• Title/Summary/Keyword: personal computer communication

Search Result 482, Processing Time 0.047 seconds

A Development of Distance Measurement Scheme for Localization System in Wireless Personal Area Network

  • Lee, Dong-Myung
    • Journal of Engineering Education Research
    • /
    • v.13 no.2
    • /
    • pp.7-11
    • /
    • 2010
  • As the development of the computer and communication technologies, the ubiquitous society can be realized to the world early in the future. Thus, the localization system in Wireless Personal Area Network (WPAN) is required for many users of ubiquitous society to provide the ubiquitous computing based applications in respective of anytime and anywhere. In this paper, we propose the distance measurement scheme that is based on the distance measurement using RSSI (Received Signal Strength Indicator) of sensor module considering of two distance conditions for the localization system using Zigbee in WPAN. Also, the localization errors of the proposed scheme are analyzed in the three scenarios that the mobile module tracks in the in $6m{\times}6m$ scaled experimentation area. In addition to this, the monitoring subsystem is developed using GUI (Graphical User Interface) in order to monitor the location of the moving objects accurately and user-friendly.

  • PDF

An Effective Pre-refresh Mechanism for Mobile Handhold Device′s Embedded Web Browser

  • Li, Hua-Qiang;Kim, Young-Hak
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.151-153
    • /
    • 2002
  • Mobile handhold devices such as PDA(Personal Digital Assistant) and Cellular Phone are more and more popular for personal web surfing. But today, most mobile handheld devices have relatively poor web browsing capability because of the small bandwidth of wireless connection, the small speed of CPU, the small capacity of RAM and Flash ROM, the small display size of LCD and the short lifecycle of battery. Users have to endure bigger communication latency than Desk PC's one because of these factors. In this paper, we propose an effective pre-refresh mechanism for handheld device's embedded web browser so as to make user's web surfing faster. The experiment was done using the simulator designed by ourselves and the experiment result demonstrates the proposed mechanism has a good performance to make web surfing faster.

  • PDF

Management Mechanism for the Protection of Information in Smart Phone

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.43-50
    • /
    • 2015
  • In order to protect important information of smart phone from these security threats, this paper has studied a mechanism for protecting information from the leakage of various information and personal information stored in the smart phone. This paper has configured the basic protection scope for the information protection and applied real time encodement when new contents were created. Also, this paper has applied a security function so that the content of the protected scope can be managed and erased remotely in preparation for loss and burglary.

Analysis of Variable Guard Channel Allocation For Image/Voice/Data Calls in Multimedia Personal Communication Services (멀티미디어 PCS에서 Image/Voice/Data 호에 대한 가변적 보호채널 할당의 분석)

  • Na, Won-Shik;Lee, Yong-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.692-697
    • /
    • 2000
  • 멀티미디어 개인 휴대 통신(MPCS)에서 다중 클래스호에 대한 효율적인 채널할당은 매우 중요하다고 할 수 있다. 본 논문에서는 Image/Voice/Data 호에 대하여 가변적 보호 채널을 할당하는 새로운 방식을 제안하였다. 이러한 방식은 3차원 상태 천이도로 모델링 되며 보호 채널의 크기를 가변적으로 조절함으로써 보다 융통성있는 서비스를 제공하게 되며, 또한 수학적 분석과 시뮬레이션을 통해 비교분석을 수행하였다.

  • PDF

Design and Implementation Smart Office System Based on Remote Desktop Protocol (RDP) (원격 데스크톱 프로토콜(RDP) 기반의 스마트 오피스 시스템 설계 및 구현)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.153-159
    • /
    • 2014
  • For smart work (smart office), RDP(Remote Desktop Protocol) connection is the most popular method. When the office workers do not have personal space, smart office is very useful. That is, they can connect personal computer using Internet at cafe or public spaces. Using the smart office, it is possible to make personal business environment to increase business efficiency. In this paper, we designed and implemented smart office using RDP (Remote Desktop Protocol). We expected that the office workers can be used smart office for business efficiency.

Small Internal Antenna Using Multiband, Wideband, and High-Isolation MIMO Techniques

  • Kim, Sang-Hyeong;Jin, Zhe-Jun;Chae, Yoon-Byung;Yun, Tae-Yeoul
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • In this paper, a small internal antenna for a mobile handset is presented using multiband, wideband, and high-isolation multiple-input multiple-output techniques. The proposed antenna consists of three planar inverted-F antennas (PIFAs) that operate in the global system for mobile communication (GSM900), the digital communication system (DCS), the personal communication system (PCS), the universal mobile telecommunication system (UMTS), and wireless local area network (WLAN) bands with a physical size of $40mm{\times}10mm{\times}10mm$. A resonator attached to the folded PIFA creates dual resonances, achieving a wide bandwidth of approximately 460 MHz, covering the DCS, PCS, and UMTS bands; a meander shorting line is used to improve impedance matching. Additionally, a modified neutralization link is embedded between diversity antennas to enhance isolation, which results in a 6-dB improvement in the isolation and less than 0.1 in the envelope correlation coefficient evaluated from the far-field radiation patterns. Simulation and measurements demonstrate very similar results for S-parameters and radiation patterns. Peak gains show 3.73 dBi, 3.77 dBi, 3.28 dBi, 2.15 dBi, and 5.86 dBi, and antenna efficiencies show 56.15%, 72.15%, 68.59%, 52.92%, and 82.93% for GSM900, DCS, PCS, UMTS, and WLAN bands, respectively.

Improvement Method of Education for Personal Information Protection through Survey on Perception in College Students (대학생 개인정보보호 인식조사를 통한 교육 개선방안 연구)

  • Kim, Ju-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.349-355
    • /
    • 2019
  • In the trend of continuously increasing collection and use of personal information, there are legal grounds for protecting personal information and various policies and systems are implemented, but there is insufficient analysis about education and its effect of personal information protection. In this study, we surveyed and analyzed the degree of awareness and actual perception level in the protection of personal information of college students, and investigated the satisfaction of personal information protection education. The results of the analysis showed that students' interest in privacy protection and concern about personal information exposure was very high, but the efforts to protect personal information and the perception level of rights and systems for protecting personal information was very low. In addition, the experience and satisfaction of education for personal information protection were found to be very low. Students felt that the necessity of education for personal information protection was strongly agreed and preferred regular and continuous education rather than one-time education.

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment

  • Lee, Donghyeok;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users' life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

A desing of personal communication system based on wideband CDMA (광대역 CDMA 방식을 이용한 개인휴대통신 시스템 설계)

  • 최안나;홍인기;안병철;김동호;박용완
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1283-1293
    • /
    • 1996
  • This paper descries design concepts, structure and charracteristics of personal communications system based on wideband CDMA under developing for general low-tier mobile telecommunications services as the first step of the next generation mobile telecommunications systems that provide timely exchange of various types of information with anyone, from anywhere, at anytime. Also, wedesign a reverse linktransmitter/receiver structure for personal communications system based on wideband CDMA and validata the performance of the designed structure and establish the each parameter via computer simulation. Simulaation results on the effects of reverse link synchronous transmission and the effects of power control and control and channel coding in pedestrian environment for low-tier services are presented.

  • PDF

Design of P2P Secure Protocol Using Kerberos (Kerberos를 이용한 P2P 보안 프로토콜 설계)

  • 이규형;송영상;우찬일;신인철
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.51-54
    • /
    • 2002
  • P2P implies direct exchange between peers. If you have something I want, 1 go directly to you and obtain il. There is one of the most advantages of formation of community in P2P. For a specified purpose through P2P, the Peers who make temporary a group delivery a request efficient and safe. And the resources can be jointed common, cooperation and communication. When P2P is developed more, we can expect more formation of online community and development. But to be a safe of personal ID and password in internet, it should be possible to make a key-exchange. In the paper, it suggest P2P security system suitable to personal security that Kerberos be transformed. The user who make community in P2P, have Kerberos Server, and using Physical Address of Ethernet card in personal computer, authenticate users.

  • PDF