • /
    • 2015
  • As the popularization of smartphone increases the number of various applications, the number of malicious applications also grows rapidly through the third party App Market or black market. This paper suggests an investigation filter, Androfilter, that detects the fabrication of APK file effectively. Whereas the most of antivirus software uses a separate server to collect, analyze, and update malicious applications, Androfilter assumes Google Play as the trusted party and verifies integrity of an application through a simple query to Google Play. Experiment results show that Androfilter blocks brand new malicious applications that have not been reported yet as well as known malicious applications.

Citizen Participation-Based Smart Phone Application's Potential Development throughout Open API Mashup (Open API Mashup 활용한 시민 참여형 스마트폰 애플리케이션 개발가능성에 관한 연구)

  • Ki, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.93-101
    • /
    • 2012
  • In the field of urban planning and disaster prevention, various geographical information systems (GIS) and design softwares have been in use. Recently urban planners and disaster managing officials face new challenges, as three dimensional GIS, web environment, and smart phone app are rapidly developed. Technical progress in open API and mashup opens a possibility of making the citizen participation-based smart phone applications in the field of urban planning and disaster prevention. Our suggested smart phone applications will have technical, economic, and administrative impacts on the society in general; and play an effective role in developing U-City, U-health, and disaster prevention.

A Defense Mechanism Based on Session Status against Cookie Replay Attack in Web Applications (웹 애플리케이션에서 세션 상태 기반의 쿠키 재전송 공격 방어 기법)

  • Won, Jong Sun;Park, JiSu;Shon, Jin Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.31-36
    • /
    • 2015
  • As web accessibility has been easier, security issue becomes much more important in web applications demanding user authentication. Cookie is used to reduce the load of the server from the session in web applications and manage the user information efficiently. However, the cookie containing user information can be sniffed by an attacker. With this sniffed cookie, the attacker can retain the web application session of the lawful user as if the attacker is the lawful user. This kind of attack are called cookie replay attack and it causes serious security problems in web applications. In this paper, we have introduced a mechanism to detect cookie replay attacks and defend them, and verified effectiveness of the mechanism.

A Method for Security Strengthening of Web Application using AOP (AOP를 이용한 웹 애플리케이션의 보안성 강화 방안)

  • Sun, Soo-Rim;Lee, Keum-Suck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.119-128
    • /
    • 2009
  • As use of web applications and web-based information systems increases, so web application attacks are increasing. Recently, XSRF(Gross Site Request Forgery) attacks among a variety of web attacks become important because victim's damage caused by such attacks can be severe. But adding security functions for preventing XSRF attacks to existing developed and running software systems could affect move dangerous and expensive to companies and organizations. We suggest effectively adding these security functions to legacy systems, could separate concerns using advantage of the modularity offered by AOP(Aspect-Oriented Programming) methodology. In this paper, we have presented approach for detecting and preventing XSRF in JEE systems using aspect of AOP.

A Study on the Enterprise Application Framework for Developing Efficient RFID Applications (효율적인 RFID 애플리케이션 개발을 위한 엔터프라이즈 애플리케이션 프레임워크에 관한 연구)

  • An, Kyu-Hee;Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.269-280
    • /
    • 2008
  • The information flow through RFID techniques such as, standardized EPC and EPCglobal network suggests new change in the method of cooperating and sharing information in the supply chain. Common function should be prepared for communication, security techniques, and business processes based on the EPCglobal standard to introduce efficient RFID techniques. And the standard architecture which can deal with the RFID environment flexibly is quite necessary. Therefore, this paper suggests Enterprise Application Framework (EAF) for developing efficient and secure RFID applications. EAF offers essential services to develop RFID enterprise systems : a communication environment which uses various standard communication protocols, a security function based on PKI, and abstract business services for flexible introduction of RFID businesses. It simplifies the RFID business integration, minimizes the development complexity, and thus EAF is expected to reduce the cost of RFID application development. EAF guarantees constructing secure RFID applications due to PKI-based security mechanism.

  • PDF

어도비 CC 2014 신기능 1> 추가된 새로운 모션 효과

  • 대한인쇄문화협회
    • 프린팅코리아
    • /
    • v.13 no.8
    • /
    • pp.114-116
    • /
    • 2014
  • 어도비는 최근 크리에이티브 클라우드의 14개 데스크톱 애플리케이션의 새 버전을 발표했다. 이번 대규모 업데이트는 CS6 이래 가장 큰 규모로, 4가지 새로운 모바일 앱 및 크리에이티브 클라우드 서비스의 업데이트가 포함돼 있다. 포토샵 CC에는 더욱 똑똑해진 스마트 가이드, 향상된 레이어 구성요소, 사실적인 모션 블러 효과 등이 추가됐다. 추가된 새로운 모션 효과에 대해 알아본다.

  • PDF

Building a Proxy Application Firewall System for System Security (시스템 보안을 위한 프락시 애플리케이션 방화벽 시스템 구축)

  • Kim, Sun-Jeung;Na, Hyun-Shik
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.827-830
    • /
    • 2001
  • 인터넷이 일반화되면서 컴퓨터 관련 전공자가 아니더라도 시스템을 관리하고 운영하는 경우가 자주 발생하면서 크래커들의 침입에 대응이 늦거나 침입 사실조차 모르는 경우가 있어 시스템 운영에 차질이 발생하고 있다. 또한 방화벽을 설치하더라도 전문 지식이 많지 않아 투자비용에 비교해서 큰 효과를 거두지 못하는 경우도 있다. 본 논문에서는 비용 절감과 방화벽 시스템 운영시 필요한 보안정책과 보안 기술 확보를 위하여 공개 버전인 방화벽 Toolkit을 이용한 프락시 애플리케이션 방화벽 시스템 구축 방법 및 관리 방안을 제시 하였다.

  • PDF

Implementation of GUI Flow Designer based on Android Platform (안드로이드 기반의 GUI 플로우 디자이너 구현)

  • Jo, Chung Gi;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.235-237
    • /
    • 2015
  • 본 논문에서는 안드로이드 애플리케이션 개발을 효과적으로 지원 할 수 있는 GUI Flow Designer for Android(GuiFA) 도구를 구현한다. GuiFA는 안드로이드 프로그램을 구성하는 액티비티들의 흐름을 한 눈에 파악 할 수 있는 기능을 제공할 뿐만 아니라 그것들의 흐름을 구현하는 소스코드를 생성해준다. 이러한 GuiFA의 기능을 사용하여 액티비티들의 흐름을 한 화면에 시각화시켜 효과적인 개발이 가능하고 생성된 코드를 이용하여 효율적으로 애플리케이션을 구현할 할 수 있다.

  • PDF

Unconventional Issues and Solutions in Developing IoT Applications (IoT 애플리케이션 개발에서 비전형적 이슈 및 솔루션)

  • Ra, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.337-350
    • /
    • 2014
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and are actuated. IoT applications provide smart services to users by interacting with multiple devices connected to the network. IoT devices provide the simple set of the information and also offer smart services by collaborating with other devices. That is, IoT applications always interact with IoT devices which are becoming very popular at a fast pace. However, due to this fact, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. Moreover, since IoT computing has its own characteristics which are distinguished from other former paradigms such as embedded computing and mobile computing, IoT applications also reveal their own technical challenges. Therefore, we analyze technical challenges occurring in developing IoT applications and present effective solutions to overcome the challenges. To verify identified issues and presented solutions, we present the result of performing a case study of developing an IoT application. Through the case study, we verify how the unconventional technical issues are raised in a real domain and analyze effectiveness of applying the solutions to the application.