• Title/Summary/Keyword: Smartphone Usage Time

Search Result 124, Processing Time 0.024 seconds

Development of an Unmanned Land-Based Shrimp Farm Integrated Monitoring System (무인 육상 새우 양식장 통합 모니터링 시스템 개발)

  • Hyeong-Bin Park;Kyoung-Wook Park;Sung-Keun Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.209-216
    • /
    • 2024
  • Land shrimp farms can control the growth environment more stably than coastal ones, making them advantageous for high-quality, large-scale production. In order to maintain an optimal shrimp growth environment, various factors such as water circulation, maintaining appropriate water temperature, oxygen supply, and feed supply must be managed. In particular, failure to properly manage water quality can lead to the death of shrimp, making it difficult to have people stationed at the farm 24 hours a day to continuously manage them. In this paper, to solve this problem, we design an integrated monitoring system for land farms that can be operated with minimal manpower. The proposed design plan uses IoT technology to collect real-time images of land farms, pump status, water quality data, and energy usage and transmit them to the server. Through web interfaces and smartphone apps, administrators can check the status of the farm stored on the server anytime, anywhere in real time and take necessary measures. Therefore, it is possible to significantly reduce field work hours without the need for managers to reside in the farm.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

Detecting Repackaged Applications using the Information of App Installation in Android Smartphones (안드로이드 스마트폰에서 앱 설치 정보를 이용한 리패키징 앱 탐지 기법)

  • Joun, Young Nam;Ahn, Woo Hyun
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • In recently years, repackaged malwares are becoming increased rapidly in Android smartphones. The repackaging is a technique to disassemble an app in a market, modify its source code, and then re-assemble the code, so that it is commonly used to make malwares by inserting malicious code in an app. However, it is impossible to collect all the apps in many android markets including too many apps. To solve the problem, we propose RePAD (RePackaged App Detector) scheme that is composed of a client and a remote server. In the smartphone-side, the client extracts the information of an app with low CPU overhead when a user installs the app. The remote server analyzes the information to decide whether the app is repackaged or not. Thus, the scheme reduces the time and cost to decide whether apps are repackaged. For the experiments, the client and server are implemented as an app on Galaxy TAB and PC respectively. We indicated that seven pairs of apps among ones collected in official and unofficial market are repackaged. Furthermore, RePAD only increases the average of CPU overhead of 1.9% and the maximum memory usage of 3.5 MB in Galaxy TAB.

Mobile App Recommendation using User's Spatio-Temporal Context (사용자의 시공간 컨텍스트를 이용한 모바일 앱 추천)

  • Kang, Younggil;Hwang, Seyoung;Park, Sangwon;Lee, Soowon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.615-620
    • /
    • 2013
  • With the development of smartphones, the number of applications for smartphone increases sharply. As a result, users need to try several times to find their favorite apps. In order to solve this problem, we propose a recommendation system to provide an appropriate app list based on the user's log information including time stamp, location, application list, and so on. The proposed approach learns three recommendation models including Naive-Bayesian model, SVM model, and Most-Frequent Usage model using temporal and spatial attributes. In order to figure out the best model, we compared the performance of these models with variant features, and suggest an hybrid method to improve the performance of single models.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

System Design for Analysis and Evaluation of E-commerce Products Using Review Sentiment Word Analysis (리뷰 감정 분석을 통한 전자상거래 상품 분석 및 평가 시스템 설계)

  • Choi, Jieun;Ryu, Hyejin;Yu, Dabeen;Kim, Nara;Kim, Yoonhee
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.5
    • /
    • pp.209-217
    • /
    • 2016
  • As smartphone usage increases, the number of consumers who refer to review data of e-commercial products using web sites and SNS is also explosively multiplying. However, reading review data using traditional websites and SNS is time consuming. Also, it is impossible for consumers to read all the reviews. Therefore, a system that collects review data of products and conducts sentiment word analysis of the review is required to provide useful information. The majority of systems that provide such information inadequately reflect the properties of the product. In this study, we described a system that provides analysis and evaluation of e-commerce products through review sentiment words as reflected properties of the product. Furthermore, the system enables consumers to access processed information about reviews quickly and in visual format.

Analyzing Intention to Use Shared E-scooters Considering Individual Travel Attitudes : The Case of Seoul Metropolitan Areas (개인 통행성향을 고려한 공유 전동킥보드 이용의향 분석: 서울시를 중심으로)

  • Lee, Yoonhee;Koo, Jahun;Choo, Sangho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.1-16
    • /
    • 2022
  • Recently, e-scooters have been attracting attention as eco-friendly modes of transportation in cities due to an increasing interest in the environment. Accordingly, various studies on usage behavior are being conducted, but studies that reflect individual travel attitudes are insufficient. Therefore, this study surveyed commuters in Seoul and analyzed respondents' traveling attitudes through factor analysis. It also built a binary logistic regression model for the intention to use shared e-scooters to determine how individual travel behaviors are affected. In particular, the model results showed that age, the main mode of transportation (car), walking time to the bus stop, and four travel attitude variables (disutility of travel, preference to self-drive, internet/smartphone friendliness, and willingness to pay extra money for services) significantly affected the intention to use shared e-scooters. This study is expected to be used as basic data, with aspect to travel behavior, for the efficient operation and use of shared e-scooters in the future.

