• Title/Summary/Keyword: Smart-phone Addition

Search Result 280, Processing Time 0.033 seconds

Smart Harness for Preventing Pet Loss Outdoors (실외에서 애완견 분실 방지를 위한 스마트 어깨줄)

  • Lee, Jun-Hyeok;Ruy, Se-Hyun;Lim, Jong-Chan;Chou, Tea-Hyun;Han, Yeong-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.709-718
    • /
    • 2021
  • In this paper, it can be seen that the number of abandoned dogs increases every year through the statistics on the occurrence of abandoned animals. With the goal of reducing the number of stray dogs, a smart pet dog shoulder strap is implemented based on a real-time location tracking system using the ESP32 module and GPS sensor. It is an ESP32 module with a built-in Bluetooth module. It is input to the MCU using various sensors, and finally outputs to a smart-phone application, and communicates through the built-in blue-tooth module. In addition, it uses Neopixels to compensate the weaknesses at night through LED light emission, and automatically sets the warning distance to design a music playback system through the LED flashing effect and MP3 module. In addition, a smart pet dog shoulder strap was designed to help pet dog health care by measuring the moving distance according to the amount of activity through the gyro sensor.

Storing and Broadcast System of Smart Multi Encoding Image (Smart 멀티 인코딩 영상 저장 및 방송 시스템)

  • Kim, Chang-Su;Kim, Jung-Woo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1633-1638
    • /
    • 2013
  • The mobile phone has now evolved into an effective multimedia devices to watch video content with your PC in addition to the calling features. Thus, the effectiveness of the video content streaming services smartphone will be available. And content should be able to deliver effectively. Be provided with textbook images and video of the speaker means that the effective content delivery. In this paper, we propose a integrated video management system that can be real-time VOD services on the Internet as input Multi-Source of audio-video, video content encoding system to meet the requirements of the above two.

Comparison between the Internet and Mobile Phone Addiction of Adolescent with Structural Equation Model and Dominance Analysis (구조 방정식 모형과 우세 분석을 통한 청소년의 인터넷.휴대폰 중독 비교)

  • Park, Chan-Jung;Hyun, Jung-Suk;Ha, Hwan-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.11-22
    • /
    • 2013
  • Due to the advent of new smart devices, the new technology addiction problems have been much severer than the Internet addiction recently. A lot of research about each technology addiction has been proposed, but the research about the changes in the addictions has been rare. In this paper, we analyze how the environmental factors such as parents and friends affect the personal factors such as time perspectives and technology usage time. In addition, we get the relative importances among the factors which influence on the Internet and mobile phone addictions. As a result, we can analyze the relationships among the factors and the differences between the two addictions with time perspective. In order to achieve our goals, we surveyed on 1,420 primary and secondary school students. We also provided the results produced by structural equation model and Budescu's Dominance analysis. Based on these analyses, we described the differences between the Internet and mobile phone addictions and proposed an alternative to prevent new technology addictions.

  • PDF

Emotion fusion video communication services for real-time avatar matching technology (영상통신 감성융합 서비스를 위한 실시간 아바타 정합기술)

  • Oh, Dong Sik;Kang, Jun Ku;Sin, Min Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.283-288
    • /
    • 2012
  • 3D is the one of the current world in the spotlight as part of the future earnings of the business sector. Existing flat 2D and stereoscopic 3D to change the 3D shape and texture make walking along the dimension of the real world and the virtual reality world by making it feel contemporary reality of coexistence good show. 3D for the interest of the people has been spreading throughout the movie which is based on a 3D Avata. 3D TV market of the current conglomerate of changes in the market pioneer in the 3D market, further leap into the era of the upgrade was. At the same time, however, the modern man of the world, if becoming a necessity in the smartphone craze new innovation in the IT market mobile phone market and also has made. A small computer called a smartphone enough, the ripple velocity and the aftermath of the innovation of the telephone, the Internet as much as to leave many issues. Smartphone smart phone is a mobile phone that can be several functions. The current iPhone, Android. In addition to a large number of Windows Phone smartphones are released. Above the overall prospects of the future and a business service model for 3D facial expression as input avatar virtual 3D character on camera on your smartphone camera to recognize a user's emotional expressions on the face of the person is able to synthetic synthesized avatars in real-time to other mobile phone users matching, transmission, and be able to communicate in real-time sensibility fused video communication services to the development of applications.

