• Title/Summary/Keyword: Smartphone Text Service

Search Result 33, Processing Time 0.029 seconds

A Study on Disaster Vulnerable People who Desire to Use Smartphone for Disaster Information : Focusing on Yeongdeungpo Traditional Market Case (재난약자의 스마트폰 재난정보 활용 욕구에 관한 연구 : 영등포전통시장 사례 중심으로)

  • Park, Sang Kil;Choi, Jae Boong
    • Journal of Information Technology Services
    • /
    • v.18 no.3
    • /
    • pp.1-15
    • /
    • 2019
  • Disadvantaged from disaster response training and disaster safety education who people are vulnerable to disasters when faced with disasters. The vulnerability of these disaster response will be linked to the desire for disaster information. Therefore, using smartphone to provide timely disaster information will be an effective disaster response service that enables disaster vulnerable people to avoid disaster efficiently. In particular, the importance of using smartphone as a part of the body will become more and more important in everyday situations when information is acquired through smartphone. In this study, Through a survey of traditional market traders, I can find out that the desire of elderly women, who are weak in disaster, to receive disaster information through smartphone text service is relatively strong. Based on the results of this study, I expect that the opportunity to improve disaster response capability through smartphone text service will be provided to elderly women who are weak in disaster.

Analyzing Technology-Service Convergence Using Smartphone Application Services (스마트폰 애플리케이션 서비스의 기술-서비스 융합 양상 분석)

  • Geum, Youngjung;Min, Hyejong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.1
    • /
    • pp.1-19
    • /
    • 2016
  • Recently, the emergence of smartphone foster the technological convergence. This convergence no longer takes place within technologies only. Rather, convergence phenomena happen as a form of embodied services. However, previous research on convergence has been subject to the technology-oriented studies, including suggesting patent-based indexes or analyzing technological characteristics. However, investigating technology-service convergence is critical since most of new smart services are technology-based convergence services. Therefore, we analyze the pattern of technology-service convergence which occurs in the smartphone application services. We divided the smatphone application services into four categories, and employ a network analysis to represent the convergence phenomena of each category. Our study is expected to provide meaningful implication in new service development practice.

Smartphone Ownership and Location Checking Scheme for Fixing the Vulnerabilities of SMS-Based Authentication (SMS 기반 인증의 보안 취약점을 개선한 스마트폰 소유 및 위치 확인 기법)

  • Kwon, Seong-Jae;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.349-357
    • /
    • 2017
  • Many Web sites adopt SMS(Short Message Service)-based user authentication when a user loses her password or approves an online payment. In SMS-based authentication, the authentication server sends a text in plaintext to a user's phone, and it allows an attacker who eavesdrops or intercepts the text to impersonate a valid user(victim). We propose a challenge-response scheme to prove to the authentication server that a user is in a certain place at the moment with her smartphone beside her. The proposed scheme generates a response using a challenge by the server, user's current location, and a secret on the user's smartphone all together. Consequently, the scheme is much more secure than SMS-based authentication that simply asks a user to send the same text arrived on her phone back to the server. In addition to entering the response, which substitutes the SMS text, the scheme also requests a user to input a passphrase to get the authentication process started. We believe, however, the additional typing should be tolerable to most users considering the enhanced security level of the scheme.

System Implementation for Mobile-Based Diagnostic Medical Image Service (모바일 진단의료영상 서비스를 위한 시스템 구현)

  • Kim, Yong-Soo;Jeon, Joonhyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.870-878
    • /
    • 2013
  • The objective of this paper is to develop mobile-based PACS(Picture Archiving Communication System: mPACS) for diagnostic medical image service available via Android-based mobile smartphone. The proposed mPACS provides an integrated platform for mobile application of diagnostic medical images stored in hospital PACS, and allows the smartphone to store, retrieve, manipulate and transfer the diagnostic medical images. Then, the mPACS platform includes the following features for use in the Android framework (i. e., diagnostic medical image processing) : transfer protocols between PACS, mPACS and smartphone, image format converter, JPEG and JPEG2000 coders, text and avatar search, and etc. This mPACS is shown to be useful and effective in providing a solution for mobile-based diagnostic medical image service.

A Study on Implementation of Safety Navigation Mobile Application Converging Marine Environment Information and Location-Based Service

  • Jeon, Joong-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.289-295
    • /
    • 2019
  • In this paper, we implemented a safety navigation mobile application that converged AtoN information and location-based services. When application user uses the smartphone's GPS sensor to transmit the user's vessel location data to the data server, the user receives information of which its providing range is considered, such as stored AtoN data, neighboring vessels information, danger area, and weather information in the server. Providing information is sorted based on the smartphone's direction and inclination and it will be also delivered via wireless network (5G, LTE, 3G, WiFi). Additionally the application is available to implement other functions such as information provision through voice and text alarming service when the user's vessel is either approaching or entering the danger area, and an expanded information provision service that is available in shadow area linking with data-storing methods; other linkable data such as weather and other neighboring vessels will be applied based on the lasted-saved data perceived from the non-shadow area.

