• Title/Summary/Keyword: Mobile Technology

Search Result 6,560, Processing Time 0.035 seconds

A 4S Design on Mobile Ad hoc Networks

  • Lee, Eun-Kyu;Kim, Mi-Jeong;Oh, Byoung-Woo;Kim, Min-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.1
    • /
    • pp.81-89
    • /
    • 2003
  • A provision of spatial information is expected to make a market explosion in various fields. A distribution of spatial data on wireless mobile environments indicates a huge expansion of mobile technology as well as a spread of geospatial applications. For high-qualified spatial information, the 4S technology Project that is integrating four kinds of spatial systems is currently being executed with the goal of nationwide integration of spatial data and spatial information systems. In terms of network environments, a mobile ad hoc network where mobile terminals communicate with each other without any infrastructures has been standardized for the next generation mobile wireless network. With respect to the future technologies for spatial information, it is necessary to design 4S applications on mobile ad hoc networks. This paper addresses the issue, which is proposing design concepts for distributing 4S spatial data on mobile ad hoc networks and for ad hoc styled 4S applications.

A study on the factors affecting the usage and diffusion of Mobile Easy Payment Services

  • Lee, Eunyoung;Shin, Chan;Baatdawa, Baatdawa
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.38-43
    • /
    • 2020
  • This study examines the factors affecting the usage and diffusion of mobile easy payment services which is fast growing industry recently. After wide reviewing previous research about mobile payment, Some factors are identified as the factors influencing intention to use mobile easy payment services-confidence, innovativeness, mobile self-efficacy, relative advantage- through several mediating factors- perceived ease, perceived usefulness, perceived risk. Empirical study for a research model showed confidence, mobile self-efficacy and relative advantage are effective to the intention to use mobile easy payment services via perceived usefulness and perceived risk. Based on the results of the study, some practical implication for customer retention and acquisition are suggested.

An Empirical Study on the Influence of Environmental Determinants on the Mobile Cloud Computing Technology Usage and the Moderating Effects of Job Relevance (모바일 클라우드 컴퓨팅 기술사용에 영향을 주는 환경적 요인과 직무 관련성의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.1-20
    • /
    • 2011
  • The recent development of mobile devices, including smartphones has maximized the user's convenience. This phenomenon has triggered the specification and activation of mobile cloud service and transformed the user's information usage and communication means. Despite such development of new technology, there is little understanding of mobile cloud. Therefor, in order to help the understanding of the usage of mobile cloud computing technology, this study developed the research model based on the UTAUT (the Unified Theory of Acceptance and Usage of Technology) model. The proposed research model included five external determinants, such as Interoperability, Information Organization, Adequacy, Information Security and Context Awareness, along with the moderating effects of Job Relevance, and empirically proved their influence on the user's job performance. This study proved the research model by analyzing the data collected from 287 copies of survey with the structural equation modeling approach. The result showed that all determinants, except Information Security have positive impact on the usage of mobile cloud computing technology. Thus, this study can compliment the limitations of previous research, suggest a new direction to analyze the user's perspective in the related research on mobile cloud and build a theoretical foundation for the further development of mobile cloud.

Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.743-749
    • /
    • 2020
  • Internet of Things (IoT) is a growing technology along with artificial intelligence (AI) technology. Recently, increasing cases of developing knowledge services using information collected from sensor data have been reported. Communication is required to connect the IoT and AI, and 5G mobile networks have been widely spread recently. IoT, AI services, and 5G mobile networks can be configured and used as sensor-mobile edge-server. The sensor does not send data directly to the server. Instead, the sensor sends data to the mobile edge for quick processing. Subsequently, mobile edge enables the immediate processing of data based on AI technology or by sending data to the server for processing. 5G mobile network technology is used for this data transmission. Therefore, this study examines the challenges, opportunities, and solutions used in each type of technology. To this end, this study addresses clustering, Hyperledger Fabric, data, security, machine vision, convolutional neural network, IoT technology, and resource management of 5G mobile networks.

Quality Testing Model of Mobile RFID Middleware (모바일 RFID 미들웨어 품질 평가 모델)

  • Jung, Hye-Jung
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.85-93
    • /
    • 2007
  • RFID applied in many area. I think that RFID enlarge for our life more and more. The application technology of RFID change the Mobile RFID using mobile phone and PDF etc. I think, Mobile RFID enlarge application technology gradually. In this paper, we propose the quality measurement metrics for mobile RFID middleware. I propose the quality testing model for interoperability and security of mobile RFID middleware. We examine the international standard for mobile RFID and software testing. In this paper, I proposed the evaluation model of mobile RFID middleware on the basis of international standard ISO/IEC 9126-2 and ISO/IEC 25000 series.

  • PDF

Optimized Method of Material Matching Test for Mobile ODF TFT-Panel

  • Lim, Jun-Hwan;Qiu, Yun;Zhang, Junrui;Ko, Young-Yik;Jung, Hee-Chul;Hwang, Soo-Woong
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.1596-1599
    • /
    • 2009
  • Mobile ODF (one drop filling) portable display such as mobile phone and application product is needed high reliability than notebook, monitor and TV. Therefore, material development in order to optimize mobile & application ODF panel is needed. Through considering mobile ODF process and design, we have developed method of material matching test by several tests which is heat stress, UV stress and ODF process condition. So we have developed a material with characteristics of high reliability for mobile ODF panel.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Implementation of Mobile Cliented-Server System for Real-Time Processing (실시간 처리 기반의 모바일 클라이언트-서버 시스템 구현)

  • Joo, Hae-Jong;Hong, Bong-Wha
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.35-47
    • /
    • 2006
  • Many researches are going on with regard to issues and problems related to mobile database systems, which are caused by the weak connectivity of wireless networks, the mobility and the portability of mobile clients. Mobile computing satisfies user's demands for convenience and performance to use information at any time and in any place, but it has many problems to be solved in the aspect of data management. The purpose of our study is to Implement Real-Time Mobile Query Processing System(MQPS) to solve problems related to database hoarding, the maintenance of shared dataconsistency and the optimization of logging, which are caused by the weak connectivity and disconnection of wireless networks inherent in mobile database systems under mobile client server environments. In addition, we proved the superiority of the proposed MQPS by comparing its performance to the C I S(Client-Intercept-Srever) model.

  • PDF

Study on Improvement of Mobility in IPTV (Mobile IPTV의 개요 및 이동성개선방안)

  • Lee, Sung-Uk;Park, Byung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.69-74
    • /
    • 2010
  • Due to a development of information and communications technology, now we can watch TV show whenever and wherever we want through DMB service. And this is different from existing TV service which we can just enjoy at certain place. Now, I will look into IPTV technology which is basis of Mobile IPTV service. And then, I will introduce Mobile IPTV service which combines the virtues of 'Mobility' of DMB technology and 'two-way communication' of IPTV technology and lets us enjoy two-way TV service at anytime and anywhere. And also I will check the problems of IPTV, on-going trend of Mobile IPTV(in service), and the perspective of Mobile IPTV. Finally, we suggest new fast duplicate address detection scheme in Mobile IPTV to support seamless IPTV packet transmission.

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.2
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.