• Title/Summary/Keyword: smart mobile device

Search Result 491, Processing Time 0.028 seconds

Improvement of Activity Recognition Based on Learning Model of AI and Wearable Motion Sensors (웨어러블 동작센서와 인공지능 학습모델 기반에서 행동인지의 개선)

  • Ahn, Junguk;Kang, Un Gu;Lee, Young Ho;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.982-990
    • /
    • 2018
  • In recent years, many wearable devices and mobile apps related to life care have been developed, and a service for measuring the movement during walking and showing the amount of exercise has been provided. However, they do not measure walking in detail, so there may be errors in the total calorie consumption. If the user's behavior is measured by a multi-axis sensor and learned by a machine learning algorithm to recognize the kind of behavior, the detailed operation of walking can be autonomously distinguished and the total calorie consumption can be calculated more than the conventional method. In order to verify this, we measured activities and created a model using a machine learning algorithm. As a result of the comparison experiment, it was confirmed that the average accuracy was 12.5% or more higher than that of the conventional method. Also, in the measurement of the momentum, the calorie consumption accuracy is more than 49.53% than that of the conventional method. If the activity recognition is performed using the wearable device and the machine learning algorithm, the accuracy can be improved and the energy consumption calculation accuracy can be improved.

RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester (서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘)

  • Kwon, Moon-Sang;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.299-306
    • /
    • 2002
  • Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

A Case Study of a Navigator Optimization Process

  • Cho, Doosan
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.26-31
    • /
    • 2017
  • When mobile navigator device accesses data randomly, the cache memory performance is rapidly deteriorated due to low memory access locality. For instance, GPS (General Positioning System) of navigator program for automobiles or drones, that are currently in common use, uses data from 32 satellites and computes current position of a receiver. This computation of positioning is the major part of GPS which accounts more than 50% computation in the program. In this computation task, the satellite signals are received in real time and stored in buffer memories. At this task, since necessary data cannot be sequentially stored, the data is read and used at random. This data accessing patterns are generated randomly, thus, memory system performance is worse by low data locality. As a result, it is difficult to process data in real time due to low data localization. Improving the low memory access locality inherited on the algorithms of conventional communication applications requires a certain optimization technique to solve this problem. In this study, we try to do optimizations with data and memory to improve the locality problem. In experiment, we show that our case study can improve processing speed of core computation and improve our overall system performance by 14%.

Two-module robotic pipe inspection system with EMATs

  • Lee, Jin-Hyuk;Han, Sangchul;Ahn, Jaekyu;Kim, Dae-Hyun;Moon, Hyungpil
    • Smart Structures and Systems
    • /
    • v.13 no.6
    • /
    • pp.1041-1063
    • /
    • 2014
  • This work introduces a two-module robotic pipe inspection system with ultrasonic NDE device to evaluate the integrity of pipe structures. The proposed robotic platform has high mobility. The two module mobile robot platform overcomes pipe obstacle structures such as elbow, or T-branch joints by cooperative maneuvers. Also, it can climb up the straight pipeline at a fast speed due to the wheel driven mechanism. For inspection of pipe structure, SH-waves generated by EMAT are applied with additional signal processing methods. A wavelet transform is implemented to extract a meaningful and specific signal from the superposed SH-wave signals. Intensity ratio which is normalized the defect signals intensity by the maximum intensity of directly transmitted signals in the wavelet transforms spectrum is applied to evaluate defects quantitatively. It is experimentally verified that the robotic ultrasonic inspection system with EMAT is capable of non-destructive inspection and evaluation of defects in pipe structure successfully by applying signal processing method based on wavelet transform.

Development of Gas Sensor Monitoring Services using Smart Phone and Web Server (스마트폰과 웹 서버를 활용한 가스 센서 모니터링 서비스 개발)

  • Roh, Jae-Sung;Lee, Sang-Geun;Hwang, In-Gyu;Lee, Jeong-Moo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1048-1050
    • /
    • 2013
  • Mobile devices or smartphones are rapidly becoming the central computer and communication network device. Recently, smartphones are programmable and come with a growing set of cheap powerful embedded sensors, such as an accelerometer, digital compass, gyroscope, GPS, microphone, and camera. In this paper, we discuss the wireless gas sensing service architectural and develope the gas sensor monitoring services using smartphone and web server.

