• Title/Summary/Keyword: Mobile source

Search Result 733, Processing Time 0.028 seconds

Problems of the Current Mobile Voting and System Requirements for the Solutions (모바일 투표의 문제점과 해결을 위한 시스템 요구 사항 - 2012년 민주통합당 경선 사례)

  • Choi, Jong Myung;Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.21-29
    • /
    • 2012
  • Mobile voting can reduce the costs spent in elections, and it can encourage people to participate in the elections more actively because it allows them to vote anytime at anywhere. The trial of mobile voting in 2012 by Democratic United Party in Korea, showed the possibilities of mobile democracy but it also showed very critical problems such as illegal voting by proxy, source code open, open to nationwide for local parliamentary candidate ballot, privacy and hacking. In this paper, we analyze the result of the mobile ballot trial, and introduce the problems that has been revealed. After that we propose some system requirements for the new mobile voting system to prevent the problems according to the stages of voting: system development, voting stage, and counting and validating stage. At each stage, there are several requirements to be met for reliable mobile voting. Our research contribute to mobile democracy and implementation of mobile voting systems in that we analyzed the real case and raised issues for the real problems.

Performance Evaluation of Multi-path Source Routing Protocol according to Mobility Model (이동성 모델에 따른 다중경로 소스 라우팅 프로토콜의 성능평가)

  • Kim, Su-Sun;Kim, Moon Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5559-5564
    • /
    • 2015
  • A variety of routing protocols targeted specifically at mobile ad-hoc network environments have been developed. Mobile ad-hoc network is a self-organizing temporary network, operating without the aid of any established wired infrastructure. The proposed protocol supports seamless communication services between the mobile hosts within a mobile ad-hoc network environments. In particular, our protocol makes faster route re-establishment possible by maintaining multiple paths in each mobile host, and also, the protocol provides reliable communication environments. We compare the performance of RWP model with that of LW model. This paper shows delivery ratio with single path and non-disjoint multiple path according to mobility model and node numbers.

Design and Implementation of the ATM Handoff Subsystem Supporting Soft-Handoffs between Mobile Switching Centers

  • Yun Sung-Hyun;Cho Kwang-Moon
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.45-49
    • /
    • 2005
  • If the service provider provides mobile service with mobile switching centers that use different handoff message format, the soft-handoff between mobile switching centers is not available and the hard-handoff scheme is used instead. When this occurs, calls are often disconnected or there is an interruption of service. This can be very annoying to a mobile user. We propose the handoff subsystem of the ATM switch which provides the soft-handoff between wireless cells under the control of different MSCs. The proposed handoff subsystem transforms the handoff message format of the source MSC to that of the destination MSC. It also provides efficient routing scheme that distributes handoff packets to balance the traffic load.

  • PDF

Development of a magnetic caterpillar based robot for autonomous scanning in the weldment (용접부 자동 탐상을 위한 이동 로봇의 개발)

  • 장준우;정경민;김호철;이정기
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.713-716
    • /
    • 2000
  • In this study, we present a mobile robot for ultrasonic scanning of weldment. magnetic Caterpillar mechanism is selected in order to travel on the inclined surface and vertical wall. A motion control board and motor driver are developed to control four DC-servo motors. A virtual device driver is also developed for the purpose of communicating between the control board and a host PC with Dual 'port ram. To provide the mobile robot with stable and accurate movement, PID control algorithm is applied to the mobile robot control. And a vision system for detecting the weld-line are developed with laser slit beam as a light source. In the experiments, movement of the mobile robot is tested inclined on a surface and a vertical wall.

  • PDF

Reactive Routing Keyword based Routing Procedure in MANET (MANET에서의 Reactive Routing Keyword 기반 라우팅 프로시듀어)

  • Park Soo-Hyun;Shin Soo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.4
    • /
    • pp.55-69
    • /
    • 2004
  • In MANET(Mobile Ad-hoc Network), unlike in wired networks, a path configuration should be in advance of data transmission along a routing path. Frequent movement of mobile nodes, however, makes it difficult to maintain the configured path and requires re-configuration of the path very often. It may also leads to serious problems such as deterioration of QoS in mobile ad-hoc networks. In this paper, we proposed a Reactive Routing Keyword (RRK) routing procedure to solve those problems. Firstly, we noticed it is possible in RRK routing to assign multiple routing paths to the destination node. We applied this feature into active networks and SNMP information based routing by storing unique keywords in cache of mobile nodes corresponding to present and candidate routings in a path configuration procedure. It was shown that the deterioration of QoS which may observed in Dynamic Source Routing(DSR) protocol was greatly mitigated by using the proposed routing technique.

