• Title/Summary/Keyword: keypad

Search Result 107, Processing Time 0.026 seconds

Analysis of Users' Gestures by Application in Smartphone Touch Interfaces (스마트폰 터치 인터페이스에서 애플리케이션별 사용자 제스처의 분석)

  • Kim, Jisun;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.9-14
    • /
    • 2015
  • Touch interface is widely used in a smartphone instead of a keyboard or a keypad interface that has been adopted in a PC or a featurephone, respectively. Touch interface can recognize a variety of gestures that clearly represent the distinct features of each application's input. This paper analyzes users' gesture of each application captured by the touch interface of a smartphone. Specifically, we extract touch input traces from various application categories such as game, web browser, youtube, image and e-book viewer, video player, camera, and map applications, and then analyzed them. Through this analysis, we observed a certain unique characteristics of each application's touch input, and this can be utilized in various useful areas such as identification of an application user, prevention of running an application by an illegal user, or design of a new interface convenient to a specific user.

The Development of Smart Jacket Incorporating MP3 functionality for Commercial Use (MP3 기능 스마트 재킷의 상용화 모형 개발)

  • Cho, Hyun-Seung;Kim, Jin-Hyung;Park, Sun-Min;Ryu, Jae-Hun;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.9 no.4
    • /
    • pp.377-383
    • /
    • 2006
  • The purpose of this research is to develop a design model of a smart jacket incorporating MP3 functionality for commercial use, as one of the digital lines of textile to apply If technology. In order to conduct this study, the previous studies were analyzed and usability and wearability tests were conducted using five prototype design models of smart wear with MP3 functionality. Accordingly, the smart jacket incorporating MP3 functionality for commercial use, for which user-centered interface, usability and wearability were completed, was developed by optimizing the design and location of the input interface, control module, the path of wires and earphone etc., based on textile wire and keypad. The smart jacket targets the female dress market from late-teens to early twenties. It will be a high value commodity considers all aspects of recent fashion trends, consumers' emotional satisfaction and the value of digital wear.

  • PDF

DNA Damage of Lymphocytes in Volunteers after 4 hours Use of Mobile Phone (일부 자원자들의 이동전화 4시간 연속 사용 후 림프구 DNA 손상 평가)

  • Ji, Seon-Mi;Oh, Eun-Ha;Sul, Dong-Geun;Choi, Jae-Wook;Park, Hee-Chan;Lee, Eun-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.37 no.4
    • /
    • pp.373-380
    • /
    • 2004
  • Objectives : There has been gradually increasing concern about the adverse health effects of electromagnetic radiation originating from cell phones which are widely used in modern life. Cell phone radiation may affect human health by increasing free radicals of human blood cells. This study has been designed to identify DNA damage of blood cells by electromagnetic radiation caused by cell phone use. Methods : This study investigated the health effect of acute exposure to commercially available cell phones on certain parameters such as an indicator of DNA damage for 14 healthy adult volunteers. Each volunteer during the experiment talked over the cell phone with the keypad facing the right side of the face for 4 hours. The single cell gel electrophoresis assay (Comet assay), which is very sensitive in detecting the presence of DNA strand-breaks and alkali-labile damage in individual cells, was used to assess peripheral blood cells (T-cells, B-cells, granulocytes) from volunteers before and after exposure to cell phone radiation. The parameters of Comet assay measured were Olive Tail Moment and Tail DNA %. Results : The Olive Tail Moment of B-cells and granulocytes and Tail DNA % of B-cells and granulocytes were increased by a statistically significant extent after 4-hour use of a cell phone compared with controls. Conclusion : It is concluded that cell phone radiation caused the DNA damage during the 4 hours of experimental condition. Nonetheless, this study suggested that cell phone use may increase DNA damage by electromagnetic radiation and other contributing factors.

