• Title/Summary/Keyword: digital devices

Search Result 2,177, Processing Time 0.027 seconds

A Study on the Relationship Between Smart Mobile Devices Use and Work Performances of Public Agencies: Focused on verification of the relationship between performances using TAM (공공기관 근무자의 스마트 모바일기기 사용과 업무성과의 관계에 관한 연구: TAM 모형을 활용한 업무성과와의 관계 검증을 중심으로)

  • Lim, Sung-Jin;Han, Kyeong-Seok;Jung, Mi-Ra
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1465-1474
    • /
    • 2017
  • The study analyzed how the user uses the smart mobile device to assess the effects of the user's acceptance factor and user-factors affecting the work performance of Public Agencies. And Prove that leveraging smart devices can improve your business performance, It was aimed at making strategic recommendations to improve the suitability of smart mobile devices and Tasks. Smart mobile devices User Innovation has affected Usefulness, such as B=.296. p.000, it also affected Perceived Ease-of-Use, such as B=.326, p.000. job fitness has affected Perceived Ease-of-Use, such as B=.261, p.001. Usefulness and Ease-of-Use had a positive affect on work performance. Each of affect on much of B=.382 and B=.488(p.000). At the conclusion, it has been validated that the effects of smart mobile devices user Innovation and job fitness on work performances are mediated by perceived usability and perceived ease of use of the smart mobile device.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Factors affecting dental biofilm maturity assessed with Quantitative Light-induced Fluorescence-Digital in Korean older adults

  • Shin, Na-Ri;Choi, Jun-Seon
    • Journal of Korean society of Dental Hygiene
    • /
    • v.19 no.3
    • /
    • pp.351-362
    • /
    • 2019
  • Objectives: The study aimed to analyze the factors affecting the maturity of dental biofilm, which was assessed with quantitative light-induced fluorescence-digital(QLF-D), in a sample of Korean older adults. Methods: This cross-sectional study included 67 participants, aged 65 years and older. All participants completed a questionnaire and tests to measure their manual dexterity and handgrip strength, which are parameters that indicate hand function abilities. To evaluate dental biofilm maturity, 804 surfaces of six index teeth were imaged using QLF-D and then quantified as ${\Delta}R$ values. All data were collected from May 25, 2017 to April 30, 2018. The independent t-test, one-way analysis of variance, and step-wise multiple linear regression were performed to analyze the factors associated with the maturity of dental biofilm (${\Delta}R$). Results: The multivariate linear regression analysis revealed that the factor most strongly related to dental biofilm maturity(${\Delta}R$) was manual dexterity (${\beta}=-0.326$), followed by handgrip strength (${\beta}=-0.303$) and use of interdental cleaning devices (${\beta}=-0.283$) (p<0.05). Conclusions: Manual dexterity, handgrip strength, and use of interdental cleaning devices are factors that can predict dental biofilm maturity in adults aged 65 years or older. Therefore, the hand function of a patient should be evaluated first, before assessing the oral hygiene status of the patient or providing him/her with oral health education, and the dental hygienist should provide differentiated oral hygiene care depending on the patient's hand function ability. Finally, dental hygienists should help older adults to recognize the importance of auxiliary oral hygiene devices such as interdental brushes and keep motivating them to use the devices more frequently.

A Design Direction for Residential Space under Ubiquitous Environment (유비쿼터스 환경에서의 주거 건축설계 방향설정 연구)

  • Yoon Ki-Byung
    • Journal of the Korean housing association
    • /
    • v.17 no.4
    • /
    • pp.145-153
    • /
    • 2006
  • Ubiquitous space can be described as a combined space of physical space and digital space. Ubiquitous space possesses new possibilities by combining the two. The concept of ubiquitous home will bring new changes in residential space design. First of all, it makes possible for more convenient and secure home. It has to be developed along with city and town level changes as ubiquitous environment. Secondly, concept of extended space as an extension of living space becomes possible by linking with outside spaces. Thirdly, as consumer requirements for residential spaces will become more versatile by social changes, ubiquitous home can be a good means to meet these versatile consumer requirements by accommodating concept of multi-functional space and flexible space. It is quite important to predict user requirements in rapidly changing social environment and versatile personal inclinations. Instead of POE methodology which can analyze and evaluate in exiting types of designs, storytelling methodology can be used to predict and direct for future requirements of living. The methodology makes scenarios of space usage for future living and extracts design requirements for the living. The concept of intelligent space has to be introduced. It is different from digital home that only accomodate digital devices in space. In intelligent space, space itself has to be recognized as an identity that interacts human directly. Intelligent space recognize human requirements and control digital devices as a response. Multi-functional space is closely related with intelligent space that can changes for business, entertainments as well as for rests by user requirements instantly. Flexible space that also intends to meet requirements of mobility and versatility can be attained through the integration of digital technology into current physical mobile systems. Interaction design becomes integral part for ubiquitous space design along with physical design. For the residential space design, digital illiteracy has to be considered for interaction design. Instead of the concept of passive existence, space itself has to be recognized as active subsistence that reacts with human. Intuitive and natural interaction for human will be a key design element for space-human interface design.

