• Title/Summary/Keyword: Portable Information Devices

Search Result 265, Processing Time 0.028 seconds

Mobile Contents Adaptation Network using Active Network Mechanisms (액티브 네트워크 메커니즘을 이용한 이동 컨텐츠 적응형 네트워크)

  • 김기조;이준호;임경식;오승희;남택용;손승원
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.384-392
    • /
    • 2004
  • Mobile contents service providers have some difficulties to timely and proper service deployment due to rapid development cycle of diverse portable devices with different capabilities. A way to resolve the problem is to introduce a mobile contents service paltform that can adapt original mobile contents to diverse devices dynamically and automatically. In this paper, we propose a mobile contents service platform based on active network mechanisms, called Mobile Content Adaptation Network(MobiCAN). The MobiCAN node provides effective service deployment, execution, and maintenance features and accommodates service layering and service customization capabilities for easy deployment. The basic functional units of the MobiCAN node are micro services with well-defined service interfaces and service layering features. For reliable services among the MobiCAN nodes, we design new distributed and robust Overlay Management Protocols(OMPs). As an example of practical MobiCAN applications, we finally describe Dynamic Contents Customization Proxy(DCCP) service.

Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)

  • In, Hoh Peter;Lee, Myoung-Rak;Kim, Do-Hoon;Kim, Nung-Hoe;Yoon, Byung-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1329-1345
    • /
    • 2011
  • After the 9.11 terror attack, lawful Interception (LI) has emerged as an important tool for anti-terrorist activity. Law enforcement agents and administrative government bodies effectively monitor suspicious target users of permanent IP-based network devices by LI in Packet Data Networks (PDNs). However, it is difficult to perform LI in monitoring migrating users from a location to another, who change their IPs due to the proliferation of portable Internet devices enabling 3G IP Multimedia Subsystems (IMS). The existing, manual handover technique in 3G IMS makes it even more difficult to continue the LI activities due to time-lag reissuance of LI authority warrants when the target users move to a new LI jurisdiction via a roaming service. Our proposed model is a seamless LI handover mechanism in 3G IMS to support mobility detection of the target users. The LI warrants are transferred to the new LI agent automatically with the target users when they move to a new LI jurisdiction. Thus, time-lag human intervention of reissuance of the LI warrants is removed and enables the LI authorities to continue monitoring. In the simulation of our proposed mechanism, the quality of lawful interception achieves a mean score of over 97.5% out of the possible 100% maximum score, whereas the quality of the existing mechanism has a mean score of 22.725%.

Low Energy Motion Estimation Architecture using Energy Management Algorithm (에너지 관리 알고리즘을 이용한 저전력 움직임 추정기 구조)

  • Kim Eung-sup;Lee Chanho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.793-800
    • /
    • 2005
  • Computation of multimedia data increases in portable devices with the advances of the mobile and personal communication services. The energy management of such devices is very important for the battery-powered operation hours. The motion estimation in a video encoder requires huge amount of computation, and hence, consumes the largest portion of the energy consumption. In this paper, we propose a novel architecture that a low energy management scheme can be applied with several fast-search algorithms. The energy-constrained Vdd hopping (ECVH) technique reduces power consumption of the motion estimation by adaptively changing the search algorithm, the operating frequency, and the supply voltage using the remaining slack time within given power-budget. We show that the ECVH can be applied to the architecture, and that the power consumption can be efficiently reduced.

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

Implementation of Smartphone based Mobile Office for a Logistics Company using HTML5 (HTML5를 이용한 물류기업의 모바일 오피스 구현에 관한 연구)

  • Lim, Yongtaek;Byun, Haegwon;Yoo, Woosik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.433-442
    • /
    • 2012
  • This paper focuses on developing a smartphone-based mobile office system for a logistics company in Korea using HTML5. Mobile office is smart working environment of working out of a company office using mobile devices such as smartphones and portable computers which are connected to the company servers via WiFi or 3G/4G. Recently many companies are introducing mobile office information systems with the smartphone wave, but they are having difficulties in maintaining and updating their systems due to the transformative mobile application platform. Therefore, we need a platform-independent implementation tools for the mobile office application and HTML5 is one of the solution tools. In this paper, we develop mobile and web applications applicable to all kinds of mobile devices such as iOS, android and windows mobile etc using HTML5. The proposed mobile office system consists of groupware, marketing management, reporting module and transportation management system.

Channel Selection Method of Wireless Sensor Network Nodes for avoiding Interference in 2.4Ghz ISM(Industrial, Scientific, Medical) Band (2.4Ghz ISM(Industrial Scientific Medical) 밴드에서 간섭을 회피하기 위한 무선 센서 노드의 채널 선택 방법)

  • Kim, Su Min;Kuem, Dong Hyun;Kim, Kyung Hoon;Oh, Il;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.109-116
    • /
    • 2014
  • In recent, ISM (Industrial Scientific Medical) band that is 2.4GHz band authorized free of charge is being widely used for smart phone, notebook computer, printer and portable multimedia devices. Accordingly, studies have been continuously conducted on the possibility of coexistence among nodes using ISM band. In particular, the interference of IEEE 802.11b based Wi-Fi device using overlapping channel during communication among IEEE 802.15.4 based wireless sensor nodes suitable for low-power, low-speed communication using ISM band causes serious network performance deterioration of wireless sensor networks. This paper examined a method of identifying channel status to avoid interference among wireless communication devices using IEEE 802.11b (Wi-Fi) and other ISM bands during communication among IEEE 802.15.4 based wireless sensor network nodes in ISM band. To identify channels occupied by Wi-Fi traffic, various studies are being conducted that use the RSSI (Received Signal Strength Indicator) value of interference signal obtained through ED (Energy Detection) feature that is one of IEEE 802.15.4 transmitter characteristics. This paper examines an algorithm that identifies the possibility of using more accurate channel by mixing utilization of interference signal and RSSI mean value of interference signal by wireless sensor network nodes. In addition, it verifies such algorithm by using OPNET Network verification simulator.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Risk Management and Telecommunications Research for customers of the accident location (사고선박의 고객위치파악용 위험관리 통신연구)

  • Kwak, Eun-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.331-335
    • /
    • 2016
  • When a boating accident, such as a January number three, the customer's risk management issues emerged. Ships and accident risk in confined spaces such as risk management to locate the customer and dangers of probation is available. In this paper, aboard after consent to obtain information for customers to wrist to customers, webbing or portable device embedded in devices and Wireless sensor information Input was attached, disposable consumer information. Customer on board the ship setting for location analysis and positioning according to information communication protocol, ships, each customer's real-time location information on the screen, 3 the foundation of d customers on the floor Can be designed to inform. Threshold designed to reduce the error of the information to analyze the position in current position and errors. Also, to system attacks would control the situation of accident and emergency jaenanguk server with real-time information transmission of information outside the emergency during a disaster, search and Disaster relief to be possible.

  • PDF

Output Noise Reduction Technique Based on Frequency Hopping in a DC-DC Converter for BLE Applications

  • Park, Ju-Hyun;Kim, Sung Jin;Lee, Joo Young;Park, Sang Hyeon;Lee, Ju Ri;Kim, Sang Yun;Kim, Hong Jin;Lee, Kang-Yoon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.5
    • /
    • pp.371-378
    • /
    • 2015
  • In this paper, a different type of pulse width modulation (PWM) control scheme for a buck converter is introduced. The proposed buck converter uses PWM with frequency hopping and a low quiescent.current low dropout (LDO) voltage regulator with a power supply rejection ratio enhancer to reduce high spurs, harmonics and output voltage ripples. The low quiescent.current LDO voltage regulator is not described in this paper. A three-bit binary-to-thermometer decoder scheme and voltage ripple controller (VRC) is implemented to achieve low voltage ripple less than 3mV to increase the efficiency of the buck converter. An internal clock that is synchronized to the internal switching frequency is used to set the hopping rate. A center frequency of 2.5MHz was chosen because of the bluetooth low energy (BLE) application. This proposed DC-DC buck converter is available for low-current noise-sensitive loads such as BLE and radio frequency loads in portable communications devices. Thus, a high-efficiency and low-voltage ripple is required. This results in a less than 2% drop in the regulator's efficiency, and a less than 3mV voltage ripple, with -26 dBm peak spur reduction operating in the buck converter.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.