• Title/Summary/Keyword: Internet phone

Search Result 1,000, Processing Time 0.024 seconds

A System Design for Mobile Service of a 3D Marine Characters (3D 해양 캐릭터의 모바일 서비스를 위한 시스템 설계)

  • Gang, Gyeong-Heon;Kim, Byoung-Hun;Youn, Jae-Hong;Kim, Eun-Seok;Hur, Gi-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.536-540
    • /
    • 2006
  • The interest in the service of 3D mobile contents becomes larger due to the technological advance of production and services of mobile contents and the appearance of the exclusive mobile phone for 3D game. Therefore, the researches about the efficient mobile services of large 3D contents are wanted in the circumstances of the narrow bandwidth and the burden of the connection charge of wireless mobile communications. In this paper, we suggest a strategy of caching for looking up and downloading the 3D marine characters efficiently and a system model for mobile service of 3D marine characters. The suggested system is designed for serving efficiently the high-quality 3D characters through the wireless mobile communications using the database on the 3D marine objects of cyber aquarium constructed for the services through the wired internet.

  • PDF

A Study on an Improvement of the Performance by Spectrum Analysis with Variable Window in CELP Vocoder (CELP 부호화기에서 가변 윈도우 스펙트럼 분석에 의한 성능 향상에 관한 연구)

  • Min So-Yeon;Kim Eun-Hwan;Bae Myung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.233-238
    • /
    • 2005
  • In general CELP(Code Excited Linear Prediction) type vocoders provide good speech qualify around 4.8kbps. Among them, G.723.1 developed for Internet Phone and video-conferencing includes two vocoders, 5.3kbps ACELP(Algebraic-CELP) and 6.3kbps MP-MLQ(Multi-Pulse Maximum Likelihood Quantization) In order to improve the speech qualify in CELP vocoder, in this paper. we proposed a new spectrum analysis algorithm with variable window In CELP vocoder, the spectrum of the synthesised speech signal is distorted because the fixed size windows is used for spectrum analysis. So we have measured the spectral leakage and in order to minimize the spectral leakage have adjusted the window size. Applying this method G.723.1 ACELP, we can got SD(Spectral Distortion) reduction 0.084(dB), residual energy reduction 6.3$\%$ and MOS(Mean Opinion Score) improvement 0.1.

  • PDF

A Study on the Strategies for Expanding Exports of Indonesia utilizing E-commerce Platform (전자상거래 플랫폼을 활용한 인도네시아 수출확대방안에 관한 연구)

  • Choi, Jang Woo;Park, Jae Han
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.99-126
    • /
    • 2017
  • The Indonesian e-commerce market has grown significantly due to sustained economic growth, middle class growth, rapid increase in Internet and SNS users, and increase in accessibility of mobile broadband services. In particular, consumers' online shopping through mobile and SNS has been increasing rapidly based on the expansion of the popularity of smart phone devices. This research suggested the strategies for expanding exports of Indonesia through e-commerce platform to the Korean firms, with deep analysis of the current status and features, problems, cases, and implications etc. of Indonesia's e-commerce market. As an export expansion strategy utilizing Indonesia's e-commerce platform, this study showed the Korean firms have to build a local online distribution network, establish a logistics & delivery and payment system, acquire Halal certification for Muslim market, carry out the in-depth market research, actively implement Hanryu marketing strategy, develop a creative product, set up market segmentation strategies, and develop SNS mobile marketing.

  • PDF

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

A Study of consumer's behavior and classifications by advertising techniques of mobile character (모바일 캐릭터의 광고기법에 따른 타켓별 유형분류와 소비자 반응 연구)

  • 강대인;주효정
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.393-402
    • /
    • 2004
  • The mobile advertisement has varied on lifestyle of people, who live aninformation-oriented society with portable equipment such as web phone and PDA(Personal Digital Assistant). Also, the advertising has expended mobile techniques and its application field unpredictably. The intrinsic characteristic of misdistribution, reach, and convenience in mobile advertisement add up the capacity of a location, information and individualize. This market condition leads the basic audio focused formal mobile advertisement to the new mobile Internet environment with an additional able of data communication. Moreover, the type of SMS (Short Message Service), Graphic, Wep Push, and ridchmedia, which based on music, basic graphic, voice, and letters transfer by mobile terminal and the mobile character is present inevitably correlation with pixel art and animation in 2D(Two Dimensions) techniques. Thus, this research appoints the importance and its role of mobile advertisement that is core of the business marketing in new media era. To activate mobile market, the mobile companies classify the characteristic of consumers with developed commercial use of mobile character and research their behavior to meet optimal mobile character in business.

