• Title/Summary/Keyword: 패턴 잠금

Search Result 25, Processing Time 0.022 seconds

Accurate Step-Count Detection based on Recognition of Smartphone Hold Position (스마트폰의 소지위치 인지 기반의 정확한 보행수 검출 기법)

  • Hur, Taeho;Yeom, Haneul;Lee, Sungyoung
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.374-382
    • /
    • 2017
  • As the walking exercise is emphasized in personalized healthcare, numerous services demand walking information. Along with the propagation of smartphones nowadays, many step-counter applications have been released. But these applications are error-prone to abnormal movements such as simple shaking or vibrations; also, different step counts are shown when the phone is positioned in different locations of the body. In this paper, the proposed method accurately counts the steps regardless of the smartphone position by using an accelerometer and a proximity sensor. A threshold is set on each of the six positions to minimize the error of undetection and over-detection, and the cut-off section is set to eliminate any noise. The test results show that the six position type were successfully identified, and through a comparison experiment with the existing application, the proposed technique was verified as superior in terms of accuracy.

Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model (거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델)

  • Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.369-383
    • /
    • 2018
  • User authentication using PIN input or lock pattern is widely used as a user authentication method of smartphones. However, it is vulnerable to shoulder surfing attacks and because of low complexity of PIN and lock pattern, it has low security. To complement these problems, keystroke dynamics have been used as an authentication method for complex authentication and researches on this have been in progress. However, many studies have used imposter data in classifier training and validation. When keystroke dynamics authentications are actually applied in reality, it is realistic to use only legitimate user data for training, and using other people's data as imposter training data may result in problems such as leakage of authentication data and invasion of privacy. In response, in this paper, we experiment and obtain the optimal ratio of the thresholds for distance based classification. By suggesting the optimal ratio, we try to contribute to the real applications of keystroke authentications.

Implementation of Carpal Tunnel Syndrome Prevention System Using Arduino (Arduino를 활용한 손목 터널 증후군 예방 시스템 구현)

  • Hwang, Woo-Jin;Woo, Youn-Ho;Noh, Yun-Hong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.531-532
    • /
    • 2016
  • Carpal tunnel syndrome, carpal tunnel becomes part of a narrower median nerve pain occurs pressed. How a stable wrist stretch for the prevention of carpal tunnel syndrome is required, it should life guides to fit the user is provided. In this research, users themselves recognize the risk of carpal tunnel syndrome, to be able to stretch, it implements the application. Application, based on the usage time set by the user, executes the alarm and lock. At this time, the user may utilize arduino and inertia sensor, it is possible to wrist stretch, to analyze usage patterns, it is possible to provide a medical information and life guides to suit the user. Data using Bluetooth 4.0 communication has been to meet the runaway. In order to evaluate the mounted system, targeting four subjects, the time and the touch frequency of usage of the 3-day smartphone measured, as a result of the questionnaire, it reduces the frequency of use of smartphones, a positive it was possible to prove the effect.

  • PDF

Object Tracking System Using Kalman Filter (칼만 필터를 이용한 물체 추적 시스템)

  • Xu, Yanan;Ban, Tae-Hak;Yuk, Jung-Soo;Park, Dong-Won;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1015-1017
    • /
    • 2013
  • Object tracking, in general, is a challenging problem. Difficulties in tracking objects can arise due to abrupt object motion, changing appearance patterns of both the object and the scene, non-rigid object structures, object-to-object and object-to-scene occlusions, and camera motion. Tracking is usually performed in the context of higher-level applications that require the location or the shape of the object in every frame. This paper describes an object tracking system based on active vision with two cameras, into algorithm of single camera tracking system an object active visual tracking and object locked system based on Extend Kalman Filter (EKF) is introduced, by analyzing data from which the next running state of the object can be figured out and after the tracking is performed at each of the cameras, the individual tracks are to be fused (combined) to obtain the final system object track.

  • PDF

The Development and Utilization of I_smart_keeper for the Learner's Smart Phone Control (학습자의 스마트폰 제어를 위한 아이스마트키퍼 개발 및 적용)

  • Han, Kyujung;Heo, Jaeyoung
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.3
    • /
    • pp.253-264
    • /
    • 2013
  • We development the service that teacher and parent can control the smart phone of student in school and home, the name is I_smart_keeper. The service is composed of server system, teacher's application, parent's application and student's application. The control of student's phone in school is operated by school timetable and GPS(Global Positioning System) in smart phone. The student's phone is operating one of six policy. The six policy is 'emergency call only', 'specific application only', 'call only', 'call and text only', 'all allowed' and 'all lock'. The teacher can change the current policy with his or her phone, That is a the temporary policy can be applied on a day. In school hours, teacher is able to instruct student using application appropriate to the teaching. If student is leaving school early and located outside school, the service do free the student's phone by GPS of her or his phone. We show the Smart Health Indicator (SHI)that analyse the pattern of student's phone habit and SHI will guide a desirable student's phone habit. In home, parent can control child's phone. The service will help the risk reduction of a robbery case due to keeping student's phone by teacher in class. Currently one elementary school's all student use I_smart_keeper and three elementary school is testing to some class. The teacher's impression was very good and they usually use I_smart_keeper for class in positive light. Survey results for students with higher satisfaction.