• Title/Summary/Keyword: Internet monitoring

Search Result 1,319, Processing Time 0.028 seconds

The Analysis of Efficient Disk Buffer Management Policies to Develop Undesignated Cultural Heritage Management and Real-time Theft Chase (실시간 비지정 문화재 관리 및 도난 추적 시스템 개발을 위한 효율적인 디스크 버퍼 관리 정책 분석)

  • Jun-Hyeong Choi;Sang-Ho Hwang;SeungMan Chun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1299-1306
    • /
    • 2023
  • In this paper, we present a system for undesignated cultural heritage management and real-time theft chase, which uses flash-based large-capacity storage. The proposed system is composed of 3 parts, such as a cultural management device, a flash-based server, and a monitoring service for managing cultural heritages and chasing thefts using IoT technologies. However flash-based storage needs methods to overcome the limited lifespan. Therefore, in this paper, we present a system, which uses the disk buffer in flash-based storage to overcome the disadvantage, and evaluate the system performance in various environments. In our experiments, LRU policy shows the number of direct writes in the flash-based storage by 10.7% on average compared with CLOCK and FCFS.

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

A Study on the establishment of IoT management process in terms of business according to Paradigm Shift (패러다임 전환에 의한 기업 측면의 IoT 경영 프로세스 구축방안 연구)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • This study examined the concepts of the Internet of Things(IoT), the major issue and IoT trend in the domestic and international market. also reviewed the advent of IoT era which caused a 'Paradigm Shift'. This study proposed a solution for the appropriate corresponding strategy in terms of Enterprise. Global competition began in the IoT market. So, Businesses to be competitive and responsive, the government's efforts, as well as the efforts of companies themselves is needed. In particular, in order to cope with the dynamic environment appropriately, faster and more efficient strategy is required. In other words, proposed a management strategy that can respond the IoT competitive era on tipping point through the vision of paradigm shift. We forecasted and proposed the emergence of paradigm shift through a comparative analysis of past management paradigm and IoT management paradigm as follow; I) Knowledge & learning oriented management, II) Technology & innovation oriented management, III) Demand driven management, IV) Global collaboration management. The Knowledge & learning oriented management paradigm is expected to be a new management paradigm due to the development of IT technology development and information processing technology. In addition to the rapid development such as IT infrastructure and processing of data, storage, knowledge sharing and learning has become more important. Currently Hardware-oriented management paradigm will be changed to the software-oriented paradigm. In particular, the software and platform market is a key component of the IoT ecosystem, has been estimated to be led by Technology & innovation oriented management. In 2011, Gartner announced the concept of "Demand-Driven Value Networks(DDVN)", DDVN emphasizes value of the whole of the network. Therefore, Demand driven management paradigm is creating demand for advanced process, not the process corresponding to the demand simply. Global collaboration management paradigm create the value creation through the fusion between technology, between countries, between industries. In particular, cooperation between enterprises that has financial resources and brand power and venture companies with creative ideas and technical will generate positive synergies. Through this, The large enterprises and small companies that can be win-win environment would be built. Cope with the a paradigm shift and to establish a management strategy of Enterprise process, this study utilized the 'RTE cyclone model' which proposed by Gartner. RTE concept consists of three stages, Lead, Operate, Manage. The Lead stage is utilizing capital to strengthen the business competitiveness. This stages has the goal of linking to external stimuli strategy development, also Execute the business strategy of the company for capital and investment activities and environmental changes. Manege stage is to respond appropriately to threats and internalize the goals of the enterprise. Operate stage proceeds to action for increasing the efficiency of the services across the enterprise, also achieve the integration and simplification of the process, with real-time data capture. RTE(Real Time Enterprise) concept has the value for practical use with the management strategy. Appropriately applied in this study, we propose a 'IoT-RTE Cyclone model' which emphasizes the agility of the enterprise. In addition, based on the real-time monitoring, analysis, act through IT and IoT technology. 'IoT-RTE Cyclone model' that could integrate the business processes of the enterprise each sector and support the overall service. therefore the model be used as an effective response strategy for Enterprise. In particular, IoT-RTE Cyclone Model is to respond to external events, waste elements are removed according to the process is repeated. Therefore, it is possible to model the operation of the process more efficient and agile. This IoT-RTE Cyclone Model can be used as an effective response strategy of the enterprise in terms of IoT era of rapidly changing because it supports the overall service of the enterprise. When this model leverages a collaborative system among enterprises it expects breakthrough cost savings through competitiveness, global lead time, minimizing duplication.

