• 제목/요약/키워드: Mobile set

검색결과 886건 처리시간 0.03초

위치 기반 서비스 지원을 위한 연관 클래스 집합 생성 기법 (An Associative Class Set Generation Method for supporting Location-based Services)

  • 김호숙;용환승
    • 한국정보과학회논문지:데이타베이스
    • /
    • 제31권3호
    • /
    • pp.287-296
    • /
    • 2004
  • 최근 이동 컴퓨팅 환경 하에서 위치를 기반으로 하는 다양한 서비스가 점차 증가하고 있다. 본 논문은 이동 컴퓨팅 환경에서 대량의 공간 데이타베이스를 기반으로 하는 위치 기반 서비스를 지원하기 위하여, 요청되는 질의들 사이에 존재하는 의미적으로 연관성이 있는 빈발 항목인 연관 클래스 집합을 제안하고, 이를 효과적으로 찾는 방법에 대해 소개한다. 이때 요청되는 질의들의 시간적 연관 관계, 그리고 이러한 서비스를 제공해 주는 공간 객체들 사이의 거리와 사용자의 접근 특성이 함께 고려된다 이러한 연구 결과는 이동 환경이 갖는 제약점을 극복하면서 효과적으로 위치 기반 서비스를 지원하는 바탕이 된다 즉 생성된 연관 클래스 집합은 이동 컴퓨팅 환경에서 지리 정보를 서비스 할 때 관련 자료를 추천하는 시스템에 활용할 수 있고, 지리 정보를 고려한 광고 방송이나 도시 개발 계획 둥에 이용할 수 있으며, 이동 사용자를 위한 클라이언트의 캐쉬 정책에 응용될 수 있다.

Mobile RFID (Radio Frequency Identification) 용 안테나 계 (Design of mobile Radio Frequency Identification (m-RFID) antenna)

  • 김용진;정창원
    • 한국산학기술학회논문지
    • /
    • 제10권12호
    • /
    • pp.3608-3613
    • /
    • 2009
  • 본 논문에서는 휴대용 단말기 적용이 가능한 mobile Radio Frequency Identification (m-RFID) system 을 위한 안테나의 설계 방법을 제안했다. 전기계 안테나와 자기계 안테나의 결합을 통하여 안테나의 휴대 단말 장착시 m-RFID 적용 방향으로 안테나의 패턴이 지향성의 특징을 나타낸다. 전기계 안테나는 PIFA 구조의 안테나를 사용하였으며, 자기계 안테나는 loop 형 안테나를 구현하였다. 목표 주파수 대역은 900 MHz 대역이며, 목표 이득은 4dBi 이상으로 설계 되었다. Ansoft 사의 HFSS 를 사용하여 시뮬레이션하였으며, 목표치 이상의 결과를 보였다. 제작된 안테나는 FR4 epoxy 기판 (h=1 mm, $\varepsilon_{\tau}=4.4$) 을 사용하여 제작되었으며, 시뮬레이션과 유사한 결과를 보였다.

휴대전화 초기설계에서의 형태인자 선정 방법론 (Methodology of Selecting FormFactor in the Early Design of Mobile Phone)

  • 이경수;김민수;차성운
    • 한국정밀공학회지
    • /
    • 제27권11호
    • /
    • pp.63-71
    • /
    • 2010
  • FormFactors is one of the most critical design factors in early development of mobile phone, and proper selection of FormFactors is necessary for smoothness of product development and customer satisfaction. Especially, emergence of mobile convergence added so various functions besides its original call function that importance of selecting FormFactors has increased because multiform FormFactors are needed. However there is problem such as frequent change of decision making in existing process because established process picks out FormFactors sensibly and arbitrarily through idea pull and so forth. We proposed FormFactors selection process by Axiomatic Design, set approach method and block approach method for reasonable and systematical FormFactors selection. First of all, we set the purpose of mobile phone development, and it is examined by Axiomatic Design. FormFactors design matrix is deduced through this process, the numbers of axes and rails are proposed using set approach method, and then patterns of FormFactors are embodied by block approach method. Particularly process application was tried through case study of mobile phone development, and we ensured that new FormFactors can be presented to a designer by systematical verification if change of customer requirements occurs through our process.

Optimization of 3G Mobile Network Design Using a Hybrid Search Strategy

  • Wu Yufei;Pierre Samuel
    • Journal of Communications and Networks
    • /
    • 제7권4호
    • /
    • pp.471-477
    • /
    • 2005
  • This paper proposes an efficient constraint-based optimization model for the design of 3G mobile networks, such as universal mobile telecommunications system (UMTS). The model concerns about finding a set of sites for locating radio network controllers (RNCs) from a set of pre-defined candidate sites, and at the same time optimally assigning node Bs to the selected RNCs. All these choices must satisfy a set of constraints and optimize an objective function. This problem is NP-hard and consequently cannot be practically solved by exact methods for real size networks. Thus, this paper proposes a hybrid search strategy for tackling this complex and combinatorial optimization problem. The proposed hybrid search strategy is composed of three phases: A constraint satisfaction method with an embedded problem-specific goal which guides the search for a good initial solution, an optimization phase using local search algorithms, such as tabu algorithm, and a post­optimization phase to improve solutions from the second phase by using a constraint optimization procedure. Computational results show that the proposed search strategy and the model are highly efficient. Optimal solutions are always obtained for small or medium sized problems. For large sized problems, the final results are on average within $5.77\%$ to $7.48\%$ of the lower bounds.

Mobile-Grid 환경에서의 통합 보안 모델 (Intergrating Security Model for Mobile-Grid)

  • 강수연;이승룡
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 합동 추계학술대회 논문집 정보 및 제어부문
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

초음파 센서와 실린더형 등대를 이용한 이동 로봇의 위치 추정 (The Mobile Robot Localizaion Using a Single Sonalr and Cylindrical Beacon)

  • 범희락;조형석
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1993년도 추계학술대회 논문집
    • /
    • pp.570-574
    • /
    • 1993
  • This paper proposes a new method of estimating the position and heading angle of a mobile robot moving on a flat surface. The proposed localization method utilizes two passive beacons and a single rotating ultrasonic sensor. The passive beacons consist of two cylinders with different diameters and reflect the ultrasonic pulses coming from the sonar sensor mounted on the mobile robot. The geometric parameter set of beacon is acquired from the sonar scan data obtained at a single mobile robot location using a new data processing algorithm. Form this parameter set, the position and heading angle of the mobile robot is determined directly. The performance and validity of the proposed method are evaluated using two beacons and a single sonar sensor attached at the pan-tilt device mounted on a mobile robot, named LCAR, in our laboratory.

  • PDF

Global Positioning System for Mobile Robot Navigation in an Indoor Environment

  • Park, Soo-Min;Lee, Bong-Ki;Jin, Tae-Seok;Lee, Jang-Myung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2002년도 ICCAS
    • /
    • pp.37.1-37
    • /
    • 2002
  • Localization is one of the most important functions for the mobile robot navigating in the unstructured environment. Most of previous localization schemes estimate current position and pose of mobile robot by applying various localization algorithms with the information obtained from sensors which are set on the mobile robot, or by recognizing an artificial landmark attached on the wall, or objects of the environment as natural landmark in the indoor environment. Several drawbacks about them have been brought up. To compensate the drawbacks, a new localization method that estimates the global position of the mobile robot by using a camera set on ceiling in the corridor is proposed. This sch...

  • PDF