• Title/Summary/Keyword: 휴대용 컴퓨터

Search Result 219, Processing Time 0.021 seconds

Map Matching Algorithm for Self-Contained Positioning (자립식 위치측정을 위한 Map Matching 알고리즘)

  • Lee, Jong-Hun;Kang, Tae-Ho;Kim, Jin-Seo;Lee, Woo-Yeul;Chae, Kwan-Soo;Kim, Young-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.3 no.2 s.6
    • /
    • pp.213-220
    • /
    • 1995
  • Map Matching is the method for correcting the current position from dead reckoning in Car Navigation System. In this paper, we proposed the new map matching algorithm that can correct the positioning error caused by sensors and digital map data around the cross road area. To do this, first we set the error boundary of the cross road area by combining the relative error of moving distance and the absolute error of road length, second, we find out the starting point of turning within the determined error boundary of the cross point area, third, we compare the turning angle of the car to the angle of each possible road, and the last, we decide the matched road. We used wheel sensor as a speed sensor and used optical fiber gyro as a directional sensor, and assembled the sensors to the notebook computer. We testified our algorithm by driving the Daejeon area-which is a part of south Korea-as a test area. And we proved the efficiency by doing that.

  • PDF

Secure Transaction Method on Smartphones with Smartwatches (스마트워치를 이용한 스마트폰에서의 안전한 전자거래방법)

  • Zhou, Jun;Choi, JinChun;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.519-530
    • /
    • 2015
  • With the development of technologies, smartphone provides excellent extensibility and performance. Users can install application programs easily in smartphone, so they can use smartphone in various way. In the past, users used smartphone for enhancing security in personal computer. Nowadays, smartphone has become a major target for attackers. Therefore we needs a reliable portable device for smartphone security. There are various wearable devices such as smartglasses and smartwatches, so they can be used for enhancing security in smartphone. In this paper, we study about that smartwatches can be role for enhancing smartphone security, and we implement transaction information verification scheme, Transaction information verification scheme based on CAPTCHA and CAPTCHA based transaction OTP scheme and experiment with users in prototype application.

Development of Tactile Display for the Blind in Japan (일본의 시각장애인을 위한 촉각디스플레이 개발)

  • Han, S.M.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.4 no.1
    • /
    • pp.63-70
    • /
    • 2010
  • Research and development of Assistive Technology (AT) for blind people is primarily focused on assisting mobility and improving access to information. Some particularly useful devices for aiding access to information and communication are DAISY players used with talking books, screen readers for reading screens, video magnifiers to aid low vision, Braille displays, and Braille PDAs. These essential devices have been successfully commercialized and have assisted many visually impaired people. Assistive technology devices for visually impaired people are called sensory substitution devices, because these devices substitute tactile or auditory functions for visual functions. The tactile interfaces of sensory substitution devices such as Braille displays and Braille PDAs have a bimorph type of piezoelectric actuator that forms a Braille (pin) of the Braille cells by moving up and down. KGS Corporation of Japan has more than 80% share of the worldwide market for these Braille cell actuators. Commercializing it for the first time in the world. This paper reviews the various endeavors in Japan in the research and development of tactile displays, such as Braille displays and Braille PDAs. Furthermore, it discusses sensory substitution devices that use tactile displays, focusing especially on the rotating Braille display we have developed.

Implementation of Smartphone based Mobile Office for a Logistics Company using HTML5 (HTML5를 이용한 물류기업의 모바일 오피스 구현에 관한 연구)

  • Lim, Yongtaek;Byun, Haegwon;Yoo, Woosik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.433-442
    • /
    • 2012
  • This paper focuses on developing a smartphone-based mobile office system for a logistics company in Korea using HTML5. Mobile office is smart working environment of working out of a company office using mobile devices such as smartphones and portable computers which are connected to the company servers via WiFi or 3G/4G. Recently many companies are introducing mobile office information systems with the smartphone wave, but they are having difficulties in maintaining and updating their systems due to the transformative mobile application platform. Therefore, we need a platform-independent implementation tools for the mobile office application and HTML5 is one of the solution tools. In this paper, we develop mobile and web applications applicable to all kinds of mobile devices such as iOS, android and windows mobile etc using HTML5. The proposed mobile office system consists of groupware, marketing management, reporting module and transportation management system.

Design and Performance Analysis of Cost-Effective and Fast Inter-Domain NEMO Scheme with Multicasting Support (멀티캐스팅 지원의 비용효과적인 도메인간 빠른 NEMO 기법의 설계 및 성능분석)

  • Han, Sunghee;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.87-98
    • /
    • 2012
  • In recent years, there are many data and multimedia services that are supported by WiFi-enabled mobile devices. As a result, the demand for the ability to connect to the Internet anywhere is rapidly increasing and network infrastructure is becoming increasingly important. The design of cost-efficient network mobility (NEMO) protocol is intended to reduce the demand for limited wired/wireless network bandwidth at the signaling of mobility support and packet delivery operations. In this paper, we propose a cost-effective inter-LMA domain mobility management scheme which provides fast handover with multicasting support in NEMO environments. And our Fast PR-NEMO scheme is compared with N-PMIPv6, rNEMO, and PR-NEMO. In conclusion, our proposed scheme shows the best performance in terms of location updating cost, and packet tunneling cost.

