• Title/Summary/Keyword: Application(App)

Search Result 731, Processing Time 0.029 seconds

Usability Principles for a Mobile Augmented Reality Application -Focus on Wayfinding- (증강현실 기반 모바일 애플리케이션의 사용성 원칙 연구 -길찾기 서비스 중심으로-)

  • Yoo, Chang-Hwa;Oh, Dong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.643-651
    • /
    • 2022
  • The mobile augmented reality(MAR) market is rapidly growing with following the sudden rise of the metaverse. However, research on improving user experience in mobile augmented reality environment is lacking. This study aims to develop the usability principles of an AR-based smartphone app. The research conducts following methods. 1)The characteristics of MAR were understood to identify usability elements of AR apps. 2)Usability principles were collected through analysis of case studies on the usability of AR and the 14 usability principles were developed through in-depth interviews with experts for the purpose of chunking. 3)To verify the 14 developed usability principles, evaluation items were composed based on the usability principles and usability evaluation survey was conducted. Consequently, significant differences were found in immersivity, presence, efficiency, satisfaction, playfulness and It was verified that the developed usability principle is useful in developing AR based smartphone apps. This study is meaningful in that it conducted the basic research of mobile AR usability principles

The Detection of Android Malicious Apps Using Categories and Permissions (카테고리와 권한을 이용한 안드로이드 악성 앱 탐지)

  • Park, Jong-Chan;Baik, Namkyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.907-913
    • /
    • 2022
  • Approximately 70% of smartphone users around the world use Android operating system-based smartphones, and malicious apps targeting these Android platforms are constantly increasing. Google has provided "Google Play Protect" to respond to the increasing number of Android targeted malware, preventing malicious apps from being installed on smartphones, but many malicious apps are still normal. It threatens the smartphones of ordinary users registered in the Google Play store by disguising themselves as apps. However, most people rely on antivirus programs to detect malicious apps because the average user needs a great deal of expertise to check for malicious apps. Therefore, in this paper, we propose a method to classify unnecessary malicious permissions of apps by using only the categories and permissions that can be easily confirmed by the app, and to easily detect malicious apps through the classified permissions. The proposed method is compared and analyzed from the viewpoint of undiscovered rate and false positives with the "commercial malicious application detection program", and the performance level is presented.

Proposal on the Improvement Direction of Web App Development lecture for Non-IT majors

  • Kim, Koono
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.231-239
    • /
    • 2022
  • In this paper, I analyze the difficulties of web service development education for non-IT majors through the Q&A of students posted in the k-mooc lecture, and propose methods to improve them. Through Q&A analysis, it was confirmed that non-majors mainly had difficulties in using unfamiliar tools, cost of cloud service, setting up server environment, and writing code while taking web service development courses. To solve this problem, I propose a method to reduce the server cost problem and the complexity of the server environment by using BaaS(Backend as a Service), which is one of the cloud service models. It also shows that it is possible to reduce the length of code that needs to be written at once by using the React library to modularize long code into smaller units. Finally, I propose an improvement plan that even non-IT majors can easily learn by implementing a web application that works by using the design output obtained by using Figma.

Smart Harness for Preventing Pet Loss Outdoors (실외에서 애완견 분실 방지를 위한 스마트 어깨줄)

  • Lee, Jun-Hyeok;Ruy, Se-Hyun;Lim, Jong-Chan;Chou, Tea-Hyun;Han, Yeong-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.709-718
    • /
    • 2021
  • In this paper, it can be seen that the number of abandoned dogs increases every year through the statistics on the occurrence of abandoned animals. With the goal of reducing the number of stray dogs, a smart pet dog shoulder strap is implemented based on a real-time location tracking system using the ESP32 module and GPS sensor. It is an ESP32 module with a built-in Bluetooth module. It is input to the MCU using various sensors, and finally outputs to a smart-phone application, and communicates through the built-in blue-tooth module. In addition, it uses Neopixels to compensate the weaknesses at night through LED light emission, and automatically sets the warning distance to design a music playback system through the LED flashing effect and MP3 module. In addition, a smart pet dog shoulder strap was designed to help pet dog health care by measuring the moving distance according to the amount of activity through the gyro sensor.