An Implementation of an Android Mobile System for Extracting and Retrieving Texts from Images (이미지 내 텍스트 추출 및 검색을 위한 안드로이드 모바일 시스템 구현)

  • Go, Eun-Bi;Ha, Yu-Jin;Choi, Soo-Ryum;Lee, Ki-Hoon;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.57-67
    • /
    • 2011
  • Recently, an interest in a mobile search is increasing according to the growing propagation of smart phones. However, a keypad, which is not appropriate for mobile environment, is the only input media for the mobile search. As an alternative, voice emerged as a new media for the mobile search, but this also has weaknesses. Thus, in the paper, we propose a mobile content called Orthros for searching the Internet using images as an input. Orthros extracts texts from images, and then inserts the texts to public search engines as a keyword. Also, Orthros can repeat searching with the extracted texts by storing result URL to internal databases. As an experiment, we analyze properties of recognizable images and present the implementation method in details.

A Study on the attack technique using android UI events (안드로이드 UI 이벤트를 이용한 공격 기법 연구)

  • Yoon, Seok-Eon;Kim, Min-Sung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.603-613
    • /
    • 2015
  • Smart-phone Applications are consists of UI(User Interface). During using applications, UI events such as button click and scroll down are transmitted to Smart-phone system with many changes of UI. In these UI events, various information including user-input data are also involved. While Keylogging, which is a well-known user-input data acquisition technique, is needed a restrictive condition like rooting to obtain the user-input data in android environment, UI events have advantage which can be easily accessible to user-input data on user privileges. Although security solutions based keypad in several applications are applied, we demonstrate that these were exposed to vulnerability of application security and could be obtained user-input data using UI events regardless of presence of any security system. In this paper, we show the security threats related information disclosure using UI events and suggest the alternative countermeasures by showing the replay-attack example based scenarios.

The Usability Evaluation of Mobile Phone Interfaces Designed for the Elderly (고령자의 휴대전화기 사용성 평가에 관한 연구)

  • Choi, Ji-Ho;Lee, Seong-Il;Cho, Joo-Eun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.265-273
    • /
    • 2011
  • Objective: The aim of this study is to investigate the attributing factors influencing usability of the mobile phones specifically designed for the elderly users. Efforts to identify factors that cause usability problems for the elderly users in using mobile phones can provide the groundwork for changes aimed at usability enhancement and design of interfaces of mobile phones. Background: It became important to understand the behaviors and tendencies of the elderly in communication as the society became older. The problems in digital divide is contributed to mainly lack of understanding in terms of the use pattern of the elderly and lack of consideration of their characteristics in designing user interfaces of most ICT devices. Method: A total of 30 elderly users who were over 65 years in age participated in usability evaluation test experiment and performed seven different tasks using a widely accepted model of universally designed mobile phone. Their performance was compared with that of contrast group that consisted of 10 younger participants who were on their 20s. Results: It was found that the elderly users had hard times in using mobile phones, especially in keypad manipulation among search, understanding, and manipulation subtasks. Conclusion: Older users seemed to have difficulty in all the subtasks of search, recognition, and manipulation. It was suggested that designers of mobile phones need to give careful consideration into designing visual interfaces for search tasks and keypads for easier control and input for the elderly users. Application: The study is expected to provide guidelines for the universal design of mobile phones and their interfaces for enhancing usability of the mobile phone for elderly users.

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

Tangible Interaction : Application for A New Interface Method for Mobile Device -Focused on development of virtual keyboard using camera input - (체감형 인터랙션 : 모바일 기기의 새로운 인터페이스 방법으로서의 활용 -카메라 인식에 의한 가상 키보드입력 방식의 개발을 중심으로 -)

  • 변재형;김명석
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.441-448
    • /
    • 2004
  • Mobile devices such as mobile phones or PDAs are considered as main interlace tools in ubiquitous computing environment. For searching information in mobile device, it should be possible for user to input some text as well as to control cursor for navigation. So, we should find efficient interlace method for text input in limited dimension of mobile devices. This study intends to suggest a new approach to mobile interaction using camera based virtual keyboard for text input in mobile devices. We developed a camera based virtual keyboard prototype using a PC camera and a small size LCD display. User can move the prototype in the air to control the cursor over keyboard layout in screen and input text by pressing a button. The new interaction method in this study is evaluated as competitive compared to mobile phone keypad in left input efficiency. And the new method can be operated by one hand and make it possible to design smaller device by eliminating keyboard part. The new interaction method can be applied to text input method for mobile devices requiring especially small dimension. And this method can be modified to selection and navigation method for wireless internet contents on small screen devices.

  • PDF

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.