• Title/Summary/Keyword: Cell phone data

Search Result 107, Processing Time 0.024 seconds

U-LBS : Precise Location Data Through a Car Crash Location System (U-LBS : 정밀 위치 데이터를 통한 차량 충돌 사고 위치 확인 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.11
    • /
    • pp.1150-1156
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are more varied. In particular, where you recognize the location of objects such as people and things, and to provide valuable services based on ubiquitous, location-based services (Ubiquitous Location Based Services: u-LBS) is emerging as an important service. In this paper precise location data to the car crash through the location and offers related service system. In this paper the precise location tracking proposed by the concept of the Rail, road, to extract the location Data Matching Data and the current location is obtained. System used in GPS Packet and information about the location of the vehicle collision and the collision time, the vehicle consists of NodeID is about. Using these data, a packet is to be created when the conflict between vehicles in the vehicle will be sent to Gateway. Gateway to the packets that were sent from the Server to determine whether the conflict is that in an emergency situation, Emergency Center for location information and let me know whether or not the conflict will be measured. Also, for those on the outside of an emergency such as a family related to the wireless terminal wireless (PDA, cell phone) is to let me know. Server get into the conflict that was configured to store information on the Database. Additionally, the proposed u-LBS system to verify the validity of the experiment was performed.

System Networking for the Monitoring and Analysis of Local Climatic Information in Alpine Area (강원고랭지 농업기상 감시 및 분석시스템 구축)

  • 안재훈;윤진일;김기영
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.3 no.3
    • /
    • pp.156-162
    • /
    • 2001
  • In order to monitor local climatic information, twelve automated weather stations (AWS) were installed in alpine area by the Alpine Agricultural Experiment Station, Rural Development Administration (RDA), at the field of major crop located in around highland area, and collected data from 1993 to 2000. Hourly measurements of air and soil temperature (underground 10 cm,20 cm), relative humidity, wind speed and direction, precipitation, solar radiation and leaf wetness were automatically performed and the data could be collected through a public phone line. Datalogger was selected as CR10X (Campbell scientific, LTD, USA) out of consideration for sensers' compatibility, economics, endurance and conveniences. All AWS in alpine area were combined for net work and daily climatic data were analyzed in text and graphic file by program (Chumsungdae, LTD) on 1 km $\times$ 1 km grid tell basis. In this analysis system, important multi-functionalities, monitoring and analysis of local climatic information in alpine area was emphasized. The first objective was to obtain the output of a real time data from AWS. Secondly, daily climatic normals for each grid tell were calculated from geo-statistical relationships based on the climatic records of existing weather stations as well as their topographical informations. On 1 km $\times$ 1 km grid cell basis, real time climatic data from the automated weather stations and daily climatic normals were analyzed and graphed. In the future, if several simulation models were developed and connected with this system it would be possible to precisely forecast crop growth and yield or plant disease and pest by using climatic information in alpine area.

  • PDF

A study on mobile internet users′ lifestyle and service preference (모바일 인터넷 사용자의 유형 및 서비스 선호도 연구)

  • 고은주;이수진
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.3
    • /
    • pp.195-209
    • /
    • 2004
  • The purpose of this study was 1) to examine the usage of mobile internet by cell phone or palm pilot, etc., 2) to analyze mobile users' lifestyles, 3) to examine preferred fashion services according to users' lifestyles and 4) to investigate service satisfaction and preference with the mobile internet. 193 university students in Seoul were randomly selected as subject. The data was analyzed using descriptive statistics (i.e., percentage, frequency), factor analysis, cluster analysis and ANOVA. The results of the study were as follows: first, most mobile users spent 10 min a day for using the mobile internet (i.e., short message service) mainly in transportation vehicles. Secondly, five factors in the mobile users' lifestyle were named as: 'surfer', 'absorber', 'expert', 'accepter' and 'enthusiast'. Thirdly, two factors in the preferences of fashion service on mobile internet were 'customized information service' and 'ordinary information service'. Fourthly, according to the internet lifestyle, mobile users were classified into three groups: 'mania group', 'follower group', and 'veteran group'. The mania group was the highest group in mobile service satisfaction and service preference. Marketing implications are discussed for the successful mobile business in clothing and textile industry.

