• Title/Summary/Keyword: Smart Phone Use

Search Result 642, Processing Time 0.024 seconds

Analysis and Risk Prediction of Electrical Accidents Due to Climate Change (기후환경 변화에 따른 전기재해 위험도 분석)

  • Kim, Wan-Seok;Kim, Young-Hun;Kim, Jaehyuck;Oh, Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.603-610
    • /
    • 2018
  • The development of industry and the increase in the use of fossil fuels have accelerated the process of global warming and climate change, resulting in more frequent and intense natural disasters than ever before. Since electricity facilities are often installed outdoors, they are heavily influenced by natural disasters and the number of related accidents is increasing. In this paper, we analyzed the statistical status of domestic electrical fires, electric shock accidents, and electrical equipment accidents and hence analyzed the risk associated with climate change. Through the analysis of the electrical accidental data in connection with the various regional (metropolitan) climatic conditions (temperature, humidity), the risk rating and charts for each region and each equipment were produced. Based on this analysis, a basic electric risk prediction model is presented and a method of displaying an electric hazard prediction map for each region and each type of electric facilities through a website or smart phone app was developed using the proposed analysis data. In addition, efforts should be made to increase the durability of the electrical equipment and improve the resistance standards to prevent future disasters.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Development of Genuine Product Authentication Framework and Genuine Distinction Algorithm Using Design QR Code (디자인 QR코드 기반 정품인증 프레임워크 및 정품판별 알고리즘 개발)

  • Heo, Gyeongyong;Lee, Imgeun;Park, Some Sick;Woo, Young Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.13-20
    • /
    • 2015
  • A genuine product authentication framework and genuine distinction algorithm based on design QR code is proposed in this paper. The proposed framework consists of design QR code, a smart phone application for authentication, and a server system. Design QR code is a shape-modification of conventional QR code according to manufacturer's and/or product's need. In the design QR code, information about manufacturer and product is written. The written information can be read with general QR code reader, however, the content is transformed with authentication code, used in the first step authentication, and the meaning cannot be inferred. The application conducts the first step authentication and sends the resulting information to the server system for the second step authentication. The server system decides the genuinity using look-up history. The proposed framework can improve the authentication effect while minimizing the additional costs by managing the history through the server system. The proposed framework has proven to be effective in actual use, such as that used for the management of garbage bags in Ansan city.

The Influence of Worker's Stress and Anxiety on Work Commitment: Focused on Mediating Effect of Smartphone Addiction (직장인의 스트레스와 불안이 업무몰입에 미치는 영향 : 스마트폰 중독의 매개효과를 중심으로)

  • Oh, Ye-Keun;Kim, Kyung-Eun
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.487-495
    • /
    • 2017
  • The purposes of this study were to find smart-phone addiction how to mediate between worker's stress, anxiety and work commitment. The subject of survey was 329 workers in a public cooperation, and the data were analyzed by AMOS 18.0. The major findings were as follows; First, the higher the stress and anxiety, the more the direct effect on smartphone addiction. Second, smartphone addiction showed a significant negative relationship with work commitment. Third, smartphone addiction played a mediating role in the relationship between stress, anxiety, and work commitment. Workers with high levels of stress and anxiety were over-dependent on smartphones, which resulted in a decrease in work commitment. In order to prevent the problem of smartphone addiction of workers, it is necessary to prepare guidelines for correct use of smartphone in the workplace and service support should be provided according to the level of addiction. In addition, in order to improve work commitment, active support from the aspect of corporate welfare is needed to manage stress well. Finally, this study has a policy implication in that it reveals the route leading to smartphone addiction.

