• Title/Summary/Keyword: Mobile Code

Search Result 773, Processing Time 0.118 seconds

A Pre-Rake TDD-CDMA System Using Modified ZCD Code (수정된 ZCD 부호를 사용하는 Pre-Rake TDD-CDMA 시스템)

  • Jeong, Incheol;Cha, Jaesang;Kyeong, Mungeon
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2012
  • In a frequency selective fading channel, Pre-Rake diversity technique provides simple receiver structure and sufficient diversity effect for mobile terminals. However, conventional Pre-Rake systems are more severely affected than Rake systems with regard to multiple access interference since the number of multipaths received at the mobile unit is nearly twice that of the Rake systems. In order to overcome the problem, a Pre-Rake TDD-CDMA system using zero correlation duration (ZCD) spreading code is proposed. Modified ZCD codes including guard interval (GI) is also proposed and the performance is evaluated by computer simulation under the condition of various channel environment.

Design and Implementation of a Low-Code/No-Code System

  • Hyun, Chang Young
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.188-193
    • /
    • 2019
  • This paper is about environment-based low-code and no-code execution platform and execution method that combines hybrid and native apps. In detail, this paper describes the Low-Code/No-Code execution structure that combines the advantages of hybrid and native apps. It supports the iPhone and Android phones simultaneously, supports various templates, and avoids developer-oriented development methods based on the production process of coding-free apps and the produced apps play the role of Java virtual machine (VM). The Low-Code /No-Code (LCNC) development platform is a visual integrated development environment that allows non-technical developers to drag and drop application components to develop mobile or web applications. It provides the functions to manage dependencies that are packaged into small modules such as widgets and dynamically loads when needed, to apply model-view-controller (MVC) pattern, and to handle document object model (DOM). In the Low-Code/No-Code system, the widget calls the AppOS API provided by the UCMS platform to deliver the necessary requests to AppOS. The AppOS API provides authentication/authorization, online to offline (O2O), commerce, messaging, social publishing, and vision. It includes providing the functionality of vision.

Advanced Message Storing Method on mobilePOST SMSC (mobilePOST SMSC(Short Message Service Center)에서의 향상된 메시지 저장 기법)

  • Song, Byung-Kwen
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.2
    • /
    • pp.126-138
    • /
    • 2008
  • This paper proposes the preservation method that can effectively process short messages at mobilePOST SMSC(Short Message Service Center) platform on CDMA(Code Division Multiple Access). There are three techniques for the preservation method. First one is shared memory technique where several processes within the system share same memory to process transmission of short messages with maximum performance. Second one is to back-up messages in shared memory to the file system to prevent lost during system initialization or other unstable period. Third technique is that when transmission of short message was completed, finished message is moved from the shared memory to relational database for accounting purposes.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

A Case Study of Combining Two Cross-platform Development Frameworks for Storybook Mobile App

  • Beomjoo Seo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3345-3363
    • /
    • 2023
  • Developers often use cross-platform frameworks to create mobile apps that can run on multiple platforms with minimal code changes. However, these frameworks may not suit all the needs of a specific app, so developers may also use native APIs to add platform-specific features. This method eventually dilutes the advantages of cross-platform development methodology that aims to reduce development costs and time, and often leads to a decision to return back to the original native mobile development methodology. In this study, we explore a different approach: combining different cross-platform tools to develop a storybook mobile app that meets various requirements. We have demonstrated that integrating two cross-platform solutions can be used reliably to develop complex mobile applications. However, we also report that this approach can introduce unforeseen issues such as sandbox redundancy, unexpected functional burdens, and redundant permission requests. Despite these challenges, we believe that combining two cross-platform solutions can be applied to a variety of functional and performance requirements, enabling the development of more sophisticated mobile applications at lower costs and with shorter development timelines than traditional mobile app development methodologies.

Design and Development on 2D Barcode Based Network Advertising Contents (2차원 바코드 기반 네트워크 광고 콘텐츠의 설계와 구현)

  • Shin, Hwan-Seob;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.376-383
    • /
    • 2019
  • In recent decades, China's economy has grown rapidly and two-dimensional bar code-based payments services have been activated. This is a model that will be introduced by developing countries that lack mobile payment infrastructure, and countries that are looking to leap into cashless societies are also drawing attention. Along with this, the existing CRM market is expanding around the mobile device called m-CRM, and research is active on the importance of collective use for online advertising and two-dimensional bar code-based payments services. Therefore, through this study, we have explored the concepts and status of online advertising and customer relationship management which using the two-dimensional bar code-based system, and designed and implemented the method and mobile application system to effectively disseminate transactional advertising information at the point of sale or at the point of share. We also presented an application approach to look at the direction of two-dimensional bar code-based ads contents sharing system and its development.

