• Title/Summary/Keyword: Mobile Check-in

Search Result 334, Processing Time 0.035 seconds

A User Adaptive Mobile Commerce Support System (개인 적응형 모바일 전자상거래 지원 시스템)

  • Lee Eunseok;Jang Sera
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.180-191
    • /
    • 2005
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile commerce takes much weight among them. Even though current mobile commerce service has serious problems which check its development, such as limited contents, expensive charge system and hardware restriction of mobile device, it is strongly expected as one of the next generation Internet services. In this paper, we summarize the problems like above and provide some total solution to meet them as follows: a function for automatic gathering of product information on online Internet and automatic translation it to data for mobile commerce, a middlelet application which provides functions for product search and order on the mobile device through off-line processing, and a function of user adaptive recommendation. We have actually designed and implemented the proposed system and verified the functions and effectiveness of the system.

Cache Invalidation Schemes based on Time Guarantee for Improving Access Time in Mobile Ad hoc Networks (모바일 애드혹 네트워크에서 캐쉬 접근 시간 향상을 위한 시간보증 기반의 캐쉬무효화 기법)

  • Choi, Jae-Ho;Oh, Jae-Oh;Lee, Myong-Soo;Lee, Sang-Keun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.65-72
    • /
    • 2009
  • Due to the popularity of mobile devices and advances in wireless communication technologies, a mobile ad hoc network has received a lot of attention. In the existing data replication management research, the use of a replica has been shown to be an efficient technique for improving data accessibility. However, to use a replica in ad hoc networks, the data consistency between the original data and the replica should be guaranteed. In the traditional research, a mobile node should check an original data whether the data is updated or not. However, It may be costly or sometimes impossible to check the original data. In the case of the time constraint applications, the checking cost can cause more serious problem. In this paper, we propose the time-guarantee based cache invalidation schemes for time constraint applications and the threshold based compensation method to enhance the time-guarantee based scheme. The proposed schemes can remove the "rollback" problem. Simulation results show that our schemes outperform the previous ones in terms of access time with little loss of data currency.

Risk Situation Analysis with usage Patterns of Mobile Devices

  • Kim, Jeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.7
    • /
    • pp.39-47
    • /
    • 2018
  • This paper confirms the risk of using smartphone through the analysis of collected usage pattern and proposes the smartphone intervention system in risk situations. In order to check the risk of smartphone usage, we made information collecting application and collected smartphone usage pattern from 11 experiment participants for two months. By analyzing smartphone usage pattern, we confirmed that about 12% of smartphone usage is being used in driving, walking, and on the street. In addition, we analyzed the response rate of smartphone notification in risk situations and confirmed that user responds the smartphone notifications in real-time even in risk situations. Therefore, it is required to present a system that intervenes the use of smartphone in order to protect smartphone users in risk situations. In this paper, we classify risk situations of using smartphone. Also, the proposed smartphone intervention system is designed to periodically detect risk situations. In risk situations, smartphone function can be restricted according to user setting of smartphone. And smartphone can be used normally when safe situation is restored.

Fuzzy Control for the Obstacle Avoidance of Remote Control Mobile Robot (원격제어 이동로봇의 장애물 회피를 위한 퍼지 제어)

  • Yeo, Hee-Joo;Sung, Mun-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.1
    • /
    • pp.47-54
    • /
    • 2011
  • The remote control mobile robot is the robot accomplishing a task according to the orders giving by a user through departed communication system using a joystick. Basically, to supply a lot of information, as this type of robot uses visual information, the user can check the transmitted information by eyes and give orders to the robot. But the weak point of this type of robot is that it has a possibility to come into a collision with an obstacle not be seen to the user because of the communication delay occurring in a communication system and dead zone happening in visual information. To solve the problem, in this paper, we try to suggest a system applying a fuzzy control system to the robot to avoid collision with an obstacle by an immediate order of the user. The fuzzy control system has better performance than any other existing control methods in the change of noise and parameter. And it is more efficient than any other since it solves easy the complexity of the system analysis occurring because of the nonlinear feature of the mobile robot system. In this paper, we made experiments how the mobile robot controlled by the fuzzy control system avoids an obstacle, tracks the path and avoids the obstacle in the path, to prove the performance and to check the evaluation and the application possibility of the fuzzy control system.

Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

  • Seok, Ho-Jun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.61-69
    • /
    • 2016
  • In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.

A Study on the Improvement of Accessibility Guidelines for Korean Mobile Applications (한국형 모바일 애플리케이션 접근성 지침 개선 방안 연구)

  • Lee, Jin-Hyuk;Min, Hong-Ki
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.11 no.4
    • /
    • pp.307-314
    • /
    • 2017
  • In this study, we propose a method to improve the guideline for accessibility of mobile applications based on the results of manual evaluation of 8 mobile online shopping applications which are widely used in Korea. 13 items of mobile online shopping application were found to have low compliance rate, and 5 items such as response time control were observed and there was no corresponding items. In the current mobile application accessibility guidelines, it is necessary to delete the check items that are not relevant or meaningless, and to provide additional logical items such as logical ordering and form creation, and to improve the accessibility of mobile applications, The government should make efforts to develop and disseminate the development guide, and to resolve the digital devides.

A Smart Mobile Mail System Based on MPEG21-DIDL for Any Mobile Device (모든 모바일 단말기에 서비스 가능한 MPEG21-DIDL 기반의 스마트 모바일 메일 시스템)

  • Zhao, Mei-Hua;Seo, Chang-Wo;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.1-13
    • /
    • 2010
  • As the computing power of the mobile devices is improving rapidly, many kinds of web services are also available in mobile devices just as Email service. Mobile Mail Service began early, but this service is mostly limited in some specified mobile devices such as Smart Phone. That is a limitation that users have to purchase specified phone to be benefited from Mobile Mail Service. In this thesis, it developed new kind of Mobile Mail System named Smart Mobile Mail System based MPEG21-DIDL Markup, and solved above problem. DIDL could be converted to other Markup types which are displayed in mobile devices by Mobile Gate Server. By transforming PC Web Mail contents including attachment document to DIDL Markup through Mobile Gate Server, the Mobile Mail Service could be available for all kinds of mobile device. The Smart Mobile Mail System also performs real time alarming service for new Email using Callback URL SMS. When there is new Email arriving, the Mail System sends a Call back URL SMS to user. User could directly check Email through Callback URL SMS in real time.

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

A Study on construction of extranet using wireless data communication of mobile device (모빌 디바이스의 무선데이터통신을 활용한 엑스트라넷 구축연구)

  • 유우식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.139-149
    • /
    • 1999
  • Developed in this paper is a prototype extranet using mobile device such as Personal Digital Assistance(PDA) or Handheld PC(HPC). Especially an adjustment transaction system for auto insurance using wireless data communications is described. Using infrastructures such as PCS, Cellular, Private Radio, wireless communications offers tremendous applications in Korea. A survey of such applications is presented in this paper. Also an analysis of currently available infrastructures of wireless communications is described in this paper. The scheme of an adjustment transaction consists of seven steps: (1) get list of adjustment, (2) obtain insurance information, (3) check police record, (4) get an accident record, (5) get bluebook value, (6) examine the car, (7) file report. Comparing with the previous on-line method that spends much time on gathering data, the proposed system guarantees more rapid transaction using wireless communications.

  • PDF