• Title/Summary/Keyword: User Device

Search Result 2,249, Processing Time 0.029 seconds

MBTI-based Recommendation for Resource Collaboration System in IoT Environment

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • In IoT(Internet of Things) environment, users want to receive customized service by users' personal device such as smart watch and pendant. To fulfill this requirement, the mobile device should support a lot of functions. However, the miniaturization of mobile devices is another requirement and has limitation such as tiny display. limited I/O, and less powerful processors. To solve this limitation problem and provide customized service to users, this paper proposes a collaboration system for sharing various computing resources. The paper also proposes the method for reasoning and recommending suitable resources to compose the user-requested service in small device with limited power on expected time. For this goal, our system adopts MBTI(Myers-Briggs Type Indicator) to analyzes user's behavior pattern and recommends personalized resources based on the result of the analyzation. The evaluation in this paper shows that our approach not only reduces recommendation time but also increases user satisfaction with the result of recommendation.

Development of Flight Control Application for Unmanned Aerial Vehicle Employing Linux OS (리눅스 기반 무인항공기 제어 애플리케이션 개발)

  • Kim Myoung-Hyun;Moon Seungbin;Hong Sung Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.78-84
    • /
    • 2006
  • This paper describes UAV (Unmanned Aerial Vehicle) control system which employs PC104 modules. It is controlled by application program based on Linux OS. This application consists of both Linux device driver in kernel-space and user application in user-space. In order to get data required in the unmanned flight, external devices are connected to PC104 modules. We explain how Linux device drivers deal with data transmitted by external devices and we account for how the user application controls UAV on the basis of data processed in the device driver as well. Furthermore we look into the role of GCS (Ground Control Station) which is to monitor the state of UAV.

A Study on the Influence of Product Attributes of Smart Device on User Acceptance: Mediating Effect of Utilitarian and Hedonic Motivation (스마트 디바이스 제품속성이 제품수용에 미치는 영향: 기능적 동기와 쾌락적 동기의 매개효과)

  • Yi, Ho-Taek;Huh, Jong-Ho;Jung, Ji-Bum;Kim, Kyung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.454-468
    • /
    • 2015
  • The purpose of this study is to investigate the relationship between product attributes of smart device and user acceptance of technology. Moreover, the authors examined mediating effect of utilitarian and hedonic motivation between product attributes and user acceptance. Previous researches focused on user attitude and behavior intention of new technology based on Technology Acceptance Model(TAM). However, differently from previous researches, which are focused on user attitude like perceived usefulness and perceived ease of use, this research emphasized the relationship product attributes such as product functionality, design, and convenience and user motivation both utilitarian(effort expectancy and performance expectancy) and hedonic motivation(perceived enjoyment) according to UTAUT model. The results shows that 3 motivation variables(effort expectancy, performance expectancy, and perceived enjoyment) have positive impacts on user acceptance intention of smart device. product design has positive relationship to perceived enjoyment and product convenience has positive relationship to both effort and performance expectancy. Furthermore, 3 motivation variables play a full mediation between product attributes and user acceptance intention of new technology. However, product functionality has no relationship to both effort and performance expectancy. Research contribution, implications, and further research directions are discussed at the end of the paper.

OWC based Smart TV Remote Controller Design Using Flashlight

  • Mariappan, Vinayagam;Lee, Minwoo;Choi, Byunghoon;Kim, Jooseok;Lee, Jisung;Choi, Seongjhin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.71-76
    • /
    • 2018
  • The technology convergence of television, communication, and computing devices enables the rich social and entertaining experience through Smart TV in personal living space. The powerful smart TV computing platform allows to provide various user interaction interfaces like IR remote control, web based control, body gesture based control, etc. The presently used smart TV interaction user control methods are not efficient and user-friendly to access different type of media content and services and strongly required advanced way to control and access to the smart TV with easy user interface. This paper propose the optical wireless communication (OWC) based remote controller design for Smart TV using smart device Flashlights. In this approach, the user smart device act as a remote controller with touch based interactive smart device application and transfer the user control interface data to smart TV trough Flashlight using visible light communication method. The smart TV built-in camera follows the optical camera communication (OCC) principle to decode data and control smart TV user access functions according. This proposed method is not harmful as radio frequency (RF) radiation does it on human health and very simple to use as well user does need to any gesture moves to control the smart TV.

A Study on Effective Information Transfer Technique between Personal Computer and Portable Equipment (개인용 컴퓨터와 휴대장치간의 효과적 정보 전송기법 연구)

  • Choi, Gyoo-Seok;Park, Jong-Jin;Kang, Jung-Jin;Kim, Woong Jae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.261-267
    • /
    • 2013
  • In this paper, the effective information transfer technique between computing device and portable device that is connected through USB interface has been studied. The proposed technique is realized by the method which portable device is perceived into optical media such as CD-ROM or CD-R/W through SCSI commands on USB interface. Through the proposed system in this study, we maximized user convenience by executing diverse works using stored data in a portable device without installing extra USB driver corresponding to portable device, when user data is transmitted between computing device and portable device. We conducted experimental tests to verify the performance of the proposed system through implementing of test system. As a result, we confirmed the technique is comparatively superior to existing method in transmitting speed and user convenience.

Design and Implementation of a Wearable LED Display Device

  • Shin, Seung-Hyeok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.7-13
    • /
    • 2015
  • Wearable device, next generation smart device, is consistently growing. The flexible display will be a kind of display in the wearable device. The flexible display technology is now evolving with end-user requirement such as portability and easy installation. Previous wearable display products still have some difficulties in manufacturing and in flexibility whole device. But it can be a flexible display with LED device and utilized in commercial area. In this paper, we propose a driver to control the LED display and implement a flexible LED display system.

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

An Approach to Systems with Multi-Factor Method (다중요소방식을 이용한 시스템 접근방안)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won;Kim, Young-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.842-848
    • /
    • 2012
  • In this paper, as a proper authentication method, we made it authenticate a user who has unauthorized device with using authorized device received from telecommunication company using QR code. We designed a better performance protocol which can authenticate mutually using safer and uncomplicated operations than existing user authentication system. Proposed user authentication system authenticates previously authorized mobile device without any information of client who is requesting to get access from outside, so we can basically prevent attack from hackers. In the future, we can possibly use it as user authentication method in common internet environment or we could study on user unique information instead of mobile device information.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Design of a User Authentication System using the Device Constant Information (디바이스 불변 정보를 이용한 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.29-35
    • /
    • 2016
  • This paper presents the design of a user authentication system (DCIAS) using the device constant information. Defined design a new password using the access device constant information to be used for user authentication during system access on the network, and design a new concept the user authentication system so that it can cope with the threat required from passive replay attacks to re-use the password obtained in other applications offer. In addition, by storing a password defined by the design of the encrypted random locations in the server and designed to neutralize the illegal access to the system through the network. Therefore proposed using the present system, even if access to the system through any of the network can not know whether any where the password is stored, and if all right even stored information is not easy to crack's encrypted to neutralize any replay attacks on the network to that has strong security features.