• Title/Summary/Keyword: mobile devices

Search Result 3,398, Processing Time 0.031 seconds

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

Analyzing the weblog data of a shopping mall using process mining (프로세스 마이닝을 이용한 쇼핑몰 웹로그 데이터 분석)

  • Kim, Chae-Young;Yong, Hye-Ryeon;Hwang, Hyun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.777-787
    • /
    • 2020
  • With the development of the Internet and the spread of mobile devices, the online market is growing rapidly. As the number of customers using online shopping malls explodes, research is being conducted on the analysis of usage behavior from customer data, personalized product recommendations, and service development. Thus, this paper seeks to analyze the overall process of online shopping malls through process mining, and to identify the factors that influence users' purchases. The data used are from a large online shopping mall, and R was the analysis tool. The results show that customer activity was most prominent in categories with event elements, such as unconventional discounts and monthly giveaway events. On the other hand, searches, logins, and campaign activity were found to be less relevant than their importance. Those are very important, because they can provide clues to a customer's information and needs. Therefore, it is necessary to refine the recommendations from related search words, and to manage activity, such as coupons provided when customers log in. In addition to the previous discussion, this paper proposes various business strategies to enhance the competitiveness of online shopping malls and to increase profits.

A Study to Improve the Performance of a Fixd Type Fin Stabilizer with Coanda Effect (콴다효과를 적용한 고정식 핀 안정기의 성능개선에 관한 연구)

  • Seo, Dae-Won;Lee, Se-Jin;Lee, Seung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.37 no.3
    • /
    • pp.257-262
    • /
    • 2013
  • A ship operating in rough sea may suffer from an undesirable motion which may severely degrade the performance of equipment onboard and give a person an uncomfortable feeling. Hence, roll stabilization received a considerable attention and various devices including bilge keels, stabilizing fins, gyroscopic, anti-rolling tanks, rudders and flaps have been conceived and utilized for the purpose. The Coanda effect is evident when a jet stream is applied tangential to a curved surface of a hydrofoil since then the jet increases the circulation around the foil and consequently the lift. Model tests and numerical simulation have been conducted to examine the practicality of a fixed type fin stabilizer augmented by the Coanda jet. The results show that the lift coefficient of the modified Coanda fin at the zero angle of attack identically coincides with that of the original fin at ${\alpha}=\26^{\circ}$ when Coanda jet is supplied at the rate of $C_j$ = 0.25. It is also shown that fixed type fin stabilizers for active control of the motions of ships and the other mobile units without rotation can be put to practical use if the Coanda effect is applied.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Design and Implementation of Unified Index for Moving Objects Databases (이동체 데이타베이스를 위한 통합 색인의 설계 및 구현)

  • Park Jae-Kwan;An Kyung-Hwan;Jung Ji-Won;Hong Bong-Hee
    • Journal of KIISE:Databases
    • /
    • v.33 no.3
    • /
    • pp.271-281
    • /
    • 2006
  • Recently the need for Location-Based Service (LBS) has increased due to the development and widespread use of the mobile devices (e.g., PDAs, cellular phones, labtop computers, GPS, and RFID etc). The core technology of LBS is a moving-objects database that stores and manages the positions of moving objects. To search for information quickly, the database needs to contain an index that supports both real-time position tracking and management of large numbers of updates. As a result, the index requires a structure operating in the main memory for real-time processing and requires a technique to migrate part of the index from the main memory to disk storage (or from disk storage to the main memory) to manage large volumes of data. To satisfy these requirements, this paper suggests a unified index scheme unifying the main memory and the disk as well as migration policies for migrating part of the index from the memory to the disk during a restriction in memory space. Migration policy determines a group of nodes, called the migration subtree, and migrates the group as a unit to reduce disk I/O. This method takes advantage of bulk operations and dynamic clustering. The unified index is created by applying various migration policies. This paper measures and compares the performance of the migration policies using experimental evaluation.

Color Path : A Location Based Drawing and Storytelling Project (위치기반의 드로잉과 스토리텔링 연구)

  • Woo, Suk-Young;Park, Seung-Ho
    • Archives of design research
    • /
    • v.20 no.1 s.69
    • /
    • pp.65-78
    • /
    • 2007
  • The mobile phone and wireless network, location based technology and other newly introduced technologies and communication media gave birth to the new terminology "ubiquitous" and are changing our daily life. Influence of such technologies and communication media is not an exception in the arts. New media art pieces using these technologies are increasing, and taking on the characteristics of public art within a wider scope of a city as a backdrop, beyond the traditional boundaries of art galleries. Of such art, locative media art using locative media has a closer relationship with city space than any other form of an, and makes various attempts to allow the spectator to reinterpret and experience city space and induce communication. These characteristics of locative media art can be considered as a method that can solve quality problems of the city space, especially the loss of the sense of place and the absence of communication. is one such locative media project with a purpose of solving quality problems of city space, especially the recovery of commercial sites and inducing communication. This project uses the paths of the city as its canvas, movement of people as its brush, the color of the roads as its pallet, and by allowing the partakers to draw paths of their own and to share their paths with others. People are encouraged to share stories about their paths. The project proceeds using barcodes that are frequently used commercially. When users wish to create their own place, they can enter their place and colors of their choice using input devices installed in the city space. Paths that are created through such a process will be displayed in public areas throughout the city, shared with others, and can create and share a stories about the city using on/off-line media.