Trajectory Distance Algorithm Based on Segment Transformation Distance

  • Wang, Longbao;Lv, Xin;An, Jicun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1095-1109
    • /
    • 2022
  • Along with the popularity of GPS system and smart cell phone, trajectories of pedestrians or vehicles are recorded at any time. The great amount of works had been carried out in order to discover traffic paradigms or other regular patterns buried in the huge trajectory dataset. The core of the mining algorithm is how to evaluate the similarity, that is, the "distance", between trajectories appropriately, then the mining results will be accordance to the reality. Euclidean distance is commonly used in the lots of existed algorithms to measure the similarity, however, the trend of trajectories is usually ignored during the measurement. In this paper, a novel segment transform distance (STD) algorithm is proposed, in which a rule system of line segment transformation is established. The similarity of two-line segments is quantified by the cost of line segment transformation. Further, an improvement of STD, named ST-DTW, is advanced with the use of the traditional method dynamic time warping algorithm (DTW), accelerating the speed of calculating STD. The experimental results show that the error rate of ST-DTW algorithm is 53.97%, which is lower than that of the LCSS algorithm. Besides, all the weights of factors could be adjusted dynamically, making the algorithm suitable for various kinds of applications.

A Comparative Study on the Gender Differences in Relation to Chinese Consumer's Selection of Korean Product: On the Basis of Beijing, Shanghai and Guangzhou Region (성(性)별 차이에 따른 중국 소비자들의 한국제품 선택에 관한 비교연구: 북경, 상해, 광주 지역을 중심으로)

  • Yoon, Seong-Hwan
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.101-130
    • /
    • 2016
  • Recently, by increasing the importance of China as consumer market, the need for a systematic and scientific study of Chinese consumers has been raised. This study researches how country image and product attributes as well as brand personality influence Chinese consumers'selection of Korean product through a comparative study of gender differences. This study used the data which were collected through Chinese adult consumers'survey on Korean cell phone products who reside at Beijing, Shanghai and Guangzhou. The main findings presented through empirical analysis results are as follows. First, Country image and brand personality have more influence on female consumers than male consumers on selection of Korean cell phones. Second, Male and female consumers have more influences by product attributes than other two factors. This study has presented the main implications of the preferred marketing strategies for Chinese enterprises of Korea on the basis of these research results.

  • PDF

Causal study on the effect of survey methods in the 19th presidential election telephone survey (19대 대선 전화조사에서 조사방법 효과에 대한 인과연구)

  • Kim, Ji-Hyun;Jung, Hyojae
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.6
    • /
    • pp.943-955
    • /
    • 2017
  • We investigate and estimate the causal effect of the survey methods in telephone surveys for the 19th presidential election. For this causal study, we draw a causal graph that represents the causal relationship between variables. Then we decide which variables should be included in the model and which variables should not be. We explain why the research agency is a should-be variable and the response rate is a shouldnot-be variable. The effect of ARS can not be estimated due to data limitations. We have found that there is no significant difference in the effect of the proportion of cell phone survey if it is less than about 90 percent. But the support rate for Moon Jae-in gets higher if the survey is performed only by cell phones.

Study on driver's distraction research trend and deep learning based behavior recognition model

  • Han, Sangkon;Choi, Jung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.173-182
    • /
    • 2021
  • In this paper, we analyzed driver's and passenger's motions that cause driver's distraction, and recognized 10 driver's behaviors related to mobile phones. First, distraction-inducing behaviors were classified into environments and factors, and related recent papers were analyzed. Based on the analyzed papers, 10 driver's behaviors related to cell phones, which are the main causes of distraction, were recognized. The experiment was conducted based on about 100,000 image data. Features were extracted through SURF and tested with three models (CNN, ResNet-101, and improved ResNet-101). The improved ResNet-101 model reduced training and validation errors by 8.2 times and 44.6 times compared to CNN, and the average precision and f1-score were maintained at a high level of 0.98. In addition, using CAM (class activation maps), it was reviewed whether the deep learning model used the cell phone object and location as the decisive cause when judging the driver's distraction behavior.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.

The Study on a Fixing-clip of a Shield Can Shielding Electromagnetic wave (전자파 차단을 위한 �Q드캔용 고정 클립 개발에 관한 연구)

  • Park, Tai-Heoun;Park, Man-Gyu;Park, Sang-Heup;Kim, Key-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.2
    • /
    • pp.554-560
    • /
    • 2013
  • This study proposes an structure that fixes the shielding device to two parts of the board by its two arranged clips. Said structure evenly distributes its loading/unloading load of the board and maintains the flatness of soldering area of the board. The structure of this study comprises a base part fixed to a printed circuit board and a clip part fixing a side wall of a shield can to the board, wherein the clip part is constituted with two clips fixable to two part of the shield can. Also, the structure of this study comprises a dented groove in order to easily solder the base part of clips and the printed circuit board. A mechanism is established and a design parameter was determined by a structure analysis and a vibration mode analysis. A single purpose machine for the production of the product was developed, the final workpiece was produced and the measuring-data and the computered-data was compared and reviewed.

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.