Smart Emotional lighting control method using a wheel interface of the smart watch (스마트워치의 휠 인터페이스를 이용한 스마트 감성 조명 제어)

  • Kim, Bo-Ram;Kim, Dong-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1503-1510
    • /
    • 2016
  • In this study, we implemented the emotional light controlling system by using the wheel interface built in the smart-watch devices. Most previous light controlling systems have been adopted the direct switches or smart-phone applications for presenting individual emotion in lighting systems. However, in order to control color properties, these studies have some complicated user-interfaces in systems and limitation to present various color spectrums. Therefore, we need to user-friendly interfaces and functions for controlling properties of the lightning systems such as color, tone, color temperature, brightness, and saturation in detail with the wheel interface built in the smart-watch devices. The system proposed in the study is given to choose the user's selecting the emotional status information for providing the emotional lights. The selectable emotional status such as "stable", "surprise", "tired", "angry", etc. can be among 11 kinds of emotional states. In addition, the designed system processed the user's information such as user's emotional status information, local time, location information.

Mobile App Analytics using Media Repertoire Approach (미디어 레퍼토리를 이용한 스마트폰 애플리케이션 이용 패턴 유형 분석)

  • Kwon, Sung Eun;Jang, Shu In;Hwangbo, Hyunwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.133-154
    • /
    • 2021
  • Today smart phone is the most common media with a vehicle called 'application'. In order to understand how media users select applications and build their repertoire, this study conducted two-step approach using big data from smart phone log for 4 weeks in November 2019, and finally classified 8 media repertoire groups. Each of the eight media repertoire groups showed differences in time spent of mobile application category compared to other groups, and also showed differences between groups in demographic distribution. In addition to the academic contribution of identifying the mobile application repertoire with large scale behavioral data, this study also has significance in proposing a two-step approach that overcomes 'outlier issue' in behavioral data by extracting prototype vectors using SOM (Sefl-Organized Map) and applying it to k-means clustering for optimization of the classification. The study is also meaningful in that it categorizes customers using e-commerce services, identifies customer structure based on behavioral data, and provides practical guides to e-commerce communities that execute appropriate services or marketing decisions for each customer group.

Correction Algorithm for PDR Performance Improvement through Smartphone Motion Sensors (보행자 추측 항법 성능 향상을 위한 스마트폰 전용 모션 센서 보정 알고리즘)

  • Kim, Do Yun;Choi, Lynn
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.148-155
    • /
    • 2017
  • In this paper, we develop a new system to estimate the step count for a smartphone user. The system analyzes data obtained from the accelerometer, magnetic sensor, and gyroscope of an android smartphone to extract pattern information of human steps. We conduct an experiment and evaluation to confirm that the proposed system successfully estimates the number of steps with 96% accuracy when hand-held and 95.5% accuracy when in-pocket. In addition, we found that detection errors were caused by human motions such as touching the screen, shaking the device up and down, sitting up and sitting down, and waving the phone around.

A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing (전기 통신 금융사기에 영향을 미치는 요인에 관한 연구 : 전화 금융사기를 중심으로)

  • Jo, Soohyun;Lee, Wooyoo;Choi, Myeonggil
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.35-49
    • /
    • 2016
  • With the gradual development of IT technology, voice phishing victims are increasing in number. In the past when only voice phone calls were made, personal information or financial information were stolen mainly by a direct phone call, but recently, as smart phones are widely in use, it is evolving into a way such as smishing that leads an access to a site with malicious codes spreading out. Since it is easy to run away after committing a crime, and trace are rarely left in case of voice phishing, it is difficult to find out criminal. In addition, it is most likely that a victim be would be exposed to further damage from another voice phishing. Its technique is growing in kinds and turning more intelligent day by day; Therefore, its victims are increasing in number. Previous researches mainly focused the area of legal studies while the factors exposed to voice phishing have not been made. Therefore, this study has analyzed the motifs in which voice phishing is done to draw out its outcomes as follows. First, a victim comes to trust the criminal by the factors of favorability, rare message, and mutuality. Second, the more sophisticated the technique of a criminal, the more likely a victim is exposed to voice phishing.

UI Design Survey of Mobile App for the Activation of Traditional Market (전통시장 활성화를 위한 모바일 앱의 UI 디자인 조사)

  • Lee, Joo-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.277-282
    • /
    • 2015
  • According to International Data Corporation(IDC) showed that PC sales for the first time ahead of the global smart phone sales in the fourth quarter of 2010. This opportunity as a smart phone application and mobile web-sites has been launched to accelerate the development of mobile services in a variety of fields. In addition to the support plan for the activation of the local traditional market from the second half of 2012 to make it easier to find information on the traditional markets of the country expanded and reorganized the traditional market-related web-site, trying to catch the foot of the youth in the online. This study is to increase the number of tourists visiting the traditional market or local residents and young people and to provide a basis for the development of mobile UI design for mobile application to investigate the local traditional market apps that are currently available.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.