• Title/Summary/Keyword: Mobile internet

Search Result 3,608, Processing Time 0.032 seconds

Research on the touch points of city brand users based on M-ICT (M-ICT시대의 도시 브랜드 사용자의 터치포인트에 관한 연구)

  • Yao, Xiao-Dong;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.289-296
    • /
    • 2019
  • In the era of M-ICT (mobile information communication technology), it is becoming more and more important to establish a city brand image that is "user-centered" and creates a new experience of "interaction between people, people and things, and people and space". The experience of city users on the brand image of a city is the key factor to determine the competitiveness of the city, among which the user's research on the touch point of the city brand is particularly important. The purpose of this study is to enhance the user's brand experience and enhance the city's brand competitiveness. The research methods of this paper are literature review and investigation. Firstly, the background and purpose of the study are expounded, then the characteristics and ways of user experience touch points are defined through the document review, and the multi-latitude composition model of city brand touch points is proposed. By means of user investigation, the structural characteristics of high frequency touch points between digital touch points and physical touch points are obtained. According to the problems found in the investigation, the optimal design strategy of touch point is put forward in combination with the case. The innovation of this study is to study the relationship between the city brand and the touch point of user experience from the perspective of user experience, and propose a multi-latitude model of the touch point of city brand.

Design of detection method for smoking based on Deep Neural Network (딥뉴럴네트워크 기반의 흡연 탐지기법 설계)

  • Lee, Sanghyun;Yoon, Hyunsoo;Kwon, Hyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.191-200
    • /
    • 2021
  • Artificial intelligence technology is developing in an environment where a lot of data is produced due to the development of computing technology, a cloud environment that can store data, and the spread of personal mobile phones. Among these artificial intelligence technologies, the deep neural network provides excellent performance in image recognition and image classification. There have been many studies on image detection for forest fires and fire prevention using such a deep neural network, but studies on detection of cigarette smoking were insufficient. Meanwhile, military units are establishing surveillance systems for various facilities through CCTV, and it is necessary to detect smoking near ammunition stores or non-smoking areas to prevent fires and explosions. In this paper, by reflecting experimentally optimized numerical values such as activation function and learning rate, we did the detection of smoking pictures and non-smoking pictures in two cases. As experimental data, data was constructed by crawling using pictures of smoking and non-smoking published on the Internet, and a machine learning library was used. As a result of the experiment, when the learning rate is 0.004 and the optimization algorithm Adam is used, it can be seen that the accuracy of 93% and F1-score of 94% are obtained.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

User-Centered Service Design Research on Shared Vehicle for Camping (캠핑용 공유 차량 사용자 중심 서비스 디자인 연구)

  • Hur, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.473-482
    • /
    • 2019
  • People's leisure activities have increased due to changes in perception of social life. Camping cars are becoming popular due to the development of camping culture and traveling. However, there are not many users compared to the population of the camper due to the difficulty of economy and usability. Making it not easy to purchase or rent a camping car. Therefore, this study researches on camping service by combining shared services. It is aimed to provide a user centered camping shared service considering usage and economic efficiency. This study analyzed the concept, characteristics and current status of shared service and camping car with reference to domestic, overseas literature and internet data to provide basic data of camping car using shared service. In addition, through case study of shared vehicles, it is possible to grasp the current market. Integrate P2P, B2C, renting company and individuals to derive the design of A2P (All to People)service which connects and shares all. The user can have its own space available at the desired place and time. This study is a camping or unique mobile space service design that can be easily experienced in everyday life. It will reduce the strain of maintaining expenses and also process of pick up, return is freely making user-centered service design. This service design will lead to a diverse range of leisure activities and contribute to the upsweep of the camper industry.

A Study on Communication Research and Trends in Journal of Korean Gerontological Society: 1980-2009 (한국노년학의 커뮤니케이션 연구 동향: 1980-2009)

  • Hong, Myungshin
    • 한국노년학
    • /
    • v.30 no.1
    • /
    • pp.31-47
    • /
    • 2010
  • The purpose of this study is to analyze communication topics in Journal of Korean Gerontological Society from 1980 to 2009. Out of all published over one thousand articles, 54 articles were selected by content analysis. The published time, the number of authors, the author's institutions, type of communication and media, methodologies, and so on were analyzed for this study. The conclusion of this study are as follows; First, the articles regarding on communication published only one throughout in 1980's. However, the articles have been gradually published since 1990's. Second, the authors came mainly from universities especially those who are engaged in social welfare field. Third, the types of communication are concentrated on group communication. Interestingly enough, it is found that mass communication such TV, magazine, and internet were analyzing in-depth. Telephone is one of most important mediated human communication media. On the contrary, mobile phone and computer were researched on not for the usage but for the education purposes. Forth, in methodologies, authors are used mainly survey method and selected content analysis in all media research. In conclusion, the scholars of gerontology and communications should co-operate and help each other to promote aging and communication field.

Factors Influencing the Using Intention of Shared Economy Services (공유경제서비스 이용의도 영향 요인에 관한 연구)

  • Cho, Eun-Joo;Suh, Sang-Hyuk
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.4
    • /
    • pp.1411-1444
    • /
    • 2018
  • The shared economy has been growing rapidly in recent years, creating an innovative economic paradigm based on the growing interest in sustainable development in the environmental aspect, the development of ICT technology, and the spread of mobile, Internet and smart environments. The purpose of this study is to investigate the factors influencing of the shared economy on the intention of domestic consumers using shared economy services. Also we would like to find out if personal orientation on sustainable development actually have a valid impact on perceived values and intentions of using Shared Economy services. The result of the study shows that the factors affecting the intention to use Shared Economy service were perceived usefulness, subjective norm, perceived risk, and sustainable orientation which are characteristics of Shared Economy service. In addition the result of the indirect effect study Find that the individual felt the emotional value through the perceived usefulness and have the greatest influence on intention to use. Therefore, it implies that the marketing strategy of the Shared Economy service should take into consideration the elements that can feel emotional value through usability. In the future, We research on domestic success and failure cases of Shared Economy services and robust verification of influential factors could be continue.

Study on Establishment of Deoksugung Palace, Tourist Information Services using Augmented Reality(AR) Technology (증강현실(AR) 기술을 이용한 덕수궁 관광안내서비스 구축방안 연구)

  • Oh, Sung-hwan;Kim, Ki-duk
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.2
    • /
    • pp.26-45
    • /
    • 2013
  • Sudden increase exceeding 30million in the number of smart phone users, and rising interest in the technology of augmented reality, is now trying to combine it with AR technology in other areas very much. The field of cultural heritage, which has been constructed by the Internet and 3D technology, is not unusual and this field is now rapidly changing thanks to the AR technology which can make users experience cultural heritage with high reality. The Palaces in Seoul, however, use fragmentary tools of information - lack of heritage commentators, leaflet, etc, even though the number of visitors is gradually increasing. Therefore, three-dimensional and comprehensive cultural heritage information service is needed with the guidance in the mobile era. This study utilizes the AR technology for building the Deoksugung Tourist Information Service Application(App.) applying the markerless-based recognition technology which is a more advanced tool than the location-based AR technology. This new AR technology can switch perceived real images such as the tablet of the King in the Palace of in the real world, patterns and pedestals into virtual world, which can reproduce the damaged cultural assets as 3D. This also composes photos of the past with the current buildings, which can increase people's interest and absorption of the contents, and helps them understand and be aware of Korean traditional culture and cultural heritage effectively. In addition, convergence between IT new technology, Augmented Reality(AR) and humanities through storytelling based implementation of cultural heritage in smart phone is attempted to demonstrate that there is strength in which augmented reality technique exerts infinite creativity based on actual reality world.

Design and Implementation of Visitor Access Control System using Deep learning Face Recognition (딥러닝 얼굴인식 기술을 활용한 방문자 출입관리 시스템 설계와 구현)

  • Heo, Seok-Yeol;Kim, Kang Min;Lee, Wan-Jik
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.245-251
    • /
    • 2021
  • As the trend of steadily increasing the number of single or double household, there is a growing demand to see who is the outsider visiting the home during the free time. Various models of face recognition technology have been proposed through many studies, and Harr Cascade of OpenCV and Hog of Dlib are representative open source models. Among the two modes, Dlib's Hog has strengths in front of the indoor and at a limited distance, which is the focus of this study. In this paper, a face recognition visitor access system based on Dlib was designed and implemented. The whole system consists of a front module, a server module, and a mobile module, and in detail, it includes face registration, face recognition, real-time visitor verification and remote control, and video storage functions. The Precision, Specificity, and Accuracy according to the change of the distance threshold value were calculated using the error matrix with the photos published on the Internet, and compared with the results of previous studies. As a result of the experiment, it was confirmed that the implemented system was operating normally, and the result was confirmed to be similar to that reported by Dlib.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.