• Title/Summary/Keyword: PDA communication

Search Result 300, Processing Time 0.028 seconds

A Knowledge Service Using Automatic Document Sharing based on Intelligent OMDR (지능형 OMDR 기반의 자동 문서 공유 에이전트를 이용한 지식서비스)

  • Su-Kyoung Kim;Kee-Hong Ahn
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.747-750
    • /
    • 2008
  • 본 연구는 온톨로지, 자연어 처리, 메타데이터 등의 시맨틱 웹 기반 기술들을 이용하여 시맨틱 웹 응용을 위한 전체적인 기술 적용과 그의 활용에 목적을 두고 있다. 이를 위해 OWL을 기반으로 조직이나 기관의 지식 주제별 도메인 온톨로지와, 기존 워드넷(WordNet)이나 더브린 코어 메타데이터(Dublin Core Meta Data)와 조직에 정의된 데이터베이스의 스키마를 MDR로 구축하여 상호 연결하여 온톨로지가 갖는 지능적 추론과 규칙 서비스와 표준화된 메타데이터의 결합 방법을 제공한다. 이는 기존에 온톨로지와 메타데이터의 재활용과 연결(Alignment)에 있어 연구적으로 높은 가치가 있다. 그리고 조직의 사용자가 문서를 작성할 때 문서의 내용에 대해 자연어 처리 기술과 온톨로지의 기술을 이용해 적합한 용어나 메타데이터를 자동으로 제공하여 작성된 문서의 공유와 재사용성을 높이고, 작성된 문서를 XML 형식으로 구성되는 XML 기반 지능 문서 데이터베이스(XMB Based Intelligent Document Database)에 저장하여 유사한 문서를 작성하거나 사용할 필요가 있는 사용자에게 문서 등록과 검색 에이전트(Document Registry and Retrieval Agent)를 통해 이러한 제공하여 문서 지식의 사유화를 최소화 하고, 유사 문서의 재작성과 또는 특정 문서의 작성에 필요한 시간이나 경비를 줄이게 된다. 또한 웹상이나 PDA 같은 개인 휴대장치를 통해서도 서 등록과 검색 에이전트를 통해 문서를 검색하고 사용할 수 있게 한다면 언제 어디서나 해당 서비스를 활용하는 유비쿼터스와 시맨틱 웹의 실질적 응용을 거둘 수도 있으리라 사료된다.

The Design and Implementation of a Platform Analyzer Model for Supporting Multi-platform Environment (다중 플랫폼 환경을 지원하기 위한 플랫폼 분석기 모델 설계 및 구현)

  • Chang, Byoung-Chol;Jung, Ho-Young;Lee, Yoon-Soo;Kim, Han-Il;Cha, Jae-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.225-233
    • /
    • 2008
  • Rapid advancement information and communication technologies has introduced various dimension of e-Learning environment such as u-learning(ubiquitous learning), m-learning(mobile learning) and t-learning(television learning). These technologies enabled learners to access learning contents through variety of devices with more flexibility and consistency. In order to implement learning through these multiple environments, basically it is necessary to acquire and process the platform information that contains properties and status of the web-accessing devices. In this study, we introduce the design and implementation of a Platform Analyzer Model which is essential for learning systems that support multi-platform environment. We also present a Interactive DTV-Centered multi-platform learning environment framework using PC, PDA or Mobile phone. Finally, we will discuss the possibility of the multi-platform learning environment with sample scenario and contents.

  • PDF

A Study of consumer's behavior and classifications by advertising techniques of mobile character (모바일 캐릭터의 광고기법에 따른 타켓별 유형분류와 소비자 반응 연구)

  • 강대인;주효정
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.393-402
    • /
    • 2004
  • The mobile advertisement has varied on lifestyle of people, who live aninformation-oriented society with portable equipment such as web phone and PDA(Personal Digital Assistant). Also, the advertising has expended mobile techniques and its application field unpredictably. The intrinsic characteristic of misdistribution, reach, and convenience in mobile advertisement add up the capacity of a location, information and individualize. This market condition leads the basic audio focused formal mobile advertisement to the new mobile Internet environment with an additional able of data communication. Moreover, the type of SMS (Short Message Service), Graphic, Wep Push, and ridchmedia, which based on music, basic graphic, voice, and letters transfer by mobile terminal and the mobile character is present inevitably correlation with pixel art and animation in 2D(Two Dimensions) techniques. Thus, this research appoints the importance and its role of mobile advertisement that is core of the business marketing in new media era. To activate mobile market, the mobile companies classify the characteristic of consumers with developed commercial use of mobile character and research their behavior to meet optimal mobile character in business.