Risk Situation Detection Safety Helmet using Multiple Sensors (다중 센서를 이용한 위험 상황 감지 안전모)

  • Woo-Yong, Choi;Hyo-Sang, Kim;Dong-Hyeon, Ko;Jang-Hoon, Lee;Seung-Dae, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1226-1274
    • /
    • 2022
  • In this paper, we dealt with a safety helmet for detecting dangerous situations that focuses on falling accidents and gas leaks, which are the main causes of industrial accidents. the fall situation range was set through gravity acceleration measurement using an acceleration sensor, and as a result, a fall detection rate of 80% could be confirmed. .In addition, the dangerous gas concentration was measured through a gas sensor, and when a digital value of 188 or more was output through a serial monitor, it was determined as a gas dangerous situation, and a fall warning message and a gas warning message could be checked through a smart-phone application produced based on the app inventor program.

Development of a System for Field-data Collection Transmission and Monitoring based on Low Power Wide Area Network (저전력 광역통신망 기반 현장데이터 수집 전송 및 모니터링 시스템 개발)

  • Yeong-Tae, Ju;Jong-Sil, Kim;Eung-Kon, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1105-1112
    • /
    • 2022
  • Field data monitoring systems such as renewable energy generation and smart farm integrated control are developing from PC and server to mobile first, and various wireless communication and application services have emerged with the development of IoT technology. Low-power wide-area networks are services optimized for low-power, low-capacity, and low-speed data transmission, and data collected in the field is transmitted to designated storage servers or cloud-based data platforms, enabling data monitoring. In this paper, we implement an IoT repeater that collects field data with a single device and transmits it to a wireless carrier cloud data flat using a low-power wide-area network, and a monitoring app using it. Using this, the system configuration is simpler, the cost of deployment and operation is lower, and effective data accumulation is possible.

Development of Unmanned Payment System based on QR Code optimized for Non-face-to-face (비대면에 최적화된 QR 코드기반 무인 결제 시스템 개발)

  • Kim, Yeon-Woo;Hwang, Seung-Yeon;Shin, Dong-Jin;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.165-170
    • /
    • 2022
  • By reducing time spent outside, a shopping system was developed for middle-aged and elderly people who mainly use neighborhood marts and neighborhood mart managers. The main functions of this app are direct shopping and online shopping, and it was developed using QR code using Zxing library on Android and Kakao Map using Kakao API. In addition, it provides information such as payment statistics and bulletin board posts that members need through recycler view and graphs in an easy-to-read manner. Through this system, members can efficiently manage by reducing fatigue when using the mart through direct purchase using QR code and delivery through map, and reducing manpower wastage as a mart manager. Also, as a mart manager, more consumers will be able to sell more items.

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Implementation of Smart Umbrella Stand Based on IoT (사물인터넷 기반의 스마트 우산꽂이 구현)

  • Jeong-Hun Moon;Bo Peng;Jun-Hyuk Kwon;Tae-Kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.57-64
    • /
    • 2023
  • In this paper, we propose a smart umbrella stand based on the Internet of Things (IoT) that helps people to pack their umbrellas more easily. The proposed smart umbrella stand offers three functions. First, it receives weather information, and a hidden umbrella handle will automatically become visible when it rains, making it easier to grab. Second, the smart umbrella stand is equipped with a heated air system, allowing it to effectively dry umbrellas that have become wet due to rain. This makes it more convenient for users to dry and store their rain-soaked umbrellas. Third, the smart umbrella stand enables users to monitor its current status, track weather conditions, and monitor the water level in the rain gutter through a dedicated application. The proposed smart umbrella stand aims to bring convenience to daily life by making it more convenient to carry an umbrella on rainy days or days with a high probability of rain.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF