• Title/Summary/Keyword: personal computer communication

Search Result 480, Processing Time 0.143 seconds

Simulation Study of Energy-efficient Routing Algorithm in Hierarchical WSN Environments (계층적 구조의 WSN 환경에서 에너지 효율적인 라우팅 알고리즘의 시뮬레이션 연구)

  • Kang, Moon-Kyoung;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1729-1735
    • /
    • 2009
  • The hierarchical routing could cause a lot of energy consumption for transferring data by assigning hierarchical routes although actual nodes could be located in physically near spots. Also, when Node Failure or Association Error occurs, the Hierarchical routing could waste more energy to deliver the control messages. This paper evaluate performance of SHP(Shortest Hop Routing) algorithm that suggests short-cut routing algorithm using NL(Neighbor List) and Redirect_ACK message to improve problem of hierarchical routing algorithm. We do a computer simulation by the size of network, deployment of sensor nodes, sink position and POS. As a result of simulation, SHP has better performance than Zigbee Hierarchical routing and HiLow.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

A Study on Correlation Analysis of Information Subject and Convergence Subject for the Gifted Children in IT (정보영재의 정보과목과 융합과목의 상관관계 분석연구)

  • Jun, Woochun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.984-990
    • /
    • 2015
  • In the knowledge-based society, IT literacy and application of a person become a measure of personal competitiveness. As IT industry is of great important nationally, many countries are trying to make an effort to promote IT industry. In this sense, identification and fostering of the gifted children in IT become an important national task since, in IT industry, usually only a few prodigies have led whole IT industry. Currently gifted education aims for convergent gifted education according to government policy. The purpose of this paper is to investigate correlation of information subject and convergent subject for the gifted children in IT. For this purpose, the gifted children in IT who attended a gifted science education center attached to a university at Seoul Metropolitan Area are selected. Their grades during their the period of attendance are collected and analysed. The statistical results show that there is a meaningful correlation between information subject and convergent subject for the gifted children in IT. It means that the higher scores information subject is, the higher scores convergent subject is. The results can be used to make or change gifted curriculum and education contents for gifted IT education.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Design and Implementation of Workspace Safety Management System based on RFID using Variable Radio Wave Oscillation (가변적 전파발진을 이용한 RFID기반 작업장 안전관리 시스템 설계 및 구현)

  • Min, So-Yeon;Lee, Kwang-Hyoung;Jang, Seung-Jae;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3660-3669
    • /
    • 2011
  • Demands for systemized management of workers' safety systemically in construction sites have been increased. Industrial accidents at work places are often happened by risk factors of construction sites, and also it brings a lot of loss as the correct direction for workers about locations to work is not delivered properly. In this paper, a safety supervision system for construction sites is designed and implemented to figure out the location of workers accurately and to provide the information about the status of works and workers in real-time by personal device which is based on RFID. The system designed in this paper achieved high performance in its function and efficiency through a performance test, compared with existing analogous systems.

A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System (원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.197-202
    • /
    • 2017
  • The remote healthcare monitoring system enables a doctor to diagnose and monitor patient's health problem from a distance. Previous researches have focused on key establishment method between a patient and a particular doctor to solve personal health information disclosure problem in data transmission process. However, when considering a misdiagnosis of doctor, the result of a diagnosis by a many doctors is more reliable. In previous work, in order to select multiple doctors, patient should generate shared key for each chosen doctor and perform many times encryptions. Therefore, in this paper, we propose a secure data transmission protocol for receiving diagnosis from multiple doctors using identity-based proxy re-encryption scheme. In proposed protocol, a patient don't need key management work for session key. Also, monitoring server performs re-encryption process on behalf of patient. So, we can reduce computational burden of patient in previous work.

Performance analysis of Hierarchical Mobile IPv6 depending on the paging size (페이징 영역크기에 따른 계층적 이동 IPv6 의 성능분석)

  • 정계갑;이상욱;김준년
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12A
    • /
    • pp.964-974
    • /
    • 2003
  • With increasing use of a personal mobile computer. the Mobile IPv6 is one of the main protocols that support mobility and complies with IPv6 specification. Similar to the mobile IPv6, the mobile IPv6 also has limitations on fast moving condition. The Hierarchical Mobile IPv6 is a solution that overcomes these limitations. The Hierarchical Mobile IPv6 is a micro mobility protocol that supports fast mobile IP handover and reduces signaling overhead with Mobility Anchor Point(MAP). But until now no paging method is applied to the Hierarchical Mobile IPv6 to reduce unnecessary signaling overhead and power consumption of mobile nodes. So, the paging mechanism for the Hierarchical Mobile IPv6 is proposed in this paper. the mechanism is implemented by making use of the destination option header and extension function and the last location algorithm. The results show that the Hierarchical Mobile IPv6 with the paging ability reduces the traffic of mobile networks by removing unnecessary binding update packet generated whenever handover takes place. Also, the larger the paging size is. the less the number of BU(Binding Update) massage generated.

Influence of The Multimedia Function on Continue Using Intention of Smartphone (스마트폰의 멀티미디어 기능이 지속적 사용의도에 미치는 영향)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.201-203
    • /
    • 2015
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. Such extensibility, it is possible to use different applications through the Apps store. In addition, it is also possible various services which are location based service. In this research, we aim to analyze factors influencing of the multimedia function on continue using intention of Smartphone In addition, we aim to analyze the causal relationship from perceived value to continue using intention. This study suggests practical and theoretical implications based on the results.

  • PDF

Fostering Pre-service STEM Teachers' Technological Pedagogical Content Knowledge: A Lesson Learned from Case-based Learning Approach

  • Srisawasdi, Niwat
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.8
    • /
    • pp.1356-1366
    • /
    • 2012
  • As the recent demand for human resources in science, technology, engineering, and mathematics (STEM), the development of professional STEM teacher is called worldwide. It is becoming a critical need in teacher education in order to educate student teachers, and prepare pre-service and beginning teachers for high quality of teaching competency. To promote the competency for $21^{st}$ century STEM teachers, the epistemology of technological pedagogical content knowledge (TPACK) is currently considered as the essential qualities of knowledge for highly qualified teachers. The aim of this study is explore the effect of case-based learning approach on TPACK competency of pre-service STEM teachers. In order to develop the pre-service teachers' competency regarding effective integration of technologies into teaching specific content areas, a series of innovative case study teaching in science and mathematics was presented to 43 participants of pre-service physics, chemistry, biology, mathematics, and computer teachers during a course of information and communication technology (ICT) in Education at Khon Kaen University, Thailand. After finishing a case presentation, the pre-service teachers were encouraged into a forum of critical open discussion by considering the potential impact of the case and the TPACK framework. They were investigated instructional design competency of using ICT tools into student learning process and their personal beliefs about ICT in educational process both before and after. The participant's reactions and learning was evaluated by using a self-reported questionnaire and an implementation log of content-specific learning process design, respectively. Results showed a change of their beliefs and the transformation of their TPACK competency in STEM teaching. In an effort to better serve the needs of high quality STEM teachers, the results of this study illustrated that the competency of TPACK could be particularly considered as a core attributes for future STEM teachers. By the way, case-based learning approach can play an effective part in preparing and professing the TPACK competency for STEM teachers.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.