Mobile-IoT System for Payment Efficiency and Convenience of Offline Shopping (오프라인 쇼핑의 결제효율과 편의성 제공을 위한 모바일-IoT 시스템)

  • Lee, Jeong-Hoon;Jeong, Seung-Hun;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.289-294
    • /
    • 2019
  • It easily collects information on purchased goods using IoT(Internet of Things). The collected data is updated directly to the smartphone for verification. The payment information is generated by QR-Code. As a way to implement a system, System was configured with two assumptions: IoT technology using Raspberry-Pi and mobile QR technology. First, RFID tags are attached to the goods instead of barcodes. Second, it has an IoT computer(Raspberry-Pi) built into its shopping cart. This system keeps traditional shopping method of face-to-face payment, but replace time-consuming tarditional barcode tagging method to QR-tagging system for time-efficiency. By debeloping the system of this paper, we maintain pleasures in offline store shopping and it provide convenience due to reduced waiting time for customers and providing prior information about the products.

Proposal of a Learning Model for Mobile App Malicious Code Analysis (모바일 앱 악성코드 분석을 위한 학습모델 제안)

  • Bae, Se-jin;Choi, Young-ryul;Rhee, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.455-457
    • /
    • 2021
  • App is used on mobile devices such as smartphones and also has malicious code, which can be divided into normal and malicious depending on the presence or absence of hacking codes. Because there are many kind of malware, it is difficult to detect directly, we propose a method to detect malicious app using AI. Most of the existing methods are to detect malicious app by extracting features from malicious app. However, the number of types have increased exponentially, making it impossible to detect malicious code. Therefore, we would like to propose two more methods besides detecting malicious app by extracting features from most existing malicious app. The first method is to learn normal app to extract normal's features, as opposed to the existing method of learning malicious app and find abnormalities (malicious app). The second one is an 'ensemble technique' that combines the existing method with the first proposal. These two methods need to be studied so that they can be used in future mobile environment.

  • PDF

Dynamic code allocation using voice activeity detection in DS-CDMA cellular system (DS-CDMA 셀룰러 시스템에서의 음성검출을 사용한 동적코드할당방식)

  • 유명수;양영님;고종하;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1302-1310
    • /
    • 1997
  • In this paper, we propose a dynamic code allocation strategy using voice activity detection and evaluate the performance of a dynamic code allocation strategy using voice activeity detection in DS-CDMA system. Proposed method allocates code to mobile terminal according to the residual capacity computed by SIR in the base station. In hot spot traffic loading cell, we find that the performance of proposed method is better than that of a fixed code assignment strategy using voice activity detection. Also, we find that the proposed method provide much improvement in blocking probability against the dynamic code assignment strategy withoug voice activity detection.

  • PDF

Code Refactoring Techniques Based on Energy Bad Smells for Reducing Energy Consumption (Energy Bad Smells 기반 소모전력 절감을 위한 코드 리팩토링 기법)

  • Lee, Jae-Wuk;Kim, Doohwan;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.209-220
    • /
    • 2016
  • While the services of mobile devices like smart phone, tablet, and smart watch have been increased and varied, the software embedded into such devices has been also increased in size and functional complexity. Therefore, increasing operation time of mobile devices for serviceability became an important issue due to the limitation of battery power. Recent studies focus on the software development having efficient behavioral patterns because the energy consumption of mobile devices is caused by software behaviors which control the hardware operations. However, it is often difficult to develop the embedded software with considering energy-efficiency and behavior optimization due to the short development cycle of the mobile services in many cases. Therefore, this paper proposes the refactoring techniques for reducing energy consumption, and enables to fulfill the energy requirements during software development and maintenance. We defined energy bad smells with the code patterns that can excessively consume the energy, and our refactoring techniques are to remove these bad smells. We performed some case studies to verify the usefulness of our refactoring techniques.