• Title/Summary/Keyword: Laptop

Search Result 192, Processing Time 0.024 seconds

An Implementation of Context-Awareness Support System based on Voice Service for Medical Environments (의료 환경을 위한 음성 서비스 기반의 상황인식 지원 시스템의 구현)

  • Shim, Choon-Bo;Shin, Yang-Won;Park, Byung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.29-36
    • /
    • 2005
  • As computing environments are more rapidly developed, an adaptive and intelligent services using post PC such as PDA. Laptop, and Tablet PC in case of rounding and examining patients are highly demanded. The objective of this study is to design and implement a context-awareness support system based on voice service for medical environments. To achieve it, we propose a context middleware which plays an important role in recognizing a client with PDA by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module, like delivery for diagnosis information of patients, according to the staff's context acquired from a context server. In addition, the context server functions as a manager that efficiently stores context information such as client's current status, physical environment, and device resources into a database server. Finally, for verifying the usefulness of the proposed system, we develop an application system which provides voice playing services for notification of other physicians through our context middleware.

  • PDF

A Study on the Development of Luminous Smart Bag for Smartphone Users (스마트폰 사용자를 위한 발광 스마트 백 개발)

  • Park, Jinhee;Kim, Jooyong
    • Journal of Fashion Business
    • /
    • v.24 no.1
    • /
    • pp.15-28
    • /
    • 2020
  • The purpose of this study was to develop and propose creative smart bags in emotional e-textiles using LEDs that inform smartphone users of motion-induced luminescence and ringing of cell phones. The LED light-emitting operation tasks produced in the study were applied to each of the three design smart bags, setting the five cases of luminance by a call initiated, absent phone, rejecting answering phone, texting, and motion-induced luminescence. In the male laptop bags of LED luminous images using wappen, 10 LEDs could be separated by a total of three pins to display the luminous mode, and all 10 LEDs became a total of five luminous patterns, including all that illuminate and those that illuminate randomly. E-wappen rendered the motif a strong sense of visibility and performed six roles on phone rings and texting. To develop a women's tote bag, we did a laser cut and attached the leather strips and placed 10 triangular LEDs to form a geometric LED e-textile. It provides the possibility of transforming simple design from traditional fashion into a more interesting and various smart designs. An entertainment smart bag using graphic design was constructed by applying a tilt sensor to look like a light in the night sky by shaking and moving the bag. The graphic design and composition of LEDs indicate that LEDs and fashion item are applied in harmony rather than heterogeneous, enabling them to be applied as fashion-oriented wearable smart products.

Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP (비인증 AP의 하드웨어 성능에 따른 시간 측정 기반의 비인증 AP 탐색 기법의 분석)

  • Jang, Rhong-Ho;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.551-558
    • /
    • 2015
  • As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

A Strategy using Updatable Message for Retaining the Cache Consistency in the Mobile Computing Environment (이동 컴퓨팅 환경에서 갱신가능 메시지를 이용한 캐쉬 일과성 유지 정책)

  • Park, Seong-Bae;Hwang, Bu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1694-1705
    • /
    • 1997
  • In the future mobile computing environment, it will be generalized that a mobile host with portable Laptop of Palmtop accesses to database through wireless communication channel. For solving the problems which are caused from low bandwidth of wireless communication, mobile hosts cache the datum used frequently on them. Thus the mobile hosts must always retain the cache consistency for the correctness of the cached datum. the cache consistency is mainly affected from the unrestricted host mobility and the disconnection of the communication between mobile hosts and mobile support station. In this situation, the strategy to retain efficiently cache consistency is required. In this paper, we propose a strategy using updatable message for retaining the cache consistency, in the mobile computing environment, with replicated database supporting 2 phase commit protocol. This strategy makes use of a updatable message to resolve the cache consistency problem, since mobile host crosses the boundary of cell. In using of this updatable, it find out and cache only the update data of missing invalidation message. As a result, the proposed strategy utilizes network bandwidth efficiently because it is not need to delete all the cached datum with any datum change.

  • PDF

Process and Die Design of Square Cup Drawing for Wall Thickening (사각형 판재성형 시 벽두께 증육을 위한 금형 및 공정 설계)

  • Kim, Jinho;Hong, Seokmoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.5789-5794
    • /
    • 2015
  • Recently, thin and light-weight production technologies are needed in IT industry in accordance with increase of the smart phones and mobile PC products. In order to make light and high rigidity products, engineering plastic and aluminum materials are frequently used in products appearance and frame hat support structure. Especially aluminum extrusion and CNC Brick processes are widely used for high strength and high rigidity technology. But extrusion method has constraints to apply exterior design and CNC Brick process has relatively high production cost and low speed of manufacturing. In this research, a new process method is introduced in order to reduce material cost and to improve manufacturing speed dramatically. Plate forging process means basically that thickening of local wall area thickness after deform exterior shape by deep drawing and bending process. Therefore, it is possible to minimize the waste of material and the manufacturing time. In this study the process of plate forging is designed using finite element program AFDEX-2D and the thickness and the width of initial deformed blank. And it is verified as a sample which is a part of laptop developed through the proposed plate forging method.

A Study on the Effect of the Name Node and Data Node on the Big Data Processing Performance in a Hadoop Cluster (Hadoop 클러스터에서 네임 노드와 데이터 노드가 빅 데이터처리 성능에 미치는 영향에 관한 연구)

  • Lee, Younghun;Kim, Yongil
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.68-74
    • /
    • 2017
  • Big data processing processes various types of data such as files, images, and video to solve problems and provide insightful useful information. Currently, various platforms are used for big data processing, but many organizations and enterprises are using Hadoop for big data processing due to the simplicity, productivity, scalability, and fault tolerance of Hadoop. In addition, Hadoop can build clusters on various hardware platforms and handle big data by dividing into a name node (master) and a data node (slave). In this paper, we use a fully distributed mode used by actual institutions and companies as an operation mode. We have constructed a Hadoop cluster using a low-power and low-cost single board for smooth experiment. The performance analysis of Name node is compared through the same data processing using single board and laptop as name nodes. Analysis of influence by number of data nodes increases the number of data nodes by two times from the number of existing clusters. The effect of the above experiment was analyzed.

A Robotcar-based Proof of Concept Model System for Dilemma Zone Decision Support Service (딜레마구간 의사결정 지원 서비스를 위한 로봇카 기반의 개념검증 모형 시스템)

  • Lee, Hyukjoon;Chung, Young-Uk;Lee, Hyungkeun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.4
    • /
    • pp.57-62
    • /
    • 2014
  • Recently, research activities to develop services for providing safety information to the drivers in fast moving vehicles based on various wireless network technologies such as DSRC (Dedicated Short Range Communication), IEEE 802.11p WAVE (Wireless Access for Vehicular Environment) are widely being carried out. This paper presents a proof-of-concept model based on a robot-car for Dilemma Zone Decision Assistant Service using the wireless LAN technology. The proposed model system consists of a robot-car based on an embedded Linux OS equipped with a WiFi interface and an on-board unit emulator, an Android-based remote controller to model a human driver interface, a laptop computer to run a model traffic signal controller and signal lights, and a WiFi access point to model a road-side unit.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.