• Title/Summary/Keyword: IT Developers

Search Result 951, Processing Time 0.023 seconds

Designing a Comet-based Open API for Establishing RCS Chat Session

  • Lee, Dongcheul;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.8-16
    • /
    • 2019
  • As smartphone users grow, mobile operators are trying to standardize and commercialize Rich Communication Suite (RCS), which is a next-generation messaging service, so that it can replace legacy messaging services. However, it is not enough to spread RCS widely to the users only by publishing an RCS app. To increase the use of RCS, a web-based open API for common RCS capabilities is needed. By using the API, Internet-based developers can create applications that make use of the RCS capabilities with less effort and time. This paper proposes a lightweight Comet-based open API to allow mobile operators to expose useful information and capabilities to application developers. The system architecture of the open API framework and call flow between relevant nodes are defined. In addition, examples of protocol translations on the framework are provided.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

Orbital Dungeon Generation: A Method for Creating Dungeons Quickly and Dynamically

  • Udjaja, Yogi
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.41-48
    • /
    • 2022
  • With the development of technology, the procedures for making systems are altered. Jobs that were initially difficult with technology have become easier. Likewise with work as a developer. In this era, it takes work that can be done quickly, precisely, and accurately. Inspired by the Copernicus' theory that the sun is the center of the solar system, this research aims to create a plugin that is integrated with the Unity game engine so that it can create dungeons quickly and dynamically using the orbital dungeon generation method. In general, games that have several dungeons are role playing games genre with the roguelike subgenre, where games of this type are widely adopted by well-known games. This method is expected to be employed by developers, especially game developers, to simplify and speed up the creation of games using dungeons, because the complexity of the system that is made can be adjusted according to needs.

Pepper SDK Class-Based Guidelines for Developers (개발자들을 위한 Pepper SDK의 클래스 기반 가이드라인)

  • Kim, Jeyeon;Park, Geon;Ju, Hanbin;Kang, Sunkyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.663-664
    • /
    • 2022
  • Pepper is a humanoid robot equipped with various sensors and joints. Therefore, it can be used in various ways depending on the purpose of the developer. The Pepper SDK is public and is used with the Android SDK. It supports Kotlin and Java languages, and although documents exist, they are inconvenient to use and difficult to aggregate. In this paper, we aim to provide convenience to those developers by describing guidelines based on some classes of Pepper SDK using Java language.

  • PDF

A Study on The Characteristics of Goods Planning and Architectural Planning of Urban Style Compact Apartment in Japan - Focus on Analysis of Apartments Sold in Tokyo City - (일본 도시형 컴팩트 아파트의 상품기획 및 계획상 특정에 관한 연구 - 도쿄도내 분양실례의 분석을 중심으로 -)

  • Yoon, Dong-Sik
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.5
    • /
    • pp.130-139
    • /
    • 2010
  • The urban style compact apartment which appeared at the end of 1990's was developed by the decrement of household members and in compliance with a new life style. Now it has its own market as a new trend. The purpose of this study is to better understand the characteristics of urban style compact apartments based on an analysis of apartments actually sold on 2008, in order to reflect on the future directions and developments. To support a comprehensive analysis, this study considered three types of compact apartments developed by : a. major developers which own multiple well-recognized brand names, b. mid-size developers under general brand names, c. new or small-size developers specializing in compact apartments. The results from 21 urban style compact apartments could be summarized as follow; 1. Most buyers are Singles or DINKs. The single women occupy a large percentage. 2. Condition of good location is under 5 minutes walk to station and accessibility to 2 and more station. 3. Exterior of building should be harmonious to surrounding and simple, the atmosphere of entrance hall should be warm and relaxed. 4. The spatial character of unit plans are developed by the ways of connecting spaces; 1) Connecting spaces by mobile partition: flexible spaces with expansion 2) Connecting spaces by hall: well arranged spaces with excursion and extends 5. The equipments of kitchen and security are fully carefully planned.

Smart Contract Code Rewritter for Improving Safety of Function Calls (함수 호출의 안전성 향상을 돕는 스마트 계약 코드 재작성기)

  • Lee, Sooyeon;Jung, Hyungkun;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.67-75
    • /
    • 2019
  • When a Solidity smart contract has a problem in calling a function of another contract, the fallback function is supposed to be executed automatically. However, it may be are arbitrarily created, with their behaviors unknown to developers, and fallback function execution is vulnerable to exploits by attackers. in In this paper, we propose a preprocessing based method to reduce the risk with less overhead of developers'. Developers mark the intention using the newly defined keywords in this paper, and the preprocessor reduces the risk by preprocessing the conditional variables and conditional statements according to the keywords.