  • PDF

An Analysis of Satellite Communications System structure for NCW (NCW대비 군 위성통신 구조 분석)

  • Park, Woo-Chul;Cha, Jae-Ryong;Kim, Jae-Hyun
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • As the information age comes out, the aspect of future war brings about the many changes in terms of war-fighting environment. Accordingly, information superiority and intelligence-centric warfare have been important and new war-fighting concept such as NCW(network centric warfare) have been turned up. This paper proposed all-weather core-strategy communications systems guaranteeing not only the real-time transmission of the information collected in a battlefield and expansion, automation, and rapidity of a battlefield but also broadband, mobility, survivability, and flexibility. The proposed military satellite communications system is classified into wideband mass capacity link, survivability, and the system supporting OTM(on the move) communication for the real-time transmission of battlefield information. This paper analyzed the essential operation concepts and core schemes of the U.S. Army's next generation system, TSAT(Transformational Satellite Communication System). Base on the analysis results, this paper proposed that the architecture of next generation military satellite communications systems for NCW have to provide the data rate, anti-jamming capability, network control and management capability which are optimally adaptable for the wireless channel environments such as jamming and interference and to support the variety of platforms like high-speed mobile vehicles, micromini devices, super-high speed unmanned aerial vehicles. Finally, this paper also proposed that next generation military satellite communications systems need the technologies such as the adaptable multi-antenna, laser link, and next-generation anti-jamming waveform.

  • PDF

Multi-layer Caching Scheme Considering Sub-graph Usage Patterns (서브 그래프의 사용 패턴을 고려한 다중 계층 캐싱 기법)

  • Yoo, Seunghun;Jeong, Jaeyun;Choi, Dojin;Park, Jaeyeol;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.70-80
    • /
    • 2018
  • Due to the recent development of social media and mobile devices, graph data have been using in various fields. In addition, caching techniques for reducing I/O costs in the process of large capacity graph data have been studied. In this paper, we propose a multi-layer caching scheme considering the connectivity of the graph, which is the characteristics of the graph topology, and the history of the past subgraph usage. The proposed scheme divides a cache into Used Data Cache and Prefetched Cache. The Used Data Cache maintains data by weights according to the frequently used sub-graph patterns. The Prefetched Cache maintains the neighbor data of the recently used data that are not used. In order to extract the graph patterns, their past history information is used. Since the frequently used sub-graphs have high probabilities to be reused, they are cached. It uses a strategy to replace new data with less likely data to be used if the memory is full. Through the performance evaluation, we prove that the proposed caching scheme is superior to the existing cache management scheme.

Study on Development of Patient Effective Dose Calculation Program of Nuclear Medicine Examination (핵의학검사의 환자 유효선량 계산 프로그램 제작에 관한 연구)

  • Seon, Jong-Ryul;Gil, Jong-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.657-665
    • /
    • 2017
  • The aim of this study was to develop and distribute a dedicated program that can easily calculate the effective dose of a patient undergoing nuclear medicine examinations, and assist in the study of dose of nuclear medicine examinations and information disclosure. The program produced a database of the effective dose per unit activity administered (mSv/MBq) of the radiopharmaceuticals listed in ICRP 80, 106 Report and the fourth addendum, was designed through Microsoft Visual Basic (In Excel) to take the effect of 5 different (Area, Clark, Solomon(=Fried), Webster, Young) of pediatric dose calculation methods and 7 different body surface area calculation methods. The program calculates the effective dose (mSv) when the age, radionuclide, substance, and amount injected in the human body is inputted. In pediatric cases, when the age is entered, the pediatric method is activated and the pediatric method to be applied can be selected. When the BSA (Body Surface Area) formula is selected in the pediatric calculation method, a selection window for selecting the body surface area calculation method is activated. When the adult dose is input, the infant dose and the effective dose (mSv) are calculated automatically. The patient effective dose calculation program of the nuclear medicine examinations produced in this study is meaningful as a tool for calculating the internal exposure dose of the human body that is most likely to be obtained in nuclear medicine examinations, even though it is not the actual measurement dose. In the future, to increase the utilization of the program, it will be produced as an application that can be used in mobile devices, so that the public can access it easily.

The Relationships among Factors that Effects on Acceptance Intention in Smart Education (스마트교육 수용의도에 영향을 미치는 요인 간의 관계 분석)

  • Kang, Hye-Young;Kim, Sung-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.183-190
    • /
    • 2013
  • This study aims to analyze the relationships among factors which influence acceptance intention of smart education. Based on literature reviews related with previous technology acceptance models, a potential model and seven hypotheses were suggested. Questionnaire was carried out among 132 students from elementary and secondary schools. They have experiences of utilizing applications of mobile devices for instructional goal. Cronbach alpha of the questionnaire was .78. The collected data were analyzed through path analysis. The results of this research are as follows. Seven hypotheses were adopted: Interaction will affect on perceived usefulness, Interaction will affect on perceived ease of use, Interaction will affect on acceptance intention, Interaction will affect on social influence, Social influence will affect on perceived usefulness, Perceived usefulness will affect on acceptance intention, Perceived ease of use will affect on acceptance intention. The model revised through the results of path analysis had good-fitness. That is, overall fit measures (RMSEA, CFI, NNFI), indexes that show the suitability of the model were quite good.