The Design and Characteristic Analysis of a Digital Signal Transmission System Based on Power Line Communications

  • Kim, Ji-Hyoung;Yun, Ji-Hun;Kim, Yong-K.;So, Byung-Moon
    • Transactions on Electrical and Electronic Materials
    • /
    • v.10 no.6
    • /
    • pp.222-226
    • /
    • 2009
  • The objective of this study is to share multimedia contents included in existing digital devices and to solve the problems of an increase in installation fees and non-environmentally friendly interiors. This study designed a new digital signal transmitter and receiver using power line transmission and HDMI in order to solve the problems in the existing systems. The transmitter and receiver designed in this study used an AD9867BCPZ PLC chip in which the transmission came from digital signals originating in a PC, and the system architecture was configured so that the outputs signals were connected to a TV from the receiver. The experiment was implemented by adding a Video Test Generator, a USBPre external sound card, and Smaart Live 6 for analyzing the characteristics of the configured system. In the video test results, it was verified that communication was actively implemented, and the image quality showed a constant level from the measurement of the captured video. In the case of the sound, it was verified that more than 90% of the sound signals were normally transmitted and received from the examination of their phases and magnitudes. Thus, the performance of the system designed in this study was verified, which leads to the resolution of some of the problems found in current digital devices.

Support the IEEE 1588 Standard in A Heterogeneous Distributed Network Environment PTP for Time Synchronization Algorithms Based Application Framework Development Method (IEEE 1588 표준을 지원하는 이기종 분산 네트워크 환경에서 시간 동기화를 위한 PTP 알고리즘 기반의 어플리케이션 프레임워크 개발 기법)

  • Cho, Kyeong Rae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.67-78
    • /
    • 2013
  • In this paper, We proposed an development method of application framework for using the precision time protocol(PTP) based on physical layer devices to synchronize clocks across a network with IEEE1588 capable devices. The algorithm was not designed as a complete solution across all conditions, but is intended to show the feasibility of such a for the PTP(Precision Time Protocol) based on time synchronization of heterogeneous network between devices that support in IEEE 1588 Standard application framework. With synchronization messages per second, the system was able to accurately synchronize across a single heavily loaded switch. we describes a method of synchronization that provides much more accurate synchronization in systems with larger networks. In this paper, using the IEEE 1588 PTP support for object-oriented modeling techniques through the 'application framework development Development(AFDM)' is proposed. The method described attempts to detect minimum delays, or precision packet probe and packet metrics. The method also takes advantage of the Tablet PC(Primary to Secondary) clock control mechanism to separately control clock rate and time corrections, minimizing overshoot or wild swings in the accuracy of the clock. We verifying the performance of PTP Systems through experiments that proposed method.

A Study on Educational App Development using the App Authoring Tool (앱 저작도구를 이용한 교육용 앱개발 연구)

  • Kim, Eun-Soo;Park, Joon-Seok
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.1-6
    • /
    • 2012
  • This study is for using applications on smart devices at school class which designed by professor himself due to nonexistent of applications which related to textbook or course work even though fast developing smart devices and plenty of educational applications are in rapid ubiquitous environment. That is reason to make a learning environments of study course work anywhere at anytime and also make smooth communication between professor and learner with the smart devices advantages of being free of location and time. Also develop the application with the tools which the computer beginner can handle easily and quickly without contracting the work to commercial firms, it will lead to save money and time, be easily updated and modified from place of study, and increase the effectiveness and efficiency of study.

Exploring the Integration of Handheld Device Applications in Teaching and Learning in Textiles, Clothing and Design Programmes in Universities in Zimbabwe

  • Dzikite, Chipo
    • International Journal of Costume and Fashion
    • /
    • v.17 no.1
    • /
    • pp.1-15
    • /
    • 2017
  • This study made use of a qualitative approach with an intrinsic case study to explore how handheld devices applications were integrated in teaching and learning in Textiles, Clothing and Design programmes. Participants of the study were purposively sampled from the Textiles and Clothing department at a selected university of Science and Technology in Zimbabwe comprising eight lecturers and thirty-two students. In-depth, focus group interviews and observations were used to gather data for the study. The findings of the study showed that participants were still at the stage of actively experimenting with very limited handheld device applications for the purposes of teaching and learning. Photoediters and digital cameras were the commonest applications used in most modules of the Textiles, Clothing and Design programmes. Though the photoediters and digital cameras were found to match the multimedia category of the Functionality framework, these were not fully utilised by students. It was recommended that there is need for the Textiles, Clothing and Design lecturers to provide opportunities for students to use a variety of applications on handheld devices for collaborative designing in practical modules of the programmes as these can encourage the development of critical skills necessary for creating innovative textiles and fashion designs.

Design and Implementation of Personalized IoT Service base on Service Orchestration (서비스 오케스트레이션 기반 사용자 맞춤형 IoT 서비스의 설계 및 구현)

  • Cha, Siho;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.21-29
    • /
    • 2015
  • The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.

A Study on Dual-IDS Technique for Improving Safety and Reliability in Internet of Things (사물인터넷 환경에서 안전성과 신뢰성 향상을 위한 Dual-IDS 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • IoT can be connected through a single network not only objects which can be connected to existing internet but also objects which has communication capability. This IoT environment will be a huge change to the existing communication paradigm. However, the big security problem must be solved in order to develop further IoT. Security mechanisms reflecting these characteristics should be applied because devices participating in the IoT have low processing ability and low power. In addition, devices which perform abnormal behaviors between objects should be also detected. Therefore, in this paper, we proposed D-IDS technique for efficient detection of malicious attack nodes between devices participating in the IoT. The proposed technique performs the central detection and distribution detection to improve the performance of attack detection. The central detection monitors the entire network traffic at the boundary router using SVM technique and detects abnormal behavior. And the distribution detection combines RSSI value and reliability of node and detects Sybil attack node. The performance of attack detection against malicious nodes is improved through the attack detection process. The superiority of the proposed technique can be verified by experiments.