• Title/Summary/Keyword: pattern of computer and Internet use

Search Result 52, Processing Time 0.042 seconds

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Intelligent Motion Pattern Recognition Algorithm for Abnormal Behavior Detections in Unmanned Stores (무인 점포 사용자 이상행동을 탐지하기 위한 지능형 모션 패턴 인식 알고리즘)

  • Young-june Choi;Ji-young Na;Jun-ho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.73-80
    • /
    • 2023
  • The recent steep increase in the minimum hourly wage has increased the burden of labor costs, and the share of unmanned stores is increasing in the aftermath of COVID-19. As a result, theft crimes targeting unmanned stores are also increasing, and the "Just Walk Out" system is introduced to prevent such thefts, and LiDAR sensors, weight sensors, etc. are used or manually checked through continuous CCTV monitoring. However, the more expensive sensors are used, the higher the initial cost of operating the store and the higher the cost in many ways, and CCTV verification is difficult for managers to monitor around the clock and is limited in use. In this paper, we would like to propose an AI image processing fusion algorithm that can solve these sensors or human-dependent parts and detect customers who perform abnormal behaviors such as theft at low costs that can be used in unmanned stores and provide cloud-based notifications. In addition, this paper verifies the accuracy of each algorithm based on behavior pattern data collected from unmanned stores through motion capture using mediapipe, object detection using YOLO, and fusion algorithm and proves the performance of the convergence algorithm through various scenario designs.

Analysis on the Power Efficiency of Smartphone According to Parameters (스마트폰의 구성 변수에 따른 전력 효율성 분석)

  • Son, Dong-Oh;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2013
  • Smartphone enables diverse applications to be used in mobile environments. In spite of the high performance of smartphones, battery life has become one of the major constraints in mobility. Therefore, power efficiency of the smartphone is one of the most important factors in determining the efficiency of the smartphone. In this paper, in order to analyze the power efficiency of the smartphone, we have various experiments according to several configuration parameters such as processor, display and OS. We also use diverse applications. As a result, power consumption is dependent on the processor complexity and display size. However, power consumption shows the unpredictable pattern according to the OS. Smartphone using android OS consumes high power when internet and image processing applications are executed, but It consumes low power when music and camera applications are executed. In contrary, smartphone based on iOS consumes high power when game and internet applications are executed but it consumes low power when camera and processing applications are executed. In general, smartphone using iOS is more power efficient than smartphone based on android OS, because smartphone using iOS is optimized in the perspective of the hardware and OS.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

A Proposal for expansion of the low-floor bus based on analysis of living area for the handicapped mobility people in Seoul Using R (R을이용한 서울시 교통약자 생활권 분석에 따른 저상버스 확대 제안)

  • Yun, Sang-hee;Kim, Jeong-joon;Jeon, Gwang-il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.195-201
    • /
    • 2017
  • As of 2016, the total traffic usage of handicapped people were 24.8%. Buses (25.6%) have the highest rate of travel, with the exception of "walking (33.5%)" as the main means of transportation for these handicapped people. Therefore, the Seoul Metropolitan Government expanded the low-floor bus, which is a means of transportation for the underbelly, to 30% by 2015, but the satisfaction level of mobility improvement of the underbelly was only 2% To 55%. In fact, increasing the percentage of low-floor buses is merely a superficial solution, and there are many restrictions on solving fundamental problems with limited budgets. Therefore, in this study, we use statistical analysis R, with a simple data manipulation and visualization function, to grasp the living area and life pattern of handicapped people in Seoul city.

