• Title/Summary/Keyword: Mobile Operating System

Search Result 397, Processing Time 0.024 seconds

Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices (모바일 기기를 활용한 고객 개시 카드결제 시스템 설계 및 구현)

  • Seo, Moon Seog
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.245-254
    • /
    • 2014
  • Payment system is defined as the various contracts and operating facilities for the transfer of monetary value to clear the relationship between credit and debt. Payment systems essentially require the efficient and reliable operations. Card-based payment systems are developed practically and creatively in accordance with the progress of ICT. Especially in mobile environment with intelligent mobile devices such as smart-phones and tablets, a variety of payment services are provided. Existing card-based payment services are configured by the payment transaction initiated by the merchants card acceptance and then swiping into the CAT (Card Authorization Terminal) to begin the transaction. The merchant initiated payment services are now applied to the Wireless CAT (W-CAT) for mobile environment. That kind of payment services cause many problems such the illegal card information leaks and the lingering threat of W-CAT theft. Also, the use of many W-CATs increased cost to the merchant. In this paper, we propose the card holder initiated card payment system using the intelligent mobile devices in mobile environment for solving problems of the existing merchant initiated card payment system and coping effectively with the activation of a wireless data network and changes of information technology.

The CPU power management technique in the Mobile Embedded System (Mobile 임베디드 시스템의 CPU 소모전력 관리 기법)

  • Kim, Wha-Young;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.170-176
    • /
    • 2009
  • The efficiently power management is an important requirement traditionally in the mobile communication system which uses battery as their power source. Especially, it has been emphasized in the most devices, which has to provide high performance and various functions with an extended operating time. In this article, the adaptive power management technique for the core CPU unit in Embedded systems used widely for the mobile system thanks to its advantage on power consumption and physical size, is proposed.

A Flash Memory Swap System for Mobile Computers (모바일 컴퓨터를 위한 플래시 메모리 스왑 시스템)

  • Jeon, Seon-Su;Ryu, Yeon-Seung
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.9
    • /
    • pp.1272-1284
    • /
    • 2010
  • As the mobile computers are becoming powerful and are used like general-purpose computers, operating systems for mobile computers also require swap system functionality that utilizes main memory efficiently. Flash memory is widely used as storage device for mobile computers but current linux swap system does not consider flash memory. Swap system is tightly related with process execution since it stores the contents of process in execution. By taking advantage of this characteristics, in this paper, we study a new linux swap system called PASS(Process-Aware Swap System), which allocates the different flash memory blocks to each process. Trace-driven experimental results show that PASS outperforms existing linux swap system with existing garbage collection schemes in terms of garbage collection cost.

A Case Study on Proprietary Standard Success : Lessons from Strategic Approaches of Apple's iPhone (독자적 기술 표준의 성공 사례 연구 : 애플의 아이폰에 관한 전략적 측면을 중심으로)

  • Chung, Do Bum;Kwak, Jooyoung;Lee, Heejin
    • Knowledge Management Research
    • /
    • v.14 no.3
    • /
    • pp.37-54
    • /
    • 2013
  • Technology standards have gained importance as global market becomes more competitive. Since a technology acknowledged as a standard brings significant benefits to the developer firm, firms in the IT industry tend to pursue standardization for the technology, being it proprietary or open. However, the paths or strategic implications are seldom discussed in academia. Therefore, our study uses iPhone of Apple, one of the proprietary standards successes, to further understand corporate strategies over two standard choices. Our case study suggests that iPhone's entry timing was optimal for creating a new mobile environment. Design excellence and user-friendly interface increased networking effects and switching costs among consumers. Apple developed independent mobile operating system (iOS) through improvement on the existing operating system. During the process, Apple chose proprietary standard and, by installing the same UX on its sibling products such as iPod Touch or iPad, overcame the subsequent problems that might arise from the limited use of iOS. Based on the capability of concurrently developing both hardware and software, Apple connected operating system, machine, and contents, which deems to contribute to its proprietary standards success. We argue that this strategy should be considered for firms which plan proprietary standard strategy.

  • PDF

Design and Implementation of Navigation Operating System APIs for Set-based POI Search Algorithm (집합 기반 POI 검색을 지원하는 내비게이션 운영체제 기능 설계 및 구현)

  • Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.269-274
    • /
    • 2015
  • As smart device companies such as Google or Apple develop competitive mobile-based automotive operating systems and navigation systems, the range of choice for users in such markets is expanding. Navigation systems equipped with mobile operating systems have increased convenience for users. However, since an API for the POI databases used in navigation systems doesn't exist, the number of applications using POI data is insufficient. In this paper, we designed and implemented system calls for navigation operating systems with a focus on POI search, in order to resolve such limitations. The system calls support set-based POI search functions, and therefore provides solutions to search performance degradation problems caused by false inputs. As a result of performance evaluation, not only did the search performance improve, but there was also no problem in applying APIs in applications.

