• Title/Summary/Keyword: 단말기 관리

Search Result 527, Processing Time 0.024 seconds

Developing Advanced Location-Based Route-Search Service for Smart-phones (진보된 스마트폰용 위치 기반 경로 검색 서비스 개발)

  • Pak, Woo-Guil;Lim, Sung-Man;Oh, Han-Joon;Yu, Kwang-Hyun;Kwon, Min-Young;Lee, Hee-Seung;Choi, Young-June
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.173-180
    • /
    • 2011
  • Various smart-phone applications for location-based service are enabled through mobile communications such as 3G and WiFi. We have developed MARS, an advanced location-based route-search application based on the Android platform. It provides three functions: route-registration, route-search, and route-evaluation. These functions are dynamically maintained by a web server, a database server, and user mobile terminals. As users can update location information using their smart-phone devices, servers provide the information and allow users to add, modify, and remove their own information as well as adding comments to others, while existing map services do not support direct inputs from users. We show our implementation process and demonstration of its operations. We also show the comparison results with existing services. Through these results, we can confirm that MARS can achieve better performance.

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

A QoS Adaption Model on the Policy-Based Network Management in the IMS (IMS에서 정책 기반 네트워크 관리 QoS 적용 모델)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3175-3181
    • /
    • 2012
  • The need of multimedia based application service is increasing as the number of smart mobile devices such as smart phone, tablet PC, and netbook is increasing rapidly and the development of application service like IPTV. There are various proposed policies to control the limited network resources. The IMS is used to control wired and wireless aggregation network to support multimedia services that are suitable to the user's need and the policy based models using the PDF of the IMS have emerged. In this paper, we propose the QoS adaption model using various protocols with the PDF of the IMS and the user scenario.

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

Realization of Location based Service with ePosition by Defining the New DNS Resource Record (새로운 DNS 리소스 레코드 정의를 통한 ePosition 위치 기반 서비스)

  • Jang, Dong-Heyok;Lee, Sang-Zee;Kim, Kyung-Hun;Kwon, Oh-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.264-272
    • /
    • 2008
  • In ubiquitous geographic information environment, the users are provided with geographic information anywhere and any time on their needs by any types of devices and communication media. The unique location ID, ePosition, is a new technology to support UBGI environment, using a logical location ID instead of physical location of a point of interest. Domain names of plural ePosition servers, where location information with its ePosition is stored, needs to be registered in DNS for some service through Internet. For better ePosition service of the type of public service like email service, a set of DNS resource records can be newly defined. This paper suggests a new DNS resource record EPO for implementation of the ePosition service through Internet.

The Optimization path searching Method Development for Destination (목적지를 고려한 최적 경로탐색 기법 개발)

  • Ham Young-Kug;Kim Tae-Eun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.55-62
    • /
    • 2005
  • In this paper, we propose the new technique to compute the optimal route by considering the direction of distribution vehicles and the location for delivery, developing the algorithm of the shortest route to approach the location as applying the gemetic algorithm. This approach makes it possible for us to find the best route even under itineraries which include many destinations. Lively studies are currently in progress on the development of vehicle navigation software, combining PDA GPS, and electronic maps. Many web-sites are providing a varier of services which use electronic maps. Popular among these services is one that computes the optimal route between two positions that a user inputs. This service of computing the optimal route plays an important role in distribution industries such as home-delivery. For the distribution system. the construction of a vehicle regulation system enables us to calculate and manipulate the optimal route for distribution vehicles, to enhance the efficiency in making use of vehicles and labor, and to reduce costs.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Efficient File System Level Encryption Mechanism Using HSM (HSM을 이용한 효율적인 파일시스템 암호화 메커니즘)

  • Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.849-858
    • /
    • 2013
  • In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.

Performance Verification of a New Positioning Technology by Low-Resolution CDMA Pilot Strength Measurements (저해상도 CDMA Pilot 신호세기를 활용한 새로운 측위기법의 성능 검증)

  • Lee, Hyung Keun;Shim, Ju-Young;Kim, Hee-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.154-162
    • /
    • 2007
  • This paper verifies the performance of the wireless-signal map-matching (WSMM) method that is recently proposed to mitigate the effects of non-line-of-sight (NLOS) error in positioning under wireless terrestrial network environments. The WSMM method is the new positioning technology that estimates and compensate the NLOS errors by processing the bulks of anonymous measurements at unknown locations that are collected randomly and automatically. The WSMM method would be advantageous for various configurations of future ubiquitous sensor networks since it is based on the existing network configuration for communication and it requires no additional hardware in base stations and mobile handsets. It is shown that the application of the WSMM concept to the real CDMA pilot strength measurment message (PSMM) actually mitigates the NLOS error effects and improves overall positioning accuracy.

  • PDF