• Title/Summary/Keyword: mobile technologies

Search Result 1,373, Processing Time 0.026 seconds

Emerging Technology Mining Framework Design in Mobile Telecommunication Industry (이동통신 산업 유망기술 발굴 방법론 설계)

  • Sim, Hyeon-Dong;Lee, Yeong-Ho;Kim, Yeong-Uk
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.157-161
    • /
    • 2008
  • In this paper, we propose a new framework for identifying emerging technologies to in mobile telecommunication industry. We designed a new framework using qualitative and quantitative methodologies. Finally, we deduced emerging technologies using our framework for mobile network operator.

  • PDF

Low Power Consumption Technology for Mobile Display

  • Lee, Joo-Hyung
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.402-403
    • /
    • 2009
  • A variety of power reduction technologies is introduced and the benefits of the technologies are discussed. PenTile$^{(R)}$ DBLC (Dynamic Brightness LED Control) combined with SABC (Sensor-Based Adaptive Brightness Control) enables to achieve the average LED power consumption to one third. The panel power reduction of 25% can be achieved with low power driving technology, ALS (Active Level Shifter). MIP (Memory In Pixel) is expected to be useful in transflective display because the whole display area can be utilized in reflective mode with power consumption of 1mW.

  • PDF

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.

Mobile IP for Explicit Multicast over All-IP mobile networks (All-IP기반 이동통신망에서의 명시적 멀티캐스트를 지원하는 Mobile IP 기술)

  • Park, Chul;Kim, Won-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.508-510
    • /
    • 2002
  • 본 논문은 기존 멀티캐스트 라우팅 프로토콜이 이동성이 없고 수신자 불명의 방송형 응용에 초점을 맞추어 설계되어 있는 점에 비추어, 이동중이며 구체적인 멤버들의 존재를 알고있는 경우에 적합한 명시적 멀티캐스트 전송기술을 Mobile IP의 확장으로 설계하고 개발한다. Mobile IP에 명시적 멀티캐스트 전송 기법을 적용하기 위해서는 이동 에이젼트의 각 모듈들이 명시적 멀티캐스트를 지원할 수 있도록 수정ㆍ보완되어야 한다. 기존 Mobile IP에 멀티캐스트를 적용하게 되면 극단적인 경우 중복된 패킷의 전송 및 수신으로 통신망에 큰 부하가 걸리게 되는데, 이를 해결하기 위한 방안으로 명시적 멀티캐스트 전송기술도 제안한다.

  • PDF

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

Networking Technologies for IPTV2.0 Service (IPTV2.0 서비스를 위한 네트워킹 기술)

  • Lee, Kyounghee;Yoon, Changwoo;Ryu, Won;Kim, Bongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.218-228
    • /
    • 2008
  • The convergence of broadcasting and telecommunication services is being accelerated by broadband networks, digital broadcasting and Web2.0. This paper describes the definition and service characteristics of IPTV as a representative of broadcasting and telecommunication convergence services. Especially, the changes of infrastructure and technology for IPTV2.0 are addressed in terms of the service features of mobility, intelligence and participation. IPTV2.0 shall be characterized by the open IPTV service based on Web2.0 and the mobile IPTV service over the heterogeneous networks employing various wireless/wired access technologies. The IP Multimedia Subsystem (IMS) and Service Delivery Platform (SDP) technologies are increasingly considered to support the personalization and openness. The mobility management technology is being evolved to provide QoS-guaranteed mobile communication services to users at anytime and anywhere. IPTV2.0 services and platforms are also anticipated to be core components to achieve knowledge-based ubiquitous society. IPTV2.0 contents are required to be integrated with the enhanced metadata to efficiently support search, selection, convergence and delivery of the contents. Moreover, those contents shall be enhanced to provide the scalable services which is adaptable to the network status and user preferences. Therefore, the networking technologies for IPTV2.0 should tightly cooperate with application services and adaptive contents. Those technologies will be developed to construct the ubiquitous content service platform considering the evolution of networks and various converged services.

  • PDF

Measuring Service Quality of Mobile Trading Systems and its Impact on the Intention to Continuous Use (모바일 증권거래 시스템에 대한 사용자의 지속적 이용의도와 서비스 품질 측정요소)

  • Choi, Jaewon;Jang, Jung Hee;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.301-319
    • /
    • 2013
  • Wireless and mobile communication technologies enable individuals who trade stocks and bonds to use mobile-based trading services. Due to rapidly developing mobile technologies and adoption of the advanced/smart mobile devices such as smart phones and tablets, the use of mobile trading systems (MTS) have increased at an unexpected rate. Although many prior studies measured service quality on various service-related fields, there are few studies that is related to mobile trading systems compared to more traditional PC-based home trading systems. This research searches determinants of service quality for mobile trading systems and examines the effects of these factors on the intention to mobile trading systems' continuous use. Through an extensive literature review, this research finds three dimensions for mobile trading systems : interaction quality, service environment quality, and service outcome quality. The result of analysis shows that personalization, connectivity, ease of use, informativeness, and monetary value enhance the intention to continuous use. Considering environmental conditions such as the high rate of MTS adoption among individual users and stiffer competition among securities firms, these findings may help practically securities firms' shaping MTS system development strategies for individual users' continuous use and for increasing new users adoption.

A Fast Authentication Algorithm For Smooth Handoff (Smoothe Handoff 지원을 위한 빠른 인증 알고리즘)

  • Kim, In-Su;Kim, Gi-Cheon;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.17-20
    • /
    • 2002
  • IMT-2000 technologies are divided 3G packet data system that using mobile IP and GPRS that based on the GSM networks. These technologies Push introduce mobile IP to support seamless roaming. In mobile If environments, use AAA server such as RADIUS or DIAMETER to provide authentication service for dial-up computers. This factor is important for mobile nodes. Mobile If require strong authentication between mobile nodes and home agents. We propose application of AAA protocols for smooth handoff mechanism in IMT-2000 environments.

The Influence of Individual's Health Beliefs on the Intention to Use Mobile Healthcare Apps: Focusing on the Moderating Role of mHealth Literacy (개인의 건강신념이 모바일 헬스케어 앱 이용의도에 미치는 영향: m헬스 리터러시의 조절효과를 중심으로)

  • Jin-Seob Wang;Jaemin Song;Sung-Byung Yang;Sang-Hyeak Yoon
    • Journal of Information Technology Services
    • /
    • v.22 no.1
    • /
    • pp.95-114
    • /
    • 2023
  • Smart healthcare, combining ICT (Information and Communications Technologies) and medical technologies, has been rapidly emerging. Accordingly, its market has also increased as interest in disease prevention, management, and diagnosis grows due to the COVID-19 pandemic. In particular, using mobile devices to support medical activities, mobile healthcare has been attracting attention as a leading service in the smart healthcare market. However, the intention to use mobile healthcare apps may vary depending on individual beliefs and attitudes. Many studies on the intention to use mobile healthcare apps have used the TAM (Technology Acceptance Model), but there is a lack of studies that have been verified from the perspective of users' health beliefs. This study aims to identify the factors that affect the intention to use mobile healthcare apps based on the HBM (Health Belief Model). Furthermore, it investigates how this influencing mechanism fluctuates based on the user's mHealth literacy, the ability to find and understand health information through mobile. This study contributes to the empirical examination of the intention to use mobile healthcare apps through the HBM. It also offers insights for app providers and public health officials to increase the use of mobile healthcare apps.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.