• Title/Summary/Keyword: 모바일 서비스 시스템

Search Result 1,755, Processing Time 0.028 seconds

A Seamless Multicast Scheme to Prevent Packet Loss in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 패킷 유실을 방지하는 끊김 없는 멀티캐스트 기법)

  • Kim, Jong-Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.7-20
    • /
    • 2011
  • Recently, Proxy Mobile IPv6(PMIPv6) networks have been studied as the mobility management protocol to effectively use limited wireless resources. And the multicasting, which is core technology of the Internet broadcast system such as mobile IPTV, has been discussed mainly based on PMIPv6 network. However, multicasting based on PMIPv6 network causes disconnection of services because it does not solve problems of packet loss during binding and group joining procedure. Hence, we propose a seamless multicast scheme which prevents packet loss in PMIPv6 networks. The proposed scheme achieves lower latency than the existing scheme because it combines binding and group joining procedure, a1so it does not cause about packet losses due to performing buffering. We proved the performance using the simulations.

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Usability Evaluation for Life-logging Application (라이프로깅 애플리케이션 사용성 평가)

  • Lee, Joeun;Kwon, Jieun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.43-49
    • /
    • 2016
  • As user-centered design and content development emerge, the research and the establishment of items on usability evaluation are becoming more important. However, research on usability evaluation for digital systems in specific areas of mobile applications is still incomplete. Due to the recent development of wearable devices and smartphones, development and usage of quantified-self and life-logging applications has been rapidly increasing. This study aims to establish evaluation items and the main factors for the usability assessment of the applications that support life-logging services. In order to establish evaluation factors for life-logging application usability, we first gathered existing usability assessment items and selected the initial items through the Focus Group Interview(FGI). Second, we conducted user assessment surveys on the selected initial questionnaires and performed reliability and exploratory factor analyses based on the survey results. Third, through the statistical analyses results, we established 28 usability assessment items and four factors: recognition; functionality; aesthetics; and satisfaction. Finally, we discussed the expectations and limitations of the established usability assessment. The results from this paper could be used as a guideline for the usability assessment of life-logging applications and thus will contribute to effective content development.

Design and Comparative Performance Analysis of Fully Distributed Mobility Management Scheme on PMIPv6 (PMIPv6 기반의 완전 분산형 이동성 관리 기법의 설계 및 성능 비교 분석)

  • Lee, Han-Bin;Lee, Jong Hyup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.220-223
    • /
    • 2016
  • Explosive growth of smartphone-based mobile nodes has increased exponentially the mobile data traffic on the Internet. To reduce the traffic load on the network and to support the seamless mobility of the mobile nodes, the IETF and 3GPP have standardized a number of mobility management mechanisms. More recently, they are making an effort to find some schemes to distribute the networking systems that involve in the mobility management in order to assure the scalability and the reliability of the network. In IETF, DMM concept for the distributed mobility management on the Internet is being discussed. Specifically, the DMM can be classified into the partially distributed management and fully distributed management. In this paper, we propose a fully distributed mobility management scheme (FuDMM) on PMIPv6-based network by applying the extended NDP. We also present the performance of FuDMM using the comparative analysis with the existing ones.

  • PDF

Study on DNN Based Android Malware Detection Method for Mobile Environmentt (모바일 환경에 적합한 DNN 기반의 악성 앱 탐지 방법에 관한 연구)

  • Yu, Jinhyun;Seo, In Hyuk;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.159-168
    • /
    • 2017
  • Smartphone malware has increased because Smartphone users has increased and smartphones are widely used in everyday life. Since 2012, Android has been the most mobile operating system. Owing to the open nature of Android, countless malware are in Android markets that seriously threaten Android security. Most of Android malware detection program does not detect malware to which bypass techniques apply and also does not detect unknown malware. In this paper, we propose lightweight method for detection of Android malware using static analysis and deep learning techniques. For experiments we crawl 7,000 apps from the Google Play Store and collect 6,120 malwares. The result show that proposed method can achieve 98.05% detection accuracy. Also, proposed method can detect about unknown malware families with good performance. On smartphones, the method requires 10 seconds for an analysis on average.

