• Title/Summary/Keyword: Smartphone User

Search Result 723, Processing Time 0.027 seconds

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

A Study on the Influence of Connectivity and Convenience of Smartphones of Word-of mouth Intentions in the Convergence Era : Focused on the Mediating Effects of Application (융복합 시대 스마트폰의 접속성과 편리성이 구전의도에 미치는 영향연구 : 어플리케이션을 매개효과로)

  • Jo, Young-Jun
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.69-78
    • /
    • 2015
  • In this study, Word-of-mouth Intention of the factors Influence the Connectivity, Convenience and Application also was Investigated. Connectivity, Convenience on the Influence of the Mediation Effect was Carried out to Examine. The test results used in this Study Established Connectivity, Convenience of Application and Word-of-mouth to the Positive Effect was Found. Also Verifying the results of the Mediating Effect of Application and Application the Mediation Effect was Verification. These Factors Result in the Application and also in Calendar, Useful Application, Video, Music, Game of Word-of-mouth Intention Influence. For this Study, the use of Smartphones is a lot of College Students Surveyed and the Findings were Derived. This result provides an application development strategy implications that can satisty the user's Smartphone Convergent times.

Comparison on Predictive Model of Intention to Use Smartphones through iPhone User: Centered on TAM, TPB & Integrated Model (아이폰 이용자를 통해 본 스마트폰의 이용의도 예측모형 비교: 기술수용모형(TAM), 계획된 행동이론(TPB) 및 통합모형을 중심으로)

  • Joo, Jihyuk
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.89-97
    • /
    • 2013
  • After introducing iPhone in Korea, the craze for iPhone was perceived to be extraordinaire phenomenon and the mobile businesses and researchers paid attention to it. This research purposes to explore more predictive model that explain to adopt the smartphones in Korea. This research show that all of models, TPB, TAM and the integrated model, are significant to explain intention to use the smartphones. TPB explains the higher than TAM, and the integrated model explains the slightly higher than TPB. These results suggest that researcher explore and build the more predictive model that comprise social influences and personal attributes than TAM that is employed broad to study new information communication systems and devices.

Tempo-oriented music recommendation system based on human activity recognition using accelerometer and gyroscope data (가속도계와 자이로스코프 데이터를 사용한 인간 행동 인식 기반의 템포 지향 음악 추천 시스템)

  • Shin, Seung-Su;Lee, Gi Yong;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.286-291
    • /
    • 2020
  • In this paper, we propose a system that recommends music through tempo-oriented music classification and sensor-based human activity recognition. The proposed method indexes music files using tempo-oriented music classification and recommends suitable music according to the recognized user's activity. For accurate music classification, a dynamic classification based on a modulation spectrum and a sequence classification based on a Mel-spectrogram are used in combination. In addition, simple accelerometer and gyroscope sensor data of the smartphone are applied to deep spiking neural networks to improve activity recognition performance. Finally, music recommendation is performed through a mapping table considering the relationship between the recognized activity and the indexed music file. The experimental results show that the proposed system is suitable for use in any practical mobile device with a music player.

Design and Implementation of Commodity Information System Using LBS with Augumented Reality Based on Smart Phone (스마트폰 기반 위치기반서비스와 증강현실을 결합한 상점정보시스템의 설계 및 구현)

  • Yoon, Sunhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.229-239
    • /
    • 2012
  • In 2011, more than 2000 million smartphone users are in our country. As a result, consumer demand have been developed for a variety of applications, especially in the information service-related applications that combine location-based services and augmented reality in addition to related information for the virtual reality of things are rapidly increased. This paper analysed location-based services and augmented reality technology as related research and designed and implemented the system that provides the same environment as if the user is shopping and purchasing the items in the real world and offers the information characterizing the real situation combines location-based service and augmented reality which provides with an excellent reality in the smart phone environment. The proposed system in this paper is excellent in mobility, scalability and reality as a result of analysis of functions and services compared to web-based systems and has advantages to apply for the suitable system in ubiqutous environment which can be used in anytime and anywhere.