A comparative study on eating habits and mental health of Korean middle school students according to their bedtime across regions: using data from the 2020-2022 Korea Youth Risk Behavior Survey

  • Sarim Kim;Jiyoung Jeong;Juyeon Kang;Jihye Kim;Yoon Jung Yang
    • Nutrition Research and Practice
    • /
    • v.18 no.2
    • /
    • pp.269-281
    • /
    • 2024
  • BACKGROUND/OBJECTIVES: The objective of this study was to compare dietary habits and mental health among middle school students in urban and rural areas based on bedtime, and to provide evidence supporting appropriate bedtime for Korean middle school students in relation to their healthy dietary habits and mental well-being. SUBJECTS/METHODS: The study population consisted of 25,681 second-year middle school students who participated in the Korea Youth Risk Behavior Survey in 2020-2022. Participants were asked about their bedtime and wake-up time during the past 7 days and were classified into five categories. The study compared the general characteristics, academic factors, dietary habits, and mental health of urban and rural students based on their bedtime. RESULTS: Bedtime was found to be later in the following order: urban female students, rural female students, urban male students, and rural male students. As bedtime got later, the rates of smoking and alcohol consumption increased. Students who went to bed before 11 p.m. had lower academic performance, while rural male students who went to bed after 2 a.m. had lower academic performance. Later bedtime was associated with increased smartphone usage, skipping breakfast, consuming fast food, and drinking carbonated beverages. Later bedtime was also associated with higher perceived stress levels, particularly among students who went to bed after 2 a.m., higher rates of suicidal ideation, experiencing sadness and despair, as well as the prevalence of clinically significant anxiety disorders. CONCLUSION: These results suggest that middle school students who go to bed too late have higher rates of smoking and alcohol drinking, as well as unhealthy eating habits, stress, suicidal ideation, sadness, and anxiety. Therefore, it is necessary to provide educational and social institutional support to promote adequate sleep for the health of adolescents.

Evaluation of Correlations in Copier's Button and Usability (복사기 조작버튼에 따른 사용성 상관관계 연구)

  • Ha, Kwang Soo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.595-603
    • /
    • 2013
  • Touchscreen is now installed in the majority of information devices thanks to the developed digital technology. In case of copiers, although touchscreen was installed earlier than any other information device, current user interface indicates that conventional methods have been maintained without any special re-validation. But, since common office devices such as copiers have brief usage time and clear, straightforward purposes, user experience between an user and device is perhaps an important element. Nevertheless, conservativeness of the market and the fact that users and buyers are not always the same are a stumbling block to actively changing UI. Recently, however, as hardware element, buttons, have moved to touchscreen mostly for smartphone, and common and public devices have seen rapid changes in UX, mostly with touchscreen, it has led to high demand for changes in UX of copiers. To remedy the issues with copiers, a literature review was conducted through existing studies and user evaluation based on user survey and prototype was done to examine the copier's UI elements and relevant changes in usage. In particular, a new direction for UX of copiers was suggested by analyzing the impact of differences between software button-oriented UI and hardware button-oriented UI on users and usability. This study findings could be used as basic data for improving the usability of future common devices including copier and UX design.

Relationship between the Intake of Children's Favorite Foods and Policy based on Special Act on Safety Control of Children's Dietary Life (아동의 기호식품섭취와 어린이기호식품정책과의 관련성 분석)

  • Woo, Taejung;Yoo, Jihye;Lee, Kyung-Hea
    • Korean Journal of Community Nutrition
    • /
    • v.24 no.2
    • /
    • pp.106-116
    • /
    • 2019
  • Objectives: This study examined the status of children's favorite foods intake and the relationship with the policy environment based on the Special Act on Safety Control of Children's Dietary Life for suggesting a supportive policy strategy. Methods: The subjects were 4th grade students (n=1,638) in elementary school from 45 schools collected from seven areas (Seoul, Daegu, Daejeon, Gyeonggi, Chungnam, Jeonbuk, and Gyeongnam). The children participated in a self-administered questionnaire survey in class under the supervision of the teacher. The questionnaire consisted of items, such as social demographic characteristics, frequency of intake of the children's favorite foods, and policy cognition. A t-test and ANOVA were applied to explore the relationship between the frequency of children's favorite foods intake and policy cognition. The survey was implemented from August 2016 to September 2016. Results: For the boys, the frequency of 'high-calorie low nutrient foods intake' (HCLN) was significantly higher than that of the girls (p<0.01). For the children who received information on their favorite foods from the internet, the frequency of HCLN was higher than the other sources (p<0.01). The time of TV viewing and computer usage, and smartphone usage was associated with a higher frequency of HCLN, and a lower healthy favorite food intake (all p<0.001). The intake frequency of healthy favorite foods indicated a positive correlation with the policy cognition, including policy perception, usefulness, necessity and buying intention, and educational experience. Conclusions: This study showed a correlation with the frequency of children's favorite foods intake and policy. In particular, the frequency of children's healthy favorite foods intake indicated a meaningful relationship with the policy than the frequency of HCLN. This study also found that the consumption of children's healthy favorite foods was positively correlated with the educational experience. To develop a supportive policy for a good dietary environment for children, there is a need to focus on how to collaborate with multiple levels of influences, such as the national level, school level, and family.