• Title/Summary/Keyword: User Terminal

Search Result 449, Processing Time 0.029 seconds

A Study of the Use of Online Public Access Catalogs (온라인목록(Online Public Access Catalog : OPAC) 이용의 편이도에 관한 연구)

  • Ro Moon Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.151-188
    • /
    • 1990
  • The aims of automation efforts in libraries are the rationalization of interval work and improvement of user services. After a period of exclusive internal computer utilization, later voluntary contact with the computer (e.g., circulation control with self services), patrons of American libraries now have to go to a computer terminal if they want certain information. Online public access catalogs(OPAC) have been used in American libraries since the end of the seventies. But OP AC are accepted by patron only if they have a useful and flexible user interface. This paper briefly describes the use of online catalogs in different type of libraries, categories of user (user, non-user), aspect of catalog use in context with computer experience etc. The disscussion then focuses on the characteristics of the final report of online catalog use study of Council on Library Resources and user problems in searching, as reported in many other catalog use studies.

  • PDF

User Interface Design in Online Services (온라인 서어비스의 이용자 접속 디자인)

  • 김선호
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.7 no.1
    • /
    • pp.147-169
    • /
    • 1994
  • The study is to assist system developers or designers who are participated in the design of the user-computer interface on online services such as Online Public Access Catalogue and Online Search-ins. To design the optimal user interface, system developers and designers should try to complete the following process orderly: 1) they should know and understand the active and potential user's information seeking behaviors concerning online services in details as possible. 2) they should design the conceptional user model on basis of that knowledge. 3)They should design the logical and hierachical computer model adaptable to the current environment. 4) they should design the display of the computer terminal which is ease to learn and use by the users. 5) finally, they should design the optimal and practical user inter-face on basis of the above 2, 3, and 4.

  • PDF

A Study on PIN-based Authentication and ID Registration by Transfer in AAA System (AAA시스템에서의 이동에 따른 PIN 기반의 인증 및 ID 등록에 관한 연구)

  • Kang Seo-Il;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.359-368
    • /
    • 2006
  • AAA(Authentication, Authorization, Accounting) is the service that offers authentication, authorization, and accounting method, and every terminal that accesses the network requires this AAA service. The authentication process of a mobile terminal is as follows: a mobile phone accesses an authentication server in a home network via the authentication service in an external network, which receives the authentication result. And, for the home authentication server to offer secure service, a unique key is distributed for the secure communication between the external agent and the user, the external agent and the home authentication server, and the user and the home authentication server. This paper discusses and proposes the key distribution for secure communication among external authentication servers when a mobile terminal travels to an external network. As the proposed method does not require the home authentication server to reissue another authentication when a user travels to other external networks, it reduces the overload in the home authentication server. It can also distribute a PIN-driven key.

An Energy-Efficient MAC Protocol for Werable Device WBAN Environment through Asymmetric Method and QoS (Wearable 장치를 사용하는 WBAN 환경에서 장치 간 비대칭적 에너지 효율과 QoS를 위한 MAC 제안)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6A
    • /
    • pp.395-404
    • /
    • 2012
  • In general, WBAN environment which use wearable devices on the human body show the different characteristics from other personal area networks. It is usually composed of sensors contacting the body and user terminal collecting the data from the sensors. The sensors are under the significant constraint of the energy resources, but the user terminal is different because it can be recharged and relatively have large energy resources. Under this characteristics, we design a new MAC protocol considering this requirements. The proposed MAC protocol can increase the energy efficiency of sensors and loads the unavoidable energy consumption to the user terminal for high energy efficiency of sensors. Additionally, the proposed MAC protocol provides the low delivery delay of the emergency information for the differentiated QoS because the emergency data requires more rapid transmission than the periodic sensed data. For this requirement, we employ the IFS (Inter Frame Space). For the efficient and objective evaluation of the proposed MAC protocol, IEEE 802.15.6 MAC is used to compare with it and we show that the advantage of the proposed MAC meet our expectation.

