• Title/Summary/Keyword: using smart device

Search Result 1,283, Processing Time 0.027 seconds

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

A strain-based wire breakage identification algorithm for unbonded PT tendons

  • Abdullah, A.B.M.;Rice, Jennifer A.;Hamilton, H.R.
    • Smart Structures and Systems
    • /
    • v.16 no.3
    • /
    • pp.415-433
    • /
    • 2015
  • Tendon failures in bonded post-tensioned bridges over the last two decades have motivated ongoing investigations on various aspects of unbonded tendons and their monitoring methods. Recent research shows that change of strain distribution in anchor heads can be useful in detecting wire breakage in unbonded construction. Based on this strain variation, this paper develops a damage detection model that enables an automated tendon monitoring system to identify and locate wire breaks. The first part of this paper presents an experimental program conducted to study the strain variation in anchor heads by generating wire breaks using a mechanical device. The program comprised three sets of tests with fully populated 19-strand anchor head and evaluated the levels of strain variation with number of wire breaks in different strands. The sensitivity of strain variation with wire breaks in circumferential and radial directions of anchor head in addition to the axial direction (parallel to the strand) were investigated and the measured axial strains were found to be the most sensitive. The second part of the paper focuses on formulating the wire breakage detection framework. A finite element model of the anchorage assembly was created to demonstrate the algorithm as well as to investigate the asymmetric strain distribution observed in experimental results. In addition, as almost inevitably encountered during tendon stressing, the effects of differential wedge seating on the proposed model have been analyzed. A sensitivity analysis has been performed at the end to assess the robustness of the model with random measurement errors.

Design and Implementation of Navigation Operating System APIs for Set-based POI Search Algorithm (집합 기반 POI 검색을 지원하는 내비게이션 운영체제 기능 설계 및 구현)

  • Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.269-274
    • /
    • 2015
  • As smart device companies such as Google or Apple develop competitive mobile-based automotive operating systems and navigation systems, the range of choice for users in such markets is expanding. Navigation systems equipped with mobile operating systems have increased convenience for users. However, since an API for the POI databases used in navigation systems doesn't exist, the number of applications using POI data is insufficient. In this paper, we designed and implemented system calls for navigation operating systems with a focus on POI search, in order to resolve such limitations. The system calls support set-based POI search functions, and therefore provides solutions to search performance degradation problems caused by false inputs. As a result of performance evaluation, not only did the search performance improve, but there was also no problem in applying APIs in applications.

A Study of Call Admission Scheme using Power Strength Threshold value between APs in Wireless LAN Environments (무선랜 환경에서 AP간 전력임계치값을 통한 호 처리 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.107-112
    • /
    • 2015
  • A smart phone and the number of wireless terminals are mobile-to the nature of the AP mobility are many call transfer between wireless terminals and AP (Access Point). Each wireless terminal that is the call processing process for each is relatively large to cause the wireless traffic, and a factor that inhibits the efficient use of the radio band on the AP. In this paper, we use the power intensity threshold and threshold timer of the AP received by the mobile station to reduce the amount of switching traffic between the AP's cause and traffic generation factors between the wireless device and the AP that can effectively utilize the radio traffic from the AP the measures proposed. The proposed method and the conventional method is improved by simulation to handle the amount of radio traffic from the AP it was confirmed that it is possible to effectively utilize the whole of the radio band.

A Study on Development of Teaching Materials for App Inventor Programming Using the Waterfall Model (워터폴 모델을 적용한 앱 인벤터 프로그래밍 교재개발 연구)

  • Seol, Moon-Gu;Son, Chang-Ik
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.4
    • /
    • pp.409-419
    • /
    • 2013
  • The aims of this paper were to review the usable possibility of the educational App Inventor Program in the field of programming education and to develop programming teaching materials that can overcome limitations of the established programming instruction. The study showed that the learners' motivations were strengthened through smart device programs. Containing the elements of STEAM, the teaching materials were developed for the logical and systematic learning that deals with elementary students' real-life situations, and that helps children follow the procedures of software development. By introducing the Waterfall Model to the process of programming, students are able to follow the software developers' thinking process. In addition, beyond the simplistic programming language and simply acquiring related knowledge, the App Inventor programming was designed to enhance students' higher-order thinking skills such as creativity, problem solving ability, collaborative thinking, and so forth.

The Design and Implementation of a Chatting System Sharing Paths (경로 공유 채팅 시스템의 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Han-Bin;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.281-286
    • /
    • 2017
  • SNS is a platformwhere users build a social relationship and share opinions and informations. To do these, it supports a text, an image and a video data. As it is possible to exploit the location data of a smart device, SNS tries to use the location data. However,since SNS does not support the coordinate data, it provides the restricted function sharing the image map instead of the vector map. In this paper, we propose a chatting systemsharing pathsto support the coordinate data on a classical SNS. On the proposed system, it is possible for usersjoined in a roomto watch a vector map of same area and exchange texts. If a user builds a path on the map, the system propagates the coordinate data of the generated path and the other users joined in the room watch the path immediately. The implemented chatting systemhasthe benefit to share the information related a map between users using coordinate data.

Study on the K-scale reflecting the confidence of survey responses (설문 응답에 대한 신뢰도를 반영한 K-척도에 관한 연구)

  • Park, Hye Jung;Pi, Su Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.41-51
    • /
    • 2013
  • In the Information age, internet addiction has been a big issue in a modern society. The adverse effects of the internet addiction have been increasing at an exponential speed. Along with a great variety of internet-connected device supplies, K-scale diagnostic criteria have been used for the internet addiction self-diagnose tests in the high-speed wireless Internet service, netbooks, and smart phones, etc. The K-scale diagnostic criteria needed to be changed to meet the changing times, and the diagnostic criteria of K-scale was changed in March, 2012. In this paper, we analyze the internet addiction and K-scale features on the actual condition of Gyeongbuk collegiate areas using the revised K-scale diagnostic criteria in 2012. The diagnostic method on internet addiction is measured by the respondents' subjective estimation. Willful error of the respondents can be occurred to hide their truth. In this paper, we add the survey response to the trusted reliability values to reduce response errors on the K-scale on the K-scale, and enhance the reliability of the analysis.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

Arduino-based power control system implemented by the MyndPlay (MyndPlay를 이용한 Arduino기반의 전원제어시스템 구현)

  • Kim, Byeongsu;Kim, Seungjin;Kim, Taehyung;Baek, Dongin;Shin, Jaehwan;An, Jeong-Eun;Jeong, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.924-926
    • /
    • 2015
  • In this paper, we use the interface, which many countries concentrates research of Brain - Computer Interface with the device and MyndPlay based on the IoT intelligent Arduino. Finally we will make the Brain - Computer Connection environment, the purpose of Brain - Computer Interface. Recognizes the EEG of a person who wearing the equipment, analyze, classify, and we did a research to design an intelligent thing to suit user's condition. In addition, we use the XBee, and Bluetooth to communicate to other devices, such as smart phone. In conclusion, this paper check users current status via brain waves, and it allows to control the power and other objects by using the EEG(Electroencephalography).

  • PDF