  • PDF

Grid-based Cloaking Area Creation Scheme supporting Continuous Query Processing for Location-based Services of Peer-to-Peer Environment (P2P 환경의 위치 기반 서비스에서 연속적인 질의 처리를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Kim, Hyeong-Il;Lee, Ah-Reum;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.18 no.3
    • /
    • pp.53-62
    • /
    • 2010
  • Recent development in wireless communication technology, like GPS, and mobile equipments, like PDA and cellular phone, make location-based services (LBSs) popular. However, because, users continuously request a query to a server in the LBSs by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a grid-based cloaking area creation scheme supporting continuous LBSs in peer-to-peer environment. The proposed scheme creates a cloaking area by using Chord protocol, so as to support the continuous LBSs in peer-to-peer environment. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time.

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Digital Signature Considering the Medical Information Property on Mobile Environment (모바일 환경에서 의료 정보 특성을 고려한 디지털서명)

  • Kim Yong-Gug;Lee Yeun-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.374-379
    • /
    • 2005
  • In the most of medical institution medical information is totally stored in a database and many number of researchers and staffs of the hospital access these information anytime. This can be caused patient's privacy to be violated. Introducing a tool for security should be considered as one of the most important requirement especially in the case that today's medical information service expands into an integrated one. In this paper we review the matters of security threat on a medical information system and propose a secure medical information service model equipped on mobile device such as PDA. Also we propose a security architecture employing a digital signature mechanism to protect the personal information on the model. Proposed architecture can lead the doctor to diagnose with high responsibility, help to build a reliable medical information system. and through the signed data, we can get some useful information against medical strife.

Implementation of Access Control System Suitable for Meteorological Tasks in Grid Computing Environment (그리드 컴퓨팅 환경에서 기상업무에 적합한 접근 제어 시스템 구현)

  • Na, Seung-kwon;Ju, Jae-han
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.2
    • /
    • pp.206-211
    • /
    • 2017
  • Recently computing devices by connecting to a network, grid computing, the next generation of digital neural networks that provide maximum service will connect all of the computer such as a PC or server, PDA into one giant network makes the virtual machine. Therefore, we propose the grid computing implementation model to be applied to meteorological business field as follows. First, grid computing will be used for tasks such as the development of numerical models below the mid-scale or test operations, and the final backup of the weather supercomputer. Second, the resources that will constitute grid computing are limited to business PCs and Linux servers operated by the central government considering operational efficiency. Third, the network is restricted to the LAN section, which suggests the implementation of high performance computing.

Design and Implementation of SMS Application System with Wireless Internet Environment (무선인터넷환경과 연계한 SMS애플리케이션 시스템의 설계 및 구현)

  • Yang Hae-Sool;Hong Jung-Hun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1507-1516
    • /
    • 2004
  • Recently, the most remarkable word is 'ubiuuitous' in field of information and communication. Ubiquitous has a meaning 'exist everywhere' that means our daily life is connect as network. It means we can get the information which in need whenever and wherever with safety. We predict this word will be symbolical keyword which lead an information-oriented society including the internet a quite long it. It's already per-meate to us the Ubiquitous. It's taken by CCTV when we visit bank. It's made to us can know the fastest way the GPS system to be connected by an artificial satcllite on mobile, and many people use mobile and PDA for investment in stocks. Among them, it has begun to spread many mobile services to us. In this paper, it's the aim a creation of value added through an efficient mobile services to use wireless internet different with previous way, cutting down on expenses and business modeling.

Grid-based Cloaking Area Creation Scheme supporting Continuous Location-Based Services (연속적인 위치기반 서비스를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Lee, Ah-Reum;Kim, Hyeong-Il;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.19-30
    • /
    • 2009
  • Recent development in wireless communication technology and mobile equipment like PDA, cellular phone and GPS makes location-based services (LBSs) popular. However, because, in the LBSs, users continuously request a query to LBS servers by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, this paper propose a grid-based cloaking area creation scheme supporting continuous LBSs. The proposed scheme creates a cloaking area rapidly by using grid-based cell expansion to efficiently support the continuous LBSs. In addition, to generate a cloaking area which makes the exposure probability of a mobile user to a minimum, we compute a privacy protection degree by granting weights to mobile users. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time, privacy protection degree.

  • PDF