• Title/Summary/Keyword: internet phone

Search Result 999, Processing Time 0.027 seconds

A Study on the Automated Design of Business Card for Personal Information Leakage Prevention Using IT-based Convergent Service

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.25-30
    • /
    • 2018
  • When producing a business card, there is always a risk for exposing personal information as the information from the business card application is saved in the computer of the printing agency. The information that goes into the business card application file, such as name, mobile phone number, and e-mail address is not encrypted, which makes it easy to access. This study was conducted in order to find a way to automatize the business card application process by encrypting the information entered into the business card application file, simplifying the business card application process, minimizing the workload and by directly linking to the print shop to remove the print file after completing the printing of the business card.

Mobile Internet Korean User Research (모바일 인터넷 국내 사용자 조사 - 스마트폰, PDA, PMP 사용자의 풀브라우징 및 인터넷 연결 기능 사용 행태를 중심으로 -)

  • Yi, Sun-Young;Kim, Jeong-Sun;Hwang, Byeong-Cheol
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.170-172
    • /
    • 2008
  • 모바일 환경에서 풀브라우징과 접속/비접속의 seamless 한 인터넷 기능의 사용을 바라는 것은 사용자들의 오래되었으나 채워지지 않는 니즈였으며, 이제 사회적, 환경적 기반이 구축되고 있는 시점에서 실사용자들의 행태에 대한 리서치를 기반으로 인터넷 풀브라우징이 가능한 모바일 단말기가 갖추어야할 사용성의 요소를 미리 알아보고자 하였다. 하여 모바일 인터넷 이라는 주제로 이루어진 리서치의 일부로서 국내 사용자 조사를 진행하였다. 국내 사용자 조사는 휴대기기로 실제 모바일 인터넷 관련 기능을 자주 사용하는 실사용자 대상으로 FGD 와 Shadowing 을 실시하였고, 그 결과 PUI/UI/GUI 관점에서 향후 모바일 인터넷 휴대단말기가 갖추어야할 요소를 추출하였다.

  • PDF

Mobile Advertisement Strategies through Data Mining Techniques (데이터마이닝 기법을 이용한 이동통신 광고 전략)

  • 나종화;김정숙;장영미
    • Proceedings of the Korean Association for Survey Research Conference
    • /
    • 2001.04a
    • /
    • pp.87-108
    • /
    • 2001
  • Recently, the user of mobile and cordless internet is growing rapidly. So the advertising methodologies are appeared on stage through the internet and mobile service. But the current advertisement(AD) service into mobile phones supplies a short-sentence AD using letter-message, and gives mobile phone users an inconvenience by making them first listen to and then check the AD. Until now the AD service using mobile has been on the beginning level. In this study, we suggest the new advertising methodologies and propose both target marketing strategies and demand forecast through the data mining techniques.

Intelligent buffer Management Method for QoS of Internet Telephony (인터넷 전화 음질 개선을 위한 지능적인 버퍼관리 방식)

  • 류태욱;강성호;이정훈;임중규;이현관;엄기환
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.111-114
    • /
    • 2002
  • This thesis introduces a buffer management method that could be used to provide better sound quality for Internet phone terminals. Proposed method used the fuzzy system for dynamically adjust the number of jitter This method actively responds to both the compression algorithms that are used by the terminals, as well as to the received data to provide an improvement in sound quality. In order to confirm the validity of the suggested algorithm, comparisons of the performance have been made between the existing buffer management method and this intelligent method in various network settings.

  • PDF

A Technical Movement of Mobile Platform (모바일 플랫폼의 개술 동향)

  • Lee Jin-Wook;Choi Min-Kyu;Kim Tae-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.452-457
    • /
    • 2005
  • It is the mobile platform that has held important position in wireless internet contents service using mobile phone terminal so far. There have been a variety of mobile platforms developed by several mobile service providers for their purpose and convenience. In this paper, in addition to the merits and demerits analysis and comparison between each platform, the WIPI is introduced and reviewed as a Korean standard wireless internet platform in terms of technology.