  • PDF

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

The Relationship Between Brand Anthropomorphism, Brand Love, and Brand Advocacy. Moderate Role of Self-brand Connection in Brand Distribution

  • Ngoc Dan Thanh, NGUYEN;Thuy Anh, TRINH
    • Journal of Distribution Science
    • /
    • v.21 no.3
    • /
    • pp.37-46
    • /
    • 2023
  • Purpose: The article focuses on studying the impact of brand anthropomorphism, and brand love, on brand advocacy, and at the same time the moderate role of brand self-connection in the process of customers' perception of the brand, especially the brand distribution. The survey subjects are customers with millennial consumers in Ho Chi Minh City, who have the behavior of buying brands in the smart mobile device industry many times with a specific brand in terms of brand distribution. Results: The findings show that Brand anthropomorphism and brand love are crucial factors to impact brand advocacy and the role of self-brand connection also is a confirmed positive effect on the relationship between brand anthropomorphism and brand love. Research design, data, and methodology: The article uses quantitative research to test the model and research hypotheses. The way to collect quantitative data is to use questionnaires with 1531 samples in Ho Chi Minh City, Vietnam. Conclusion: The research results can help businesses build a long-term brand strategy and expect to get new rewards and value from customers. They can also add to the theory about the relationship between brands and customers.

Privilege Management Technology based-on One-time Certificate for Smart Device in Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 스마트 디바이스용 일회용 인증서 기반 권한 관리 기술)

  • Moon, Jong-Sik;Han, Seung-Wan;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.832-835
    • /
    • 2011
  • 공인인증서의 사용은 꾸준히 증가하고 있으나 증가하는 사용량에 비례하여 하드디스크에 저장된 공인인증서 해킹으로 인한 피해 사례가 증가하고 있다. 이에 따라 정부는 하드디스크 내 공인인증서 저장을 금지하고 이동형 저장매체에 저장하도록 하는 방침을 내놓았다. 또한 모바일 클라우드 컴퓨팅 환경에서는 중앙의 스토리지에 데이터가 저장되기 때문에 공인인증서를 중앙 스토리지에 저장하는 것은 매우 위험한 일이다. 이러한 방침으로 인해 앞으로 USB 메모리 및 스마트폰과 같은 이동형 저장매체에 대한 중요성이 높아질 것이며, 분실 위험이 높은 USB 메모리 및 스마트폰의 특징에 따라 인증서가 저장된 저장매체 없이도 인증서를 사용할 수 있는 방안이 필요하게 될 것이다. 본 논문은 일회용 인증서에 대한 요구사항 분석 및 형식을 설계하고, PKI 인증서를 기반으로 경량화된 일회용 인증서를 발급받아 인증서를 사용할 수 있도록 하였다. 또한 모바일 클라우드 컴퓨팅 환경에서 일회용 인증서를 이용한 권한 관리 기술을 제안하여 안전성과 효율성을 제공하도록 하였다.

A Study on Portable Weighing Scales Applicable to Poultry Farms (가금류 농장에 적용 가능한 이동식 중량 저울에 관한 연구)

  • Park, Sung Jin;Park, In Ji;Kim, Jin Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.2
    • /
    • pp.155-159
    • /
    • 2022
  • Smart livestock, which combines information and communication technology (ICT) with livestock, can be said to be an effective solution to existing livestock problems such as productivity improvement, odors, and diseases. So far, it has hardly been universalized; thus, it is necessary to develop automation devices to reduce labor by localizing automation devices to expand the distribution of ICT technology to farms, and to advance precise specifications and health management technology using biometric information. Weighing scales currently being used in livestock farms are to prevent the spread of diseases by diagnosis and preparation for AI and other diseases in advance, using information on the growing weight of duck breeding. However, accurate values cannot be obtained due to poor breeding conditions. In this paper, we developed a separate data transmission system kit for the weighing scale and placed the sensor on top of the weighing scale so that the sensor wire is not affected by pollutants or ducks on the floor. A display function was provided, and a method of receiving and analyzing the serial port data of the weighing device, and then transmitting them to the data collection server was implemented.