  • PDF

Implementation of Remote Monitoring Scenario using CDMA Short Message Service for Protected Crop Production Environment

  • Bae, Keun-Soo;Chung, Sun-Ok;Kim, Ki-Dae;Hur, Seung-Oh;Kim, Hak-Jin
    • Journal of Biosystems Engineering
    • /
    • v.36 no.4
    • /
    • pp.279-284
    • /
    • 2011
  • Protected vegetable production area is greater than 26% of the total vegetable production area in Korea, and portion of protected production area is increasing for flowers and fruits. To secure stable productivity and profitability, continuous and intensive monitoring and control of protected crop production environment is critical, which is labor- and time-consuming. Failure to maintain proper environmental conditions (e.g., light, temperature, humidity) leads to significant damage to crop growth and quality, therefore farmers should visit or be present close to the production area. To overcome these problems, application of remote monitoring and control of crop production environment has been increasing. Wireless monitoring and control systems have used CDMA, internet, and smart phone communications. Levels of technology adoption are different for farmers' needs for their cropping systems. In this paper, potential of wireless remote monitoring of protected agricultural environment using CDMA SMS text messages was reported. Monitoring variables were outside weather (precipitation, wind direction and velocity, temperature, and humidity), inside ambient condition (temperature, humidity, $CO_2$ level, and light intensity), irrigation status (irrigation flow rate and pressure), and soil condition (volumetric water content and matric potential). Scenarios and data formats for environment monitoring were devised, tested, and compared. Results of this study would provide useful information for adoption of wireless remote monitoring techniques by farmers.

U-LBS : Precise Location Data Through a Car Crash Location System (U-LBS : 정밀 위치 데이터를 통한 차량 충돌 사고 위치 확인 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.11
    • /
    • pp.1150-1156
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are more varied. In particular, where you recognize the location of objects such as people and things, and to provide valuable services based on ubiquitous, location-based services (Ubiquitous Location Based Services: u-LBS) is emerging as an important service. In this paper precise location data to the car crash through the location and offers related service system. In this paper the precise location tracking proposed by the concept of the Rail, road, to extract the location Data Matching Data and the current location is obtained. System used in GPS Packet and information about the location of the vehicle collision and the collision time, the vehicle consists of NodeID is about. Using these data, a packet is to be created when the conflict between vehicles in the vehicle will be sent to Gateway. Gateway to the packets that were sent from the Server to determine whether the conflict is that in an emergency situation, Emergency Center for location information and let me know whether or not the conflict will be measured. Also, for those on the outside of an emergency such as a family related to the wireless terminal wireless (PDA, cell phone) is to let me know. Server get into the conflict that was configured to store information on the Database. Additionally, the proposed u-LBS system to verify the validity of the experiment was performed.

Estimation of Accessibility and Usability in Web Interaction for Personalized Ubiquitous Web Information Services (개인화된 유비쿼터스 웹 정보 서비스를 위한 웹 상호작용의 접근성 및 사용성 평가)

  • Kim, Yung-Bok
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.8
    • /
    • pp.512-521
    • /
    • 2008
  • Web-based information services should be evaluated for accessibility and usability with various types of Internet Web-browsing devices, interacting with web information servers. A reliable ubiquitous Web information server, accessible and usable with a variety of Web-browsing devices (e.g. a full-browsing mobile phone), should be a unified center for personalized ubiquitous Web information services as well as for business models based on personalized advertisements. We studied an estimation of the accessibility and usability in Web interaction for personalized ubiquitous Web information services, as metrics for real-time estimation. We show empirical results based on implementation and experiments in Korea, Japan and China, using a test-bed Web site ('ktrip.net') and single-character Korean domain names (e.g. 김.net, 이.net, 박.net, 최.net, ㄱ.net, ㄴ.net ... ㅎ.net, ㅏ.net, ... ㅔ.net, ㄱ.com, ㄴ.com ... ㅎ.com).

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

Conditional Access Authentication and Management System for IPTV Service (IPTV 서비스를 위한 수신권한 인증 및 관리 시스템)

  • Cho, Yong-Soon;Park, Ki-Chul;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2009
  • Currently broadcasting and telecommunication has integrated, And IPTV Service has appeared who called TPS(Triple Play Service) which integrated with broadcasting, telecommunication and Phone Service. IPTV provide broadcasting service and VOD(Video on Demand) service, and it must be satisfied digital content security. For this condition, IPTV Forum working on standardization of interface for digital content security. The Security solution for broadcasting and VOD are CAS (Conditional Access System) and DRM(Digital Rights Management). But these solutions manufactured by many vendors, so there is no inter-operability. And after finished standardization of interface for CAS and DRM system, the problem of inter-operability with them will be issued. For this reason, Rights management system which possible to operate independently with platform is necessary. In this paper, To protect multimedia digital content, we designed and implemented Conditional Access Management System.