• Title/Summary/Keyword: mobile Smart Phone

Search Result 824, Processing Time 0.032 seconds

A Study for Usability in Web Board Game based on Smart Phone : Toward Efficiency and Accuracy (스마트 폰 기반의 웹 보드 게임에서 사용성에 관한 연구 : 효율성과 정확성을 중심으로)

  • Han, Sang-geun;Song, Seung-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.122-124
    • /
    • 2014
  • Currently mobile game market has expanded rapidly due to the development of smart phone. In addition, mobile web board game has been developed consistently. However, several problems appear in users' usability. That is why the user who plays game do not satisfy in aspect with usability. The objective of this research analyses the factors to investigate the efficiency and the accuracy among usability those in web board game based on smart phone. We conduct to research the efficiency and the accuracy in traditional usability literatures and derive the proper usability factors based on smart phone. We expect to provide the guideline related on usability in mobile board game in the future.

  • PDF

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

A Study on the User Context Awareness based on the Smart Phone (스마트 폰 기반의 사용자 상황인지 플랫폼에 관한 연구)

  • Kim, Kee-Baek;Jang, Won-Seok;Choi, Jae-Wan;Lim, Chul-Su;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.109-119
    • /
    • 2012
  • As it is developing and growing up the mobile telecommunication, commercial mobile, and the application on it, the smart phone is attracting public attention techniques, hereafter. In this paper, we can make the context-awareness platform to supply users with the interface for their appropriate contexts using the smart phone. Therefore, we use the sensors in the smart phone, and the values from them are analyzed. As a result, we can estimate the user's contexts, such as the sitting and standing, movement, the lights, positions, locations, etc. In addition, we happen the suitable events from them for users. Therefore, we can provide the perspective interfaces for them. In addition, to prove the more efficiency of the proposed platform, we implemented the shooting game, and could know that the performance is the more advanced than the others. The proposed algorithm can be used for the mobile environments, which high efficiency is required such as the game, or the implementation of mobile applications which are more efficient to the user interfaces, etc.

Development of Digital Mileage Service System using Smart-Phone (스마트폰을 이용한 디지털 적립 서비스 시스템 개발)

  • Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.137-142
    • /
    • 2011
  • Increasing users of smart phone and various marketing strategies activate lots of mobile mileage services recently. Such a mileage service is a typical marketing service to increase brand loyalty of clients and maximize purchase motivation. However, traditional offline mileage services introduce discomfort that users have to carry lots of mileage cards physically. Also, in case of using digital mobile mileage service, users have to search specific card to use from lots of digital cards stored in his mobile device. In this paper, to solve the problems, we design and develop a mobile mileage service system that especially discover a proper card automatically based on location information of user.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

Smart phone Application Development for Aware of Unexpected Conditions using Accelerometer Sensors (스마트폰 가속도 센서 기반의 돌발 상황인식 어플리케이션 개발)

  • Cha, Kyung-Ae;Yeo, SunDong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2012
  • A Smart phone is the one of the mobile devices widely used in our daily life. Moreover, various type of sensing data gathering from smart phone are effectively applicable to recognize of their users or smart phone status. Therefore, many smart phone applications based on sensor data have been actively developed. In this paper, we investigate an unexpected conditions recognition method using continuous sensing data from a single three-axis accelerometer. In addition, we implemented an application using the proposed method which provides the services notifying an abrupt changes of the smart phone conditions. By the experimented results, the application can be useful to protect the smart phone on the user's unaware conditions such as falling or a robbery case.

Discussion-based Interface Design Research on the Smart phone at Cyber Universities (사이버대학 강의에서 스마트폰을 활용한 토론학습 인터페이스 설계연구)

  • Si, Ji-Hyun;Park, Dae-Ghun;Chae, A-Lm;Kim, Dong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.5
    • /
    • pp.81-96
    • /
    • 2011
  • With the popularity of smart phones for mobile learning on the rise, cyber universities in Korea are trying to build a reliable mobile campus infrastructure. Such advances in smart phone technologies have made it increasingly easy for users to stay connected and this heightened interaction through smart phones has educational potential for collaborative learning. Thus, to fulfill its educational potential and ultimately provide optimal learning environments on the smart phones, this study has developed a discussion-based interface prototype for collaborative learning. The proposed interface design was evaluated through cognitive walkthrough of the expert reviewers and its usability improvements were also offered.

  • PDF

The Quality Evaluation Model for Mobile RPG (모바일 RPG의 품질평가모델)

  • Kim, Giuhyoung;Lee, Nam-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.457-460
    • /
    • 2014
  • As to the rapid development of mobile technology, the era of 1-person 1-smart phone has come. Also, the application of smart phone became the part of our life. Especially mobile RPG(Role Playing Game) has the biggest market and the largest number of users. There could be no precise quality assessment result, if quality evaluation model of PC RPG game were applied to the mobile RPG. Thus, it is time to focus on new quality evaluation model for mobile RPG with the great reflection of smart phone attributes. In this paper, based on ISO/IEC 9126, the international standard of software quality, quality evaluation elements for mobile RPG were deducted. Then metrics for validation of elements were redefined and new quality evaluation model was proposed.

  • PDF

The Application Methods of Hologram Technology in Fashion Business (패션 비즈니스에서 홀로그램 기술을 이용한 마케팅 활용 방안)

  • Jeong, Hwa-Yeon
    • Journal of Fashion Business
    • /
    • v.20 no.2
    • /
    • pp.16-31
    • /
    • 2016
  • This study analyzed cases that applied hologram technology in the fashion industry in order to provide basic information for research on fashion marketing using hologram technology. The results of this study are as follows. A hologram was applied to fashion businesses in various ways including fashion shows, outdoor signboards, hologram windows or screens in stores, and launching shows or exhibitions. Most of these cases were foreign fashion brands, which utilized hologram technology actively for formulating a new brand image or for advertising products. Among Korean brands, however, there are not many cases of hologram application. Today, as-being the age of smart devices, the mobile advertisement market is growing rapidly among smart phone users. DKNY and Puma are providing information on styling through smart phone applications, and the Adidas stores in Germany also allow the customers to buy goods by entering a simple code through the smart phone. Recently, new devices are being introduced one by one, which display 2D digital contents in 3D holograms by combining mobile and hologram technologies. The marketing of fashion products is not just for supplying products but is required to satisfy the consumers' five senses. Therefore, the development of experiential contents based on the combination of mobile and hologram technologies will open new potential for profitable business models.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.