Design and Implementation of Cost-effecive Public Bicycle Sharing System based on IoT and Access Code Distribution (사물 인터넷과 액세스 코드 배포 기반의 경제적인 공공 자전거 공유 시스템의 설계 및 구현)

  • Bajracharya, Larsson;Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1123-1132
    • /
    • 2018
  • In this paper, we design and implement a public bicycle sharing system based on smart phone application capable of distributing access codes via internet connection. When smartphone user uses the application to request a bicycle unlock code, server receives the request and sends an encrypted code, which is used to unlock the bicycle at the station and the same code is used to return the bicycle. The station's hardware prototypes were built on top of Internet devices such as raspberry pi, arduino, keypad, and motor driver, and smartphone application basically includes shared bike rental and return functionality. It also includes an additional feature of reservation for a certain time period. We tested the implemented system, and found that it is efficient because it shows the average of 3-4 seconds delay. The system can be implemented to manage multiple bikes with a single control box, and as the user can use a smartphone application, this makes the system more cost effective.

Digital Blood Pressure Estimation with the Differential Value of the Arterial Pulse Waveform (맥파의 차동값에 의한 디지털 방식의 혈압 추정 기법)

  • Kim, Boyeon;Chang, Yunseok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.135-142
    • /
    • 2016
  • We proposed the new method to estimate the blood pressure with the differential value of the digital arterial pulse waveform and BP relation equation. To get the digital arterial pulse waveform, we use the arterial pulse waveform measurement system that has digital air-pressure sensor device and smart phone. The acquired digital arterial pulse waveforms are classified as hypertension group, normal group, and hypotension group, and we can derive the average differential value between the highest point and lowest point of a single waveform of individuals along with the group. In this study, we found the functional correlation between the blood pressure and differential value as a form of BP relation equation through the regression process on the average of differential value and blood pressure value from a tonometer. The Experimental results show the BP relation equation can give easy blood pressure estimation method with a high accuracy. Although this estimation method has over 66 % error rate and does not give the high level of the accuracy for the diastolic compares to the commercial tonometer, the estimation results for the systolic show the high accuracy that has less than 10 % error rate.

Study on implementation of Secure HTML5 Local Storage (안전한 HTML5 로컬스토리지 구현에 대한 연구)

  • Myeong, Hee-Won;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.83-93
    • /
    • 2012
  • HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom, HTML5 is spotlighted because it can be applied to cross platforms in mobile web environments. Specially the local Storage that has been listed in new features in HTML5 supports offline function for web application that enables web application to be run even when the mobile is not connected to 3G or wifi. With Local storage, development of server-independent web application can be possible. However Local storage stores plaintext data in it without applying any security measure and this makes the plaintext data dangerous to security threats that are already exist in other client side storages like Cookie. In the paper we propose secure Local storage methods to offer a safe way to store and retrieve data in Local storage guaranteeing its performance. Suggested functions in this paper follow localStorage standard API and use a module that provide cryptographic function. We also prove the efficiency of suggested secure Local storage based on its performance evaluation with implementation.

FMD response cow hooves and temperature detection algorithm using a thermal imaging camera (열화상 카메라를 이용한 구제역 대응 소 발굽 온도 검출 알고리즘 개발)

  • Yu, Chan-Ju;Kim, Jeong-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.292-301
    • /
    • 2016
  • Because damages arising from the occurrence of foot-and-mouth disease (FMD) are very great, it is essential to make a preemptive diagnosis to cope with it in order to minimize those damages. The main symptoms of foot-and-mouth disease are body temperature increase, loss of appetite, formation of blisters in the mouth, on hooves and breasts, etc. in a cow or a bull, among which the body temperature check is the easiest and quickest way to detect the disease. In this paper, an algorithm to detect FMD from the hooves of cattle was developed and implemented for preemptive coping with foot-and-mouth disease, and a hoof check test is conducted after the installation of a high-resolution camera module, a thermo-graphic camera, and a temperature/humidity module in the cattle shed. Through the algorithm and system developed in this study, it is possible to cope with an early-stage situation in which cattle are suspected as suffering from foot-and-mouth disease, creating an optimized growth environment for cattle. In particular, in this study, the system to cope with FMD does not use a portable thermo-graphic camera, but a fixed camera attached to the cattle shed. It does not need additional personnel, has a function to measure the temperature of cattle hooves automatically through an image algorithm, and includes an automated alarm for a smart phone. This system enables the prediction of a possible occurrence of foot-and-mouth disease on a real-time basis, and also enables initial-stage disinfection to be performed to cope with the disease without needing extra personnel.