Meta's Metaverse Platform Design in the Pre-launch and Ignition Life Stage

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.121-131
    • /
    • 2022
  • We look at the initial stage of Meta (previous Facebook)'s new metaverse platform and investigate its platform design in pre-launch and ignition life stage. From the Rocket Model (RM)'s theoretical logic, the results reveal that Meta firstly focuses on investing in key content developers by acquiring virtual reality (VR), video, music content firms and offering production support platform of the augmented reality (AR) content, 'Spark AR' last three years (2019~2021) for attracting high-potential developers and users. In terms of three matching criteria, Meta develops an Artificial Intelligence (AI) powered translation software, partners with Microsoft (MS) for cloud computing and AI, and develops an AI platform for realistic avatar, MyoSuite. In 'connect' function, Meta curates the game concept submitted by game developers, welcomes other game and SNS based metaverse apps, and expands Horizon Worlds (HW) on VR devices to PCs and mobile devices. In 'transact' function, Meta offers 'HW Creator Funding' program for metaverse, launches the first commercialized Meta Avatar Store on Meta's conventional SNS and Messaging apps by inviting all fashion creators to design and sell clothing in this store. Mata also launches an initial test of non-fungible token (NFT) display on Instagram and expands it to Facebook in the US. Lastly, regarding optimization, especially in the face of recent data privacy issues that have adversely affected corporate key performance indicators (KPIs), Meta assures not to collect any new data and to make its privacy policy easier to understand and update its terms of service more user friendly.

Design and Implementation of 3D Visualization System for Real-time Environmental Sensor Data (실시간 환경 센서 데이터의 3차원 시각화 시스템 설계 및 구현)

  • Kim, KyeongOg;Ban, KyeongJin;Ryu, NamHoon;Kim, EungKon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.783-787
    • /
    • 2007
  • Although data analysis in earlier days had been sufficiently done only by character user interface, users of these days are more used to the graphic user interface and the requirements for the user interface are gradually varying and increasing. In order to meet users' various wants and needs and to develop well-equipped interface, not only software developers but also professional designers who can complement the technique of the developers are needed. But in reality there are many restrictions and difficulties for developers and designers to work together cooperatively. Moreover, developing user interface in use of 3D type of graphics and animation techniques causes the rise of the developing cost. The thesis attempts to design and implement 3D visualization for real-time sensor data collected by the various environmental sensor and measuring devices, by using WPF (Window Presentation Foundation) which can make both developers and designers work together cooperatively and which makes it possible to implement various multimedia functions such as a 2D and 3D type of graphics, animation techniques, and an acoustic effect.

  • PDF

Determinants of Shopping Experience for Mall Shoppers: Empirical Investigation in an Emerging City of Raipur (India)

  • Singh, Harvinder;Prashar, Sanjeev;Agarwal, Rashmi;Sharma, Tarun Kumar
    • Asia-Pacific Journal of Business
    • /
    • v.5 no.1
    • /
    • pp.13-21
    • /
    • 2014
  • Shopping malls have become key players in the Indian retail space. Even in upcoming Indian towns, malls have been mushrooming. Raipur, the capital city of the Indian state of Chhattisgarh has witnessed the growth over the last few years. However, this unplanned growth of malls in cities is expected to lead to oversupply of mall space in the near future, making things difficult for mall developers. The study is an attempt to identify appropriate strategies for mall developers to iron out such kinks. This paper presents 'shopping experience' as a tool to compete, succeed and explore its composition in terms of its constituent factors. The paper uses Exploratory Factor Analysis (EFA) on a non-probability sample of 350 respondents. It condenses a set of twenty-two mall variables into five factors that directly influence the shopping experience. These factors included ambience, infrastructure, marketing focus, convenience and safety and security. In terms of significance, shoppers assigned different weightage to each of these factors. The study shed light on interesting insights regarding the expectations of mall shoppers in the city of Raipur. The results though interesting, may be extended to different social, economic and geographic contexts to check the universality. While strategizing, mall developers must assign proportionate effort on the factors based on the respective contribution to shopping experience. In light of intensifying competition in Raipur, the study is significant for future prospects of malls. In the absence of a scientific and objective basis, the developers run risk of making wrong investment and management decisions. This paper is a useful addition to the body of knowledge on management of shopping malls in India and is unique in terms of its focus on mall shoppers in the smaller Indian cities like Raipur.

  • PDF

Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045 (ISO/IEC 15408, 18045 기반 소프트웨어 취약성 분석 방법론)

  • Im, Jae-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.969-974
    • /
    • 2014
  • CC (Common Criteria) requires collecting vulnerability information and analyzing them by using penetration testing for evaluating IT security products. Under the time limited circumstance, developers cannot help but apply vulnerability analysis at random to the products. Without the systematic vulnerability analysis, it is inevitable to get the diverse vulnerability analysis results depending on competence in vulnerability analysis of developers. It causes that the security quality of the products are different despite of the same level of security assurance. It is even worse for the other IT products that are not obliged to get the CC evaluation to be applied the vulnerability analysis. This study describes not only how to apply vulnerability taxonomy to IT security vulnerability but also how to manage security quality of IT security products practically.