• Title/Summary/Keyword: smart pad

Search Result 110, Processing Time 0.025 seconds

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.

Wettability and Intermetallic Compounds of Sn-Ag-Cu-based Solder Pastes with Addition of Nano-additives (나노 첨가제에 따른 Sn-Ag-Cu계 솔더페이스트의 젖음성 및 금속간화합물)

  • Seo, Seong Min;Sri Harini, Rajendran;Jung, Jae Pil
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.29 no.1
    • /
    • pp.35-41
    • /
    • 2022
  • In the era of Fifth-Generation (5G), technology requirements such as Artificial Intelligence (AI), Cloud computing, automatic vehicles, and smart manufacturing are increasing. For high efficiency of electronic devices, research on high-intensity circuits and packaging for miniaturized electronic components is important. A solder paste which consists of small solder powders is one of common solder for high density packaging, whereas an electroplated solder has limitation of uniformity of bump composition. Researches are underway to improve wettability through the addition of nanoparticles into a solder paste or the surface finish of a substrate, and to suppress the formation of IMC growth at the metal pad interface. This paper describes the principles of improving the wettability of solder paste and suppressing interfacial IMC growth by addition of nanoparticles.

A Study of 0.5-bit Resolution for True-Time Delay of Phased-Array Antenna System

  • Cha, Junwoo;Park, Youngcheol
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.96-103
    • /
    • 2022
  • This paper presents the analysis of increasing the resolution of True-Time-Delay (TTD) by 0.5-bit for phased-array antenna system which is one of the Multiple-Input and Multiple Output (MIMO) technologies. For the analysis, a 5.5-bit True-Time Delay (TTD) integrated circuit is designed and analyzed in terms of beam steering performance. In order to increase the number of effective bits, the designed 5.5-bit TTD uses Single Pole Triple Throw (SP3T) and Double Pole Triple Throw (DP3T) switches, and this method can minimize the circuit area by inserting the minimum time delay of 0.5-bit. Furthermore, the circuit mostly maintains the performance of the circuit with the fully added bits. The idea of adding 0.5-bit is verified by analyzing the relation between the number of bits and array elements. The 5.5-bit TTD is designed using 0.18 ㎛ RF CMOS process and the estimated size of the designed circuit excluding the pad is 0.57×1.53 mm2. In contrast to the conventional phase shifter which has distortion of scanning angle known as beam squint phenomenon, the proposed TTD circuit has constant time delays for all states across a wide frequency range of 4 - 20 GHz with minimized power consumption. The minimum time delay is designed to have 1.1 ps and 2.2 ps for the 0.5-bit option and the normal 1-bit option, respectively. A simulation for beam patterns where the 10 phased-array antenna is assumed at 10 GHz confirms that the 0.5-bit concept suppresses the pointing error and the relative power error by up to 1.5 degrees and 80 mW, respectively, compared to the conventional 5-bit TTD circuit.

A Study on the Automation of Fish Species Identification and Body Length Measurement System (어종 인식 및 체장 측정 자동화 시스템에 관한 연구)

  • Seung-Beom Kang;Seung-Gyu Kim;Sae-Yong Park;Tae-ho Im
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.17-27
    • /
    • 2024
  • Overfishing, climate change, and competitive fishing have led to a continuous decline in fishery production. To address these issues, the Total Allowable Catch (TAC) system has been established, which sets annual catch quotas for individual fish species and allows fishing only within those limits. As part of the TAC system, land-based investigators measure the length and height of fish species at auction markets to calculate the weight and TAC depletion. However, the accuracy of the acquired data varies depending on the skill level of the land-based investigators, and the labor-intensive nature of the work makes it unsustainable. To address these issues, this paper proposes a fish species recognition and length measurement system that automatically measures the length, height, and weight of eight TAC-managed fish species using the camera of a smart pad that can measure the distance to the water surface. This system can help to automate the current labor-intensive work, minimize data loss, and facilitate the establishment of the TAC system.

