• Title/Summary/Keyword: personal computer communication

Search Result 480, Processing Time 0.037 seconds

A Study on Optmize Access Method in Personal Communication using to WTDL (WTDL을 이용한 개인통신망의 최적 접속방법에 관한 연구)

  • 이관형;송우형
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.3
    • /
    • pp.121-127
    • /
    • 1998
  • In this paper, using diversity and convolution code in the DS/CDMA system, have been the performance analized. In this modulation shceme is using QPSK. Channel to CDMA system has been approximated by Rayleight fading channel considering effect for multi-path. In this assumed that receiver is WTDL(Wide-band Tappped Delay Line) receiver, and in this condition, average error probability of DS/CDMA.

  • PDF

Location Management Strategy Based on Working Set for Personal Communications Network (PCN 환경을 위한 Working Set 기반의 위치 관리 기법)

  • Im, Seong-Bin;Eom, Yeong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1279-1289
    • /
    • 2000
  • Recently, research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environment that designed to support mobile hosts in the existing network environments. For PCN environments, the location management strategies are particularly emphasized among various strategies necessary for the mobile computing environment. Location management strategy for PCN environment, which is mostly based on the IS-41 standards brings an issue that additional network traffics are generated to deliver updata messages to home location server whenever a mobile host changes its location server. In this paper, we propose an innovative updata strategy and a search strategy that resolves the problem shown in the IS-41 scheme for HLR/VLR structure of CDMA environments. Also, this paper presents the performance comparison of proposed scheme and scheme used in IS-41 obtained from a simulation. The simulation was conducted based on the number of messages, the rate of database accesses, and the number of hops visited when the location management scheme is executed.

  • PDF

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Model Of Formation Of Digital Competence On The Basis Of Pedagogical Proceedings At The Present Stage Of Development Of Digitalization Of Society

  • Lytvyn, Valentyna;Khlystun, Olena;Prykhodkina, Nataliia;Poluboiaryna, Iryna;Bevz, Maryna;Kopeliuk, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.219-223
    • /
    • 2021
  • The article discusses the pedagogical support for the formation of ICT competence assumes the individualization of students' training, due to their personal and professional needs and interests, and the provision of the necessary conditions and means to implement this process. A theoretical analysis is carried out and an analysis of experimental work on the implementation of the developed model for the formation of ICT competence is generalized specialists on the basis of pedagogical support.

Design of a Data Grid Model between TOS and HL7 FHIR Service for the Retrieval of Personalized Health Resources (개인화된 건강 자원 조회를 위한 TOS 와 HL7 FHIR 서비스간의 데이터그리드 모델 설계)

  • Jeon, Young-Jun;Im, Seok-Jin;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.139-145
    • /
    • 2016
  • On the ICT healing platform designed to issue early disease alerts, TOS connected between the provider of personal health-related data and the service provider and relayed personalized health data. In the previous study, TOS proposed how to monitor the retrieval and management of document/measurement resources by taking mobile devices into account. Recently the healthcare field, however, defined the standard items needed for communication and data exchanges with a mobile device through HL7 FHIR. This study designed a data grid model between TOS and FHIR to provide personal health resources relayed through TOS in FHIR bundle search sets. The proposed design was organized as follows: first, it stated similarities between the method of TOS resource request and that of FHIR observation request. Then, it designed an eventbus module to process a retrieval request for FHIR service based on the imdb and cluster technologies. The proposed design can be used to expand the old service terminals of ICT healing platform to mobile health devices capable of using FHIR resources.

Computerized Order Communication System for Out-patients' Clinic Using Personal Computer and Local Area Network(II) (PC 및 LAN을 이용한 외래처방 전달 시스템(II))

  • Huh, Jae-Man;Kim, Ji-Hae;Kim, Nam-Hyun;Kim, Won-Ki;Kim, Do-Nyun;Chang, Byung-Chul;Cho, Bum-Koo
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.11
    • /
    • pp.97-99
    • /
    • 1992
  • After development of order communication system for out-patients using PC and LAN in May 1992, this system had been tested for 2 months. The system also use Host computer(IBM 9221-170) as a data bank and communicats wi th emulation card(3270 emulator. Interlink Inc., Korea). Since September 1992, this system(named YOUSEI-PC) has been running successfully in the Yonsei Cardiovascular Center of the Severance Hospital, Yonsei University College of Medicine. After introducing this system, it enables patients to receive drugs wi thin 30 minutes after prescription and revealed effective system not to reduce waiting time for the patients but also to remove charge-troubling(due to mis-entry of prescription). This system also seems to be effective in terms of office automatism for hospital management. However users, usually physitions, required more friendly and easy system to operate and we thought that the most important one to successfully introduce order communication computer system in the hospital is user interface.

  • PDF

Design of a Lightweight Security Protocol Using Post Quantum Cryptography (양자내성암호를 활용한 경량 보안 프로토콜 설계)

  • Jang, Kyung Bae;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.165-170
    • /
    • 2020
  • As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.

Implementation of Untouched Interactive Digital Signage Control using Kinect (키넥트를 사용한 터치 없는 디지털 사이니지 제어기의 구현)

  • Kim, Jiyoung;Lee, Youngkyung;Baek, Wookjin;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • In this paper, we propose a digital signage method that can control the contents of the screen and download the desired files to individual smart terminal with no touch of digital signage screen by using Kinect. The main features and contributions of the proposed method are as follows. First, can solve the problems such as the risk of bacterial infection, not cleanliness on the screen as well as maximize advertising effectiveness. Second, can support bi-directional communications with computer while we touch only wanted advertisements. The performance evaluation shows the effectiveness of the proposed method. Especially, we can see that the proposed system operates through the recognition of user's actions when the cursor is within the scope of a certain coordinate and the file transfer time to download information is different depending on the PC performance and the version of personal smart device.

SorMob: Computation Offloading Framework based on AOP (SorMob: AOP 기반의 연산 오프로딩 프레임워크)

  • Cho, Yeongpil;Cho, Doosan;Paek, Yunheung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.203-208
    • /
    • 2013
  • As smartphones are rapidly and widely spread, their applications request gradually larger computation power. Recently, in the personal computer, computing power of hardware has exceeded performance requirement of software sometimes. Computing power of smartphone, however, will not grow at the same pace as demand of applications because of form factor to seek thinner devices and power limitation by relatively slow technical progress of battery. Computation offloading is getting huge attention as one of solution for the problem. It has not commonly used technology in spite of advantages for performance and power consumption since the existing offloading frameworks are difficult for application developer to utilize. This paper presents an application developer-friendly offloading framework, named SorMob. Based on Aspect Oriented Programming model, SorMob provides a convenient environment for application development, and its performance was verified by comparing with the existing offloading framework.

A Study on Land Warrior System Design Based on IEEE 802.15.4 (IEEE 802.15.4 기반의 미래병사체계 시스템 설계에 관한 연구)

  • Heo, Jun;Lee, Sang-Jin;Choi, Yong-Hoon;Choi, Hyo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.71-80
    • /
    • 2012
  • In this paper, applications that require low-speed data rate on personal area network to operate the Land Warrior system is proposed. These applications can refer to WSN(wireless sensor network) technology. However, this technology is not suitable to support various data transmission rate. A suitable CSMA/CA algorithm for Land Warrior System in order to solve these existing system problems is proposed. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of Land Warrior system model and CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.