• Title/Summary/Keyword: mobile storage

Search Result 475, Processing Time 0.033 seconds

A Study on the Email Management of Undergraduate Students (대학생의 이메일 관리 행태 연구)

  • Jiyoon Han;Hye-Eun Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.1
    • /
    • pp.149-173
    • /
    • 2023
  • This study examines email records management patterns of undergraduate students and their perceptions of university email policy. The research collected data from 317 undergraduate students using a survey based on the five essential elements of email records management: common elements, email creation, email management, email preservation, and perception. Also, an in-depth interview was conducted with 6 undergraduate students, according to the method of university email service: Google, Microsoft, and in-house webmail. As a result, undergraduate students used email as an address book, cloud storage, file storage, and collaboration tool, and they had difficulties in systematically managing the email records according to the records lifecycle. Also, there was a tendency to prefer using an external email platform that can use additional functions to in-house webmail that has limitations in mobile service and preservation of attachments. Thus, this study suggests ways to help undergraduate students manage their email records, including maintaining graduates' email accounts, providing sufficient email storage, and providing email records management training and guidelines for undergraduate students.

A Comparative Study on the Aesthetic Aspect of Design Preferred Between Countries Centering Around the Analysis on the Aesthetic Aspect of Mobile Phone Preferred by Korean and Chinese Consumers - (국가 간 선호 디자인의 심미성요소 비교연구 - 한.중 소비자 선호휴대폰의 심미성요소 분석을 중심으로 -)

  • Jeong Su-Kyoung;Hong Jung-Pyo
    • Science of Emotion and Sensibility
    • /
    • v.9 no.1
    • /
    • pp.49-61
    • /
    • 2006
  • The present mobile phone industry has significant effect on the domestic economy and has taken root as the core item that has the responsibility to lead the Korean economy for a considerable period of time. As the mobile phone market becomes gigantic, the mobile phone is being used by people in broader age bracket, and functions or designs preferred by people of various age are getting more diverse. Like that, as the mobile phone has greater effect on and meaning in our daily lives, consumers of mobile phone have growing expectation of the mobile phone Now, the core function of voice communication via the mobile phone is not a great concern to consumers. But the function, such as more convenient and friendly information input and output, processing and storage, and the design, which is more sophisticated and optimized for the user environment, are being demanded, not just the simple voice communication. And as the modern design is getting more similar to the objects of traditional high art consumed by consumers every day, the aesthetic aspect of design can play an important role, as the factor that differentiates the product, in creating new value which forms the spiritual and emotional value of human beings to improve the quality of living, and in addition, the willingness of consumers to buy is determined by the design that they prefer the most. Like that, a new design of mobile phone based on a new dimension and preferred by the consumers the most is urgently required to be developed by shedding light on the factors related to the preference of consumers on the basis of the analysis on the aesthetic aspect, which can be said to be the most critical factor in the design process. Therefore, this study aims to identity the common preference and different factors of aesthetic aspects through the analysis on the aesthetic aspects of the mobile phone preferred by users among countries, and figure out the formative artistic factors of aesthetic aspects that are considered to be important, in order to propose the guideline on the aesthetic aspect of mobile phone that can be applied to the design of mobile phone practically.

  • PDF

A Design of Mobile Device Description Repository System (모바일 단말정보 저장소 시스템 설계)

  • Lee, Young-Il;Lee, Seung-Yun;Lee, Kang-Chan;In, Min-Kyo;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.819-822
    • /
    • 2008
  • The demand against the contents service which is various with improvement capability of the mobile device. But the capability of heterogeneous mobile device to display contents has a difference from the side of the hardware, software, network conditions so the adaptation of contents is a solution to overcome this difference. This adaptation of contents is based on profile(DDL : Device Description Language) but there is no system which manages the profile efficiently. In this paper, we designed independent DDR(Device Description Repository) system that offers storage and optimized profiles processed by searching and recombination with request conditions.

