• Title/Summary/Keyword: IT Application

Search Result 32,828, Processing Time 0.057 seconds

Portability Evaluation Technique of Application for Heterogeneous Mobile Platform (이기종 모바일 플랫폼에 애플리케이션 이식성 평가 기법)

  • Park, Hae-Yoon;Yoo, Hae-Young
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.123-132
    • /
    • 2011
  • However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. This paper ascertains problems when a mobile application is transplanted for reusing into other platforms, and suggests to evaluation systems of portability's quality that we can check the portability convenience of the existing mobile application. As we confirm its grade that shows convenience of suggested portability, we are able to check problems issued when a mobile application implants to other platforms. Then it is expected that we can check capability of rebuilding and endeavor rate. Also if the method will be considered at the first step of designing a mobile application, it will be the best way to develop the better mobile application that we can easily implant many other mobile platforms.

An Analysis on Key Factors of Mobile Fitness Application by Using Text Mining Techniques : User Experience Perspective (텍스트마이닝 기법을 이용한 모바일 피트니스 애플리케이션 주요 요인 분석 : 사용자 경험 관점)

  • Lee, So-Hyun;Kim, Jinsol;Yoon, Sang-Hyeak;Kim, Hee-Woong
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.117-137
    • /
    • 2020
  • The development of information technology leads to changes in various industries. In particular, the health care industry is more influenced so that it is focused on. With the widening of the health care market, the market of smart device based personal health care also draws attention. Since a variety of fitness applications for smartphone based exercise were introduced, more interest has been in the health care industry. But although an amount of use of mobile fitness applications increase, it fails to lead to a sustained use. It is necessary to find and understand what matters for mobile fitness application users. Therefore, this study analyze the reviews of mobile fitness application users, to draw key factors, and thereby to propose detailed strategies for promoting mobile fitness applications. We utilize text mining techniques - LDA topic modeling, term frequency analysis, and keyword extraction - to draw and analyze the issues related to mobile fitness applications. In particular, the key factors drawn by text mining techniques are explained through the concept of user experience. This study is academically meaningful in the point that the key factors of mobile fitness applications are drawn by the user experience based text mining techniques, and practically this study proposes detailed strategies for promoting mobile fitness applications in the health care area.

The Application Technology of Korean-style R&D in Verification for deploying the Neo-Korean Style Public Building - Focused on the positivistic case R&D Technologies in Neo-Korean Style Public building

  • Kim, Young-Hoon;Peck, Yoo-Jung;Park, Joon-Young
    • KIEAE Journal
    • /
    • v.17 no.1
    • /
    • pp.5-13
    • /
    • 2017
  • Purpose: This study, by comprehensively the characteristics of new Hanok application techniques with the proposed site application technology in the course of the design changes that have been accumulated through Hanok technology development the second stage business, by analyzing the range of reflection, new Considering the direction reflects the efficiency of the new Hanok application techniques. Method: new Hanok application technology, it was been established through research and development of large 1 new Hanok technology it has been proposed through the "site-specific application techniques" and 2 builders and designers "space-time proposed technique" Analysis of the case, at the center of the design changes, the land the body of laws and regulations, the requirements of the public buildings, compared to the construction method and the like for the reduction of construction costs, new Hanok applied technology in the process of change by it There was analyzed whether acceleration on the range and step which is reflected in the design Result: The result of new Hanok applied technology was built through the demonstration build business case, process another major technology, foundation, woodwork, walls, roof, has been reflected in the ceiling construction, the inclusion of items in the proposed technique of construction , it was applied to the main steps in general, except for other construction work landscaping. Application techniques and construction proposal technology research team has presented, show the difference between the scope and method. With significance effort to improve the unreasonable traditional methods of these core processes that can be reflected in the field repeated the construction proposed technique as a result of the utility that can be applied for substantial construction.

Construction of Security Evaluation Criteria for Web Application Firewall (웹방화벽의 보안성 평가 기준의 구축)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.197-205
    • /
    • 2017
  • To achieve web application security goals effectively by providing web security features such as information leakage prevention, web application firewall system must be able to achieve the goal of enhancing web site security and providing secure services. Therefore, it is necessary to study the security evaluation of web application firewall system based on related standards. In this paper, we analyze the requirements of the base technology and security quality of web application firewall, and established the security evaluation criteria based on the international standards for software product evaluation. Through this study, it can be expected that the security quality level of the web application firewall system can be confirmed and the standard for enhancing the quality improvement can be secured. As a future research project, it is necessary to continuously upgrade evaluation standards according to international standards that are continuously changing.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

