• Title/Summary/Keyword: Mobile internet

Search Result 3,615, Processing Time 0.028 seconds

A System for Marking the Absence using a Smart-Phone (스마트폰을 이용한 전자 출석 인증 시스템)

  • Choi, Jun-Il;Yoon, Dal-Suk;Chang, Joong-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4160-4168
    • /
    • 2011
  • The development of computing technology and the increase of using mobile smart devices have brought about changes in our daily life. It makes accessing the internet more easy, and also increases the convenience of our daily life and the variety of information. In this paper, a system for marking the absence using a smart-phone is developed, which is one of the means to increase the convenience of our daily life. Usually the conventional system for the same purpose uses a smart card, so that there are some drawbacks in the system such as attendance by proxy. To compensate the drawbacks, the system proposed in this paper uses a smart-phone belonging to an individual and an instant authentication key to mark the absence that is generated at the time when it is required. It makes the proposed system being more effectively used in marking the absence.

Hopping Routing Scheme to Resolve the Hot Spot Problem of Periodic Monitoring Services in Wireless Sensor Networks (주기적 모니터링 센서 네트워크에서 핫 스팟 문제 해결을 위한 호핑 라우팅 기법)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Jang, Seong-Sik;Byun, Tae-Young;Lee, Won-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2340-2349
    • /
    • 2009
  • In this paper we proposed a hopping routing scheme to resolve the hot spot problem for periodic monitoring services in wireless sensor networks. Our hopping routing scheme constructs load balanced routing path, where an amount of energy consumption of all nodes in the sensor networks is predictable. Load balanced routing paths can be obtained from horizontal hopping transmission scheme which balances the load of the sensor nodes in the same area, and also from vertical hopping transmission scheme which balances the load of the sensor nodes in the other area. The direct transmission count numbers as load balancing parameter for vertical hopping transmission are derived using the energy consumption model of the sensor nodes. The experimental results show that the proposed hopping scheme resolves the hot spot problem effectively. The efficiency of hopping routing scheme is also shown by comparison with other routing scheme such as multi-hop, direct transmission and clustering.

Development of Bridge Life-Cycle Management System based on Information and Communication Technology (ICT 기반 교량 생애주기 관리시스템 개발)

  • Park, Kyung-Hoon;Sun, Jong-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.13-20
    • /
    • 2016
  • The computerized management system for bridges is required due to the increased service life and number of bridges. This paper provides information and communication technology (ICT) - based bridge management system (BMS) to enable life cycle management through a comparative study with the development trend and function of domestic and foreign BMSs. BMS developed as an operation system combined an internet and mobile program, and was based on GIS technology and an object-based information management system. BMS supports the establishment of long-term strategies and short-term plans based on predicting the life-cycle performance profile and the necessary budget by object-based informatization for the whole life-cycle information of bridges. Useful knowledge information for supporting decision making was derived from the life-cycle management strategies establishment for approximately 6,000 existing bridges. BMS was developed to be applicable to all nationwide road bridges. In addition, it can be used practically to maintain the performance based on accurate maintenance result management, reducing cost by reasonable budget management, and enhancing the convenience and reliability of field data collection.

DCCP based Congestion Control Scheme to support Mobility of Devices on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 단말의 이동성을 지원하기 위한 DCCP 기반의 혼잡 제어 정책)

  • Park Si-Yong;Kim Sung-Min;Lee Tae-Hoon;Chung Ki-Dong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.59-75
    • /
    • 2006
  • In this paper, we propose a congestion control scheme to control the congestion due to the mobility of ubiquitous devices on ubiquitous computing environment. Especially, this congestion control scheme provides a reverse congestion avoidance state which can classify between packet error by features of wireless network and packet dropping by congestion. Also, it provides a slow stop state which can minimize bandwidth waste due to congestion control. The proposed congestion control scheme controls more adaptive than existing congestion control schemes. The proposed congestion control scheme is designed based on DCCP(Datagram Congestion Control Protocol) being proposed by IETF(Internet Engineering Task Force) and implemented on the Linux kernel. In simulation results, the proposed congestion control scheme provides good bandwidth throughput in wireless network as well as in wired network.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

The Method for Extracting Meaningful Patterns Over the Time of Multi Blocks Stream Data (시간의 흐름과 위치 변화에 따른 멀티 블록 스트림 데이터의 의미 있는 패턴 추출 방법)

  • Cho, Kyeong-Rae;Kim, Ki-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.377-382
    • /
    • 2014
  • Analysis techniques of the data over time from the mobile environment and IoT, is mainly used for extracting patterns from the collected data, to find meaningful information. However, analytical methods existing, is based to be analyzed in a state where the data collection is complete, to reflect changes in time series data associated with the passage of time is difficult. In this paper, we introduce a method for analyzing multi-block streaming data(AM-MBSD: Analysis Method for Multi-Block Stream Data) for the analysis of the data stream with multiple properties, such as variability of pattern and large capacitive and continuity of data. The multi-block streaming data, define a plurality of blocks of data to be continuously generated, each block, by using the analysis method of the proposed method of analysis to extract meaningful patterns. The patterns that are extracted, generation time, frequency, were collected and consideration of such errors. Through analysis experiments using time series data.

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF

Design And Implementation of WebDAV Virtual Storage System based on Android (안드로이드 기반의 WebDAV 가상 스토리지 시스템의 설계 및 구현)

  • Kim, Sang-Geon;Byun, Sung-Jun;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.669-671
    • /
    • 2010
  • IStorage is a technology, which can use resources of server PC by using Android Phone supporting wireless internet access. IStorage utilizes resources of server PC through WebDAV protocol. And with GUI interface, Users upload their resources to the server PC and They can perform various kinds of works like Opening, Searching, Deleting and Downloading files. Since it is possible for them to use resources of server PC as if they are originally stored in their mobile devices, there is no limit on using the functions such as watching movies, listening musics and opening document files in real time. We expect this study can to overcome the limitation of storage space and also be a useful technology in the smart phone market.

  • PDF

Improved Feature Extraction Method for the Contents Polluter Detection in Social Networking Service (SNS에서 콘텐츠 오염자 탐지를 위한 개선된 특징 추출 방법)

  • Han, Jin Seop;Park, Byung Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.47-54
    • /
    • 2015
  • The number of users of SNS such as Twitter and Facebook increases due to the development of internet and the spread of supply of mobile devices such as smart phone. Moreover, there are also an increasing number of content pollution problems that pollute SNS by posting a product advertisement, defamatory comment and adult contents, and so on. This paper proposes an improved method of extracting the feature of content polluter for detecting a content polluter in SNS. In particular, this paper presents a method of extracting the feature of content polluter on the basis of incremental approach that considers only increment in data, not batch processing system of entire data in order to efficiently extract the feature value of new user data at the stage of predicting and classifying a content polluter. And it comparatively assesses whether the proposed method maintains classification accuracy and improves time efficiency in comparison with batch processing method through experiment.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.