A Study on High Speed Image Rotation Algorithm using CUDA (CUDA를 이용한 고속 영상 회전 알고리즘에 관한 연구)

  • Kwon, Hee-Choul;Cho, Hyung-Jin;Kwon, Hee-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.1-6
    • /
    • 2016
  • Image rotation is one of main pre-processing step in image processing or image pattern recognition. It is implemented with rotation matrix multiplication. However it requires lots of floating point arithmetic operations and trigonometric function calculations, so it takes long execution time. We propose a new high speed image rotation algorithm without two major time-consuming operations. It use just 2 shear translation operations, so it is very fast. In addition, we apply a parallel computing technique with CUDA. CUDA is a massively parallel computing architecture using prevailed GPU recently. As GPU is a dedicated graphic processor, it is exellent for parallel processing of pixels. We compare the proposed algorithm with the conventional rotation one with various size images. Experimental results show that the proposed algorithm is superior to the conventional rotation ones.

Visual Element Analysis and Guideline of School Web Site Design (학교 웹 사이트의 디자인에 대한 시각적인요소 분석 및 가이드라인)

  • Kwon Kyung-Ran;Kim Young-Bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.273-279
    • /
    • 2005
  • It is activated a virtual university(digital university) without limitation time and space that the diffusion of internet, the rapid development of information and communicative technologies, web-technology. It is great importance of school-site to support various and qualitative education services, to cut social education spending, to strengthen national competitiveness with breed expert. Many people who are in universities are putting a school-site to the test. So we need study and analysis it to build up a virtual-study-space efficiently on web. This thesis is supposed to help in school-site design to make it reduce errors and save time and efforts. First, it suggests most general design pattern by analysis visual elements using HTML Tag. Second, it suggests a guide-line and a specific of design to use convenience through research on web-design problem and finding out user's favor.

  • PDF

A Study on Product Design Process in Digital Environment A Comparative Analysis of Image Evaluation and Design Factors in Internet Environment and Reality Environment (디지털 환경 하에 제품디자인 프로세스 연구 -인터넷 환경과 현실 환경에서의 제품디자인 이미지 평가 및 디자인 요소 비교분석-)

  • 윤형건
    • Archives of design research
    • /
    • v.13 no.3
    • /
    • pp.123-134
    • /
    • 2000
  • Electronic commerce in digital environment is greatly different from the commerce in physical environment in the past (reality environment) in terms of marketing, distribution structure and, above an, comsumers'purchase pattern. The Old purchase pattern is that a consumer buys a product after s/he touches, tests, and feels it physically, while the purchase pattern in electronic commerce enables the comsumer to make a decision about whether to buy it or not through the information gleaned from the computer monitor screen. A number of products which appears in the market now are designed to use the reality environment setup without consideration of the digital environment, of which the intention is to appeal to consumers with a series of design process. However, taking under consideration the present situation in which lots of electronic commerce are made in the cyber space or digital environment, we are required to forward the product design which can gains the positive attraction for consumers in this environment. Factor analysis is made in order to understand how the subjects perceive the image of the design of the product both in reality situation and in digital environment. The result shows the first factor has different images in those environments. In the background of this conclusion rests the fact that the difference of the transfer of formative factors to consumers is made in the images which show themselves in those different environments.

  • PDF

Internet Addiction in Adolescents and its Relation to Sleep and Depression (청소년의 인터넷 중독 : 수면, 우울과의 관련성)