A Study on DGPS Framework and Performance Evaluation for High-Accurate Localization based on GPS/AGPS (GPS/AGPS 기반의 고정밀 측위가 가능한 DGPS 프레임워크 및 성능평가에 관한 연구)

  • Seo, Ho-Seok;Jung, Se-Hoon;Oh, Min-Joo;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.8
    • /
    • pp.927-938
    • /
    • 2014
  • A number of crime and disease relief situation show a clear increasing trend in domestic and overseas country. In particular, we desperately need a fast location information sharing with high accuracy for dealing with this situation efficiently. In this paper, we propose a DGPS framework and performance evaluation based on Web service enable increase location accuracy using low-cost GPS or AGPS. The framework consists of mobile station to realize the final service by receiving the correction values that are created in the base station closest to the current position from DGPS server, base station system to transmit the correct values to DPGS server by installing at base point and DGPS framework working at DGPS server. Our framework is fundamentally designed to respond based on XML to service request. In addition, for performance evaluation, we make use of 3 sites of Level 2 city base-station among the base stations being operated in Suncheon-si. Through performance evaluation, we show that our framework outperforms about 10%~15% in terms of error improvement rate, compared with the existing schemes. And we have the advantage that various services can be expanded owing to receiving the correction values through mobile device such as, smart phone, smart pad, net-book by using XML based Web services.

Perspective of Juvenile Problems by Musical (브로드웨이 뮤지컬 를 통하여 본 청소년 문제)

  • Kim, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.204-210
    • /
    • 2016
  • The reason to research the musical is it has a lot of useful things for the various studies department not only Korea Musical Theatre own although it has been a successful musical theater on the Off-Broadway by Reboot culture era. Even though does not release on Korea, the popular of the show and powerful results of environments have delivered through the international magazines and Youtube channels to Korea. To study of Musical will be lead us to the world which adopted to the social problems as the youth school violence, family communication hurdle, and religion missing by script not only the musical drama but the interpretation for Teen-agers social problem. There are many kinds of Neo educations are proved by smart learning as STEAM. The students who have been studied with the smartphone, I-pad, personal computer, or laptop as smart tools for class are familliar as feedback processing speedly. It would make them learn the skill for their knowledge of a digital age, but it should not let them how to understand other people's emotion as real although STEAM has emtion part. Besides they have communicated on the social network not the ordinary man but the special ego by themselves, as mention or retweet as like their amusements and make the gossip group. This study would show the perspective for understanding Teen-agers Social Problem and who is the victims today's juvenile problems though the musical based on Jim Taulli's directing.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

The Effect of Mobile Device Capability of Middle and Older Aged Adults on Life Satisfaction : Focusing on the mediating effect of mobile social participation (중고령자의 모바일기기 이용능력이 삶의 만족도에 미치는 영향 : 모바일 기반 온라인 사회참여활동의 매개효과를 중심으로)

  • Kim, Su-Kyoung;Shin, Hye-Ri;Kim, Young-Sun
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.23-34
    • /
    • 2020
  • This study aims to verify the mediating effect of mobile social participation on the relationship between the mobile device capability and life satisfaction. Using the data of 2018 Digital Divide Survey conducted by the National Information Society Agency(NIA), the mediating effect was verified by Baron & Kenny (1986)'s 3 step process, targeting 1,665 middle and older aged adults. The result is as follows: first, the mobile device capability of the middle and older aged people has a positive effect on life satisfaction. Second, the effect of the mobile device capability of middle and older aged people on life satisfaction is partially mediated by mobile social participation including expressing opinions on social concerns, proposing policies and filing a civil complaint, donation and volunteering work and online voting and responding to a poll. The result represents that the mobile device, such as a smart phone or a smart pad, capability of the middle and older aged group not only directly benefits the group but also helps expand their mobile social participation, which leads to, although indirectly, higher life satisfaction. Therefore, the study is expected to be a groundwork for a practical intervention for enlarging the use of mobile device and lifting digital information level of the elderly to encourage mobile social participation and drive life satisfaction.

Developed a golf course scorecard App that improved UI/UX based on C/S (C/S 기반의 UI/UX를 개선한 골프장 스코어카드 App 개발)

  • Jung, Chul-Jong
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1433-1442
    • /
    • 2018
  • This study develops and improves the EZ Touch App of the scorecard application (app) using the smartphone and the pad, and works with the customer management system (C/S). The research was conducted as follows. First, how do you handle the EZ Touch input method on a scorecard? Second, how to configure the platform of customer (member) management system (C/S) and data server system? Third, does EZ Touch App work organically with customer management system (C/S)? The developed EZ Touch is entered into the scorecard as an input method using the gesture as a result of this research, and it is linked with the C/S system to organize the review function, hall information function, field coaching function through score, It can be used for applications such as information management functions and statistics through differentiated statistics. However, there are some problems and improvements in user convenience in real time use. I think there is a need to study to solve this problem in the future. EZ Touch input method is input to the scorecard by inputting gesture of the finger as a result of this study, and it is linked with this, and it is possible to use differentiated statistics such as review function, hall information function, field coaching function, It is the purpose of the study to improve the technical competitiveness of the product by developing the application.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.