  • PDF

The Present State and the Future Prospect on the Mobile Internet for the M-Commerce (M-Commerce 도입을 위한 Mobile Internet의 풍향과 향후 전망)

  • Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.177-192
    • /
    • 2001
  • 전자상거래의 탄생과 성장의 가장 큰 당위성은 고객의 만족도 제고와 효용성의 증대라 할 수 있다. 이러한 측면에서 살펴볼 때, 이동성, 위치성, 접근성 및 개인성을 고루 갖춘 M-Commerce에 대한 수요는 매우 폭발적일 것으로 판단된다. 그럼에도 불구하고 기존의 유선 인터넷 망을 이용하는 전자상거래에 비해 기술 규격이 표준화되지 못하고 있는 점, 보안 및 인중이 취약하다는 점, 불편한 인터페이스 등의 문제로 아직까지는 대중화되지 못하는 태동기라고 볼 수 있다. 현재, M-Commerce의 주요 수단으로 사용되는 Cellular Phone과 PCS의 차기 모델로서 대두되고 있는 IMT 2000과 기존의 단말기를 대체하는 PDA 사용자의 급증 동 제반 불만족 요인의 상당 부분을 극복 할 수 있을 것으로 판단된다. 또한, M-Commerce의 Business Model은 기존은 기존의 전자상거래가 B2B 시장이 가장 폭넓은 시장인데 비해 B2C 시장으로 특화될 수 있을 것으로 전망된다.

  • PDF

Correction for Misrecognition of Korean Texts in Signboard Images using Improved Levenshtein Metric

  • Lee, Myung-Hun;Kim, Soo-Hyung;Lee, Guee-Sang;Kim, Sun-Hee;Yang, Hyung-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.722-733
    • /
    • 2012
  • Recently various studies on various applications using images taken by mobile phone cameras have been actively conducted. This study proposes a correction method for misrecognition of Korean Texts in signboard images using improved Levenshtein metric. The proposed method calculates distances of five recognized candidates and detects the best match texts from signboard text database. For verifying the efficiency of the proposed method, a database dictionary is built using 1.3 million words of nationwide signboard through removing duplicated words. We compared the proposed method to Levenshtein Metric which is one of representative text string comparison algorithms. As a result, the proposed method based on improved Levenshtein metric represents an improvement in recognition rates 31.5% on average compared to that of conventional methods.

Study on 3 DoF Image and Video Stitching Using Sensed Data

  • Kim, Minwoo;Chun, Jonghoon;Kim, Sang-Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4527-4548
    • /
    • 2017
  • This paper proposes a method to generate panoramic images by combining conventional feature extraction algorithms (e.g., SIFT, SURF, MPEG-7 CDVS) with sensed data from inertia sensors to enhance the stitching results. The challenge of image stitching increases when the images are taken from two different mobile phones with no posture calibration. Using inertia sensor data obtained by the mobile phone, images with different yaw, pitch, and roll angles are preprocessed and adjusted before performing stitching process. Performance of stitching (e.g., feature extraction time, inlier point numbers, stitching accuracy) between conventional feature extraction algorithms is reported along with the stitching performance with/without using the inertia sensor data. In addition, the stitching accuracy of video data was improved using the same sensed data, with discrete calculation of homograph matrix. The experimental results for stitching accuracies and speed using sensed data are presented in this paper.

An Empirical Study on Concern for Information Privacy for Smart Phone Users (스마트 폰 사용자들의 정보보호 염려도에 관한 실증연구)

  • Lee, Jaejung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.53-61
    • /
    • 2014
  • This research analyzed the relationship between CFIP and Intention to purchase under M-Commerce circumstances. First of all, CFIP had a negative influence on intention to purchase similar to E-Commerce. Secondly, we found privacy fundamentalist groups to react most sensitive to the degree of CFIP. Finally, Mobile experience did not have influence on the relationship between CFIP and Intention to purchase. This result is different from that of the E-Commerce Study. As such, it requires a more comprehensive research.

Voice Verification System for m-Commerce on CDMA Network

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.4E
    • /
    • pp.176-182
    • /
    • 2003
  • As the needs for wireless Internet service is increasing, the needs for secure m-commerce is also increasing. Conventional security techniques are reinforced by biometric security technique. This paper utilized the voice as biometric security techniques. We developed speaker verification system for m-commerce (mobile commerce) via wireless internet and wireless application protocol (WAP). We named this system the mVprotek. We implemented the system as client-server architecture. The clients are mobile phone simulator and personal digital assistant (PDA). The verification results are obtained by integrating the mVprotek system with SK Telecom's code dimension multiple access (CDMA) system. Utilizing f-ratio weighting and virtual cohort model normalization showed much better performance than conventional background model normalization technique.