  • Song, Ho-Kwang;Jeong, Mi-Hyang;Sung, Da-Jung;Jung, Jung-Kyung;Choi, Jin-Sook;Jang, Yong-Lee;Lee, Jin-Seong
    • Sleep Medicine and Psychophysiology
    • /
    • v.17 no.2
    • /
    • pp.100-108
    • /
    • 2010
  • Objectives: "Internet-addiction" came into common use not only in clinical setting but also in everyday life. But, pathophysiology and diagnostic criteria of the internet addiction remain unknown. Because adolescents are in developing period, they might be vulnerable to the internet addiction, depression and sleep-related problem. The objectives of this study were to investigate the characteristics of internet addiction and its association with sleep pattern and depression in Korean adolescence. Methods: Subjects were 799 middle and high school students in Seoul, Korea. We administered a self-reported questionnaire including socio-demographic data, Korean versions of Young's Internet Addiction Scale (YIAS), Pittsburgh Sleep Quality Index (PS-QI), the Center for Epidemiologic Studies for Depression Scale (CES-D) and questions about internet using patterns. Data of 696 subjects were included in analysis. Chi-square tests were used to analyze proportional differences, and ANOVA with post-hoc tests were used to analyze differences among groups. Partial correlation analyses were performed to analyze the correlation of internet addiction with other variables (two-tailed, p<0.05). Results: Of the 696 participants (grade 2 of middle school; M2 135 vs. grade 1 of high school; H1 238 vs. grade 2 of high school; H2 323), 2.0% (n=14) were internet-addicted (IA), 27.7% (n=193) were over-using (OU) and 70.3% (n=489) were not-addicted (NA). The mean scores of YIAS, PSQI and CES-D scores were 35.24${\pm}$12.78, 5.53${\pm}$3.04 and 16.72${\pm}$8.69, respectively. In higher grade students, average total sleep time was shorter (M2 426.20${\pm}$67.68 min. vs. H1 380.47${\pm}$62.57 min. vs. H2 354.67${\pm}$73.37 min., F=51.909, p<0.001), and PSQI (4.69${\pm}$3.14 vs. 5.42${\pm}$3.15 vs. 5.97${\pm}$2.83, F=8.871, p<0.001) CES-D (13.53${\pm}$8.37 vs. 16.96${\pm}$8.24 vs. 17.87${\pm}$8.84, F=12.373, p<0.001) scores were higher than those of lower grade students. Comparing variables among IA, OU and NA groups, computer using time not for study (96.36${\pm}$63.31 min. vs. 134.92${\pm}$86.79 min. vs. 213.57${\pm}$136.87 min., F=34.287, p<0.001) and portable device using time not for study (84.22${\pm}$79.11 min. vs. 96.97${\pm}$91.89 min. vs. 152.31${\pm}$93.64 min., F= 5.400, p=0.005) were different among groups. PSQI (5.26${\pm}$2.97 vs. 6.08${\pm}$2.97 vs. 7.50${\pm}$4.41, F=8.218, p<0.001) and CES-D scores (15.40${\pm}$8.08 vs. 19.05${\pm}$8.42 vs. 30.43${\pm}$13.69, F=32.692, p<0.001) were also different among groups. YIAS score were correlated with computer using time not for study (r=0.356, p<0.001) and portable device using time not for study (r= 0.136, p<0.001). PSQI score (r=0.237, p<0.001) and CES-D score (r=0.332, p<0.001). YIAS score and PSQI score (r=0.131, p= 0.001), YIAS and CES-D score (r=0.265, p<0.001), PSQI score and CES-D score (r=0.357, p<0.001) were correlated each other. Conclusion: These results suggested that adolescents' internet-addiction was correlated with not only computer and portable device using time not for study but also depression and sleep-related problems. We should pay attention to depression and sleep-related problems, when evaluating internet-addiction in adolescents.

  • PDF

Clustering of Smart Meter Big Data Based on KNIME Analytic Platform (KNIME 분석 플랫폼 기반 스마트 미터 빅 데이터 클러스터링)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • One of the major issues surrounding big data is the availability of massive time-based or telemetry data. Now, the appearance of low cost capture and storage devices has become possible to get very detailed time data to be used for further analysis. Thus, we can use these time data to get more knowledge about the underlying system or to predict future events with higher accuracy. In particular, it is very important to define custom tailored contract offers for many households and businesses having smart meter records and predict the future electricity usage to protect the electricity companies from power shortage or power surplus. It is required to identify a few groups with common electricity behavior to make it worth the creation of customized contract offers. This study suggests big data transformation as a side effect and clustering technique to understand the electricity usage pattern by using the open data related to smart meter and KNIME which is an open source platform for data analytics, providing a user-friendly graphical workbench for the entire analysis process. While the big data components are not open source, they are also available for a trial if required. After importing, cleaning and transforming the smart meter big data, it is possible to interpret each meter data in terms of electricity usage behavior through a dynamic time warping method.