A Study on Smart Medical Treatment System and Security (스마트 진료시스템과 보안에 관한 연구)

  • Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.107-113
    • /
    • 2012
  • Due to the development of communications technology, it is now possible to be offered online from remote places. This kind of communications technology can be applied to the medical field. The medical treatment appointments in hospitals can be its typical example. But still, in most of hospitals, patient or guardian have to physically visit or call to the hospital to set up an appointment for the medical treatment. In addition, they have to wait in line in order to pay after receiving the medical treatment. The patient or guardian, after paying, receive a paper prescription and they go to a nearby pharmacy to take the medicines. They must wait in line again there in order to receive the medicine from the pharmacy. In this paper, we would like to suggest a smart medical treatment system in order to solve the problems discussed above. With this proposed system, the user will be able to make an appointment, make payments and receive medication quickly and easily without spending extra time. Also, there will be no need for paper prescriptions with this system. We discuss about the security of medical information for this proposed smart medical treatment system proposed.

Performance Evaluation of Automatic Exercise Weight and Repetition Measuring Device Add-on for Existing Fitness Machines (기존 운동기기 부착용 운동중량/횟수 자동측정기기의 성능평가)

  • Kim, Jung Gi;Lee, Yongkoo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.4
    • /
    • pp.329-332
    • /
    • 2017
  • In this study, a performance evaluation was carried out to develop a new add-on device with an algorithm for automatically measuring the exercise weight and repetitions when using an existing fitness machine. The developed device was designed to be simply attached to an exercise machine to measure the exercise weight and repetitions. The measured data are transferred to a smartphone using Bluetooth. As result, it is possible to detect the weights and repetitions from three users with different exercise habits with little error. The system can measure the user's motion and transfer the data to various devices capable of utilizing the workout data, giving it the advantage of being applicable to personalized health care and rehabilitation therapy.

Analysis of Encryption and Decryption Processes of Realm Database and Its Application (Realm 데이터베이스 암·복호화 프로세스 및 기반 애플리케이션 분석)

  • Youn, Byungchul;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.369-378
    • /
    • 2020
  • Due to the widespread use of mobile devices, smartphone penetration and usage rate continue to increase and there is also an increasing amount of data that need to be stored and managed in applications. Therefore, recent applications use mobile databases to store and manage user data. Realm database, developed in 2014, is attracting more attention from developers because of advantages of continuous updating, high speed, low memory usage, simplicity and readability of the code. It also supports an encryption to provide confidentiality and integrity of personal information stored in the database. However, since the encryption can be used as an anti-forensic technique, it is necessary to analyze the encryption and decryption processes provided by Realm Database. In this paper, we analyze the structure of Realm Database and its encryption and decryption process in detail, and analyze an application that supports an encryption to propose the use cases of the Realm Database.

Design and Implementation of a Multi-Interface Access Point with Inter-interface Dynamic Load Balancing (인터페이스간 동적 부하 분배를 고려한 다중 인터페이스 액세스 포인트 설계 및 구현)

  • Kim, Tae-Keun;Seo, Hyung-Yoon;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.348-357
    • /
    • 2012
  • Recently, smartphone, notebook, PC and other supporting wireless LAN device have come into wide use. By increasing user that use wireless LAN device, wireless traffic also increased. If wireless traffic through one AP is increase, it causes throughput decrease. To solve this problem, wireless LAN service provider install more AP where overload occurred. But this is not enough. Because stations can't know AP's load factor, and APs do nothing for load balancing. In this paper, we propose Multi-Interface Access Point(MIAP) to solve this problem. MIAP operate same as multiple APs with multi-interface, and MIAP measure each interface's load periodically. If MIAP detect overloaded interface, MIAP transfer station from overloaded interface to under-loaded interface. We conducted an experiment for verifying existing problem, and we found this problem occurred. We plan an experiment scenario for a comparison between existing AP and MIAP, and excute these experiment. In the result, we show MIAP with load balancing can improve total throughput about 72% and stabilize delay jitter than existing AP.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.