A Design of X-internet Development Framework by Using Flash Component and Service API (플래시 컴포넌트와 서비스 API를 이용한 X-인터넷 개발 프레임워크 설계)

  • Ko, Dae-Sik
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.165-172
    • /
    • 2006
  • In this paper, we designed a new type of X-internet framework by using Flash component and server service API and analyzed its performance. Proposed X-internet framework uses Flash MX Professional 2004, Java, and software which opened middleware and database. Since proposed framework use the server service API that we developed in this paper and Flash player, this framework does not need server module. Proposed framework enables to obtain design with dynamic user interface compare to Web application and enables to reduce development time. In analytical results, it has been shown that proposed x-internet framework have efficient characteristics such as network traffic, low development cost and dynamic user interface implementation. Since proposed X-internet framework can operate in environment of current developer friendly, it is useful for development of various new application programs and we confirm it through Flash web mail implementation by using proposed x-internet framework.

A study on the Selection Attributes of Accommodation Applications

  • Kim, Kyu-dong;Jeon, Se-hoon;Kim, Jeong-lae
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.130-137
    • /
    • 2019
  • We conducted this study to identify the composition factors for consumers' selection attributes of accommodation applications and to identify the differences in the selection attributes perception of accommodation applications based on demographic characteristics and use status. According to the study, 6 factors were derived as the components of the selectivity of accommodation application and were named convenience, interactivity, economic efficiency, transaction reliability, product reliability and informativeness. And the respondents differed in their selection attributes perception of the accommodation application they used. In particular, it was found that the highest perception of informativeness and interactivity, and the lowest perception of product reliability. Finally, there were differences in the selection attributes perception of the accommodation application they used by demographic characteristics and use status. Based on the results of this study, we should strive to derive the effective marketing strategy needed for travel industry-related companies.

Analysis of Multicategory Responses with Logit Model on Earlyold Age Pension

  • Kim, Mi-Jung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.3
    • /
    • pp.735-749
    • /
    • 2008
  • This article suggests application of logit model for analysis of multicategory responses. Referring to the reference category, characteristic of each category is obtained from analysis of polytomous logit model. With National Pension data it is illustrated that application of logit model helps it possible to find significant factors which may not be found only with polytomous logit model. Application of the logit model is done by reducing the number of categories. Categories are grouped into the former and the latter group according to reference category. Extra finding of significant factor was possible from logistic regression analysis for the two groups after removing the reference category. It is expected that this application would be helpful for finding information and characteristics on ordered multicategory responses where the proportional odds model does not fit.

  • PDF

Critical Steps in Building Applications with Visual Basic and UML: Focusing on Order Processing Application (Visual Basic과 UML을 사용한 애플리케이션 개발시의 핵심적 단계: 주문처리 업무를 중심으로)

  • Han, Yong-Ho
    • IE interfaces
    • /
    • v.16 no.2
    • /
    • pp.268-279
    • /
    • 2003
  • This paper presents critical steps in building client/server application with UML and Visual Basic, which are derived from the implementation case of a typical order processing system. To begin with, we briefly review the software architecture, the diagrams and the object-oriened building process in the UML. In the inception phase, it is critical to define the project charter, to draw use case diagrams, and to construct a preliminary architecture of the application. In the elaboration phase, it is critical to identify classes to be displayed in the class diagram, to develop user interface prototypes for each use case, to construct sequence diagram for each use case, and finally to design an implementation architecture. Steps to construct implementation architecture are given. In the construction phase, it is critical to design both the database and components. Steps to design these components are described in detail. Additionally the way to create the Internet interface is suggested.

Application of botulinum toxin in maxillofacial field: part I. Bruxism and square jaw

  • Kwon, Kyung-Hwan;Shin, Kyung Su;Yeon, Sung Hee;Kwon, Dae Gun
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.41
    • /
    • pp.38.1-38.13
    • /
    • 2019
  • The application of botulinum in oral and maxillofacial surgery begins in 1982, where Jan Carruthers started using it for reducing the muscle mass and smoothing the skin, and since then it has been used for cosmetic purposes. In Korea, it is already being used by various specialties including dentistry (oral and maxillofacial surgery, oral medicine), plastic surgery, dermatology, ophthalmology, general surgery, and orthopedic surgery, etc. Each specialty approaches to Botox with its own medical indications. In this article, we will discuss the maxillofacial application of botulinum toxin, which includes theoretical and practical aspects of such as bruxism and square jaw.