• Title/Summary/Keyword: Smart Mobile Devices

Search Result 805, Processing Time 0.026 seconds

Estimating Indoor Radio Environment Maps with Mobile Robots and Machine Learning

  • Taewoong Hwang;Mario R. Camana Acosta;Carla E. Garcia Moreta;Insoo Koo
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.92-100
    • /
    • 2023
  • Wireless communication technology is becoming increasingly prevalent in smart factories, but the rise in the number of wireless devices can lead to interference in the ISM band and obstacles like metal blocks within the factory can weaken communication signals, creating radio shadow areas that impede information exchange. Consequently, accurately determining the radio communication coverage range is crucial. To address this issue, a Radio Environment Map (REM) can be used to provide information about the radio environment in a specific area. In this paper, a technique for estimating an indoor REM usinga mobile robot and machine learning methods is introduced. The mobile robot first collects and processes data, including the Received Signal Strength Indicator (RSSI) and location estimation. This data is then used to implement the REM through machine learning regression algorithms such as Extra Tree Regressor, Random Forest Regressor, and Decision Tree Regressor. Furthermore, the numerical and visual performance of REM for each model can be assessed in terms of R2 and Root Mean Square Error (RMSE).

Flow-based Seamless Handover Scheme for WLANs Using an Overlaid 4G Network (중첩된 4G망을 이용한 플로우 기반의 끊김없는 WLAN 핸드오버 방안)

  • Choi, Jae-In;Park, In-Soo;Cho, You-Ze
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.7-14
    • /
    • 2014
  • The rapid increase of mobile devices such as smart phone and smart pad have raised the needs for seamless multimedia services during moving at anytime and anywhere. Current 4G mobile devices are equipped with both 4G (LTE) and WLAN (WiFi) interfaces, and mobile services operators provide wireless Internet services using 4G network with a wider coverage and WiFi zone. Generally users prefer to use the Internet services through WLAN rather than LTE in the coverage of WLAN. However, since WLAN has a long L2 handover latency, it is difficult to support seamless services during a handover. In this paper, we proposed an efficient handover scheme based on flow mobility for WLANs to support a seamless service during handovers by using the overlaid 4G network with a wider coverage. Also, we showed the outperformance of the proposed scheme on a testbed.

A Subway Arrival Notification System Using iBeacon (iBeacon을 이용한 지하철 도착 알림 시스템)

  • Jung, Hyun-Hee;Nam, Choon-Sung;Shin, Dong-Ryeol
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.272-279
    • /
    • 2015
  • Concurrent with the more widespread usage of smart devices, mobile users' desires are becoming much more complex. Most IT experts insist that smart devices should have additional functions to satisfy these requirements. In particular, research has concentrated on LBS (Locationbased Service), because it is considered one of the most common mobile service types. Generally, Wi-Fi has a critical limitation for use for LBS services, because it requires new network connection points whenever its location (Network Zone) changes. Unfortunately, GPS also has a systematic problem in providing LBS service in the indoor environment, because of its inaccuracy in processing data. So, to redress these limitations, iBeacon technology has been designed, and is currently used for LBS service instead of Wi-Fi or GPS. By using iBeacon, which is based on Bluetooth 4.0 LE technology, we propose a M-SAS (Mobile-Subway-Alarm-Service System) that could accurately and timely provide its users with various mLBS (micro LBS) services, such as current user location, and subway arrival time.

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

Investigating Cursor Control Types for Text Entry on Smartphones (스마트폰에서의 텍스트 입력을 위한 커서 조작 방식 연구)

  • Ahn, Junyoung;Kim, Kyungdoh
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.5
    • /
    • pp.352-359
    • /
    • 2016
  • The soft keyboard with touch interaction is universally available on mobile phone, a variety of previous studies with respect to the soft keyboard on smart devices had been conducted. However, previous studies of cursor control for text entry on smart devices such as smartphone did not performed. In this study, we compared three types of cursor controls (Default, 3D touch, Slide) in smartphone using Fitts' law and C-D ratio. Then we performed a laboratory experiment with three cursor control types and evaluated using cursor movement time as a quantitative evaluation and 8 subjective metrics for usability as a qualitative evaluation. Then, we discussed what types of cursor control showed better performance and subjective satisfaction through their results. From these results, this study recommended the design guidelines for cursor control on smartphones and developed its study methods as our contributions.

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

A Manually Captured and Modified Phone Screen Image Dataset for Widget Classification on CNNs

  • Byun, SungChul;Han, Seong-Soo;Jeong, Chang-Sung
    • Journal of Information Processing Systems
    • /
    • v.18 no.2
    • /
    • pp.197-207
    • /
    • 2022
  • The applications and user interfaces (UIs) of smart mobile devices are constantly diversifying. For example, deep learning can be an innovative solution to classify widgets in screen images for increasing convenience. To this end, the present research leverages captured images and the ReDraw dataset to write deep learning datasets for image classification purposes. First, as the validation for datasets using ResNet50 and EfficientNet, the experiments show that the dataset composed in this study is helpful for classification according to a widget's functionality. An implementation for widget detection and classification on RetinaNet and EfficientNet is then executed. Finally, the research suggests the Widg-C and Widg-D datasets-a deep learning dataset for identifying the widgets of smart devices-and implementing them for use with representative convolutional neural network models.

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

A study of Content Generation System using QR Code in Smart Phone Environment (스마트폰 환경에서 QR Code를 활용한 콘텐츠 생성시스템 연구)

  • Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.2999-3004
    • /
    • 2013
  • Smartphone subscribers exceeded 30 million people, Smart Korea is up on this track, and leaping to 'Smart powerful nation from 'IT powerful nation. Of course, the popularization of the smart phone called 'PC in the hands' has brought a revolutionary change to nation livelihood, and also to business and government, too. The current usage of Smartphone is not just a simple function call, people can communicate anytime, anywhere with it. The current usage of Smartphone is not just a simple function call, people can communicate anytime, anywhere with it. And it has become the culture of the terminal type in the hands whenever and wherever. However, the screen size and the existing flash or video files do not run when trying to access to the homepage for PC with Smartphone. and it may gives the inconvenience to people who use mobile devices. Therefore, in this paper, it is a study for the provision of an efficient service for Smartphone users through the establishment of website for mobile in mobile circumstances.

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.