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

Development on Real Time Application System for Fisheries Oceanography Information (실시간 어장정보 생산 부이시스템 개발 및 활용연구)

  • Lee, Chu;Suh, Young-Sang;Hwang, Jae-Dong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2005
  • To provide observed oceanography data at coastal fish and shellfish farm in the northeastern sea of the Korean peninsula on real time base, we developed real time application system for fisheries oceanography information. The system has been made up a mooring buoy system, a server for oceanography data collection, a server for archiving data and a database system, and a web server for providing fisheries oceanography information using internet. Futhermore, to support letters service on a cellular phone, we developed the communication system from mooring buoy to cell phone on real time base. The oceanography data derived from the system are water temperature speed and direction of current in surface layer middle layer and bottom layer in hour. We were able to quantify short term variation of ocean conditions within several days at shellfish farm such as a scallop sea farm using our system. To reduce damages of fish and shellfish farm from abnormal phenomena of ocean conditions such as a broken stratification of water, an occurrence of abnormal coastal cold water and warm water we will be able to move vertically and horizontally the sea farm facilities to proper conditions using real time oceanography information derive from the system.

  • PDF

Development of a Water Sampling System for Unmanned Probe for Improvement of Water Quality Measurement (수질측정 방법 개선을 위한 무인 탐사체의 채수장치 개발방안)

  • Jung, Jin Woo;Cho, Kwang Hee;Kim, Min Ji
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.35 no.6
    • /
    • pp.527-534
    • /
    • 2017
  • The purpose of this study is to develop unmanned equipment that can automatically move to the desired point and measure water quality at the correct depth. For this purpose, we constructed a water sampling lift and water sampling container, an unmanned vessel equipped with a VRS-GPS, an acoustic echo sounder, and a water quality sensor. Also, we developed an automatic navigation algorithm and program, an automatic water sampling program, and a water quality map generation program. As a result of the experiment in the detention pond, the unmanned vessel sailed along the planned route with an accuracy of about 93% within the error range of 3m. In addition, the water quality sensor installed in the lift was able to acquire the water quality of the target area in real time and transmit it to the server via wireless Internet, and it was possible to monitor the water quality of each site in real time. Through field experiments, the water sampling lift was able to control the desired length with an accuracy of about 94%. The stretch length accuracy experiment of the water sampling lift was impossible to measure directly in the water, so it was replaced land-based experiment. We also found some unstable problems due to the weight of the water sampling lift and the weight of the air compressor to operate the water container. Except these two problems, we accomplished purpose of this study. An automated water quality measurement method using an unmanned vessel can be used to measure the quality of water in a difficult to access area and to secure the safety of the worker.

Design and Implementation of the JAVA Serial Communication Program to Control the Industrial Digital Indicator (산업용 디지털 지시계 제어를 위한 자바 시리얼 통신 프로그램의 설계와 구현)

  • Kim, Tai-Suk;Kim, Jong-Soo;Lee, Jung-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.794-801
    • /
    • 2011
  • Main machinery in the factory have various digital indicator to display its operating data for the manager. It is useful to control these datum at the remote office for factory automation in order to increase machine productivity. It is easy to use Ethernet infrastructure for remote communication. But most of all machinery in domestic factories still support RS232c or RS485 serial communication way. In this case to control machinery datum on the ethernet base, it is need to change RS232C or RS485 data to ethernet base. In this paper, in order to develop a remote progress management system through the wireless Internet, we show a design method to make easy maintenance by developing the system with both the JAVA language and RxTx Package for RS232c serial communication. For the system implementation, we added the digital indicator connect with a thermo couple to a machine which provide the real time status data of temperature. To connect machines management server program, we set up a convertor to change the RS485 data to the RS232c and also another convertor to change the RS232c data to wireless ethernet.

