• Title/Summary/Keyword: mobile application development

Search Result 924, Processing Time 0.033 seconds

Bluetooth Audio Gateway and Headset including Connection Function to the Mobile Phone (휴대폰 접속 기능을 포함한 블루투스 오디오 게이트웨이 및 헤드셋)

  • Chung, J.S.;Chung, T.Y.;Jung, K.W.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.539-544
    • /
    • 2004
  • This paper presents the implementation of the bluetooth headset and the audio gateway connected to the mobile Phone in the embedded environment. The bluetooth module includes the BC02 processor chip, the BCSP02 firmware and the bluelab software Including bluetooth protocol stack. The above components in the bluetooth module developed at CSR company are used as the development environment. The application program using API functions supported by bluelab is coded by C language and loaded on the flash ROM of the bluetooth module. The cail processing capacity measuring the call setup time and the clearing time between the audio gateway and the headset is considered as the performance parameter of the developed systems. As a call setup and clearing time between the audio gateway and the headset is about 88.8ms, the call processing capacity is about 11 calls per second. Therefore the performance result is satisfied in the aspect of the call processing time.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.

Development of an Interface for Data Visualization and Controlling of Classified Objects based on User Conditions (사용 상황에 맞게 분류된 사물의 데이터 시각화와 제어를 위한 인터페이스 개발)

  • Park, Heesung;Han, Minseok;Choi, Yuri
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.320-325
    • /
    • 2016
  • By developing the IoT(Internet of Things) technology, devices for smart home environment have rapidly increased. With respect to mobiles, these applications are used to control and manage the various smart devices effectively. However, the existing mechanisms only provide simple information, and hence a difficulty to search or control the smart devices persists, since there is no meaningful relationship between them. In this research, we suggest an interface which visualizes the device's data and controls them effectively, based on the user's device using pattern. As a solution for this problem, we classify the user pattern based on a timeline for the associated circumstance, and visualize the device's data to make a group or to control individually in an easier approach. Also, all meaningful information could be confirmed by summarizing all the data of smart devices.

Development of Standard Protocol-based Healthcare Services for Optimized Health Management (최적화된 건강관리를 위한 표준 프로토콜 기반 헬스케어 서비스 개발)

  • Park, Hyun-Sang;Kim, Hyun-Young;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.7
    • /
    • pp.969-975
    • /
    • 2018
  • The purpose of this study is to develop a healthcare service based on standard protocol and information communication technology for mother's sustainable postpartum care. The developed service was consisted of a client area where mothers measure, manage and transmit their vital signs using their own smartphone and personal health devices, and a server area that manages and shares with the received mother's vital signs and the results of examination results and personal health records. The client area collects vital signs through the IEEE 11073 Personal Health Device (PHD) using the m-health application of the previous study and Continua Health alliance certified personal health devices and transfers to Health Level Seven (HL7) V2.4, Continuity of Care Record (CCR) and Continuity of Care Document (CCD). The server area consists of a mobile web that manages and shares the HL7 Fast Healthcare Interoperability Resources (FHIR)-compliant personal health records to ensure interoperability of examination results, and a mobile web where the postpartum caregiver enters and manages the results of the mother's examination results and provides it to the mother. In this way, the healthcare service of this study securing continued exchanges between the mother and postpartum caregiver improves the quality of life of the mother not only to satisfy the needs of the mother who was discharged but also through self-management and postpartum. In the future, we will conduct a study applying mothers and postpartum caregiver after approval of a clinical trail at a university hospital to evaluate developed healthcare services.

Analysis of the Impact of Motion Recognition Sensor on Mobile Game by Compare Valuation Experiment (비교평가 실험으로 동작인식센서가 모바일게임에 미치는 영향분석)

  • Lee, Dae-Young;Sung, Jung-Hawn
    • Journal of Korea Game Society
    • /
    • v.9 no.5
    • /
    • pp.63-72
    • /
    • 2009
  • I-phone presented a new mobile control type by the introducing motion recognition sensor and that influenced on game application development so that led a lot of games using kinds of sensors. In this paper, we divided the game enjoyment into 5 factors for the embodiment of the sensor's influence direction on the enjoyment. We experimented two game, which have same content, different devices in using motion recognition sensor or not for clarifying the distinction between devices. As a experiment source game, we used Cooking Mama, as a experimental device, we used I-pod touch and NDS. This experiment shows a motion recognition sensor control's enjoyment is far superior to touch sensor. This sensor got high marks on every fun factors, stimulus, absorption, empathy, accomplishment and variation. Especially, stimulus and empathy showed great differences. In this case, we found the fact that extended communication between the gamer and the device can be fun.

  • PDF

Extraction of 3D Objects Around Roads Using MMS LiDAR Data (MMS LiDAR 자료를 이용한 도로 주변 3차원 객체 추출)

  • CHOUNG, Yun-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.1
    • /
    • pp.152-161
    • /
    • 2017
  • Making precise 3D maps using Mobile Mapping System (MMS) sensors are essential for the development of self-driving cars. This paper conducts research on the extraction of 3D objects around the roads using the point cloud acquired by the MMS Light Detection and Ranging (LiDAR) sensor through the following steps. First, the digital surface model (DSM) is generated using MMS LiDAR data, and then the slope map is generated from the DSM. Next, the 3D objects around the roads are identified using the slope information. Finally, 97% of the 3D objects around the roads are extracted using the morphological filtering technique. This research contributes a plan for the application of automated driving technology by extracting the 3D objects around the roads using spatial information data acquired by the MMS sensor.

60GHz Band RoF Transport Distribution System for CATV Application (CATV 용 60GHz 대 RoF 분배시스템)

  • Park Jong-Dae;Chang Sun-Hyok;Chung Hwan-Seok;Chu Moo-Jung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.158-164
    • /
    • 2006
  • Mobile operators will face many challenges both economically and technically, as WLAN evolve through a bewildering number of different standards during the coming years. Potentially this will require several upgrades to the mobile infrastructure. A new approach for addressing these challenges is evaluated in this paper. It is based on a radio over fiber (RoF) technology that uses electro-absorption modulator (EAM) and optical single sideband (OSSB) modulation technique and it promises to provide solutions that will be transparent to changes in protocols and frequency of operation as well as reducing radio access infrastructure costs. This paper describes the development of prototype RoF system based on the 60GHz band CATV transport distribution system with EAM and the possibility of radio over fiber technology for use in the broadband convergence network (BcN) wireless access infrastructure.

Development of a Wearable Vibrotactile Display Device (착용 가능한 진동촉감 제시 장치 개발)

  • Seo, Chang-Hoon;Kim, Hyun-Ho;Lee, Jun-Hun;Lee, Beom-Chan;Ryu, Je-Ha
    • Journal of the HCI Society of Korea
    • /
    • v.1 no.1
    • /
    • pp.29-36
    • /
    • 2006
  • Tactile displays can provide useful information without disturbing others and are particularly useful for people with visual or auditory impairments. They can also complement other displays. In this paper, we present a new vibrotactile display device for wearable, mobile, and ubiquitous computing environments. The proposed vibrotactile device has a $5{\times}5$ array configuration for displaying complex information such as letters, numbers, and haptic patterns as well as simple directional ques and situation awareness alarms. Commercially available coin-type vibration motors are embedded vertically in flexible mounting pads in order to best localize vibrations on the skin. An embedded microprocessor controls the motors sequentially with an advanced tracing mode to increase recognition rate. User studies with the vibrotactile device on the top of the foot show 86.7% recognition rate for alphabet characters after some training. In addition, applying vibrotactile device to driving situation shows 83.9% recognition rate. We also propose some potentially useful application scenarios including Caller Identification for mobile phones and Navigation Aids for GPS systems while driving.

  • PDF

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

A Study of Security Requirement in Wireless Charging (무선충전에서 보안요구사항에 관한 연구)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.23-27
    • /
    • 2014
  • In recent times, there is an increasing interest in wireless charge of smartphones and devices, and many companies are developing wireless charges. The range of application of wireless charge would be expanded to almost all electronics, including not only mobile devices, but also notebook computers and vacuum cleaners. On-line electric vehicles are to be launched in the market this year in a massive scale. As such wireless charge-related markets are inexhaustible. Wireless charge is included in the world's top 10 promising technologies, and its rapid growth is expected to have annual growth by more than 100%. However, there's a need to establish a safe environment, by analyzing security threats to technical limitations and harmfulness to human body, and arrange institutional compliments. The development of communication method for a variety of wireless charging are delivering comfortable and safe information. This paper aims to examine the factors to threaten electric vehicle, which are usually intruded through network system and analyzes security threats to and security requirements for magnetic resonance mode-based wireless charge in mobile devices, and suggests security requirements.