• Title/Summary/Keyword: Mobile set

Search Result 886, Processing Time 0.028 seconds

An Associative Class Set Generation Method for supporting Location-based Services (위치 기반 서비스 지원을 위한 연관 클래스 집합 생성 기법)

  • 김호숙;용환승
    • Journal of KIISE:Databases
    • /
    • v.31 no.3
    • /
    • pp.287-296
    • /
    • 2004
  • Recently, various location-based services are becoming very popular in mobile environments. In this paper, we propose a new concept of a frequent item set, called “associative class set”, for supporting the location-based service which uses a large quantity of a spatial database in mobile computing environments, and then present a new method for efficiently generating the associative class set. The associative class set is generated with considering the temporal relation of queries, the spatial distance of required objects, and access patterns of users. The result of our research can play a fundamental role in efficiently supporting location-based services and in overcoming the limitation of mobile environments. The associative class set can be applied by a recommendation system of a geographic information system in mobile computing environments, mobile advertisement, city development planning, and client cache police of mobile users.

Design of mobile Radio Frequency Identification (m-RFID) antenna (Mobile RFID (Radio Frequency Identification) 용 안테나 계)

  • Kim, Yong-Jin;Jung, Chang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3608-3613
    • /
    • 2009
  • In this paper, we propose a mobile Radio Frequency Identification antenna for mobile hand set. The proposed antenna with directive radiation characteristics based on combination of electric-magnetic radiators can be installed in the mobile hand-set. The combination of PIFA antenna for electric radiator and loop antenna for magnetic radiator is presented and designed for료 m-RFID reader system. Target frequency band is 900-MHz band. and desired gain is 4dBi. The antenna is simulated using Ansoft HFSS software and shows expected results. The antenna is also manufactured using FR4-epoxy circuit board (h=1 mm, $\varepsilon_{\tau}=4.4$). There are good agreements between the simulated and measured VSWR curves and radiation characteristics.

Methodology of Selecting FormFactor in the Early Design of Mobile Phone (휴대전화 초기설계에서의 형태인자 선정 방법론)

  • Lee, Kyung-Soo;Kim, Min-Soo;Cha, Sung-Woon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.27 no.11
    • /
    • pp.63-71
    • /
    • 2010
  • FormFactors is one of the most critical design factors in early development of mobile phone, and proper selection of FormFactors is necessary for smoothness of product development and customer satisfaction. Especially, emergence of mobile convergence added so various functions besides its original call function that importance of selecting FormFactors has increased because multiform FormFactors are needed. However there is problem such as frequent change of decision making in existing process because established process picks out FormFactors sensibly and arbitrarily through idea pull and so forth. We proposed FormFactors selection process by Axiomatic Design, set approach method and block approach method for reasonable and systematical FormFactors selection. First of all, we set the purpose of mobile phone development, and it is examined by Axiomatic Design. FormFactors design matrix is deduced through this process, the numbers of axes and rails are proposed using set approach method, and then patterns of FormFactors are embodied by block approach method. Particularly process application was tried through case study of mobile phone development, and we ensured that new FormFactors can be presented to a designer by systematical verification if change of customer requirements occurs through our process.

Optimization of 3G Mobile Network Design Using a Hybrid Search Strategy

  • Wu Yufei;Pierre Samuel
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.471-477
    • /
    • 2005
  • This paper proposes an efficient constraint-based optimization model for the design of 3G mobile networks, such as universal mobile telecommunications system (UMTS). The model concerns about finding a set of sites for locating radio network controllers (RNCs) from a set of pre-defined candidate sites, and at the same time optimally assigning node Bs to the selected RNCs. All these choices must satisfy a set of constraints and optimize an objective function. This problem is NP-hard and consequently cannot be practically solved by exact methods for real size networks. Thus, this paper proposes a hybrid search strategy for tackling this complex and combinatorial optimization problem. The proposed hybrid search strategy is composed of three phases: A constraint satisfaction method with an embedded problem-specific goal which guides the search for a good initial solution, an optimization phase using local search algorithms, such as tabu algorithm, and a post­optimization phase to improve solutions from the second phase by using a constraint optimization procedure. Computational results show that the proposed search strategy and the model are highly efficient. Optimal solutions are always obtained for small or medium sized problems. For large sized problems, the final results are on average within $5.77\%$ to $7.48\%$ of the lower bounds.

Intergrating Security Model for Mobile-Grid (Mobile-Grid 환경에서의 통합 보안 모델)

  • Kang, Su-Youen;Lee, Sung-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

The Mobile Robot Localizaion Using a Single Sonalr and Cylindrical Beacon (초음파 센서와 실린더형 등대를 이용한 이동 로봇의 위치 추정)

  • 범희락;조형석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1993.10a
    • /
    • pp.570-574
    • /
    • 1993
  • This paper proposes a new method of estimating the position and heading angle of a mobile robot moving on a flat surface. The proposed localization method utilizes two passive beacons and a single rotating ultrasonic sensor. The passive beacons consist of two cylinders with different diameters and reflect the ultrasonic pulses coming from the sonar sensor mounted on the mobile robot. The geometric parameter set of beacon is acquired from the sonar scan data obtained at a single mobile robot location using a new data processing algorithm. Form this parameter set, the position and heading angle of the mobile robot is determined directly. The performance and validity of the proposed method are evaluated using two beacons and a single sonar sensor attached at the pan-tilt device mounted on a mobile robot, named LCAR, in our laboratory.

  • PDF

Global Positioning System for Mobile Robot Navigation in an Indoor Environment

  • Park, Soo-Min;Lee, Bong-Ki;Jin, Tae-Seok;Lee, Jang-Myung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.37.1-37
    • /
    • 2002
  • Localization is one of the most important functions for the mobile robot navigating in the unstructured environment. Most of previous localization schemes estimate current position and pose of mobile robot by applying various localization algorithms with the information obtained from sensors which are set on the mobile robot, or by recognizing an artificial landmark attached on the wall, or objects of the environment as natural landmark in the indoor environment. Several drawbacks about them have been brought up. To compensate the drawbacks, a new localization method that estimates the global position of the mobile robot by using a camera set on ceiling in the corridor is proposed. This sch...

  • PDF