Risk Assessment of Volatile Organic Compounds (VOCs) and Formaldehyde in Korean Public Facilities: Derivation of Health Protection Criteria Levels

  • Kim, Ho-Hyun;Lim, Young-Wook;Shin, Dong-Chun;Sohn, Jong-Ryeul;Yang, Ji-Yeon
    • Asian Journal of Atmospheric Environment
    • /
    • v.5 no.2
    • /
    • pp.121-133
    • /
    • 2011
  • This study suggests criteria to conduct a risk assessment of VOCs and formaldehyde in uncontrolled public facilities. Pollutants and facilities were selected based on two years of monitoring data and exposure scenarios in 573 uncontrolled public facilities, composed of 10 types of public institutions. With the exception of social welfare facilities, lifetime ECRs of formaldehyde and benzene in each facility were higher in employees than in users, except in social welfare facilities. In social welfare facilities, the risk of benzene for users ($1{\times}10^{-5}$) was higher than that of workers ($1{\times}10^{-6}$) because facility users live in the facility 24 hours per day, compared to workers who spend an average of 8 hours per day in the facility. The risk of benzene to workers in restaurants, academies, performance halls, internet cafe and pubs were estimated as high as $1{\times}10^{-4}$ and the risk to workers in the theaters and karaoke bars were recorded as $1{\times}10^{-5}$. Because lifetime ECRs of carcinogens exceeded $1{\times}10^{-4}$ for workers and users in most facilities, risk management of formaldehyde and benzene in these facilities is necessary. Although HQs of toluene and xylenes did not exceed 1.0, their HQs did exceed 0.1 in some facilities, so they were evaluated as potentially harmful materials. Additionally, criteria for health protection in IAQ by facility are suggested at $60-100\;{\mu}g/m^3$ for formaldehyde, $400-500\;{\mu}g/m^3$ for TVOCs, $10-20\;{\mu}g/m^3$ for benzene, $150-170\;{\mu}g/m^3$ for toluene and $100\;{\mu}g/m^3$ for xylenes, based on the survey on IAQ and HRA methodology. The excess rates of IAQ to health protection criteria in all facilities were 16% for formaldehyde, 8% for TVOCs and benzene, 9% for toulene, and 5% for xylenes.

Remote Monitoring and Control of Tractor on Internet (인터넷을 이용한 트랙터 원격모니터링과 제어)