  • PDF

A study on mobile lighting control technologies using open source (오픈소스 기반 Mobile 조명제어 기술 연구)

  • Park, Won-Woo;Park, Ki-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1140-1142
    • /
    • 2012
  • 본 연구는 스마트폰으로 조명등을 원격에서 제어하기 위한 Mobile 조명제어시스템(LMS)에 관한 것으로 특히 조명제어서버 내에 제어기와 Database를 직접 동기화시키는 Thread Pool 방식을 사용하여 별도의 에이전트 프로그램의 탑재 없이도 스마트폰에서 직접 데이터베이스에 접속하여 제어되게 함으로써 스마트폰 내에서 이루어지는 작업을 최소화 하고 결과적으로 스마트폰 뿐만 아니라 BEMS, FEMS, BAS와 같은 외부 장비와의 연계운영이 용이하며 Mobile 프로그램의 개발 및 운영환경을 제공할 수 있는 Mobile 조명제어장치의 연구 내용을 소개하고 있다.

Building a Mobile AR System Based on Visual SLAM (Visual SLAM 기반의 모바일 증강현실 시스템 구축)

  • Song, Ju Eun;Kook, Joongjin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.4
    • /
    • pp.96-101
    • /
    • 2021
  • The SLAM market is growing rapidly with advances in Machine Learning, Drones, Augmented Reality technologies. However, due to the absence of an open source-based SLAM library for developing AR content, most SLAM researchers are required to conduct their own research and development to customize SLAM. In this paper, we propose an opensource-based Mobile Markerless AR System by building our own pipeline based on Visual SLAM. To implement the Mobile AR System of this paper, it uses ORB-SLAM3 and Unity Engine and We experimented with running our system in a real environment and confirming it in the Unity Engine's Mobile Viewer. Through this experimentation, we can verify that the Unity Engine and the SLAM System are tightly integrated and communicate smoothly. Also, we expect to accelerate the growth of SLAM technology through this research.

Sound Source Localization Method Based on Deep Neural Network (깊은 신경망 기반 음원 추적 기법)

  • Park, Hee-Mun;Jung, Jong-Dae
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1360-1365
    • /
    • 2019
  • In this paper, we describe a sound source localization(SSL) system which can be applied to mobile robot and automatic control systems. Usually the SSL method finds the Interaural Time Difference, the Interaural Level Difference, and uses the geometrical principle of microphone array. But here we proposed another approach based on the deep neural network to obtain the horizontal directional angle(azimuth) of the sound source. We pick up the sound source signals from the two microphones attached symmetrically on both sides of the robot to imitate the human ears. Here, we use difference of spectral distributions of sounds obtained from two microphones to train the network. We train the network with the data obtained at the multiples of 10 degrees and test with several data obtained at the random degrees. The result shows quite promising validity of our approach.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

A New Blind Beamforming Procedure Based on the Conjugate Gradient Method for CDMA Mobile Communications

  • Shin, Eung-Soon;Choi, Seung-Won;Shim, Dong-Hee;Kyeong, Mun-Geon;Chang, Kyung-Hi;Park, Youn-Ok;Han, Ki-Chul;Lee, Chung-Kun
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.133-148
    • /
    • 1998
  • The objective of this paper is to present an adaptive algorithm for computing the weight vector which provides a beam pattern having its maximum gain along the direction of the mobile target signal source in the presence of interfering signals within a cell. The conjugate gradient method (CGM) is modified in such a way that the suboptimal weight vector is produced with the computational load of O(16N), which has been found to be small enough for the real-time processing of signals in most land mobile communications with the digital signal processor (DSP) off the shelf, where N denotes the number of antenna elements of the array. The adaptive procedure proposed in this paper is applied to code division multiple access (CDMA) mobile communication system to show its excellent performance in terms of signal to interference plus noise ratio (SINR), bit error rate (BER), and capacity, which are enhanced by about 7 dB, ${\frac{1}{100}}$ times, and 7 times, respectively, when the number of antenna elements is 6 and the processing gain is 20 dB.

  • PDF