• Title/Summary/Keyword: smart mobile device

Search Result 489, Processing Time 0.028 seconds

Development of Gas Sensor Monitoring Services using Smart Phone and Web Server (스마트폰과 웹 서버를 활용한 가스 센서 모니터링 서비스 개발)

  • Roh, Jae-Sung;Lee, Sang-Geun;Hwang, In-Gyu;Lee, Jeong-Moo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1048-1050
    • /
    • 2013
  • Mobile devices or smartphones are rapidly becoming the central computer and communication network device. Recently, smartphones are programmable and come with a growing set of cheap powerful embedded sensors, such as an accelerometer, digital compass, gyroscope, GPS, microphone, and camera. In this paper, we discuss the wireless gas sensing service architectural and develope the gas sensor monitoring services using smartphone and web server.

  • PDF

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

The Relationship Between Brand Anthropomorphism, Brand Love, and Brand Advocacy. Moderate Role of Self-brand Connection in Brand Distribution

  • Ngoc Dan Thanh, NGUYEN;Thuy Anh, TRINH
    • Journal of Distribution Science
    • /
    • v.21 no.3
    • /
    • pp.37-46
    • /
    • 2023
  • Purpose: The article focuses on studying the impact of brand anthropomorphism, and brand love, on brand advocacy, and at the same time the moderate role of brand self-connection in the process of customers' perception of the brand, especially the brand distribution. The survey subjects are customers with millennial consumers in Ho Chi Minh City, who have the behavior of buying brands in the smart mobile device industry many times with a specific brand in terms of brand distribution. Results: The findings show that Brand anthropomorphism and brand love are crucial factors to impact brand advocacy and the role of self-brand connection also is a confirmed positive effect on the relationship between brand anthropomorphism and brand love. Research design, data, and methodology: The article uses quantitative research to test the model and research hypotheses. The way to collect quantitative data is to use questionnaires with 1531 samples in Ho Chi Minh City, Vietnam. Conclusion: The research results can help businesses build a long-term brand strategy and expect to get new rewards and value from customers. They can also add to the theory about the relationship between brands and customers.

Privilege Management Technology based-on One-time Certificate for Smart Device in Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 스마트 디바이스용 일회용 인증서 기반 권한 관리 기술)

  • Moon, Jong-Sik;Han, Seung-Wan;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.832-835
    • /
    • 2011
  • 공인인증서의 사용은 꾸준히 증가하고 있으나 증가하는 사용량에 비례하여 하드디스크에 저장된 공인인증서 해킹으로 인한 피해 사례가 증가하고 있다. 이에 따라 정부는 하드디스크 내 공인인증서 저장을 금지하고 이동형 저장매체에 저장하도록 하는 방침을 내놓았다. 또한 모바일 클라우드 컴퓨팅 환경에서는 중앙의 스토리지에 데이터가 저장되기 때문에 공인인증서를 중앙 스토리지에 저장하는 것은 매우 위험한 일이다. 이러한 방침으로 인해 앞으로 USB 메모리 및 스마트폰과 같은 이동형 저장매체에 대한 중요성이 높아질 것이며, 분실 위험이 높은 USB 메모리 및 스마트폰의 특징에 따라 인증서가 저장된 저장매체 없이도 인증서를 사용할 수 있는 방안이 필요하게 될 것이다. 본 논문은 일회용 인증서에 대한 요구사항 분석 및 형식을 설계하고, PKI 인증서를 기반으로 경량화된 일회용 인증서를 발급받아 인증서를 사용할 수 있도록 하였다. 또한 모바일 클라우드 컴퓨팅 환경에서 일회용 인증서를 이용한 권한 관리 기술을 제안하여 안전성과 효율성을 제공하도록 하였다.

A Study on Portable Weighing Scales Applicable to Poultry Farms (가금류 농장에 적용 가능한 이동식 중량 저울에 관한 연구)

  • Park, Sung Jin;Park, In Ji;Kim, Jin Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.2
    • /
    • pp.155-159
    • /
    • 2022
  • Smart livestock, which combines information and communication technology (ICT) with livestock, can be said to be an effective solution to existing livestock problems such as productivity improvement, odors, and diseases. So far, it has hardly been universalized; thus, it is necessary to develop automation devices to reduce labor by localizing automation devices to expand the distribution of ICT technology to farms, and to advance precise specifications and health management technology using biometric information. Weighing scales currently being used in livestock farms are to prevent the spread of diseases by diagnosis and preparation for AI and other diseases in advance, using information on the growing weight of duck breeding. However, accurate values cannot be obtained due to poor breeding conditions. In this paper, we developed a separate data transmission system kit for the weighing scale and placed the sensor on top of the weighing scale so that the sensor wire is not affected by pollutants or ducks on the floor. A display function was provided, and a method of receiving and analyzing the serial port data of the weighing device, and then transmitting them to the data collection server was implemented.