IEEE 802.16j MMR System for cost-efficient coverage extension (비용 효율적 커버리지 확장을 위한 IEEE 802.16j 모바일 멀티-홉 릴레이 시스템)

  • Lee, Ju-Ho;Lee, Goo-Yeon;Jeong, Choong-Kyo
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.191-197
    • /
    • 2013
  • To complete the "anywhere" mobile service there should not be shaded areas. However, it is never economical to deploy BS's (Base Stations) in a low population density area due to the low resource utilization. We propose a design technique to install RS's(Relay Stations) which are cheaper than BS's and find the condition in which the proposed technique is acceptible. The proposed design technique aims to allocate the frequency and time resources to RS's to minimize the transmission rate degradation due to interferences between RS's as well as to maximize the parallelism in transmission. We showed by simulation that the proposed technique achieves cost benefits when the expected traffic is less than 20.32 percent of the total BS capacity. The proposed technique is compatible with the IEEE 802.16j, thus can be extended to multi-hop configuration.

Physical Layer Modem Implementation for mmWave 5G Mobile Communication (밀리미터파 5G 이동통신을 위한 물리계층 모뎀의 구현)

  • Kim, Jun-woo;Bang, Young-jo;Park, Youn-ok;Kim, Ilgyu;Kim, Tae Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.51-57
    • /
    • 2016
  • This paper describes the physical layer modem structure of Giga KOREA 5G system which is being developed by ETRI as a 5G telecommunications prototype. The objective of Giga KOREA 5G system is supporting maximum 100 Gbps data rate for each cell with wide-bandwidth baseband station and mobile station prototypes in mmWave (10~40 GHz) environment. To achieve this objective, its physical layer is composed of high performance baseband station as well as mobile station and their OFDM TDD modems. The important features of Giga KOREA 5G physical layer are carrier aggregation, multiple receiving beam searching in mobile station, high data rate channel encoder and decoder and high speed modulation and demodulation functions.

Design and Performance Analysis of Cost-Effective and Fast Inter-Domain NEMO Scheme with Multicasting Support (멀티캐스팅 지원의 비용효과적인 도메인간 빠른 NEMO 기법의 설계 및 성능분석)

  • Han, Sunghee;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.87-98
    • /
    • 2012
  • In recent years, there are many data and multimedia services that are supported by WiFi-enabled mobile devices. As a result, the demand for the ability to connect to the Internet anywhere is rapidly increasing and network infrastructure is becoming increasingly important. The design of cost-efficient network mobility (NEMO) protocol is intended to reduce the demand for limited wired/wireless network bandwidth at the signaling of mobility support and packet delivery operations. In this paper, we propose a cost-effective inter-LMA domain mobility management scheme which provides fast handover with multicasting support in NEMO environments. And our Fast PR-NEMO scheme is compared with N-PMIPv6, rNEMO, and PR-NEMO. In conclusion, our proposed scheme shows the best performance in terms of location updating cost, and packet tunneling cost.

A New Cell Selection Scheme For Heterogeneous Mobile Communication Networks (이종 이동통신 네트워크를 위한 새로운 셀 선택 기법)

  • Ban, Tae-Won;Jung, Bang Chul;Jo, Jung-Yeon;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2397-2402
    • /
    • 2014
  • Recently, heterogeneous mobile communication network is attracting plenty of interest to serve explosively increasing mobile data traffic. Although the heterogeneous mobile communication network can enhance spatial reuse ratio by using both conventional macro cells and small cells simultaneously, it causes the unbalance in performance of downlink and uplink. In this paper, we propose a new cell selection scheme for heterogeneous mobile communication network. In the proposed cell selection scheme, mobiles select their home cells by considering both uplink and downlink performance, contrary to conventional schemes. We analyze the performance of the proposed scheme in terms of average cell transmission rate through system level simulations and compare it with those of conventional schemes.

A intelligent network weather map framework using mobile agent (이동 에이전트 기반 지능형 네트워크 weather map 프레임워크)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.203-211
    • /
    • 2006
  • Today, Internet covers a world wide range and most appliances of our life are linked to network from enterprise server to household electric appliance. Therefore, the importances of administrable framework that can grasp network state by real-time is increasing day by day. Our objective in this paper is to describe a network weather report framework that monitors network traffic and performance state to report a network situation including traffic status in real-time. We also describe a mobile agent architecture that collects state information in each network segment. The framework could inform a network manager of the network situation. Through the framework. network manager accumulates network data and increases network operating efficiency.

  • PDF