• Title/Summary/Keyword: Smart application

Search Result 3,076, Processing Time 0.027 seconds

Developing Adaptive Math Learning Program Using Artificial Intelligence (인공지능을 활용한 맞춤형 수학학습 프로그램 개발)

  • Ee, Ji Hye;Huh, Nan
    • East Asian mathematical journal
    • /
    • v.36 no.2
    • /
    • pp.273-289
    • /
    • 2020
  • This study introduces the process and results of developing an adaptive math learning program for self-directed learning. It presented the process and results of developing an adaptive math learning program that takes into account the level of learners using artificial intelligence. We wanted to get some suggestions on developing programs for artificial intelligence-based mathematics. The program was developed as Math4U, an application based on smart devices in the "character and expression" area for 7th grade. The Application Math4U may be used differently depending on its purpose. It is also expected to be a useful tool for providing self-directed learning to students as the basis for educational research using smart devices in a changing educational environment.

Development of Smart Healthcare Scheduling Monitoring System for Elderly Health Care

  • Cho, Sooyong;Lee, Sang Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.51-59
    • /
    • 2018
  • Health care has attracted a lot of attention, recently due to an increase in life expectancy and interest in health. Various biometric data of the user are collected by using the air pressure sensor, gyro sensor, acceleration sensor, and heart rate sensor to perform the Smart Health Care Activity Tracker function. Basically, smartphone application is made and tested for biometric data collection, but the Arduino platform and bio-signal measurement sensor are used to confirm the accuracy of the measured value of the smartphone. Use the Google Maps API to set user goals and provide guidance on the location of the user and the points the user wants. Also, the basic configuration of the main UI is composed of the screen of the camera, and it is possible for the user to confirm the forward while using the application, so that accident prevention is possible.

An Analysis of Types and Contents on Mathmatics Learning Application (수학 학습용 애플리케이션 유형 및 내용 분석)

  • Huh, Nan
    • East Asian mathematical journal
    • /
    • v.33 no.4
    • /
    • pp.413-429
    • /
    • 2017
  • This study is a basic study for developing a mathematical learning application program that can be used in smart devices for adaptive learning. We selected 20 mathematical learning applications including middle school contents and analyzed learning types. And we analyzed the contents and the learning process. As a result, most learning types of mathematics learning applications were problem-centered. Contents analysis results showed that the most applications have achievement goals. The factors that induce interest in learning were lacking and feedback was not provided sufficiently. Analysis of the learning process showed that most of the math learning applications were classified according to their purpose and characteristics.

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Study on the utilization of Travel site Matjip (Reputable Restaurant) search application(APP) using Smart Phone (스마트폰을 이용한 여행지 맛집 검색 앱 활용에 관한 연구)

  • Yoon, KyungBae;Song, Seung-Heon
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.437-443
    • /
    • 2013
  • This thesis enhanced the degree of utilization of smart phone through carrying out the application/app. which search and visit matjip (reputable restaurant) at the travel sites using smart phones. When we search matjip (reputable restaurant) using materialized application, we can select the best matjip (reputable restaurant) we want. Especially, this application evaluates individual restaurants through the level of utilization and satisfaction by consumer including appropriate menus, the style and design of the restaurant, reasonableness of prices, service of restaurant employees and sanitation management by region and registered the information input to DB in advance while classifying based on the evaluation scores to keep track for individual tastes. And individuals can record their personal memories to input columns. On top of that, information field for transportation is also designed to enhance the accessibility during travel, and in the future the application can be further utilized through the expansion of the DB through the input of famous tour sites and acquaintance's house information.

APPLICATION OF HIGH RESOLUTION SATELLITE IMAGERY ON X3D-BASED SEMANTIC WEB USING SMART GRAPHICS

  • Kim, Hak-Hoon;Lee, Kiwon
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.586-589
    • /
    • 2006
  • High resolution satellite imagery is regarded as one of the important data sets to engineering application, as well as conventional scientific application. However, despite this general view, there are a few target applications using this information. In this study, the possibility for the future wide uses in associated with smart graphics of this information is investigated. The concept of smart graphics can be termed intelligent graphics with XML-based structure and knowledge related to semantic web, which is a useful component for the data dissemination framework model in a multi-layered web-based application. In the first step in this study, high resolution imagery is transformed to GML (Geographic Markup Language)-based structure with attribute schema and geo-references. In the second, this information is linked with GIS data sets, and this fused data set is represented in the X3D (eXtensible 3D), ISO-based web 3D graphic standard, with styling attributes, in the next stop. The main advantages of this approach using GML and X3D are the flourished representations of a source data according to user/clients’ needs and structured 3D visualization linked with other XML-based application. As for the demonstration of this scheme, 3D urban modelling case with actual data sets is presented.

  • PDF

Mobile Book Management Application using Camera of Smart Phone (스마트폰 카메라를 이용한 모바일 도서 관리 어플리케이션)

  • Chung, Myoung-Beom;Kang, Mi-Ae;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.87-95
    • /
    • 2012
  • In this paper, we propose a mobile book management application using the camera of a smart phone and the open API book information provided online. The camera automatically scans the bar-code or QR-code of a particular book. The code of that book is used to transmit detailed information to the open API. Then the proposed application records this information for use in an "Scan list" or an "My book list". This application notes the page of the book that the user is currently reading and, if the user has read the entire book, he or she can comment about it. Therefore, the proposed application provides useful functions so that the users can manage their books effectively.

Application Design and Implementation for Spinal Disorder Prevention using Kotlin (코틀린을 사용한 척추 질환 예방을 위한 Application 설계 및 구현)

  • Kyoung-Ju Minn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.71-77
    • /
    • 2024
  • The increasing use of smart devices in South Korea has led to a rise in patients with spinal disorders. This study aims to develop an Android application with exercise prompts to prevent spinal disorders, enhance the usability of healthcare applications, and utilize Android's overlay technology to encourage physical activity. Considering South Korea's total population, it is estimated that around one million individuals may suffer from spinal disorders due to smart device usage. Emphasizing the importance of maintaining proper posture and regular exercise habits, this research highlights the need for innovative application development to assist users in preventing musculoskeletal disorders caused by smart device usage.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.