Development of a Novel Mobile Terminal Software Architecture supporting Energy Efficient Vertical Handover (에너지 효율적 이종망간 핸드오버를 지원하는 새로운 모바일 단말 소프트웨어 아키텍쳐 개발)

  • Park, Seung-Min;Kim, Won-Tae;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.10-23
    • /
    • 2009
  • In this paper we propose a novel mobile terminal software architecture supporting energy efficient handover operation in heterogeneous networks. Since the legacy proposals for L3 handover are mostly dependent on IETF Mobile IP which has some problems in movement detection mechanism and no considerations on nested heterogeneous network environment as a result they make serious overload on networks and terminals by performing unnecessary handover in such network environments. The proposed architecture has terminal-oriented network selection and switching architecture where a mobile terminal periodically monitors network status and selects the optimum network, and reduces energy consumption by making L3 handover of Mobile IP to the finally selected network. The network selection method first picks up some candidate networks by considering a terminal speed and power consumption estimation, and determines the final target handover network among the candidates after evaluating multiple factors including QoS required by a terminal, network status, user preference and terminal battery status. Finally we verify the functionality and performance of the energy efficient vertical handover architecture by means of adopting it into a real mobile terminal.

System of gas sensor for conbinating wire and wireless using Internet of Things (IOT기술을 이용한 유무선 통합 가스검출 시스템 구현)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.297-304
    • /
    • 2015
  • This study concerns the integrated gas sensor system of wire and wireless communication by using IoT(Internet of Things) technology. First, communication part is that it delivers the detection information, which transferred by wire or wireless communication and required control procedure based on a wireless module that receives the gas leakage information from wired or wireless detector, to administrator or user's terminal. Second, receiver part is that it shows the location and information, which received from the wired detector formed by a detecting sensor's node as linking with the communication part, and transfers these to the communication part. Third, wireless detector formed as a communication module of a detecting sensor node is that it detects gas leakage and transfers the information through wireless as a packet.Fourth, wired detector communicated with the receiver part and formed as a communication module of a detecting sensor node is that it detects gas leakage, transfers and shows the information as a packet. Fifth, administrator's terminal is that it receives gas leakage information by the communication part, transfers the signal by remote-control, and shut off a gas valve as responding the information. Sixth, database is that it is connected with the communication part; it sets and stores the default values for detecting smoke, CO., and temperature; it transfers this information to the communication part or sends a gas detecting signal to user's terminal. Seventh, user's terminal is that it receives each location's default value which stored and set at the database; it manages emergency situation as shutting off a gas valve through remote control by corresponding each location's gas leakage information, which transferred from the detector to the communication part by wireless.It is possible to process a high quality data regarding flammable or toxic gas by transferring the data, which measured by a sensor module of detector, to the communication part through wire and wireless. And, it allows a user to find the location by a smart phone where gas leaks. Eventually, it minimizes human life or property loss by having stability on gas leakage as well as corresponding each location's information quickly.

An Information Security Scheme Based on Video Watermarking and Encryption for H.264 Scalable Extension (H.264 Scalable Extension을 위한 비디오 워터마킹 및 암호화 기반의 정보보호 기법)

  • Kim, Won-Jei;Seung, Teak-Young;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.3
    • /
    • pp.299-311
    • /
    • 2012
  • Recently, H.264 SE(scalable extension) has become a standard of next generation multimedia service which is one source, multi-user service in the telecommunication environment of different kinds of networks and terminal equipments. But existing DRM schemes for multimedia service are not fit for H.264 SE system. Because the amount of transmitted multimedia data is changed considering network environment and terminal equipments' performance by the system, but in the existing DRM schemes, the amount of handled multimedia data are not variable according to network environment and terminal equipments' performance. In this paper, an information security scheme combined video watermarking and encryption is presented for H.264 SE. Amount of watermarks and embedding positions are calculated by the frame number of enhancement layers which are created according to the state of networks and terminal equipments. In order to minimize delayed time by video watermarking and encryption, the video data are watermarked and encrypted in the H.264 SE compression process. In the experimental results, we confirmed that proposed scheme is robust against video compression, general signal processing and geometric processing.

