• Title/Summary/Keyword: use of digital devices

Search Result 559, Processing Time 0.024 seconds

A Investigation for Usage Reason and Usage Satisfaction of Setting Perm and Digital Perm (셋팅 펌과 디지털 펌 기기의 사용 이유와 사용 만족도 조사)

  • Hong, Mi Ra;Park, Hye ryeon;Youn, Young Han
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.312-325
    • /
    • 2020
  • The heat perm is the preferred hair technique to get positive affects such as increase of work efficiency and sale in hair industry. The subjects of this study is 262 hair shop workers and it was investigated heat perm device using reason, using satisfaction and repurchase. As a result, the perm accounted for 32.1 and the use of digital perm devices was more than that of setting perm devices. The reasons for the use were that the longer the setting device was engaged, the flexible it was the hair wave. The higher the rank, the better the hair wave retention and the long hair treatment, and it also helped sales. (p<0.05) Digital perm device can be hair-wavy in the desired style while in use, and the longer the working period, the more advantageous. The repurchase intention was that the longer the period of service and the higher the rank, the more advantageous it was. (p<0.05) The reasons for the usage of setting perm and digital perm were correlated with the satisfaction of use and the repurchase intention. The reasons for the use were helpful for sales and elastic hair wave and long hair waving was possible, which affected the repurchase. In conclusion, heat perm had been found not only helped sales, made a good hair wave, and the long hair waving, but also to be preferred to the long working period of the hair shop and the rank above the designer.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Hand-held Multimedia Device Identification Based on Audio Source (음원을 이용한 멀티미디어 휴대용 단말장치 판별)

  • Lee, Myung Hwan;Jang, Tae Ung;Moon, Chang Bae;Kim, Byeong Man;Oh, Duk-Hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.73-83
    • /
    • 2014
  • Thanks to the development of diverse audio editing Technology, audio file can be easily revised. As a result, diverse social problems like forgery may be caused. Digital forensic technology is actively studied to solve these problems. In this paper, a hand-held device identification method, an area of digital forensic technology is proposed. It uses the noise features of devices caused by the design and the integrated circuit of each device but cannot be identified by the audience. Wiener filter is used to get the noise sounds of devices and their acoustic features are extracted via MIRtoolbox and then they are trained by multi-layer neural network. To evaluate the proposed method, we use 5-fold cross-validation for the recorded data collected from 6 mobile devices. The experiments show the performance 99.9%. We also perform some experiments to observe the noise features of mobile devices are still useful after the data are uploaded to UCC. The experiments show the performance of 99.8% for UCC data.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

An Optimal Design Guide for Campus wireless LAN by Evaluating Performance Measurements in IEEE 802.11n-based Networks (IEEE 802.11n 기반에서 성능측정을 통한 최적의 캠퍼스 무선 랜 설계)

  • Kim, Bang Ryong;Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.9-23
    • /
    • 2013
  • In recent days, there are many researches of wireless LAN services as the communication environment of wireless LAN are so improved that a lot of services are available in wireless environments. The frequency of the wireless LAN is a general resource that can be used to everyone without any permission. Many technologies using this ISM (Industry Science Medical) frequency band are developed fast and widely. But, as many devices use the same frequency band at th same time, the service quality is degraded and the speed of the service rate id degraded by the result of the interference. For overcome this problem, we must provide the new technology of the mobile devices and a new cell design scheme for obtaining maximum throughput that considering the wireless environments effectively. In this paper, we explain the main technology at the IEEE 802.11n environments and proposes the optimal cell design and reference model for gaining maximum performance to many mobile devices at the same time by investigating real environment testing results.

A Study on Developing Designs and the Practical Use of Outdoor Backpacks Equipped with Solar Cells

  • Park, Jinhee
    • Journal of Fashion Business
    • /
    • v.17 no.6
    • /
    • pp.88-97
    • /
    • 2013
  • 'Smart Clothes', which incorporate topnotch digital technology into fashion, are a leading fashion runner in this digital era. The purpose of the study is to first help develop a practical design for outdoor backpacks which are equipped with eco-friendly solar cells that facilitate recharging diverse smart devices during outdoor activities; and, secondly, to offer some practical data from the actual appropriation tests that will be used for manufacturing such products. This trial study finds out how to conjoin some practical IT devices with fashion items and mainly focusses on designing outdoor backpacks which are loaded with solar cells for recharging electric devices, and, later, experiments on designed backpacks with some smart phones to see how it works. According to the desired purposes of backpacks, all the features can be adjusted and modified such as the kinds of solar cell panels, materials, sizes, positions of attachment, weights, etc. Smart Clothes are highly functional and fashionable items that satisfy both practical and emotional purposes, and are being actively developed to serve consumers. This study proves that Smart Clothes or Smart Wear will have practical uses for outdoor activities and will possibly lead our smart lifestyles.

Analysis of Use Intention of Mobile Cloud Service using a Convergence Technology Acceptance Model (융합기술수용모델을 이용한 모바일 클라우드 서비스 이용의도 분석)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.105-110
    • /
    • 2016
  • As smart devices have proliferated and network speed and accessibility of mobile have accelerated, mobile cloud services that can do the same tasks by various devices are promoted. This paper explores the analysis of use intention of mobile cloud services and influencing factors. We develop and apply a convergence technology acceptance model which combines TAM, VAM and UTAUT. The proposed model verifies some hypotheses to aware the significant factors of use intention of mobile cloud services with TAM, VAM and UTAUT including additional mobile cloud service characteristics such as mobility, high availability, easy accessibility and scalability. Eventually, this research can not only help users gain insights into mobile cloud service use intention, but also help mobile cloud service providers to develop more effective mobile cloud service and their business strategy in the future.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Design and Implementation of Personalized IoT Service base on Service Orchestration (서비스 오케스트레이션 기반 사용자 맞춤형 IoT 서비스의 설계 및 구현)

  • Cha, Siho;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.21-29
    • /
    • 2015
  • The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.

Method for Analyzing Media Compatibility in Home Networks (홈 네트워크에서 미디어 호환성 분석 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Park, Se-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.641-643
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) specification enables sharing of multimedia contents in the home network. Ordinary users will assume multimedia compatibility among DLNA certified devices, but that is generally not the case. There are optional codecs and even proprietary codecs used by the manufacturers. Information on multimedia formats supported by the devices are in general not easily exposed, creating difficulties in media sharing and usage. In this paper, the contents directory information exchanges among DLNA devices over the network is analyzed, and a method for media compatibility analysis is provided, The user can get information on compatible media formats, enabling ease of DLNA system use.

  • PDF