  • Kim, Sang-Cheol;Park, U-Pung;Lee, Yong-Beom;Han, Gil-Su;Im, Dong-Hyeok;Lee, Un-Yong
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • v.10 no.2
    • /
    • pp.59-63
    • /
    • 2005
  • 가. 자율주행 트랙터가 작업하는 동안 작동상태를 효과적으로 모니터링하고 제어할 수 있도록 하기 위해 인터넷을 통한 자율주행 트랙터의 모니터링과 원격제어 기술에 대하여 시험 하였다. 나. 트랙터를 모니터링하고 제어하는 곳과 경작지가 있는 곳을 인터넷으로 연결하고, 운전자가 탑승하지 않은 트랙터는 인터넷을 통해 전달받은 명령을 수행하도록 액튜에이터를 제어하고 제어되는 상황을 경작지에 위치한 카메라가 촬영하여 인터넷을 통하여 원격지의 운전자 쪽으로 전송하도록 시스템을 구성했다. 다. HST 트랙터 조종장치로서 서보제어가 가능한 액튜에이터를 개발 장착하고 제어성능을 시험하였다. 전자유압제어(EHPS)식 조향액튜에이터는 , 조향가능각 100도의 전범위에 조향 제어가 가능했으며 전조향에 필요한 시간은 약 1.6초 정도 였다. 피스톤 펌프의 사판각을 제어하는 전후진 제어기는 리니어 모터 구동식으로 총 제어 변위 50mm를 이동하는데 제어시간이 약 1.2초 소요되었다. 엔진 회전수를 제어하기위한 스로틀 액튜에이터는 리니어 모터 구동식으로 제어변위 30mm에 대해 제어시간이 0.8초 소요되었다. 3점 링크에 부착된 작업기의 위치를 제어하는 리프트 제어기도 리니어모터로 구동하였으며 제어거리 40mm에 대해 제어시간 0.9초정도가 소요되었다 라. 제작된 HST 무인 트랙터를 인터넷과 무선통신 시스템을 이용하여 원격 모니터링과제어 가능성에 대해 시험 했다. 인터넷을 통한 장거리 원격제어 및 모니터링 시험에서 제어신호의 전달지연은 0.3 ${\sim}$ 0.5초정도로 제어신호의 피이드 백을 확인할 때까지는 약1초정도의 대기 시간이 필요한 것으로 나타나 모니터링 및 제어 시스템의 개발 시 이를 고려할 설계가 필요한 것으로 나타났다.된 표층수온 분포값보다 2005년 2월에 관측된 표층수온 분포값이 상대적으로 낮은 분포 특성을 나타내고 있었다. 따라서 인공위성자료를 이용한 황해의 2004년 해황 분석 결과는 이상수온 상승의 원인이 쿠로시오 해류의 변동과 관련성이 높다고 판단되며 이에 대한 지속적인 연구가 현재 진행중에 있다.에 인산염 처리, 여기에 초음파 처리, 마지막 단계로 3분 끓이면 억제율이 68%까지 억제되었다. 이는 단일처리시 전혀 억제를 못하는 처리를 단계별로 한 단계씩 더해가면 allergy 억제효과가 나타난다고 할 수 있겠다. 초음파 처리도 역시 저 allergy 처리 공정에 이용될 수 있는데 이것은 그 처리로 인해 새로운 알러젠이 생성될 수도 있다. 또한 복합처리로 allergy를 감소시키면 연속적이고 동시적으로 하기 때문에 원가를 절감할 수 있다.환경현안에 대한 정치경제적 접근을 외면하지 말고 교과서 저작의 소재로 삼을 수 있어야 하며, 이는 '환경관리주의'와 '녹색소비'에 머물러 있는 '환경 지식교육'과 실천을 한단계 진전시키는 작업으로 이어질 것이다. 이후 10년의 환경교육은 바로 '생태적 합리성'과 '환경정의'라는 두 '화두'에 터하여 세워져야 한다.배액에서 약해를 보였으나, 25% 야자지방산의 경우 50 ${\sim}$ 100배액 어디에서도 액해를 보이지 않았다. 별도로 적용한 시험에서, 토마토의 경우에도 25% 야자지방산 비누 50 ${\sim}$ 100배액 모두 약해를 발생하지 않았으나, 오이에서는 25% 야자지방산 비누 100배액에도 약해를 나타내었다. 12. 이상의 결과, 천연지방산을 이용하여 유기농업에 허용되는 각종의 살충비누를 제조할 수 있었으며, 방제가 조사결과 진딧물, 응애 등 껍질이 연약한

  • PDF

Usability of a smartphone food picture app for assisting 24-hour dietary recall: a pilot study

  • Hongu, Nobuko;Pope, Benjamin T.;Bilgic, Pelin;Orr, Barron J.;Suzuki, Asuka;Kim, Angela Sarah;Merchant, Nirav C.;Roe, Denise J.
    • Nutrition Research and Practice
    • /
    • v.9 no.2
    • /
    • pp.207-212
    • /
    • 2015
  • BACKGROUND/OBJECTIVES: The Recaller app was developed to help individuals record their food intakes. This pilot study evaluated the usability of this new food picture application (app), which operates on a smartphone with an embedded camera and Internet capability. SUBJECTS/METHODS: Adults aged 19 to 28 years (23 males and 22 females) were assigned to use the Recaller app on six designated, nonconsecutive days in order to capture an image of each meal and snack before and after eating. The images were automatically time-stamped and uploaded by the app to the Recaller website. A trained nutritionist administered a 24-hour dietary recall interview 1 day after food images were taken. Participants' opinions of the Recaller app and its usability were determined by a follow-up survey. As an evaluation indicator of usability, the number of images taken was analyzed and multivariate Poisson regression used to model the factors determining the number of images sent. RESULTS: A total of 3,315 food images were uploaded throughout the study period. The median number of images taken per day was nine for males and 13 for females. The survey showed that the Recaller app was easy to use, and 50% of the participants would consider using the app daily. Predictors of a higher number of images were as follows: greater interval (hours) between the first and last food images sent, weekend, and female. CONCLUSIONS: The results of this pilot study provide valuable information for understanding the usability of the Recaller smartphone food picture app as well as other similarly designed apps. This study provides a model for assisting nutrition educators in their collection of food intake information by using tools available on smartphones. This innovative approach has the potential to improve recall of foods eaten and monitoring of dietary intake in nutritional studies.