• Title/Summary/Keyword: 무선 단말기

Search Result 1,105, Processing Time 0.019 seconds

Practical Architectural Patterns and Guidelines for Designing Complex Mobile Applications (복잡도가 높은 모바일 어플리케이션 설계를 위한 아키텍처 패턴과 적용지침)

  • Jang, Jeong-Ran;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.63-80
    • /
    • 2012
  • Mobile devices with Android OS and iOS have been emerged as mobile computing devices where various software applications are deployed. Furthermore, they are anticipated to be used not only for traditional personal computing but also for enterprise computing. However, such mobile devices have their intrinsic characteristics such as limited resources and flexible network capabilities, which are not revealed in traditional computers. Hence, there is high demand for methods to develop mobile applications with reflecting their intrinsic characteristics. Since those characteristics belong to non-functional requirements, they should be reflected in architecture design while designing mobile applications. To design architecture, the architecture drivers that are architecture non-functional requirements are decided from mobile application characteristics. Conventional architecture design methods do not consider those characteristics so that the methods cannot be straightforwardly applied to mobile applications. In this paper, to efficiently develop mobile applications reflecting those characteristics, we propose a set of architecture patterns and define a guideline to apply those patterns. First, we define the characteristics of mobile applications distinguished and derive architectural drivers from them. Then, we propose architecture patterns in terms of static and dynamic views and define an architectural guideline to apply the patterns to designing architecture for mobile application. And, we perform case studies to verify the applicability of proposed patterns. Finally, we assess the proposed architecture patterns by proving how the patterns can fulfill identified architecture drivers and by comparing our approach with previous works.

Design and Implementation of Open Service Platform for LBS (LBS를 위한 개방형 서비스 플랫폼의 설계 및 구현)

  • Min, Kyoung-Wook;Han, Eun-Young;Kim, Gwang-Soo
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1247-1258
    • /
    • 2004
  • The LBS(Location-Based Service), which is based on individual's mobility, is required increasingly as mobile telecommunication and various infrastructures have developed rapidly. The technologies for LBS are location determination technology, service platform technology, contents provider technology and moving object database technology generally. Among these, service platform must be interoperable with location gate-way server and provide common function of billing, authentification, protect location information, privacy control, location trigger and intelligent acquisition and so on. The TTA(Telecommunications Technology Association) published specification that defines a standard protocol for safe and simple interface between LBS client and LBS platform and the OpenLS(Open Location Service) in OGC (Open GIS Consortium) released implementation specifications for providing Location based core services. In this paper, we implemented service platform for LBS which is able to interoperable with location gateway server and contents provider and is caracterized as follows. First, it could require and response location information from different types of location gateway server with same interface. Second, it complies with the standard interfaces with OpenLS 4 contents providers for core LBS. Third, it could provide location of wired phone as well as wireless mobile terminal compling with the standard protocol. Last, it could provide trajectorH information based past location as well as current location, because it is able to interoperable with moving object DBMS. This paper contributes to the construction and practical use of LBS by providing the method of implementation of service platform for LBS.

Analysis of Huawei's PCT Patent Applications (화웨이의 PCT 특허 출원 동향분석)

  • Kim, Marco JinHwan;Han, Yoo-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2507-2517
    • /
    • 2015
  • In this research, we aim to analyze the trend of Huawei's PCT patent applications. As a result of analyzing Huawei's PCT patents by dividing temporal spans into three periods - the early 2000s, the late 2000s, and the early 2010s -, the following characteristics have been observed. First, the number of PCT patent applications has conspicuously increased from the early 2000s to the late 2000s and this trend has continued during the early 2010s. Second, in terms of a core technological field, whereas Huawei focused on the development of technologies in the 'H04L: transmission of digital information' sector during the early/late 2000s, it changed this field to the 'H04W: wireless communication networks' sector during the early 2010s. Lastly, in the case of the patent maps, it was found that while general communications technologies, as expressed with such keywords as 'user' and 'network,' were actively developed during the early/late 2000s, mobile phone-related technologies grasped this leading position, as shown with the keywords including 'user equipment,' 'base station,' and 'MME,' during the early 2010s. It was also noticeable that Huawei filed LTE-related patent applications more actively than Apple and Samsung Electronics, which implies that it will presumably pioneer the global market more aggressively than its competitors in the future.

Analysis of Driving and Environmental Impacts by Providing Warning Information in C-ITS Vehicles Using PVD (PVD를 활용한 C-ITS 차량 내 경고정보 제공에 따른 주행 및 환경영향 분석)

  • Yoonmi Kim;Ho Seon Kim;Kyeong-Pyo Kang;Seoung Bum Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.224-239
    • /
    • 2023
  • C-ITS (Cooperative-Intelligent Transportation System) refers to user safety-oriented technology and systems that provide forward traffic situation information based on a two-way wireless communication technology between vehicles or between vehicles and infrastructure. Since the Daejeon-Sejong pilot project in 2016, the C-ITS infrastructure has been installed at various locations to provide C-ITS safety services through highway and local government demonstration projects. In this study, a methodology was developed to verify the effectiveness of the warning information using individual vehicle data collected through the Gwangju Metropolitan City C-ITS demonstration project. The analysis of the effectiveness was largely divided into driving behavior impact analysis and environmental analysis. Compliance analysis and driving safety evaluation were performed for the driving impact analysis. In addition, to supplement the inadequate collection of Probe Vehicle Data (PVD) collected during the C-ITS demonstration project, Digital Tacho Graph ( DTG ) data was additionally collected and used for effect analysis. The results of the compliance analysis showed that drivers displayed reduced driving behavior in response to warning information based on a sufficient number of valid samples. Also, the results of calculating and analyzing driving safety indicators, such as jerk and acceleration noise, revealed that driving safety was improved due to the provision of warning information.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF