• Title/Summary/Keyword: Mobile technology

Search Result 6,584, Processing Time 0.03 seconds

A Study on the Current Situation and Promotion Plans of the Mobile Industry (모바일 산업의 현황과 활성화 방안에 관한 연구)

  • Kim, Jang-Ho
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.47-69
    • /
    • 2003
  • The computer was only used to calculate and solve the mathematical problems, to send the simple data, and to exchange the text based informations in the early 1990's. But nowadays, computer technology give us the chance to exchange digital goods and services, etc. And more, computer and computer based systems can be applied everywhere, for example, it can be used at office, at home, and at school. Most of all, one of the remarkable changes is the development of mobile industry, which can be applied anywhere and anytime. So, this study focused on the current situation and promotion plans of the mobile industry. Mobile is based on the IT, IT and mobile technology are the foundation stone of ubiquitous computing environments. Accordingly, this thesis analysis the meaning of ubiquitous, the meaning and roll of mobile industry. With the analysis of this, the conclusion is that to develop and success the new business model at home and overseas, the cooperation of government section and industry section is the most import thing to make it out.

  • PDF

Design of A Downlink Power Control Scheme in Unequal Error Protection Multi-Code CDMA Mobile Medicine System

  • Lin, Chin-Feng;Lee, Hsin-Wang;Hung, Shih-Ii;Li, Ching-Yi
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.335-338
    • /
    • 2005
  • In this paper, we propose a downlink power control scheme to apply in the unequal error protection multi-code CDMA mobile medicine system. The mobile medicine system contains (i) blood pressure and body temperature measurement value, (ii) ECG medical signals measured by the electrocardiogram device, (iii) mobile patient's history, (iv) G.729 audio signal, MPEG-4 CCD sensor video signal, and JPEG2000 medical image. By the help of the multi-code CDMA spread spectrum communication system with downlink power control scheme and unequal error protection strategy, it is possible to transmit mobile medicine media and meet the quality of service. Numerical analysis and simulation results show that the system is a well transmission platform in mobile medicine.

  • PDF

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Design and implementation of Mobile Electronic Payment Gateway System based on M-Commerce Security Platform (M-Commerce 보안 플랫폼상의 무선 전자지불시스템 설계 및 구현)

  • 김성한;이강찬;민재홍
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.35-50
    • /
    • 2002
  • Recently, payment method is one of the most hot issues for transaction of contents in mobile and internet markets. Many kinds of mobile contents services are rapidly growing with the combination of internet application services. Payment method algorithms are demanded for the stable transaction between producer and consumer. Security protocol algorithms are widely adapted for mobile Platform terminals. In this Paper, we described security mechanism for the current wireless internet services and compared with the performance result. There are security protocols that based on java machine platform or WAP protocols. The system is based on J2ME technology for the java mobile platform. Based on this technology, a security system is proposed for the service of mobile commerce electronic payment. The system is designed for the stability of transaction so that it enables to apply into many kinds of internet payment system.

  • PDF

The Impact of Ubiquitous Factors on Intention to Use Mobile Services (유비쿼터스 특성요인이 모바일 서비스의 사용의도에 미치는 영향)

  • Cha, Yoon-Sook;Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.69-91
    • /
    • 2007
  • The mobile computing environment has already matured and mobile services are activated throughout many industries. In the following years, these changes are expected to evolve into a ubiquitous computing environment. In the meantime, whether newly developed information technologies will thrive or diminished depends on user's intention to adopt them. Hence, the necessity of user-centered research considering ubiquitous computing in mobile computing environment is obvious. This study, thus, investigated ubiquitous factors in various literature related to ubiquitous computing and technology acceptance and it proposes a research model of the ubiquitous factors affecting user's intention to use mobile services, in terms of meaning(connectivity, mobility), service(contextual offer), compatibility(compatibility), and infrastructure(privacy, truth). The proposed model is expected to help both researchers and practitioners extend their understanding about the ubiquitous factors in mobile computing environment

  • PDF

A Study on the Information Security Control and Management Process in Mobile Banking Systems

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.218-232
    • /
    • 2015
  • According to the development of information processing technology and mobile communication technology, the utilization of mobile banking systems is drastically increasing in banking system. In the foreseeable future, it is expected to increase rapidly the demands of mobile banking in bank systems with the prevalence of smart devices and technologies. However, the keeping 'security' is very important in banking systems that handles personal information and financial assets. But it is very difficult to improve the security of banking systems only with the vulnerabilities and faults analysis methods of information security. Hence, in this paper, we accomplish the analysis of security risk factor and security vulnerability that occur in mobile banking system. With analyzed results, we propose the information security control and management processes for assessing and improving security based on the mechanisms which composes mobile banking system.

Demonstration of Mobile Fronthaul Test Bed Based on RoF Technology Supporting Two Frequency Assignments and 2 × 2 MIMO Antennas

  • Cho, Seung-Hyun;Han, Changyo;Chung, Hwan Seok;Lee, Jong Hyun
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1055-1064
    • /
    • 2015
  • We demonstrate a next-generation high-capacity mobile fronthaul based on radio over fiber (RoF) technology, which links between a digital unit and a radio unit supporting two frequency assignments and $2{\times}2$ multiple input, multiple output antennas. To confirm the technical feasibility of a mobile fronthaul, we experimentally investigate its down- and uplink end-to-end performances including the optical and radio frequency (RF) signal path. Frequency-dependent performance deviations, error vector magnitude variations, overall system performance variations caused by optical to electrical conversion, and intermediate frequency to RF conversions are examined. Experimental verifications on multiple LTE uplink signals are performed for the first time. We also demonstrate several commercial mobile Internet services, YouTube video streaming, and file transfers using off-the-shelf mobile devices, through a mobile fronthaul based on RoF.

Fuzzy Navigation Control of Mobile Robot equipped with CCD Camera (퍼지제어를 이용한 카메라가 장착된 이동로봇의 경로제어)

  • Cho, Jung-Tae;Lee, Seok-Won;Nam, Boo-Hee
    • Journal of Industrial Technology
    • /
    • v.20 no.B
    • /
    • pp.195-200
    • /
    • 2000
  • This paper describes the path planning method in an unknown environment for an autonomous mobile robot equipped with CCD(Charge-Coupled Device) camera. The mobile robot moves along the guideline. The CCD camera is used for the detection of the existence of a guideline. The wavelet transform is used to find the edge of guideline. It is possible for us to do image processing more easily and rapidly by using wavelet transform. We make a fuzzy control rule using image data as an input then determined the position and the navigation of the mobile robot. The center value of guideline is the input of fuzzy logic controller and the steering angle of the mobile robot is the fuzzy controller output. Some actual experiments show that the mobile robot effectively moves to target position by means of the applied fuzzy control.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

The Study on the Mobile internet proliferation in Korea (한국에서의 모바일인터넷활용에 관한 연구)

  • Kim, Kyung-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.147-148
    • /
    • 2016
  • The purpose of this paper is to investigate the diffusion process of mobile internet use in Korea and to explore the determinants driving MIU. A survey was conducted to collect data to empirically assess the research model. In total, 543 usable responses were collected using a questionnaire derived from previous research. Both the structural equation model and partial least squares were used to study the model concerning different user groups. Findings, The results indicate that there are significant differences in the users' perceptions of mobile internet usage during its different innovation diffusion stages. Of the determinants, perceived enjoyment is the most important predictor of mobile internet use. In addition to motivating users by making services more enjoyable, the findings suggest that practitioners should take the differences of adopter groups into account. Making the mobile internet easy to use and compatible with users' lifestyles would promote the use of technology as well.

  • PDF