Design and Implementation of Embedded Linux-based Mobile Teller which supports CDMA and WiBro networks (듀얼모드 통신 지원 임베디드 리눅스 기반의 모바일 이야기꾼 설계 및 구현)

  • Kim, Do-Hyung;Yun, Min-Hong;Lee, Kyung-Hee;Lee, Cheol-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.131-138
    • /
    • 2008
  • This paper describes the implementations of the first application service based on embedded Linux; Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. Currently, with the appearance of WiBro service, dual-mode terminals which support two heterogeneous networks are available. But, the development of applications which effectively use these networks for providing better service to user is rarely prepared. At Mobile Teller, when a sender on a dual-mode terminal types texts, the texts are transmitted to a TTS server located in the Internet through WiBro network. Subsequently, the TTS server converts the texts into voices and transmits the voice data to the dual-mode terminal. At last the dual-mode terminal sends the voice to the receiver through the CDMA network. In case of noisy environment or when a user has difficulty in speaking, Mobile Teller makes voice communication possible

Development of Mobile Performance Management System Using Real-Time Monitoring Method (실시간 모니터링 기법을 이용한 모바일 성능 관리 시스템 개발)

  • Jeong, Taeg-Won;Lee, Chul-Han;Lee, Chong-Deuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1894-1902
    • /
    • 2009
  • As the spread of LBS(Location Based Service), MDT(Mobile Data Terminal) and PDA (Personal Digital Assistant) services using mobile terminals, various systems are under development to to manage the performance of these services. This paper describes a mobile performance management system which is implemented to test the performance of mobility between the user and the terminal or between the terminal and the mobile server automatically in the mobile-user field. The system has four modules: scenario management module, MDT monitoring, LBS monitoring, and PDA monitoring. The scenario management module manages the performance by monitoring all modules. The LBS monitoring module monitors LBS call attempt stage, call connecting stage, and LBS test for established connection. Thus, the LBS monitoring module manages the performance for every stage of the call. The MDT monitoring module monitors the performance according to the input command and the PDA monitoring module monitors according to the input from the set up and the execution menu.

A Study on Barrier-free Certification Evaluation of the Bus Terminals (여객자동차터미널의 장애물 없는 생활환경 인증 평가에 관한 연구)

  • Kang, Byoung-Keun;Kang, Tae-Sung;Kim, Sang-Woon;Lee, Joo-Hyung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.22 no.2
    • /
    • pp.7-14
    • /
    • 2016
  • Purpose: Caring for weak person in society, which increases the population of the elderly and people with disabilities is essential. By increasing along with the increase of the use of passenger facilities for travelers and pedestrian is increasing the demand for convenient and secure facilities for everyone. The emerging importance of the passenger-related facilities, but a representative study of the bus terminal facilities is lacking. Bus terminals are the most popular passenger facility. Thus, the bus terminal can be conveniently used by anyone in everyday life, however, the applied elements considering the use of the transportation Poor are not sufficient. Methods: This study was conducted to evaluate BF certification standards targeting bus terminals across the country to determine the availability of the transportation Poor in bus terminal. Result: As a result of the bus Terminal possibility BF certified it appeared to be very low. Also, items received the lowest rating of each item was evaluated in the informative facilities and items. Bus terminal is a facility used by the unspecified individuals, the proportion of first-time user is high, but there is a lack of consideration for the transportation Poor bus terminals. Implications: In the future, this study can guide the next research on the application of BF certification standards in bus terminal. Further studies can be presented to the improvement of the BF certification indicator in bus terminal.