• Title/Summary/Keyword: 태블릿 PC

Search Result 251, Processing Time 0.026 seconds

A Study on the Application and Utilization of PDA in u-Learning (u-러닝에서 PDA 적용 방안 및 활용에 관한 연구)

  • Baek, Jang-Hyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.3
    • /
    • pp.511-522
    • /
    • 2005
  • The rapid development of information & communication technology has changed the paradigm of education. Recently the area of education is introducing u-Learning, in which learning is possible at any time and in any place through personal information devices such as PDA, tablet PC and mobile phone terminals. Taking advantage of the mobility and individuality of personal information devices, u-Learning can provide learning customized to the characteristics of individual learners without the limitations of time and space and can be effective in situational learning and experiential learning. In order to identify the uses of PDA in teaching.learning and to develop a basic teachinglearning model using PDA, the present study applied PDA directly to classes and examined the effects. According to the result, most students were satisfied with classes utilizing PDA but problems were also found in connection, insufficient contents for PDA, the quality of screen, etc.

  • PDF

An UHISRL design to protect patient's privacy and to block its illegal access based on RFID (환자의 프라이버시 보호와 불법 접근 차단을 위한 RFID 기반 UHISRL 설계)

  • Lee, Byung Kwan;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2014
  • This paper proposes the UHISRL(Ubiquitous Healthcare Information System based on Real Time Location) which manages patient, doctor, medicine by using RFID. The proposed UHISRL monitors the patient's health state, and enables us to confirm the result with Smart Phone and Tablet PC. Also, it can block Replay and Spoofing attack by using the ERHL(Extended Randomized Hash Lock) authentication scheme designed in this paper. A patient privacy is enhanced by limiting UHISRL DB access according to attributes with CP-ABE (Cipher Text - Attributed based Encryption) technique. Specially, UHISRL can prevent an unexpected accident by monitoring a chronic patient's emergency situation in real time.

A Study on Improving Electronic Notetaking Interface Design on Pen based learning contents situation (펜 기반 학습컨텐츠 상황에서의 향상된 전자 노트 작성 인터페이스 설계 연구)

  • Lee, Seon-Ho;Sohn, Won-Sung
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.219-226
    • /
    • 2011
  • The purpose of this paper is to design improving electronic notetaking interface on pen-based learning contents. For this study, we apply requirement analysis which includes heuristic analysis, conceptual mapping, surveying, and derive the functional requirements. After functional requirements process, we design a persona, scenario, storyboard and wireframe. By making a paper prototyping from wireframe, maternalize the improving electronic notetaking interface, and assess the usability test. Through the assessment, compensate the defect and complete the design

  • PDF

A Route Selection Scheme for WLAN Off-Loading in EPC Network with a Cloud Server (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택)

  • Kim, Su-Hyun;Min, Sang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2527-2532
    • /
    • 2013
  • There coexist various access network for mobile terminals, such as mobile phones, smart phones, and tablet PC, in mobile and wireless network. In these circumstance, the network traffic overload unexpected causes the service degradation or discontinuity. To solve this problem, we consider a off-loading route selection by a cloud server which monitors traffic volume and selects an appropriate route. With our proposed scheme, it is possible for the EPC network with untrusted WLAN access networks to operate efficiently to a trusted service level. Also, an optimal handover with satisfying service requirements could be achieved by the proposed offload scheme.

Security System for Location-Based Services (위치 기반 서비스의 보안 시스템)

  • Park, Chan Hyun;Lee, Jaeheung;Park, Yongsu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.161-164
    • /
    • 2012
  • Location-Based Services(LBS) are a general class of computer program-level services used to include specific controls for location data as control features in computer programs. In recent years, the number of smart device(Smart Phone, Tablet PC etc.) users growth was exponential. For that reason, using rate of LBS has drastically increased. The most important thing of LBS is security. Personal information, especially private information likes illness, should not be disclosed. In this paper shows how to attack LBS and how to defense it.

  • PDF

A Route Selection Scheme for WLAN Offloading with Cloud Server in EPC Network (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택 방안)

  • Kim, Su-hyun;Min, Sang-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.603-606
    • /
    • 2013
  • Mobile and wireless communication technologies to the development of a variety of next-generation mobile networks such as smart phones, tablet PC and mobile terminals will coexist various access networks. In a variety of network service continuity and quality of service degradation due to network conditions, and the EPC network traffic overload phenomenon still remains a problem. In this paper, the EPC network traffic overload in distributed cloud servers is proposed to select. Our proposed scheme using an efficient network handover can provide optimal service according to the network condition.

  • PDF

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

Personalized Message Syndication As a Smart Media (스마트 미디어로서의 개인화된 메시지 신디케이션)

  • Lee, Seo-Young;Kim, Nam-Yun;Lee, Bong-Gyou
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Since the increasing use of smart devices such as smartphone and tablet PC improves the quality of convergence of broadcasting and telecommunication, many new media have been created. This smart device can provide personal environments based on user's profile (age, gender, and job) and current location. In addition, it can be regarded as a media platform with two-way communication. This paper proposes personalized message syndication, called PMS, based on smart devices and then analyzes its business and technical issues. The PMS service as a smart media provides consumers customized information and can be used for producer's marketing tools which can lead consumers' heart and participation.

The Development of Smart Applications for the Cognitive Enhancement of the Elderly (노인의 인지적 기능 향상을 위한 스마트 애플리케이션 개발 연구)

  • Lee, Donghun;Ko, Ho kyoung;Huh, Nan
    • Journal of Science Education
    • /
    • v.43 no.3
    • /
    • pp.382-399
    • /
    • 2019
  • This study suggests how to use tablet PC application to improve the cognitive functions of the elderly. As a part of lifelong education, this study analyzes cases of developing and applying smart application programs to contribute to the enhancement of science education as an elderly education. For the research, we set the direction of the program and developed the programs 'Coloring,' 'Building lights,' 'Matching shapes,' and 'Pressing button' accordingly. As a result of applying the program to nine participants, each program has a positive effect on the improvement of cognitive function of the elderly. This shows the possibility of using smart applications as a cognitive function enhancement program for the elderly.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.