A Study on Embedded Operating System Security Technology for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 운영체제 보안 기술 연구)

  • Park, Jong-Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1194-1201
    • /
    • 2010
  • Currently embedded system has been widespreadly used in digital Set-top box, mobile phone, USN, etc and the significance of security has been increased due to be necessarily embedded in these all system. In this paper we propose new integrity verification scheme among the main security requirements in target system based on the korea TTA standard, security reference model for embedded operating system, published in december 2006. Moreover the proposed scheme is more effective than the previous scheme, Jung, et al.[2,6].

ANNs on Co-occurrence Matrices for Mobile Malware Detection

  • Xiao, Xi;Wang, Zhenlong;Li, Qi;Li, Qing;Jiang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2736-2754
    • /
    • 2015
  • Android dominates the mobile operating system market, which stimulates the rapid spread of mobile malware. It is quite challenging to detect mobile malware. System call sequence analysis is widely used to identify malware. However, the malware detection accuracy of existing approaches is not satisfactory since they do not consider correlation of system calls in the sequence. In this paper, we propose a new scheme called Artificial Neural Networks (ANNs) on Co-occurrence Matrices Droid (ANNCMDroid), using co-occurrence matrices to mine correlation of system calls. Our key observation is that correlation of system calls is significantly different between malware and benign software, which can be accurately expressed by co-occurrence matrices, and ANNs can effectively identify anomaly in the co-occurrence matrices. Thus at first we calculate co-occurrence matrices from the system call sequences and then convert them into vectors. Finally, these vectors are fed into ANN to detect malware. We demonstrate the effectiveness of ANNCMDroid by real experiments. Experimental results show that only 4 applications among 594 evaluated benign applications are falsely detected as malware, and only 18 applications among 614 evaluated malicious applications are not detected. As a result, ANNCMDroid achieved an F-Score of 0.981878, which is much higher than other methods.

Integrated System of Mobile Manipulator with Speech Recognition and Deep Learning-based Object Detection (음성인식과 딥러닝 기반 객체 인식 기술이 접목된 모바일 매니퓰레이터 통합 시스템)

  • Jang, Dongyeol;Yoo, Seungryeol
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.3
    • /
    • pp.270-275
    • /
    • 2021
  • Most of the initial forms of cooperative robots were intended to repeat simple tasks in a given space. So, they showed no significant difference from industrial robots. However, research for improving worker's productivity and supplementing human's limited working hours is expanding. Also, there have been active attempts to use it as a service robot by applying AI technology. In line with these social changes, we produced a mobile manipulator that can improve the worker's efficiency and completely replace one person. First, we combined cooperative robot with mobile robot. Second, we applied speech recognition technology and deep learning based object detection. Finally, we integrated all the systems by ROS (robot operating system). This system can communicate with workers by voice and drive autonomously and perform the Pick & Place task.

Implementation of mmWave long-range backhaul for UAV-BS

  • Jangwon Moon;Junwoo Kim;Hoon Lee;Youngjin Moon;Yongsu Lee;Youngjo Bang;Kyungyeol Sohn;Jungsook Bae;Kwangseon Kim;Seungjae Bahng;Heesoo Lee
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.781-794
    • /
    • 2023
  • Uncrewed aerial vehicles (UAVs) have become a vital element in nonterrestrial networks, especially with respect to 5G communication systems and beyond. The use of UAVs in support of 4G/5G base station (uncrewed aerial vehicle base station [UAV-BS]) has proven to be a practical solution for extending cellular network services to areas where conventional infrastructures are unavailable. In this study, we introduce a UAV-BS system that utilizes a high-capacity wireless backhaul operating in millimeter-wave frequency bands. This system can achieve a maximum throughput of 1.3 Gbps while delivering data at a rate of 300 Mbps, even at distances of 10 km. We also present the details of our testbed implementation alongside the performance results obtained from field tests.

Design and Implementation of SWF Player on Mobile Communication (이동통신에서의 SWF Player 설계 및 구현)

  • 서정현;김대규;강영만;장문석
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.101-104
    • /
    • 2001
  • Many applications are developed on variety type of mobile terminal with mobile tole-communication improvement. We suggest that we offer more improve multimedia environment on that development. So we design SWF player which supports Macromedia SWF file format. It is application that animation and graphic module are independent of system. In addition to, we implement SWF player on mobile communication environment. for the purpose of it, we adapt AKL concept, which is designed for the consistent interface on heterogeneous operating system environment.

  • PDF