• Title/Summary/Keyword: Mobile Check-in

Search Result 334, Processing Time 0.029 seconds

A study for tracking directional compensation in a mobile robot by the gyro sensor (Gyro를 이용한 이동 로보트의 주행 방향각 보상에 관한 연구)

  • 배준영;이상룡
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.783-786
    • /
    • 1991
  • Generally, The position of mobile robot moving on the plane is measured by the method of dead reckoning, using the encoder system coupled on a wheel axis. But it is noted that the encoder system cannot check the slip of a wheel, often occurring in tracking of the mobile robot. In this study, using velocity angular velocity sensor with a tuning fork vibration system, the system is developed which can measure the directional angle of positional variables on the mobile robot. By measuring the variations of tracking direction mobile robot equipped with this system, following result is found; In spite of the slip at a wheel when measuring the tracking directional angle, the error occurs in the range of .+-. 1 (degree).

  • PDF

Structured LDPC Codes for Mobile Multimedia Communication Systems (이동 멀티미디어 통신 시스템을 위한 구조적인 저밀도패리티검사 부호)

  • Yu, Seog-Kun;Joo, Eon-Kyeong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.2
    • /
    • pp.35-39
    • /
    • 2011
  • Error correcting codes with easy variability in code rate and codeword length in addition to powerful error correcting capability are required for present and future mobile multimedia communication systems. And low complexity is also needed for the compact mobile terminals. In general, the irregular random LDPC(low-density parity-check) code is known to have the superior performance among various LDPC codes. But it has inefficiency since the various parity check matrices for various services should be stored for encoding and decoding. The structured LDPC codes which can easily provide various rates and lengths are studied recently. Therefore, the flexibility, memory size, and error performance of various structured LDPC codes are compared and analyzed in this paper. And the most appropriate structured LDPC code is also suggested.

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

Deriving Mobile Robot Delivery Service Security Requirements Using STRIDE Threat Modeling (STRIDE 위협모델링을 활용한 이동로봇 배송 서비스 보안 요구사항 도출)

  • Ji-Yong Choi;Jae-Dong Jang;Sang-Joon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.927-947
    • /
    • 2024
  • Due to the global low birth rate and aging population, there is a growing interest in utilizing robot technology as a solution to address labor shortages. Specifically, mobile robots, which are growing rapidly, have become intelligent enough to recognize their environment and avoid obstacles to carry out tasks. However, the integration of IT technology into these robots has led to an increase in potential security vulnerabilities, and security research has been conducted to prepare countermeasures. However, research to examine the security threats of mobile robots in general is insufficient. To enhance the overall security of robot systems, it is imperative to systematically identify security threats starting from the design phase. In this paper, we identify security threats within the mobile robot delivery service environment using a structured approach that involves Data Flow Diagram and STRIDE threat modeling. Additionally, we visualize vulnerabilities and attack techniques through Attack Tree based on the Attack Library, and a Check List has finally been created to derive security requirements. We have been conducted this study with the hope that the results derived from this study will be utilized in establishing guidelines and policies related to robot security and contribute to the establishment of a safe robot foundation.

Mobile Advertisement Strategies through Data Mining Techniques (데이터마이닝 기법을 이용한 이동통신 광고 전략)

  • 나종화;김정숙;장영미
    • Proceedings of the Korean Association for Survey Research Conference
    • /
    • 2001.04a
    • /
    • pp.87-108
    • /
    • 2001
  • Recently, the user of mobile and cordless internet is growing rapidly. So the advertising methodologies are appeared on stage through the internet and mobile service. But the current advertisement(AD) service into mobile phones supplies a short-sentence AD using letter-message, and gives mobile phone users an inconvenience by making them first listen to and then check the AD. Until now the AD service using mobile has been on the beginning level. In this study, we suggest the new advertising methodologies and propose both target marketing strategies and demand forecast through the data mining techniques.

Mobile Advertisement Strategies through Data Mining Techniques (데이터마이닝 기법을 이용한 이동통신 광고 전략)

  • 나종화;김정숙;장영미
    • Survey Research
    • /
    • v.2 no.1
    • /
    • pp.87-108
    • /
    • 2001
  • Recently, the user of mobile and cordless internet is growing rapidly. So the advertising methodologies are appeared on stage through the internet and mobile service. But the current advertisement(AD) service into mobile phones supplies a short-sentence AD using letter-message, and gives mobile phone users an inconvenience by making them first listen to and then check the AD. Until now the AD service using mobile has been on the beginning level. In this study, we suggest the new advertising methodologies and propose both target marketing strategies and demand forecast through the data mining techniques.

  • PDF

Design and implementation of prepaid service for Mobile-lP in Diameter (Diameter Mobile-lP 응용을 지원하는 Diameter 선불 시스템의 설계 및 구현)

  • Yoo Sangkeun;Kim Hyungon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.76-83
    • /
    • 2005
  • This paper presents the design and implementation of credit-control application to provide prepaid service for Diameter Mobile-lP application in Diameter-based AAA system. Diameter credit-control application is designed to support prepaid accounting service, which is not supported in RADIUS and Diameter accounting. Real-time credit-control requires that an application must be able to rate service information in real-time. In addition, it is necessary to check that the end user's account provides coverage for the requested service, prior to initiation of that service. In this paper, we design and implementation Diameter credit-control to provide prepaid service for Diameter Mobile-IP application.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Mobile SNS Application Accessibility Evaluation for the Disabled and the Aged (장애우 및 고령자 측면에서의 모바일 SNS 앱접근성 평가)

  • Hong, Mee-Hee;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.575-582
    • /
    • 2012
  • Mobile SNS like facebook is famous as an app which users cooperate others and share information without regard to time and place. But it is necessary to evaluate the mobile app accessibility in view of the disabled and the aged to check if they get appropriate interface service to use such a popular app. Mobile app accessibility is an indicator of equal opportunity to mobile app for all users regardless of cognitive and physical attribute. Therefore, this paper evaluates accessibility of facebook and kakaotalk mobile SNS, apprehend the status of conform to the manual, and suggest an improving way, based on 'mobile application accessibility guideline' announced by government and 'mobile application (Android) accessibiliy checking manual(v1.0)' by National Information society agency.

UAV-based Image Acquisition, Pre-processing, Transmission System Using Mobile Communication Networks (이동통신망을 활용한 무인비행장치 기반 이미지 획득, 전처리, 전송 시스템)

  • Park, Jong-Hong;Ahn, Il-Yeop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.594-596
    • /
    • 2022
  • This paper relates to a system for pre-processing high-definition images acquired through a camera mounted on an unmanned aerial vehicle(UAV) and transmitting them to a server through a mobile communication network. In the case of the existing UAV system for image acquisition service, the acquired image was stored in the external storage device of the camera mounted on the UAV, and the image was checked by directly moving the storage device after the flight was completed. In the case of this method, there is a limitation in that it is impossible to check whether image acquisition or pre-processing is properly performed before directly checking image data through an external storage device. In addition, since the data is stored only in an external storage device, there is a disadvantage that data sharing is cumbersome. In this paper, to solve the above problems, we propose a system that can remotely check images in real time. Furthermore, we propose a system and method capable of performing pre-processing such as geo-tagging and transmission through a mobile communication network in addition to image acquisition through shooting in an UAV.

  • PDF