• Title/Summary/Keyword: wireless mobile device

Search Result 447, Processing Time 0.022 seconds

Consumer Associative Network Analysis on Device and Service Convergence

  • Han, Sangman;Lee, Janghyuk;Park, Sun-Young;Jo, Woonghyeon
    • Asia Marketing Journal
    • /
    • v.15 no.3
    • /
    • pp.1-14
    • /
    • 2013
  • Our research brings managerial insights for developing new digital convergence of devices and services. To explain the phenomenon of device and service convergence, we combine two different approaches from separate research fields: a perceptual mapping technique generally used for segmentation in marketing and associative network analysis mobilized to understanding network structure of core and peripheral as well as the information mediating role of nodes in network science. By combining these two approaches, we provide an in-depth analysis of the associations among devices and services by assessing the centrality of device and service nodes in an associative network. This is done by examining the connections between these services and devices as well as investigating the role of mediation in the combined device-service associative network. Our results based on bi-partite network analysis of survey responses from 250 Internet Protocol (IP) television viewers show which device and which service will play the major role in future device and service convergence as well as which characteristics and functionalities have to be incorporated into future convergence. Among the devices, the mobile handset with the betweenness centrality of 0.26 appears to be the device that would lead future device convergence. Among the services, wireless broadband with the betweenness centrality of 0.276 appears to be the service on which future service convergence needs to be developed. This result is quite unexpected, since wireless broadband has a lower penetration rate than other services, such as fixed broadband and cable TV. In addition, we indicate the possibility of converging devices, such as personal digital assistant (PDA) and mobile handset, and services, such as IPTV and mobile Internet, into wireless broadband services in the future.

  • PDF

Real-time Location Tracking System Using Ultrasonic Wireless Sensor Nodes (초음파 무선 센서노드를 이용한 실시간 위치 추적 시스템)

  • Park, Jong-Hyun;Choo, Young-Yeol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.7
    • /
    • pp.711-717
    • /
    • 2007
  • Location information will become increasingly important for future Pervasive Computing applications. Location tracking system of a moving device can be classified into two types of architectures: an active mobile architecture and a passive mobile architecture. In the former, a mobile device actively transmits signals for estimating distances to listeners. In the latter, a mobile device listens signals from beacons passively. Although the passive architecture such as Cricket location system is inexpensive, easy to set up, and safe, it is less precise than the active one. In this paper, we present a passive location system using Cricket Mote sensors which use RF and ultrasonic signals to estimate distances. In order to improve accuracy of the passive system, the transmission speed of ultrasound was compensated according to air temperature at the moment. Upper and lower bounds of a distance estimation were set up through measuring minimum and maximum distances that ultrasonic signal can reach to. Distance estimations beyond the upper and the lower bounds were filtered off as errors in our scheme. With collecting distance estimation data at various locations and comparing each distance estimation with real distance respectively, we proposed an equation to compensate the deviation at each point. Equations for proposed algorithm were derived to calculate relative coordinates of a moving device. At indoor and outdoor tests, average location error and average location tracking period were 3.5 cm and 0.5 second, respectively, which outperformed Cricket location system of MIT.

A Study on the Efficient Energy Management using Mobility Management in Distributed Wireless Network Environments (분산 무선 네트워크 환경에서의 이동성 관리를 통한 효율적인 에너지 사용에 관한 연구)

  • Kim, Tae-Kyung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.57-63
    • /
    • 2007
  • Providing the sufficient energy to the mobile device is essential to process the job in distributed wireless network. To solve the restrained conditions of energy problems of mobile devices, this paper suggests the efficient method of processing the distributed job using mobility management in wireless network. Energy consumption can be analyzed using the statistical model and required energy of processing the distributed job in mobile device can be predicted using the mobility management. Therefore, this paper suggests the reliable algorithm to process distributed job through the mobile devices with regular mobility and shows the efficiency of the suggested algorithm.

  • PDF

Development of a Telemetering Device Using RF Transceivers and a Mobile-Phone (RF 트랜시버와 무선전화기를 이용한 텔레미터링 장치 개발)

  • Jung, Tae-Hong;Kang, Moon-Ho;Lee, Jeong-Kn
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2173-2175
    • /
    • 2004
  • This paper addresses a telemetering device which uses RF transceivers and a mobile-phone. Locally collected data arc encoded with a BCH error correcting code and transferred to a receiver through a RF module. The receiver-side RF module decodes the transferred data and then repetes them to a mobile-phone. Lastly, the mobile-phone hands over the data through a wireless phone network to a host computer in the internet.

  • PDF

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.

Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool (무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법)

  • Jeon Hyun-Cheol;Ryu Jae-Hyun;Park Sang-Jin;Park Joo-Yeoul;Kim Jung-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Development a Mobile Transportation Payment System of Used Smartcard (스마트카드를 이용한 모바일 교통결재 시스템 개발)

  • Lee, Sang-Bum;Jung, Hyun-Ho;Choi, Lee-Kwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.171-179
    • /
    • 2011
  • In these days, various wireless internet services are possible since the advanced wireless networks enable to transfer more data than before and smarter devices have developed to display the multimedia information more efficiently. Therefore, Korean MIPS such as SKT and LGT provide many kinds of advanced services such as wireless on-line shopping, mobile banking system and etc using 2.5 generation wireless network technology and smartcards. In a transportation system, a cellular phone can be used as a useful payment tool since most people always keep it and a mobile payment system has developed as infrastructure for wireless on-line services. In this paper, a mobile transportation payment system is introduced. A driver needs to pay a toll fee when he/she uses the highways. Recently, a high pass system has introduced, in which a vehicle can pass a toll gate without stopping to pay the fee to a counter. The payment is done automatically by an attached payment device. We have developed an advanced mobile system in which a smartcard embedded cellular phone is used as a payment device. The personnel and financial information is stored at a smartcard and the communication between the phone and OBU(On Board Unit) is done by Bluetooth.

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

An Analysis of Consumer Preferences among Wireless LAN and Mobile Internet Services

  • Ahn, Ji-Woon;Lee, Jong-Su;Lee, Jeong-Dong;Kim, Tai-Yoo
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.205-215
    • /
    • 2006
  • Wireless data communication (WDC) services are increasingly penetrating the market. The two main alternative WDC technologies are wireless LAN and mobile Internet. Services based on these technologies display differences in quality attributes such as terminal device, data transmission speed, pricing scheme and so on. How consumers choose between these two alternatives will be determined by their preferences regarding such quality attributes. In turn, their preferences will affect the evolution of WDC services and related technologies. This study employs a conjoint analysis of consumer valuations of quality attributes of wireless LAN and mobile Internet services. Respondents rate hypothetical service alternatives featuring various combinations of quality attributes. By estimating consumer willingness to pay for the attributes of WDC services, the authors predict the evolution of WDC services and related technologies along various quality dimensions, make a comparison with the results of a previous study, and draw policy implications for national-and company-level R&D strategies.

  • PDF