  • PDF

Implementation of Augmentative and Alternative Communication System Using Image Dictionary and Verbal based Sentence Generation Rule (이미지 사전과 동사기반 문장 생성 규칙을 활용한 보완대체 의사소통 시스템 구현)

  • Ryu, Je;Han, Kwang-Rok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.569-578
    • /
    • 2006
  • The present study implemented AAC(Augmentative and Alternative Communication) system using images that speech defectives can easily understand. In particular, the implementation was focused on the portability and mobility of the AAC system as well as communication system of a more flexible form. For mobility and portability, we implemented a system operable in mobile devices such as PDA so that speech defectives can communicate as food as ordinary People at any Place using the system Moreover, in order to overcome the limitation of storage space for a large volume of image data, we implemented the AAC system in client/server structure in mobile environment. What is more, for more flexible communication, we built an image dictionary by taking verbs as the base and sub-categorizing nouns according to their corresponding verbs, and regularized the types of sentences generated according to the type of verb, centering on verbs that play the most important role in composing a sentence.

Buying vs. Using: User Segmentation & UI Optimization through Mobile Phone Log Analysis (구매 vs. 사용 휴대폰 Log 분석을 통한 사용자 재분류 및 UI 최적화)

  • Jeon, Myoung-Hoon;Na, Dae-Yol;Ahn, Jung-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.460-464
    • /
    • 2008
  • To improve and optimize user interfaces of the system, the accurate understanding of users' behavior is an essential prerequisite. Direct questions depend on user' s ambiguous memory and usability tests depend on the researchers' intention instead of users'. Furthermore, they do not provide with natural context of use. In this paper we described the work which examined users' behavior through log analysis in their own environment. 50 users were recruited by consumer segmentation and they were downloaded logging-software in their mobile phone. After two weeks, logged data were gathered and analyzed. The complementary methods such as a user diary and an interview were conducted. The result of the analysis showed the frequency of menu and key access, used time, data storage and several usage patterns. Also, it was found that users could be segmented into new groups by their usage patterns. The improvement of the mobile phone user interface was proposed based on the result of this study.

  • PDF

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.

Development and Simulation Verification of Operation System for Mobile ESS Test Equipment (ESS 이동형 시험장비용 운영시스템의 개발과 모의검증)

  • Shin, Je-Seok;Han, Hyun-Gyu;Kim, Jin-Tae;Lee, Seung-Min;Park, Chan-Wook;Lim, Geon-Pyo
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.3
    • /
    • pp.168-174
    • /
    • 2018
  • The performance test for 376MW ESS for frequency regulation currently operating in 13 substations is conducted based on the test procedure in the first and second steps. In the first step, components of ESS is moved to the certification authority where the test equipment is located in order to be proceeded with the test. In the second step, the performance test is conducted manually for the ESS equipments installed on site using the movable measurement equipment, and thus it can only be performed on some limited test items and requires a lot of time and manpower. Therefore, mobile test equipment for ESS(MOTES) is being developed that can perform automatically more test items for ESS in the field using the MOTES, and reduce manpower and time. To do this, an algorithm and a prototype of the operating system(MOS) are also being developed that can control MOTES automatically. In this paper, a development of the MOS prototype is introduced and then a simulation is performed to verify the prototype and its algorithm before the field demonstration.

Hybrid Main Memory based Buffer Cache Scheme by Using Characteristics of Mobile Applications (모바일 애플리케이션의 특성을 이용한 하이브리드 메모리 기반 버퍼 캐시 정책)

  • Oh, Chansoo;Kang, Dong Hyun;Lee, Minho;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1314-1321
    • /
    • 2015
  • Mobile devices employ buffer cache mechanisms, just as in computer systems such as desktops or servers, to mitigate the performance gap between main memory and secondary storage. However, DRAM has a problem in that it accelerates battery consumption by performing refresh operations periodically to maintain the stored data. In this paper, we propose a novel buffer cache scheme to increase the battery lifecycle in mobile devices based on a hybrid main memory architecture consisting of DRAM and non-volatile PCM. We also suggest a new buffer cache policy that allocates buffers based on process states to optimize the performance and endurance of PCM. In particular, our algorithm allocates each page to the appropriate position corresponding to the state of the application that owns the page, and tries to ensure a rapid response of foreground applications even with a small amount of DRAM memory. The experimental results indicate that the proposed scheme reduces the elapsed time of foreground applications by 58% on average and power consumption by 23% on average without negatively impacting the performance of background applications.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.