• Title/Summary/Keyword: Smart mobile

Search Result 2,327, Processing Time 0.034 seconds

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2491-2496
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Smart Phone users use the copyrighted multimedia contents illegally from hacking their Smart Phone with Jail Breaking and Rooting. Legal issues according to the Korea-U.S. FTA. and high relevance with crime as mobile communication terminal, the utilization of created and saved digital evidence is high, the mobile forensic evidence study is required. This paper studied method and notice of legal seizure and search assuming the Smart Phone copyright violation. Research the status of Smart Phone copyright violation and related violation by category as broadcasting, movies, music, e-book etc. Research the method of submit a report to the court by applying techniques to forensic. The results of this research will contribute to the provide of Smart Phone crime evidence and mobile forensic technology.

A Smart Script System for Implementing Intelligent Behaviors of Mobile Personal Assistants (모바일 퍼스널 어시스턴트의 지능 행위 구현을 위한 스마트 스크립트 시스템)

  • Kim, In-Cheol;Oh, Hui-Kyoung
    • The KIPS Transactions:PartB
    • /
    • v.18B no.2
    • /
    • pp.83-86
    • /
    • 2011
  • In this paper, we present the plan execution model for dynamic mobile computing environments, and then introduce the smart script system developed on these base models. The smart script system includes the smart script language, in which the task knowledge of a mobile personal assistant is represented, and the script execution engine, by which the scripts are dynamically executed in response to the given task goal and the environmental changes. In order to evaluate the utility and the performance of our system, we implement an application service called Smart Reservation and conduct some experiments.

Adaptive Cloud Offloading of Augmented Reality Applications on Smart Devices for Minimum Energy Consumption

  • Chung, Jong-Moon;Park, Yong-Suk;Park, Jong-Hong;Cho, HyoungJun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3090-3102
    • /
    • 2015
  • The accuracy of an augmented reality (AR) application is highly dependent on the resolution of the object's image and the device's computational processing capability. Naturally, a mobile smart device equipped with a high-resolution camera becomes the best platform for portable AR services. AR applications require significant energy consumption and very fast response time, which are big burdens to the smart device. However, there are very few ways to overcome these burdens. Computation offloading via mobile cloud computing has the potential to provide energy savings and enhance the performance of applications executed on smart devices. Therefore, in this paper, adaptive mobile computation offloading of mobile AR applications is considered in order to determine optimal offloading points that satisfy the required quality of experience (QoE) while consuming minimum energy of the smart device. AR feature extraction based on SURF algorithm is partitioned into sub-stages in order to determine the optimal AR cloud computational offloading point based on conditions of the smart device, wireless and wired networks, and AR service cloud servers. Tradeoffs in energy savings and processing time are explored also taking network congestion and server load conditions into account.

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.215-218
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Accordingly, Smart Phone users to hack their Jail Breaking and Rooting and illegal use of the multimedia content is copyrighted. Also relevant to mobile communication terminal as a high crime, create, and the digital evidence increases the utilization of the mobile forensic evidence is required to study. In this paper, Smart Phone Copyright Violation and Forensic Apply Method research. Smart Phone Status and related violations of copyright infringement, broadcasting, film, music, e-book, etc. for each survey item, and how to apply for forensics were studied. This study investigated the development and forensic science will be able to contribute to the development.

  • PDF

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

SmartCAC : Novel Distributed Connection Admission Control Framework for Heterogeneous Networks (이종 네트워크를 위한 분산처리 방식의 효율적인 호 수락 제어 구조)

  • Kim, Hyo-Eun;Kim, Won-Tae;Kang, Eun-Hyun;Park, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.7 s.361
    • /
    • pp.70-80
    • /
    • 2007
  • For supporting various mobile networks, this paper proposes a framework of distributed connection admission control, named SmartCAC. Especially, intelligent CAC operations are adopted in terms of interoperation between mobile nodes and mobile networks. This scheme does not need to correct information between networks. Basically vertical handover call can use guard channel that was reserved for handoff, because SmartCAC addresses the identification between vertical handover call and new call, delay and reliability as requirement of QoS for efficient connection control. The scheme also uses mobile terminal speed for network filtering. Especially an extended protocol is proposed to give different network states information to mobile nodes because there have been no ways for mobile nodes to compare the states of different networks. Sophisticated simulation study is performed in order to evaluate SmartCAC in terms of signaling cost. As a result, signaling cost of ours is up to 96% better than that of the existing scheme.

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

Smart Mobile Blackbox DVR in Car Environment (자동차 환경에서 스마트 모바일 블랙박스 DVR)

  • Choi, Sun-O;Kim, Young-Po;Im, Yong-Soon;Kim, Young-Ja;Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.9-15
    • /
    • 2013
  • In this paper, automatic recognition of an accident and whether service delivery and risk driving through the giving of the driver to correct driving habits before and after the accident to reproduce highly scalable video Smart Mobile Blackbox DVR (SMBD, Smart Mobile Blackbox DVR) Computer of the model was designed. SMBD on embedded systems equipped with wireless capabilities to sleep in the car accident point and the image information by wireless communications, by notification in the control center, 24-hour emergency rescue service and traffic information can be provided. The vehicle ECU (Electronic Control Unit) of the vehicle information and sensor data in conjunction with wireless eCall (Emergency Call) services can be realized.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

Development of Baby Care Mobile Application Using Smart Sensor (스마트 센서를 이용한 Baby Care 모바일 어플리케이션 개발)

  • Chung, Jae-Pil
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.643-647
    • /
    • 2015
  • Nowadays, ubiquitous technology which combines sensors and network technology is emerging and it is called ubiquitous sensor network (USN). In this paper, mobile application for baby care using smart sensor is proposed. The proposed mobile application consists of mobile networks to transfer the information. It detects various information such as falling detecting, crying and fever detecting of infants. It keeps infants from external threats. The developed mobile application will be examined by simulation.