• Title/Summary/Keyword: Window Mobile

Search Result 165, Processing Time 0.024 seconds

Bit Error Probability Performance of Multi-carrier CDMA System Using M-band Cosine Modulated Filter Bank in the Mobile Radio Channel (M-밴드 코사인변조 필터뱅크를 이용한 멀티캐리어 CDMA 시스템의 이동무선환경에서의 비트오율 성능)

  • Kim, Myoung-Jin
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.6
    • /
    • pp.1-8
    • /
    • 1999
  • Multi-carrier CDMA is a transmission scheme where data symbols are spread in the frequency domain with a spread code then transmitted using multiple carriers. It is robust against narrowband interference because of its long symbol duration. However, due to large sidebands of the rectangular window frequency response, subchannels spectrally overlap with neighboring subchannels, which leads to substantial intercarrier interference in a dispersive channel. In this paper, we consider a mult-carrier CDMA system where subchannel spectral containment is achiveved by M-band cosine modulated filter bank (CMFB). In CMFB based MC-CDMA, subchannel spectral containment is achieved using the filter bank of longer impulse response than that of conventional discrete Fourier transform (DFT) filter bank. We show that spectral containment feature of the CMFB based fading channel is analyzed using computer simulations.

  • PDF

Design of MAC Algorithm Supporting Adaptive Transmission Rate on VANET (VANET에서 적정 전송속도를 지원하는 MAC 설계)

  • Park, Sanghyun;Kim, Nam-Il
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.132-138
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network), standardization of IEEE 802.11p specification is in process. 802.11 MAC protocol grants all nodes equal opportunity to acquire channel without regard to their bit-rates, making it possible for lower bit-rate nodes to occupy communication channel for a fair amount of time thus keeping the higher bit-rate nodes from acquiring connection channel which downward-equalize the overall network performance. Also with the 802.11p MAC protocol, the probability of collision occurring increases as the number of nodes grow. The proposed algorithm is a new MAC protocol that guarantees nodes with acquired channel a firm priority over other nodes for a fixed amount of time with TXOP concept added to 'packet burst' according to the current transmitting speed. This newly designed algorithm allows the construction of wireless network with enhanced network throughput, decreased probability of collisions as well as providing the means to grant each node a fair chance of acquiring connection according to their channel conditions. The algorithm sets the CW's (Contention Window) width wider than the standard's and modulates the continuous transmitting threshold value depending on channel acquired time, thus improving the overall performance of the network.

Implementation of Intelligent Home Network System using Wireless Sensor (무선센서를 이용한 지능형 홈네트워크 시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.294-299
    • /
    • 2017
  • Home network service is evolving into a service that can receive contents such as remote education, home automation, remote meter reading and various entertainment anytime and anywhere by connecting all household appliances in home with wired and wireless network. In this paper, an intelligent home gateway installed at home is connected to the mobile communication terminal from the outside to solve the problems of the existing home network and configure and maintain a more efficient and comfortable home network environment for the user, In the window, the login page is activated to confirm the user access authority, and the user proceeds the authentication procedure through own login information. When the normal authentication procedure is performed, the intelligent home gateway maintains only the network connection with the user, and the user presents the intelligent home network system using the RFID which is accessed by the intelligent home network system.

A Study on V.M.D(Visual Merchandising Design) Environment of Mobile Telecommunication Company Store (이동통신 회사 매장의 V.M.D(Visual Merchandising Design) 환경에 관한 연구)

  • Kim, Jong Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1589-1594
    • /
    • 2013
  • V.M.D(Visual Merchandising Design) covers every space, environment, and visually stimulating factor. This includes not only the architectural appearance but interior, graphic sign boards, window display, layout, store appliances, lighting, and even the looks and service attitude that sales employees have and show to customers. V.M.D aims to display merchandise in multiple ways; to heighten brand images; to steadily lure many customers to the store. One of the characteristics that V.M.D has is, that this abandons the previous design concept which solely puts stress on luxurious interior-focused display; that this displays merchandise in a rational and systemic way and induces customers to buy products. In this regard, the objective of this study is to study brand perception and effect of V.M.D displayed in the stores, on customers, and thereby to present the concepts of V.M.D, suitable for display in the stores, which can be used continuously in the future.

University-Industry Cooperation for Creative Convergence Technology Fields (창의형 융합기술분야 산학협력방안)

  • Cho, Han-Jin;Kim, Geun-Chae;Kim, Ki-Bong
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.271-278
    • /
    • 2016
  • University-industry cooperation is indispensable for a short-term problem solving, as well as sustainable growth in the economy of the Republic of Korea. In order to embody and implement that, the government has run a variety of financial assistance programs and policies for the promotion of the cooperation for the last 10 years, and Korea Sanhak Foundation has made progress in academic and research development support, creative personnel training and scholarships, International Support and other projects. In this paper, window-type university-industry convergence and practices, and analyzing the best practices of national and international IT-based fusion technology, corporate cooperation were established to support measures taken in conjunction type and model of the university. Industry utilizing the latest IT technology based on this model, academia, proposed a collaboration system between workers building measures.

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

High definition VOD contents management system design of H.264 basis (H.264기반의 고화질 VOD 콘텐츠관리시스템(CMS) 설계)

  • Min, Byoung-won;Oh, Yong-sun;Lee, Jung-man
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.465-468
    • /
    • 2008
  • Recently, VOD market is getting increased and most of public, educational organization, enterprises are providing service as content managing system of WMV standard subordinated to Window OS of Microsoft company. VOD CMS of WMV standard have problem that frequent cut-off, small-size of screen, and image quality which is also chronic problem. In order to solve this problem, technology solving the problem has developed through minimization of buffering time, screen size, high quality sound, and high quality image by image codec and streaming engine which is H. 264. But there are still a problem that systematic management of contents or distribution is difficult. This study expected that there would be a effect preoccupying significant stand of world wide H.264 high quality image mobile VOD managing market by securing domestic on-line VOD contents integrated managing technology by designing system for image VOD contents management having a limit in wmv market and combining H.264 which is new technology.

  • PDF

Research on Usability of Mobile Food Delivery Application: Focusing on Korean Application and Chinese Application (모바일 배달 애플리케이션 사용성 평가 연구: 한국(배달의민족)과 중국(어러머)을 중심으로)

  • Yang Tian;Eunkyung Kweon;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • The development and generalization of the Internet increased the popularity of food delivery service applications in Korea. The food delivery market based on online-to-offline service is growing rapidly. This study compares the usability of Korean food delivery service application between that of Chinese food delivery service application. This study suggests improvement points for Korean food delivery service applications. To conduct this study, we explore the status of various food delivery service applications and conduct interviews and surveys based on the honeycomb model developed by Peter Morville. This study obtained the following results. First, all restaurants participating in the Korean food delivery service must be able to accept order through the application. Second, the shopping cart function must be able to accept order of all restaurants simultaneously. Third, when users look for menu recommendation, their purchase history and shopping cart functions should appear at the first page of the website. Users should be able to perceive the improved usability of the website using those functions. Fourth, when the search window is fixed on the top of each page, users should be able to find the information they need. Fifth, the application must allow users to find the exact location of the delivery person and the estimated delivery time. Finally, the restaurants'address should be disclosed and fast delivery time should be confirmed to enhance users'trust on the application. This study contributes to academia and industry by suggesting useful insight into food delivery service applications and improving the point of food delivery service application in Korea.

Development of JPEG2000 Viewer for Mobile Image System (이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발)

  • 김새롬;정해조;강원석;이재훈;이상호;신성범;유선국;김희중
    • Progress in Medical Physics
    • /
    • v.14 no.2
    • /
    • pp.124-130
    • /
    • 2003
  • Currently, as a consequence of PACS (Picture Archiving Communication System) implementation many hospitals are replacing conventional film-type interpretations of diagnostic medical images with new digital-format interpretations that can also be saved, and retrieve However, the big limitation in PACS is considered to be the lack of mobility. The purpose of this study is to determine the optimal communication packet size. This was done by considering the terms occurred in the wireless communication. After encoding medical image using JPGE2000 image compression method, This method embodied auto-error correction technique preventing the loss of packets occurred during wireless communication. A PC class server, with capabilities to load, collect data, save images, and connect with other network, was installed. Image data were compressed using JPEG2000 algorithm which supports the capability of high energy density and compression ratio, to communicate through a wireless network. Image data were also transmitted in block units coeded by JPEG2000 to prevent the loss of the packets in a wireless network. When JPGE2000 image data were decoded in a PUA (Personal Digital Assistant), it was instantaneous for a MR (Magnetic Resonance) head image of 256${\times}$256 pixels, while it took approximately 5 seconds to decode a CR (Computed Radiography) chest image of 800${\times}$790 pixels. In the transmission of the image data using a CDMA 1X module (Code-Division Multiple Access 1st Generation), 256 byte/sec was considered a stable transmission rate, but packets were lost in the intervals at the transmission rate of 1Kbyte/sec. However, even with a transmission rate above 1 Kbyte/sec, packets were not lost in wireless LAN. Current PACS are not compatible with wireless networks. because it does not have an interface between wired and wireless. Thus, the mobile JPEG2000 image viewing system was developed in order to complement mobility-a limitation in PACS. Moreover, the weak-connections of the wireless network was enhanced by re-transmitting image data within a limitations The results of this study are expected to play an interface role between the current wired-networks PACS and the mobile devices.

  • PDF

A 2D / 3D Map Modeling of Indoor Environment (실내환경에서의 2 차원/ 3 차원 Map Modeling 제작기법)

  • Jo, Sang-Woo;Park, Jin-Woo;Kwon, Yong-Moo;Ahn, Sang-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.355-361
    • /
    • 2006
  • In large scale environments like airport, museum, large warehouse and department store, autonomous mobile robots will play an important role in security and surveillance tasks. Robotic security guards will give the surveyed information of large scale environments and communicate with human operator with that kind of data such as if there is an object or not and a window is open. Both for visualization of information and as human machine interface for remote control, a 3D model can give much more useful information than the typical 2D maps used in many robotic applications today. It is easier to understandable and makes user feel like being in a location of robot so that user could interact with robot more naturally in a remote circumstance and see structures such as windows and doors that cannot be seen in a 2D model. In this paper we present our simple and easy to use method to obtain a 3D textured model. For expression of reality, we need to integrate the 3D models and real scenes. Most of other cases of 3D modeling method consist of two data acquisition devices. One for getting a 3D model and another for obtaining realistic textures. In this case, the former device would be 2D laser range-finder and the latter device would be common camera. Our algorithm consists of building a measurement-based 2D metric map which is acquired by laser range-finder, texture acquisition/stitching and texture-mapping to corresponding 3D model. The algorithm is implemented with laser sensor for obtaining 2D/3D metric map and two cameras for gathering texture. Our geometric 3D model consists of planes that model the floor and walls. The geometry of the planes is extracted from the 2D metric map data. Textures for the floor and walls are generated from the images captured by two 1394 cameras which have wide Field of View angle. Image stitching and image cutting process is used to generate textured images for corresponding with a 3D model. The algorithm is applied to 2 cases which are corridor and space that has the four wall like room of building. The generated 3D map model of indoor environment is shown with VRML format and can be viewed in a web browser with a VRML plug-in. The proposed algorithm can be applied to 3D model-based remote surveillance system through WWW.

  • PDF