• Title/Summary/Keyword: Mobile Message

Search Result 731, Processing Time 0.024 seconds

A Location Based Emergency Alert Service

  • Han E. Y.;Choi H. O.
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.327-330
    • /
    • 2004
  • This research work is concerned with a location-based alert service in wireless communication network environment. The alert service automatically transfers alert message to subscriber in the disaster area. This research work deals with automatic alert services that automatically provide people in emergency area with the state of emergency. The alert service uses the mobile device to inform its urgency to the subscribers in its area. The location tracking service will give the list of people in emergency area. The all processes of this research work are followed as. First, when a disaster or a calamity comes in, an emergency management center receives the emergency to analyze its shape and size and to declare the place to 'the disaster area.' Secondly, then the center finds information of mobile device subscribers in the disaster area. Finally, the center automatically generates a shape of text or audio of alert message of the emergency to send the message to the subscribers in the disaster area. Our mobile automatic alert service proposed above is so efficient that the subscribers in disasters area may meet the emergency more efficiently and may save their own valuable lives and properties more safely.

  • PDF

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

Heart Rate Variability on Telephone types and IOD of Conversation while Driving (도로주행 중 휴대전화 수신시 핸드폰 형태와 대화난이도에 따른 심전도 변화)

  • Lee, Kyung-Tae;Jang, Phil-Sik;Kim, Ki-Hyun;Im, Jung-Bin;Lee, Dong-Hyun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.554-559
    • /
    • 2005
  • It seems to be dangerous to use a cellular phone while driving since it increases driver's mental stress and makes driver's reaction time slow. This study is to investigate driver's psycho-physiological responses on mobile telephoning while driving. Among the three experimental factors (mobile-phone types, message IODs over mobile-phone, road types), only the message IODs over mobile-phone changed R-R intervals of electrocardiograph significantly. This result suggests that the regulations on the mobile telephoning while driving be changed.

  • PDF

Development of Mobile Station in the CDMA Mobile System

  • Kim, Sun-Young;Uh, Yoon;Kweon, Hye-Yeoun;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • v.19 no.3
    • /
    • pp.202-227
    • /
    • 1997
  • This paper describes the development of the CDMA mobile station to support non-speech, mobile office services such as data, fax, and short message service in addition to voice. We developed some important functions of layer 2 and layer 3. To provide non-speech services, we developed a terminal adapter and user interface software. The description of development process, software architecture and external interfaces required to provide such services is given. The description of a TTA-62 message analysis tool, a mobile station monitoring software, and an automatic test system developed for integration tests and performance measurements is also given.

  • PDF

Can Coupon Holding Duration and Message Framing Increase the Effect of Push Notifications on Mobile Coupon Redemption? Evidence from A Randomized Field Experiment

  • Soonki Hwang;Jai-Yeol Son;Sunju Park;Kil-Soo Suh
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.812-830
    • /
    • 2023
  • We propose a mobile coupon strategy designed to increase the effect of push notifications on redemption. The proposed strategy recommends that firms deliver mobile coupons with distant expiration dates and remind them through push notifications framed negatively once these expiration dates become imminent, rather than frequently sending coupons with near expiration dates. We test the effectiveness of the proposed strategy using data collected through a randomized field experiment. The findings indicate that push notifications enhance coupon redemption rates for coupons that are held longer by customers than those that are recently received. Additionally, we found that sending negatively framed push notification messages to remind customers of imminent coupon expiration dates further resulted in higher coupon redemption rates. The findings can be employed to offer useful guidance on how to effectively design mobile coupons for achieving higher redemption rates.

Performance Evaluation of Access Channel Slot Acquisition in Cellular DS/CDMA Reverse Link

  • Kang, Bub-Joo;Han, Young-Nam
    • ETRI Journal
    • /
    • v.20 no.1
    • /
    • pp.16-27
    • /
    • 1998
  • In this paper, we consider the acquisition performance of an IS-95 reverse link access channel slot as a function of system design parameters such as postdetection integration length and the number of access channel message block repetitons. The uncertainty region of the reverse link spreading codes compared to that of forward link is very small, since the uncertainty region of the reverse link is determined by a cell radius. Thus, the parallel acquisiton technique in the reverse link is more efficient than a serial acquisition technique in terms of implementation and of acquisition time. The parallel acquisition is achieved by a bank of N parallel I/Q noncoherent correlator are analyzed for band-limited noise and the Rayleigh fast fading channel. The detection probability is derived for multiple correct code-phase offsets and multipath fading. The probability of no message error is derived when rake combining, access channel message block combining, and Viterbi decoding are applied. Numerical results provide the acquisition performance for system design parameters such as postdetection integration length and number of access channel message block repetitions in case of a random access on a mobile station.