A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch (갤럭시 워치를 중심으로 본 스마트워치 활용 기술유출의 위험성 및 대응방안에 대한 연구)

  • Seungjae Jeon;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.893-906
    • /
    • 2023
  • Awareness that smartphones can be used as tools for criminal activity is prevalent in many organizations, but the functionally smartphone-like smartwatch's potential as a criminal tool is being overlooked. Considering this situation, this research verifies the possibility of information leakage through an insider's smartwatch in a situation where smartphones are controlled by security regulations and technologies, but smart watch are not. By analyzing information related application usage and Wi-Fi connection generated in the smartwatch during the verification process, forensic information and limitations are identified. Finally, this research proposes preventive methods to prepare for potential smartwatch-related crimes, and reconsiders awareness of the possibility of using smartwatches as criminal tools.

A Comparative Study of Users' Behavior on Mobile Internet Service Usage according to Lifestyle (라이프스타일 유형별 모바일 인터넷 사용형태 비교 연구)

  • Choi, Hun
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.87-105
    • /
    • 2011
  • Although the rapid spread of mobile device like smart phone has increased, One of the main problems of systems is that they do not meet their quality requirements. Many researchers have tried to improve users' satisfaction and enhance their quality of life. The purpose of the study is to examine the moderating effect of lifestyle on the use of mobile internet service. To achieve our research purpose, we used lifestyle, IS success model and quality of life as the theoretical background. Based on the research model, we conducted survey and empirically analyzed the data. We classified user types according to lifestyle as a moderating variable. The results show that users' lifestyle can classify two group: curiosity-independent group and intelligence-pursuit of advanced fashion type. The impact of information and systems quality factors of mobile internet service on user satisfaction are differentiated from these lifestyle group. This paper ends with strategical implication of the study results.

  • PDF

Morphological Characteristics Optimizing Pocketability and Text Readability for Mobile Information Devices (모바일 정보기기의 소지용이성과 텍스트 가독성을 최적화하기 위한 형태적 특성)

  • Kim, Yeon-Ji;Lee, Woo-Hun
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.323-332
    • /
    • 2006
  • Information devices such as a cellular phone, smart phone, and PDA become smaller to such an extent that people put them into their pockets without any difficulties. This drastic miniaturization causes to deteriorate the readability of text-based contents. The morphological characteristics of size and proportion are supposed to have close relationships with the pocketability and text readability of mobile information devices. This research was aimed to investigate the optimal morphological characteristics to satisfy the two usability factors together. For this purpose, we conducted an controlled experiment, which was designed to evaluate the pocketability according to $size(4000mm^2/8000mm^2)$, proportion(1:1/2:1/3:1), and weight(100g/200g) of information devices as well as participants' pose and carrying method. In the case of male participants putting the models of information device into their pockets, 2:1 morphological proportion was preferred. On the other hand, the female participants carrying the models in their hands preferred 2:1 proportion$(size:4000mm^2{\times}2mm)$ and 3:1 proportion$(size:8000mm^2{\times}20mm)$. For the device in the size of $4000mm^2$, it was found that the weight of device has an significant effect on pocketability. In consequence, 2:1 proportion is optimal to achieve better pocketability. The second experiment was about how text readability is affected by size $(2000mm^2/4000mm^2/8000mm^2)$ and proportion(1:1/2:1/3:1) of information devices as well as interlinear space of displayed text(135%/200%). From this experiment result, it was found that reading speed was increased as line length increased. Regarding the subjective assessment on reading task, 2:1 proportion was strongly preferred. Based on these results, we suggest 2:l proportion as an optimal proportion that satisfy pocketability of mobile information devices and text readability displayed on the screen together. To apply these research outputs to a practical design work efficiently, it is important to take into account the fact that the space for input devices is also required in addition to a display screen.

  • PDF

A design of embedded PC-Fi system with interactive remote control (인터렉티브 원격제어 기능을 갖는 임베디드 PC-Fi 시스템 설계)

  • Bae, Min-Eui;Shin, Ok-Keun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.1
    • /
    • pp.55-61
    • /
    • 2016
  • As the price-performance ratio of embedded PCs improves, the benefits of the PC-Fi can be maximized by designing an embedded PC-Fi system. In this paper presents the design of an embedded PC-Fi that can be manipulated by a remote controller based on mobile devices such as smart phones or tablets. Additionally, an interactive control system and its GUI, through which the user can select and play music as they like at ease, are presented. The case that a large amount of music is stored in the PC-Fi system requires a function allowing the user to easily select the music they want to listen to. In order to implement this function, a DB containing detailed information of each track can be used to find the location of the desired music with keywords provided by the user. In this proposed system, the embedded PC-Fi system and remote controller are mutually connected via a WiFi network, and more than one user can remotely control the embedded system with their own mobile device.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.