Distributed Mutual Exclusion Algorithm for Maintaining Tree-Height Balance in Mobile Computing Environments (이동 컴퓨팅 환경에서 트리 높이의 균형을 유지하는 상호 배제 알고리즘)

  • Kim, Hyeong-Sik;Eom, Yeong-Ik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1206-1216
    • /
    • 1999
  • 이동 호스트란 시간과 공간의 제약 없이 필요한 기능을 수행하고, 또한 원하는 정보에 접근할 수 있는 휴대용 컴퓨터를 일컫는다. 이동 컴퓨팅 환경이란 이러한 이동 호스트들을 지원할 수 있도록 구성된 분산 환경이다. 따라서 이동 컴퓨팅 환경에서의 분산 알고리즘은 정적 호스트만을 고려한 기존의 분산 환경에서와는 다르게 이동 호스트의 여러 가지 특성들을 고려하여 제안되어야 한다. 즉, 이동 컴퓨팅 환경의 도래로 인하여 이동성과 휴대성, 그리고 무선 통신과 같은 특성들을 고려한 새로운 분산 상호 배제 알고리즘이 필요하다. 이제까지 이동 컴퓨팅 환경에서의 상호 배제 알고리즘은 토큰 링 구조에 기반을 두고 설계되었다. 토큰 링 구조는 이동 호스트들의 위치를 유지하기 위하여 높은 비용을 필요로 하는 단점을 가지고 있다. 본 논문에서는 균형 높이 트리(height-balanced tree)라는 새로운 모형을 제안함으로써 정적 분산 환경과 이동 분산 환경이 혼합된 환경에서 상호 배제 비용을 감소시킬 수 있는 새로운 알고리즘을 제안하며, 각 경우에 있어서의 비용을 산출하고 평가한다.Abstract The mobile host is a potable computer that carries out necessary functions and has the ability to access desirable informations without any constraints in time and space. Mobile computing environment is a distributed environment that is organized to support such mobile hosts. In that environment, distributed algorithms of which environment not only with static hosts but with mobile host's several properties should be proposed. With the emergence of mobile computing environments, a new distributed mutual exclusion method should be required to consider properties mobile computing system such as mobility, portability, and wireless communication. Until now, distributed mutual exclusion methods for mobile computing environments are designed based on a token ring structure, which have the drawbacks of requiring high costs in order to locate mobile hosts. In this paper, we propose a distributed mutual exclusion method that can reduce such costs by structuring the entire system as a height-balanced tree for static distributed networks and for networks with mobile hosts. We evaluated the operation costs in each case.

A Study on Interface Security Enhancement (조직의 실시간 보안관리 체계 확립을 위한 '인터페이스 보안' 강화에 대한 연구)

  • Park, Joon-Jeong;Kim, Sora;Ahn, SooHyun;Lim, Chae-Ho;Kim, Kwangjo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.171-176
    • /
    • 2015
  • Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.

A Study on the Development of Pattern Design Tool for CCFL Backlight (CCFL 백라이트 패턴 설계툴 개발에 관한 연구)

  • Cho Young-Chang;Choi Byung-Jin;Yoon Jeong-Oh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.79-85
    • /
    • 2006
  • As the portable information appliance is developed, the demand of flat panel display equipments and parts are steeply increased. Most of all, the applications of LCD such as LCD TV, monitor, digital camera, CNS(car navigation system) and game machine become diversified. With the result that the number of BLU production enterprise is increased and the research on the design of backlight with the superior optical properties is persistently in progress. In this study we developed the pattern design tools for CCFL(cold cathode flourescent lamp) backlight to improve the conventional pattern design environment in which the pattern is designed manually from the experience and the trial and error. For the verification of our research, we designed the light reflection surface patterns for a real model of backlight and we measured the brightness uniformity using the BM-7. From the brightness uniformity measurement, the BLU designed using the presented tool showed the tolerable performance only in the first try of pattern design rather than the fifth try of pattern design in case of the conventional pattern design.

  • PDF

Implementation of U-Kiosk based on PANDA and VNC (PANDA$^{1)}$와 VNC에 기반한 U-Kiosk 구현)

  • Seok, Hyun-Chul;Park, Ki-Woong;Lim, Sang-Seok;Park, Kyu-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.238-243
    • /
    • 2006
  • 휴대용 단말기의 보급과 인터넷 및 무선 네트워크의 발달로 사용자들이 사용하는 개별 장치들이 보편화되어 있으며, 이들을 서로 유기적으로 엮은 서비스가 등장하고 있다. 본 논문에서는 이러한 서비스의 한 종류로 U-Kiosk의 개념을 소개한다. U-Kiosk는 Kiosk 단말장치나 공용 PC를 사용자 개인의 PC처럼 사용할 수 있도록 하여 이들의 리소스를 직접 제어할 수 있는 기능을 제공한다. 이것을 실현하기 위한 방안으로 본 논문에서는 공용 PC에서 개인 PC의 바탕화면 설정을 포함해 모든 자원을 직접 사용할 수 있도록 하는 부분을 구현하고 설명을 하였으며, 인증 과정에서 사용자의 개입을 최소한으로 줄이는 방법에 대해서 소개한다. 이를 위하여 초소형 보안 단말기인 PANDA를 사용하였으며, Zigbee 통신을 사용하여 사용자의 위치정보를 파악하여 자동으로 인증을 하도록 하는 Transient Authentication의 개념을 도입하였다. 두 컴퓨터 간의 원격 접속을 위해서는 VNC를 이용하여 구현하였으며, 사용자가 공용 PC로부터 일정 거리 안에 있을 경우, 자동으로 원격 접속이 이루어지고, 공용 PC로부터 멀어질 경우 자동으로 접속이 종료되도록 구현하였다. 이를 기반으로 제안하는 U-Kiosk의 개념에 맞는 테스트 베드를 구축 하였다. 이는 UFC Project$^{2)}$의 일부로서 차후 완벽한 인증 인프라를 구축하여 보다 안정적이고 사용하기 편리한 U-Kiosk의 구현에 초석이 될 것이다.

  • PDF

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF