• Title/Summary/Keyword: WiFi phone

Search Result 145, Processing Time 0.025 seconds

Design and Implementation of Prototype Anti-disaster Remote Control Robot Model using Smart Phone (스마트폰을 이용한 방재용 원격 조정 로봇의 프로토 타입 모델 설계 및 구현)

  • Choi, Sung-Jai
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.221-227
    • /
    • 2014
  • This paper presented a design which was a minimized remote control robot. This remote control robot was created for preventing life damage from conflagrations, nuclear events and HF gas accidents. This robot's system based smart phone that had camera and GPS systems. When fire came out, The robot figured out that how big fire was, where the fire was started and various aspects of situations. And The robot broadcasted the informations to smart phone using mobile application and wi-fi camera. By doing these, the fire mans could more accurate and be easier to plan a strategy for saving life. The body of robot are 2 parts. One is a car and the other one is a remote controller. By the power, 1step to 10steps, of grabbing remote controller could change the car's speed to move. Also, The prototype robot was already confirmed its utility itself.

Implementation of FMC Controller to connect IMS Service Networks (IMS 서비스망 연동을 위한 FMC 컨트롤러 구현)

  • Yoo, Seung-Sun;Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.85-90
    • /
    • 2015
  • Work environments within the firm with a concept of mobile office is growing divided into two sections. It's Wi-Fi FMC(Fixed Mobile Convergence) field Which are implemented in a telephone service available from existing fixed-line service in the center of the smart phones and the EMS(Enterprise Mobility Service) field to make people will be able to handle PC the center of the information system within an enterprise using a smart phone instead of terminal facility connects to a system in the workplace and external. This paper developed FMC controller to allow execution IMS(IP Multi-Media Subsystem) services to complement the issues of the FMC corporation, telephony service associated. The controller includes FMC automatic enrollment services, voice quality enhancement of the mobile phone, anywhere within the firm on his mobile phone calls can provide mobility and is also implemented FMC LCR function that use status information from mobile soft-phone within the IP-PBX.

Smart Phone Based Image Processing Methods for Motion Detection of a Moving Object via a Network Camera (네트워크 카메라의 움직이는 물체 감지를 위한 스마트폰 기반 영상처리 방법)

  • Kim, Young Jin;Kim, Dong Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.1
    • /
    • pp.65-71
    • /
    • 2013
  • In this work, new smart phone based moving target detection is proposed. In order to implement the task, methods of real time image transmission from network camera, motion detecting algorithm and its effective implementation are also addressed. The network camera transfers image data by MJPEG format which contains various information such as data and IP address, and the smart phone separates the image data received through a WiFi module. Later, the image data is converted to a Bitmap image format, and with the help of the embedded OpenCV library on a smart phone and algorithm, it was found that the moving object was identified effectively in terms of real time monitoring and detection.

A Study on Policies for the Activation of WiBro Market (와이브로 시장 활성화를 위한 정책 방안 연구)

  • Lee, Young-Suk;Jung, Jae-Lim;Park, Sang-Hyun;Kim, Sang-Wook
    • Korean System Dynamics Review
    • /
    • v.12 no.2
    • /
    • pp.37-67
    • /
    • 2011
  • This study first attempted to point out fundamental reasons behind the failure to have WiBro services off the saddle, investigating the previous studies, and second to screen the WiBro promotion policies after reviewing the major steps conducted thus far by the government. In order to put the screened policies in order by the importance, an AHP analysis was conducted targeting WiBro professionals in various fields such as government offices, universities, research institutes, and industry. One step further, causal loop diagramming on the system dynamics methodology was conducted to examine the dynamic structure of the WiBro market in holistic standpoint of view. Finally, a simulation model was developed based on the causal loop diagrams and the results of the AHP analysis in order to examine how various policy scenarios influence the growth of the WiBro market over time, and to compare the mix of policy options. Finally, the study attempted to draw some implications for WiBro vitalization.

  • PDF

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.

Developing Advanced Location-Based Route-Search Service for Smart-phones (진보된 스마트폰용 위치 기반 경로 검색 서비스 개발)

  • Pak, Woo-Guil;Lim, Sung-Man;Oh, Han-Joon;Yu, Kwang-Hyun;Kwon, Min-Young;Lee, Hee-Seung;Choi, Young-June
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.173-180
    • /
    • 2011
  • Various smart-phone applications for location-based service are enabled through mobile communications such as 3G and WiFi. We have developed MARS, an advanced location-based route-search application based on the Android platform. It provides three functions: route-registration, route-search, and route-evaluation. These functions are dynamically maintained by a web server, a database server, and user mobile terminals. As users can update location information using their smart-phone devices, servers provide the information and allow users to add, modify, and remove their own information as well as adding comments to others, while existing map services do not support direct inputs from users. We show our implementation process and demonstration of its operations. We also show the comparison results with existing services. Through these results, we can confirm that MARS can achieve better performance.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Design of Diigence/Indolence System using a Smart Phone (스마트폰을 이용한 근태관리시스템의 설계)

  • Jo, Hyun Joon;Lee, Dong Gi;Kim, Min Gyu;Park, Jin Soo;Kim, Dong Hyun;Ban, Chae Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.307-309
    • /
    • 2013
  • Diligence/Indolence records are the basic data at a human resource management and the essential data for measure salaries of employees. However, since the D/I systems using RFIDs or biometric sensors require hish costs to build and operate the D/I systems, it is difficult for to small business or self-employed business to use them. In this paper, we propose the Diligence/Indolence system to use the location identification of a smart phon. To locate the position of an employee, the WiFi signal of a smart phone and the wireless access point are exploited. Because the pre-owned hardware resources are used and initial building costs are low, it is easy for small business to use the proposed D/I system with low cost.

  • PDF

Additional location data transmission and Remote-controller App. Development using Smart Phone (스마트폰 기반 부가 위치 데이터 전송 및 Mobile 리모컨 App. 개발에 관한 연구)

  • Lee, JungHoon
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.12-16
    • /
    • 2013
  • In this paper, we proceeded a study about the mobile software applications using smartphone technology. Firstly, we proposed a communication which a position data transmission technique using LED flashlight with built-in smartphone and we develop the application to perform a remote controller for beam-forming communication based on visible light associated with the position of Smartphone user. OOK modulation was applied for transmitting location data via LED backlight flash of smartphone and PD is used for detecting receiving light. In case of remote controller application which was controlled by WiFi IP-networking and it controls LED direction for beam-forming communication. These suggestion can be a good example for ubiquitous position recognition system using smart phone and software.

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF