• Title/Summary/Keyword: PersonalJava

Search Result 57, Processing Time 0.028 seconds

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

An Application for Management of National Geodetic Control Points on the Web 2.0 (Web 2.0 기반 국가기준점 어플리케이션 설계)

  • Kim, Tae-Woo;Kim, Jyung-Wuk;Suh, Yong-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.79-84
    • /
    • 2009
  • As a surveying standard of a nation, the Korean geodetic control points such as triangulation points and benchmarks require continuous and effective management toward a spatially enabled society. As the developments of information technologies, use of mobile devices like PDA (personal digital assistant) has been increasing and the Web 2.0 environment became an important part of GIS. In this context, the management systems for national geodetic control points should be upgraded in accordance with the current trend, particularly for more interactive user-interface on the Web 2.0. This paper describes the framework design and prototype implementation of a Web 2.0 GIS application for the management of Korean geodetic control points. Our system enables a real-time update of the control point information and provides aerial photos on vector maps using Ajax(Asynchronous JavaScript and XML) techniques.

  • PDF

A Client Agent Framework for Dynamic Connection with Web Services (웹 서비스 동적 연동을 위한 클라이언트 에이전트 프레임워크)

  • Park, Young-Joon;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.339-346
    • /
    • 2009
  • In order to connect web services, clients generally should use heavy frameworks such as .Net framework and Java run-time environment, which require high performance hardware resources like a personal computer. Therefore, it is impossible for sensor nodes to handle web services due to their limited resources. In this paper, a client agent framework is proposed for dynamically connecting web services in the client node with limited resources. A client agent, which is managed by the framework in other server, has full capability for connecting web services, while a real client has a simple connection module with the client agent. In this framework, a client agent is dynamically generated using the WSDL in the web service server. By using the framework, sensor nodes or mobile devices can enhance their functionalities and services by accessing web services with minimum resources.

Improvement of User Recognition Rate using Multi-modal Biometrics (다중생체인식 기법을 이용한사용자 인식률 향상)

  • Geum, Myung-Hwan;Lee, Kyu-Won;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1456-1462
    • /
    • 2008
  • In general, it is known a single biometric-based personal authentication has limitation to improve recognition rate due to weakness of individual recognition scheme. The recognition rate of face recognition system can be reduced by environmental factor such as illumination, while speaker verification system does not perform well with added surrounding noise. In this paper, a multi-modal biometric system composed of face and voice recognition system is proposed in order to improve the performance of the individual authentication system. The proposed empirical weight sum rule based on the reliability of the individual authentication system is applied to improve the performance of multi-modal biometrics. Since the proposed system is implemented using JAVA applet with security function, it can be utilized in the field of user authentication on the generic Web.

Empirical Analysis of the Effect of Avatars on Learner's e-Learning Performance : Emphasis on Trust Transference between Avatars and Contents (아바타가 학습자 이러닝 성과에 미치는 영향에 관한 실증연구:아바타와 학습내용간 신뢰전이를 중심으로)

  • Chae, Seong-Wook;Lee, Kun-Chang;Lee, Keun-Young
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.149-176
    • /
    • 2009
  • In the recent e-learning environment, avatars are often used to help learners get familiar with the contents, which is ultimately to motivate them to study more. Therefore, it is important to investigate whether avatars have actually the desirable effect on users of e-learning materials. Surprisingly, however, no extensive study has been conducted on this crucial issue Accordingly, main objectives this study are summarized as follows. First, we need to gain better understanding of how much learners' trust towards avatars (termed as "avatar trust") is transferred to learners' trust towards e-learning contents (termed as "contents trust"). Second, we need to investigate how much learners' personal relationships with avatars as well as learning behaviors change depending on avatar types (attractive vs. professional) and contents complexity (easy vs. difficult). As described in the study objectives, in order for us to analyze empirical data more systematically, we classified avatar types into two: "attractive" and "professional;" the contents are categorized as either "easy" or "difficult." Therefore, it is essential for this study to build a prototype e-learning website on which our research purpose can be realized and tested effectively with proper avatar types and e-learning contents. For this purpose, we built a prototype e-learning website, in which avatars are invited from currently working avatar instructors used in real-world e-learning websites, and e-learning contents are adapted from real-world contents about Java programming topic, which have been proved to have shown high quality and reliability. Our research method includes questionnaire survey by inviting a number of valid respondents comprised of office workers who are believed to have high demands for the e-learning contents as well as those who have previous experience with avatar instructors. Respondents were given one of the four e-learning experiment conditions (2 avatar types x 2 contents types) on a random basis. Each experimental e-learning condition is framed to have the same quality but different avatar type and content complexity. Then the respondents are asked to fill out the survey form which has questions about avatar trust, contents trust, personal relationships with avatar, and learning behavior, among others. Regarding the constructs used in research model, we based them rigorously on previous studies. For example, we used six constructs such as behavior to give information (BGI), behavior to obtain information (BOI), need for inclusion wanted, need for control wanted, contents trust, and avatar trust. To measure them, 7-Likert scales were used in the questionnaire. E-learning performance was measured indirectly through two constructs such as BGI and BOI. Six constructs used in the research model were adopted and revised from the FIRO-B model suggested by Schutz. Empirical results are as follows: First, professional avatars are more effective for difficult contents, while attractive avatars were not as effective for easy contents. Second, our study results ascertained that avatar trust transfers to contents trust regardless of avatar types and contents complexity.

Indonesia, Malaysia Airline's aircraft accidents and the Indonesian, Korean, Chinese Aviation Law and the 1999 Montreal Convention

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.37-81
    • /
    • 2015
  • AirAsia QZ8501 Jet departed from Juanda International Airport in, Surabaya, Indonesia at 05:35 on Dec. 28, 2014 and was scheduled to arrive at Changi International Airport in Singapore at 08:30 the same day. The aircraft, an Airbus A320-200 crashed into the Java Sea on Dec. 28, 2014 carrying 162 passengers and crew off the coast of Indonesia's second largest city Surabaya on its way to Singapore. Indonesia's AirAsia jet carrying 162 people lost contact with ground control on Dec. 28, 2014. The aircraft's debris was found about 66 miles from the plane's last detected position. The 155 passengers and seven crew members aboard Flight QZ 8501, which vanished from radar 42 minutes after having departed Indonesia's second largest city of Surabaya bound for Singapore early Dec. 28, 2014. AirAsia QZ8501 had on board 137 adult passengers, 17 children and one infant, along with two pilots and five crew members in the aircraft, a majority of them Indonesian nationals. On board Flight QZ8501 were 155 Indonesian, three South Koreans, and one person each from Singapore, Malaysia and the UK. The Malaysia Airlines Flight 370 departed from Kuala Lumpur International Airport on March 8, 2014 at 00:41 local time and was scheduled to land at Beijing's Capital International Airport at 06:30 local time. Malaysia Airlines also marketed as China Southern Airlines Flight 748 (CZ748) through a code-share agreement, was a scheduled international passenger flight that disappeared on 8 March 2014 en route from Kuala Lumpur International Airport to Beijing's Capital International Airport (a distance of 2,743 miles: 4,414 km). The aircraft, a Boeing 777-200ER, last made contact with air traffic control less than an hour after takeoff. Operated by Malaysia Airlines (MAS), the aircraft carried 12 crew members and 227 passengers from 15 nations. There were 227 passengers, including 153 Chinese and 38 Malaysians, according to records. Nearly two-thirds of the passengers on Flight 370 were from China. On April 5, 2014 what could be the wreckage of the ill-fated Malaysia Airlines was found. What appeared to be the remnants of flight MH370 have been spotted drifting in a remote section of the Indian Ocean. Compensation for loss of life is vastly different between US. passengers and non-U.S. passengers. "If the claim is brought in the US. court, it's of significantly more value than if it's brought into any other court." Some victims and survivors of the Indonesian and Malaysia airline's air crash case would like to sue the lawsuit to the United States court in order to receive a larger compensation package for damage caused by an accident that occurred in the sea of Java sea and the Indian ocean and rather than taking it to the Indonesian or Malaysian court. Though each victim and survivor of the Indonesian and Malaysia airline's air crash case will receive an unconditional 113,100 Unit of Account (SDR) as an amount of compensation for damage from Indonesia's AirAsia and Malaysia Airlines in accordance with Article 21, 1 (absolute, strict, no-fault liability system) of the 1999 Montreal Convention. But if Indonesia AirAsia airlines and Malaysia Airlines cannot prove as to the following two points without fault based on Article 21, 2 (presumed faulty system) of the 1999 Montreal Convention, AirAsia of Indonesiaand Malaysia Airlines will be burdened the unlimited liability to the each victim and survivor of the Indonesian and Malaysia airline's air crash case such as (1) such damage was not due to the negligence or other wrongful act or omission of the air carrier or its servants or agents, or (2) such damage was solely due to the negligence or other wrongful act or omission of a third party. In this researcher's view for the aforementioned reasons, and under the laws of China, Indonesia, Malaysia and Korea the Chinese, Indonesian, Malaysia and Korean, some victims and survivors of the crash of the two flights are entitled to receive possibly from more than 113,100 SDR to 5 million US$ from the two airlines or from the Aviation Insurance Company based on decision of the American court. It could also be argued that it is reasonable and necessary to revise the clause referring to bodily injury to a clause mentioning personal injury based on Article 17 of the 1999 Montreal Convention so as to be included the mental injury and condolence in the near future.

Development of User Based Recommender System using Social Network for u-Healthcare (사회 네트워크를 이용한 사용자 기반 유헬스케어 서비스 추천 시스템 개발)

  • Kim, Hyea-Kyeong;Choi, Il-Young;Ha, Ki-Mok;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.181-199
    • /
    • 2010
  • As rapid progress of population aging and strong interest in health, the demand for new healthcare service is increasing. Until now healthcare service has provided post treatment by face-to-face manner. But according to related researches, proactive treatment is resulted to be more effective for preventing diseases. Particularly, the existing healthcare services have limitations in preventing and managing metabolic syndrome such a lifestyle disease, because the cause of metabolic syndrome is related to life habit. As the advent of ubiquitous technology, patients with the metabolic syndrome can improve life habit such as poor eating habits and physical inactivity without the constraints of time and space through u-healthcare service. Therefore, lots of researches for u-healthcare service focus on providing the personalized healthcare service for preventing and managing metabolic syndrome. For example, Kim et al.(2010) have proposed a healthcare model for providing the customized calories and rates of nutrition factors by analyzing the user's preference in foods. Lee et al.(2010) have suggested the customized diet recommendation service considering the basic information, vital signs, family history of diseases and food preferences to prevent and manage coronary heart disease. And, Kim and Han(2004) have demonstrated that the web-based nutrition counseling has effects on food intake and lipids of patients with hyperlipidemia. However, the existing researches for u-healthcare service focus on providing the predefined one-way u-healthcare service. Thus, users have a tendency to easily lose interest in improving life habit. To solve such a problem of u-healthcare service, this research suggests a u-healthcare recommender system which is based on collaborative filtering principle and social network. This research follows the principle of collaborative filtering, but preserves local networks (consisting of small group of similar neighbors) for target users to recommend context aware healthcare services. Our research is consisted of the following five steps. In the first step, user profile is created using the usage history data for improvement in life habit. And then, a set of users known as neighbors is formed by the degree of similarity between the users, which is calculated by Pearson correlation coefficient. In the second step, the target user obtains service information from his/her neighbors. In the third step, recommendation list of top-N service is generated for the target user. Making the list, we use the multi-filtering based on user's psychological context information and body mass index (BMI) information for the detailed recommendation. In the fourth step, the personal information, which is the history of the usage service, is updated when the target user uses the recommended service. In the final step, a social network is reformed to continually provide qualified recommendation. For example, the neighbors may be excluded from the social network if the target user doesn't like the recommendation list received from them. That is, this step updates each user's neighbors locally, so maintains the updated local neighbors always to give context aware recommendation in real time. The characteristics of our research as follows. First, we develop the u-healthcare recommender system for improving life habit such as poor eating habits and physical inactivity. Second, the proposed recommender system uses autonomous collaboration, which enables users to prevent dropping and not to lose user's interest in improving life habit. Third, the reformation of the social network is automated to maintain the quality of recommendation. Finally, this research has implemented a mobile prototype system using JAVA and Microsoft Access2007 to recommend the prescribed foods and exercises for chronic disease prevention, which are provided by A university medical center. This research intends to prevent diseases such as chronic illnesses and to improve user's lifestyle through providing context aware and personalized food and exercise services with the help of similar users'experience and knowledge. We expect that the user of this system can improve their life habit with the help of handheld mobile smart phone, because it uses autonomous collaboration to arouse interest in healthcare.