A Design and Implementation of Speech Recognition and Synthetic Application for Hearing-Impairment

  • Kim, Woo-Lin;Ham, Hye-Won;Yun, Sang-Un;Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.105-110
    • /
    • 2021
  • In this paper, we design and implement an Android mobile application that helps hearing impaired people communicate based on STT(Speech-to-Text) and TTS(Text-to-Speech) APIs and accelerometer sensor of a smartphone. This application provides the ability to record what the hearing-Impairment person's interlocutor is saying with a microphone, convert it to text using the STT API, and display it to the hearing-Impairment person. In addition. In addition, when a hearing-impaired person inputs a text using the TTS API, it is converted into voice and told to the interlocutor. When a hearing-impaired person shakes their smartphone, an accelerometer based background service function is provided to run the application. The application implemented in this paper provides a function that allows hearing impaired people to communicate easily with other people when communicating with others without using sign language as a video call.

Analysis of Perceived Discomfort and EMG for Touch Locations of a Soft Keyboard (소프트 키보드의 터치 위치별 지각 불편도 및 근전도 분석)

  • Choi, Bori;Jung, Kihyo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.2
    • /
    • pp.99-104
    • /
    • 2013
  • With diversity of mobile services (e.g., messenger, and social network service) on smartphone, the demand of text input using a soft keyboard is increasing. However, studies on subjective and physiological responses of users for various touch locations are lacking. The present study investigated the ergonomic effects according to touch locations of a soft keyboard on smartphone. The experiment of the present study measured perceived discomfort using Borg's CR-10 scale and electromyography (EMG) on forearm (abductor pollicis longus, and extensor digitorum communis) and thumb (abductor pollicis brevis, and first dorsal interossei) muscles. Perceived discomfort was significantly varied from 0.7 (extremely weak discomfort) to 2.5 (weak discomfort) depending on touch locations. %MVC according to touch locations was only significant at abductor pollicis brevis which varied from 10% to 23%. The experimental results of the present study can be utilized in the ergonomic design of a soft keyboard.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

Spam Image Detection Model based on Deep Learning for Improving Spam Filter

  • Seong-Guk Nam;Dong-Gun Lee;Yeong-Seok Seo
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.289-301
    • /
    • 2023
  • Due to the development and dissemination of modern technology, anyone can easily communicate using services such as social network service (SNS) through a personal computer (PC) or smartphone. The development of these technologies has caused many beneficial effects. At the same time, bad effects also occurred, one of which was the spam problem. Spam refers to unwanted or rejected information received by unspecified users. The continuous exposure of such information to service users creates inconvenience in the user's use of the service, and if filtering is not performed correctly, the quality of service deteriorates. Recently, spammers are creating more malicious spam by distorting the image of spam text so that optical character recognition (OCR)-based spam filters cannot easily detect it. Fortunately, the level of transformation of image spam circulated on social media is not serious yet. However, in the mail system, spammers (the person who sends spam) showed various modifications to the spam image for neutralizing OCR, and therefore, the same situation can happen with spam images on social media. Spammers have been shown to interfere with OCR reading through geometric transformations such as image distortion, noise addition, and blurring. Various techniques have been studied to filter image spam, but at the same time, methods of interfering with image spam identification using obfuscated images are also continuously developing. In this paper, we propose a deep learning-based spam image detection model to improve the existing OCR-based spam image detection performance and compensate for vulnerabilities. The proposed model extracts text features and image features from the image using four sub-models. First, the OCR-based text model extracts the text-related features, whether the image contains spam words, and the word embedding vector from the input image. Then, the convolution neural network-based image model extracts image obfuscation and image feature vectors from the input image. The extracted feature is determined whether it is a spam image by the final spam image classifier. As a result of evaluating the F1-score of the proposed model, the performance was about 14 points higher than the OCR-based spam image detection performance.

Characteristics of Smartphone User in Application Usage and Implications for Applications Business Model (스마트폰 사용자들의 앱 이용 특성과 앱 비즈니스 모델에의 시사)

  • Yun, Hyung Bo;Wang, Boram;Park, Jiyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.32-42
    • /
    • 2013
  • As the smartphone market grows, the needs for its new business model are also increased. However, most previous researches on smartphone applications focused on Technology Acceptance Model(TAM) and Rogers' Diffusion of Innovation Theory so that there was lack of researches on characteristics for actual smartphone users. In this research, we divided the smartphone applications into five category functions (Call & Text/Music & Video/Information Search/Game/Social Network Service (SNS)). We analyzed characteristic differences of users who used the each application category and found that the differences were statistically significant in both demographic and smartphone usage characteristics (frequency of downloading applications, and download experience of paid applications). Additionally, the smartphone usage characteristic is closely related to the usage duration. The representative result is that the characteristics of people used Music & Video function actively were women in their 20s who downloaded applications more than three times per week, and had a download experience of paid applications. It is positive result for players in the application markets, because it means the users are willing to pay for downloading the paid applications. However, large companies already occupied most of the market share in music applications so that small and medium-sized players should develop an innovative and distinguishable business model in order to success. We believe this research result would provide significant implications for the players in planning the successful business model and developing an user-specific application product.