• Title/Summary/Keyword: Smart Mobile Device

Search Result 494, Processing Time 0.026 seconds

Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN (WPAN에서 간섭을 피하기 위한 멀티모드 단말기 채널등급 방법)

  • Jung, Sungwon;Kum, Donghyun;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2015
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT), The IoT enables physical world objects in our surrounding to be connected to the Internet. ISM (Industrial Scientific Medical) band that is 2.4GHz band authorized free of charge is being widely used for smart devices. Accordingly studies have been continuously conducted on the possibility of coexistence among nodes using ISM band. In particular, the interference of IEEE 802.11b based Wi-Fi devices using overlapping channel during communication among IEEE 802.15.4 based wireless sensor nodes suitable for low-power, low-speed communication using ISM band. Because serious network performance deterioration of wireless sensor networks. In this paper, we will propose an algorithm that identifies the possibility of using more accurate channels by mixing utilization of interference signal and RSSI (Received Signal Strength Indicator) Min/Max/Activity of Interference signal by wireless sensor nodes. In addition, it will verify our algorithm by using OPNET Network verification simulator.

The Implementation of Broadcasting Scalable Application on Multimedia mobile device using SADL (멀티미디어 모바일 단말기기를 이용한 방송통신용 스케일러블 애플리케이션 구현)

  • Kim, Sang-Hyun;Lim, Tae-Beom;Kim, Kyung-Won;Lee, Seok-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.556-559
    • /
    • 2011
  • 최근 디지털 방송 서비스가 본격화가 이루어짐에 따라 디지털 콘텐츠는 기하급수적으로 늘어나고 있다. 또한 방송통신 융합 환경은 기존 셋탑 박스와 같은 방송 전용 단말기와 PC, 노트북, PDA와 같은 인터넷 단말기기, 그리고 모바일 폰과 같은 통신기기 사이의 벽을 허물고 있다. IPTV, SmartTV 시대의 도래로 방송통신 제공자의 양방향성 콘텐츠의 제공 및 상호연동 서비스의 제공은 중요한 이슈가 되었다. 이에 따라 다양한 단말기를 이용해 N-Screen이 가능하도록 방송통신 융합 서비스를 제공하고, 이를 위한 여러 콘텐츠 제작이 활발히 일어나고 있다. 이에 본 논문은 양방향성과 상호운용성을 높이기 위한 하나의 방법으로, 방송통신 융합서비스를 인터넷에 의한 전송과 방송 셋탑에 의한 전송에 있어서 상호 동일한 콘텐츠의 통일성을 유지하여 관리가 쉽도록 하는 Scalable Application Framework를 이용하였고 이를 실제 멀티미디어 모바일 단말기기에 적용하고 구현하였다. 이를 통해 앞으로 스마트 방송 시대에 대비할 수 있는 시스템의 대안을 제안하고자 한다. MPEG-21의 DID를 기초로 하여 SADL(Scalable Application Description Language)를 정의하고 이를 이용한 다양한 프레임워크 모델 중 일부인 멀티미디어 모바일 단말기기에 적용하여 이를 활용하는 방안에 대해 논의한다.

  • PDF

Improvement of Activity Recognition Based on Learning Model of AI and Wearable Motion Sensors (웨어러블 동작센서와 인공지능 학습모델 기반에서 행동인지의 개선)

  • Ahn, Junguk;Kang, Un Gu;Lee, Young Ho;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.982-990
    • /
    • 2018
  • In recent years, many wearable devices and mobile apps related to life care have been developed, and a service for measuring the movement during walking and showing the amount of exercise has been provided. However, they do not measure walking in detail, so there may be errors in the total calorie consumption. If the user's behavior is measured by a multi-axis sensor and learned by a machine learning algorithm to recognize the kind of behavior, the detailed operation of walking can be autonomously distinguished and the total calorie consumption can be calculated more than the conventional method. In order to verify this, we measured activities and created a model using a machine learning algorithm. As a result of the comparison experiment, it was confirmed that the average accuracy was 12.5% or more higher than that of the conventional method. Also, in the measurement of the momentum, the calorie consumption accuracy is more than 49.53% than that of the conventional method. If the activity recognition is performed using the wearable device and the machine learning algorithm, the accuracy can be improved and the energy consumption calculation accuracy can be improved.

RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester (서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘)

  • Kwon, Moon-Sang;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.299-306
    • /
    • 2002
  • Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

A Case Study of a Navigator Optimization Process

  • Cho, Doosan
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.26-31
    • /
    • 2017
  • When mobile navigator device accesses data randomly, the cache memory performance is rapidly deteriorated due to low memory access locality. For instance, GPS (General Positioning System) of navigator program for automobiles or drones, that are currently in common use, uses data from 32 satellites and computes current position of a receiver. This computation of positioning is the major part of GPS which accounts more than 50% computation in the program. In this computation task, the satellite signals are received in real time and stored in buffer memories. At this task, since necessary data cannot be sequentially stored, the data is read and used at random. This data accessing patterns are generated randomly, thus, memory system performance is worse by low data locality. As a result, it is difficult to process data in real time due to low data localization. Improving the low memory access locality inherited on the algorithms of conventional communication applications requires a certain optimization technique to solve this problem. In this study, we try to do optimizations with data and memory to improve the locality problem. In experiment, we show that our case study can improve processing speed of core computation and improve our overall system performance by 14%.

Two-module robotic pipe inspection system with EMATs

  • Lee, Jin-Hyuk;Han, Sangchul;Ahn, Jaekyu;Kim, Dae-Hyun;Moon, Hyungpil
    • Smart Structures and Systems
    • /
    • v.13 no.6
    • /
    • pp.1041-1063
    • /
    • 2014
  • This work introduces a two-module robotic pipe inspection system with ultrasonic NDE device to evaluate the integrity of pipe structures. The proposed robotic platform has high mobility. The two module mobile robot platform overcomes pipe obstacle structures such as elbow, or T-branch joints by cooperative maneuvers. Also, it can climb up the straight pipeline at a fast speed due to the wheel driven mechanism. For inspection of pipe structure, SH-waves generated by EMAT are applied with additional signal processing methods. A wavelet transform is implemented to extract a meaningful and specific signal from the superposed SH-wave signals. Intensity ratio which is normalized the defect signals intensity by the maximum intensity of directly transmitted signals in the wavelet transforms spectrum is applied to evaluate defects quantitatively. It is experimentally verified that the robotic ultrasonic inspection system with EMAT is capable of non-destructive inspection and evaluation of defects in pipe structure successfully by applying signal processing method based on wavelet transform.

Development of Gas Sensor Monitoring Services using Smart Phone and Web Server (스마트폰과 웹 서버를 활용한 가스 센서 모니터링 서비스 개발)

  • Roh, Jae-Sung;Lee, Sang-Geun;Hwang, In-Gyu;Lee, Jeong-Moo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1048-1050
    • /
    • 2013
  • Mobile devices or smartphones are rapidly becoming the central computer and communication network device. Recently, smartphones are programmable and come with a growing set of cheap powerful embedded sensors, such as an accelerometer, digital compass, gyroscope, GPS, microphone, and camera. In this paper, we discuss the wireless gas sensing service architectural and develope the gas sensor monitoring services using smartphone and web server.

  • PDF

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

The Relationship Between Brand Anthropomorphism, Brand Love, and Brand Advocacy. Moderate Role of Self-brand Connection in Brand Distribution

  • Ngoc Dan Thanh, NGUYEN;Thuy Anh, TRINH
    • Journal of Distribution Science
    • /
    • v.21 no.3
    • /
    • pp.37-46
    • /
    • 2023
  • Purpose: The article focuses on studying the impact of brand anthropomorphism, and brand love, on brand advocacy, and at the same time the moderate role of brand self-connection in the process of customers' perception of the brand, especially the brand distribution. The survey subjects are customers with millennial consumers in Ho Chi Minh City, who have the behavior of buying brands in the smart mobile device industry many times with a specific brand in terms of brand distribution. Results: The findings show that Brand anthropomorphism and brand love are crucial factors to impact brand advocacy and the role of self-brand connection also is a confirmed positive effect on the relationship between brand anthropomorphism and brand love. Research design, data, and methodology: The article uses quantitative research to test the model and research hypotheses. The way to collect quantitative data is to use questionnaires with 1531 samples in Ho Chi Minh City, Vietnam. Conclusion: The research results can help businesses build a long-term brand strategy and expect to get new rewards and value from customers. They can also add to the theory about the relationship between brands and customers.