  • PDF

Helping People with Visual Disability Using AI

  • Naif Al Otaibi;Tariq S Almurayziq
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.205-208
    • /
    • 2024
  • Artificial Intelligence (AI) technology has evolved rapidly in recent years and is used in everything from banking to email management to surgery, but without the help of the visible, most of the fun features of the Internet include visual impairment. It benefits people with disabilities. The main purpose of this study is to find ways to help people with visual impairments using AI technology. A visually impaired request is made for the visually impaired. For example, when a message arrives that the program will notify you by voice (reads the sender's name, read the message, and replies to it if necessary), this is a special program installed on your mobile phone. This program uses a customized algorithm developed in Python to convert written text to voice, read text, and convert voice to written text on a message when a visually impaired person wants to respond. Then it sends the response in the form of a text message. Therefore, the research should lead to programs for people with visual impairments. This program makes mobile phones easier and more comfortable to use and makes the daily life easier for visual impairments.

The Emotional Effect of Emoticon on Interpreting Text Message (메시지 해석에 이모티콘이 미치는 정서적 효과 - 휴대전화 문자 메시지 상황을 중심으로)

  • Ahn, Won-Mi;Kim, Jong-Wan;Han, Kwang-Hee
    • Journal of the HCI Society of Korea
    • /
    • v.5 no.1
    • /
    • pp.11-18
    • /
    • 2010
  • Cell phone users frequently send and receive text messages with emoticons in their everyday lives, but emoticon and its emotional effect on message in mobile context has not been focused on. The purpose of this study is to investigate the emotional effect of emoticons on interpretation of text message considering valent texts and emoticons. Study 1 showed the effect of valent emoticons on neutral message, and also revealed that existence of emoticon, regardless of its valence, decreases rigidness and increases familiarity of message. In Study 2 that used positive and negative text messages, we found that emoticon still affects assessing sender's mood state and emotion. Result of interaction between valences of text and emoticon showed that participants in condition of incongruent pairs felt more sarcasm.

  • PDF

Adaptive Cache Maintenance Scheme based on Connection States in Mobile Computing Environments (이동 컴퓨팅 환경하의 연결 상태를 기반으로 한 적응적 캐쉬 유지 기법)

  • Nam, Sung-Hun;Cho, Sung-Ho;Hwang, Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.149-159
    • /
    • 2000
  • In mobile computing environments, invalidation and propagation method based on broadcasting is used to transmit the information for cache maintenance of mobile hosts. Previous researches generally adopted invalidation method that easily adapts to the limited network bandwidth and the frequent disconnection. But the invalidation of frequently accessed data causes the contention on the wireless network with the increasing cache requests. Although the propagation method can reduce the cache requests, the high probability of broken message or loss of message is the main factor that degrades the system performance. To resolve these problems, we propose adaptive cache maintenance scheme that dynamically adjusts the broadcasting ratio of invalidation and propagation, according to the wireless network connection states. The proposed scheme broadcasts the propagation message in stable connection state, so it can reduce the cache requests and server response time. With the decreasing available network bandwidth by the frequent partial disconnection and disconnection, the proposed scheme dynamically increases the broadcasting ratio of the invalidation messages to minimize the broken message or the loss of message probability. Consequently, the proposed scheme resolves the problems which arise in the invalidation or propagation method in mobile computing environments.

  • PDF

A Fault-tolerant Network-based Mobility Management Scheme for Supporting Multi-media Services (방통융합 멀티미디어 서비스를 제공하기 위한 안정된 네트워크 기반의 이동성 관리 기술)

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Hong, Kang-Woon;Um, Tai-Won;Lee, Hyun-Woo;Ryu, Won;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.526-535
    • /
    • 2010
  • In this paper, we propose the fault-tolerant network-based mobility management scheme for supporting multimedia services of broadcasting & communications convergence in fixed mobile convergence (FMC) networks. The proposed scheme is based on AIMS (Access Independent Mobility Service) which is developed for the mobility support among heterogeneous access networks. To support stable location management and handover control for a MN, the proposed scheme supports stable management of binding information by sensing network attachment and detachment of a mobile node (MN). In addition, the proposed fault-tolerant (FT) AIMS supports a function of message retransmission for the support of handover control message and a function of heartbeat message transmission for the support of stable access network environments to a mobile node. We evaluate and analyze the performance of the proposed scheme through the implementation of AIMS system test-bed.