• Title/Summary/Keyword: Wireless Internet

Search Result 3,086, Processing Time 0.03 seconds

Analysis and fabrication of a wearable antenna using conductive fibers (전도성 실 재질을 이용한 웨어러블 안테나의 제작 및 분석)

  • Nguyen, Tien Manh;Chung, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2770-2776
    • /
    • 2015
  • The development of efficient wearable antennas is required to implement short range body-centric wireless communication links for various internet of thing applications. We present simulation and measurement results of conductive-fiber-based wearable antennas which can comfortably fabricated directly on usual clothing materials. The proposed antenna is a form of a rectangular patch antenna designed by weaving conductive fibers on a felt substrate. A full-wave electromagnetic simulation tool is used to investigate the antenna performance such as antenna impedance, resonant frequency, and radiation efficiency. Parametric studies show that the radiation efficiency increases from 67.5% to 70.4% by widening the gap between conductive fibers from 0.25mm to 3mm. This implies a wearable antenna with good radiation efficiency can be designed despite of less portion of conductive fibers on the antenna. The simulation results are also verified by measured results with fabricated antennas.

Design and Implementation of a Location-Based Push-Service Platform (위치기반 푸쉬서비스 플랫폼 설계 및 구현)

  • Shim, Jae-Min;Lee, Eung-Jae;Ju, Yang-Wan;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.47-55
    • /
    • 2009
  • As the wireless internet technology such as mobile phone, WIBRO, HSDPA develops, customized location-based services for traffic, tourism, shopping, and emergency relief has lately attracted attention. For giving customized services. we should consider dynamic characteristics of moving object which continuously change their location. In this paper, we define the context trigger type of moving object and design triggering method for processing context generated by moving object. Also we propose location-based push service platform including context trigger of moving object for supporting location-based information to user. The proposed system gathers moving object stream from the terminal based on MS-assisted or Stand-alone positioning mode of embedded GPS in terminal extract user context by user device agent, and send context information to server.

  • PDF

An Investigation of the Awareness and Use of Open Access Initiative at the Federal Polytechnic, Offa, Kwara State, Nigeria

  • Issa, A.O.;Igwe, K.N.;Akangbe, B.R.;Aliyu, M.B.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.3
    • /
    • pp.55-65
    • /
    • 2014
  • This study investigated the information environment of lecturers in Federal Polytechnic, Offa, Kwara State, Nigeria, in relation to their information seeking behavior, extent of use of the polytechnic library, perceptions of the resources and services of the library, level of awareness and extent of use of the open access model of scholarly communications, as well as the challenges of accessing and using information resources. It adopted the survey research method, using a questionnaire for data collection, while the descriptive statistics method was used to analyse the data, using tabular presentation and simple percentages. From a population of 280 lecturers for the study, a purposive sample of 164 was drawn. The findings showed that the lecturers' information needs are focused on online use; they hardly use the polytechnic library due to their perceptions of the resources and services of the library. They are, to a greater extent, aware of open access initiatives, but do not publish in open access outlets, while various challenges affect their access and use of information resources for teaching and research. A recommendation was made, among others, that the polytechnic management should pay more critical attention to the library especially in the areas of adequate, current and comprehensive collections on all the programmes of the institution, as well as the provision of wireless internet services on the campus through a public-private partnership arrangement.

Coffee Shops' Quality Classification and Customer Satisfaction Improvement Index by KANO Model (KANO모델을 활용한 커피전문점의 품질분류와 고객만족개선지수)

  • Shin, Bong-Sup;Kim, Ki-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.346-357
    • /
    • 2012
  • This study classified the various quality features of coffee shop by Kano model with customers' perspective. Also both satisfaction coefficient and dissatisfaction coefficient are calculated to analyse the relative influence of quality features on customer satisfaction. This study also dragged the potential customer satisfaction improvement index to scrutinize the quality improvement possibility for coffee shops. The analysis results showed that low price, luxurious interior, restfulness of table and chair, usability of wireless internet are belonged to the Attractive quality. On the other hand, cleanliness and hygiene, quality to price are identified as the One-dimensional quality. The current satisfaction level for both 'Caffe Bene' and 'Starbucks' are measured to draw the potential customer satisfaction improvement index. The result showed that low price and quality to price appeared to be the highest in its quality improvement possibility. The findings of this study help understanding the quality features to focus on and strengthening the competitiveness for coffee shops.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Publish/Subscrib Service based Selective Sensor Data Monitoring System using Mesh Network (메쉬 네트워크에서 가입/게시(subscribe/publish) 서비스기반 선택적 센서정보 모니터링 시스템)

  • Kim, Yong-Hyuck;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.493-502
    • /
    • 2010
  • In this paper we propose a scalable sensor network system that makes mesh network among the sink nodes to solve the scalability problem of existing sensor network which is caused by multi-hop networking between the sensor nodes. In the proposed system, the sink nodes have the wireless networking ability to communicate with another sink nodes in mesh fashion, and with the monitoring nodes which is located in the local area or internet area. Especially, the system includes L4(Application Layer) routing mechanism that provides subscribe/publish service to serve selective transmission of sensor data to the specific monitoring nodes. The collected sensor data is transmitted to the monitoring nodes when the sensor data is matched with the monitoring node's interesting value.

The Effect of Features and Motivators of Mobile Phone on Repurchasing Intention: Focusing on Difference Between Korea and Indonesia (휴대폰의 재구매 동기에 관한 국가간 비교 연구 : 한국과 인도네시아를 중심으로)

  • Lee, Jong-Oh;Whang, Jae-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.159-174
    • /
    • 2007
  • The purpose of this research is to investigate the relationships among the perceived satisfaction, the perceived the trust, the commitment, the key features for mobile phone, the brand image, the switching cost and the repurchasing intention. We also examine the differences between Korean and Indonesian markets concerning the relationships of these key successfactors. The structural model is tested with the data form each of the sub-samples (i. e. Korean and Indonesian users taken separately). Properties of the casual paths, including standardized path coefficients, the significance of difference, and variance explained for trust, satisfaction, commitment and repurchasing in the hypothesized model, are presented. This study indicated that hardware (sound quality, LCD display, design) user interface (GUI, Menu, Key pad) and extra functions (camera phone, wireless internet, MP3 player) are the three important factors effecting the trust and the satisfaction. The proposed model has been newly tested from the technological prospective in order to get the more practical result. Following the model test, we conduct a test of the differences in path coefficients between Korean and Indonesian users. MSEM show that, compared to Korean market, Indonesian had more emphasized on extra-function for the mobile phone as well as giving more influence to the satisfaction from the brand image. It means Korean market consider the extra-function as basic or no-premium points. And the satisfaction has been effected by switching-cost in Korea but the trust in Indonesia. Other interesting result from the structural weight invariance indicate that, compared to Korean market, the brand-image has effected the satisfaction in addition to placing more the trust on determining the commitment in Indonesia.

  • PDF

IEEE 802.22 WG에서의 CR응용: WRAN MAC설계

  • Go Gwang-Jin;Hwang Seong-Hyeon;Song Myeong-Seon;Kim Chang-Ju;Gang Beop-Ju
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.38-49
    • /
    • 2006
  • In order to increase the spectrum efficiency, recently, there is the number of studies for CR technology. For instance, IEEE 802.22 WRAN(Wireless Regional Area Network) WG considered the CR technology as a solution of WRAN system to serve the high speed internet service(1.5 Mbps down stream and 384 kbps up stream) in 100 km overall coverage and 54 MHz-746 MHz band. Basically, in MAC point of view, the WRAN system have been standardizing based on the IEEE 802.16 MAC layer features such as Data transmission method, QoS provision and Bandwidth request schemes. Additionally, the WRAN system further include CR nature functions such as incumbent user protection, self coexistence which would be importantly considered. Also, the inherent WRAN functions are added such as channel bonding and fractional bandwidth usage. This paper mainly explained frame structure, IU protection, self coexistence which are key functions of WRAN system. Finally, in this paper, we expressed a prospect of IEEE 802.22 WRAN standardization.

Measuring and Improving Method the Performance of E-Commerce Websites (전자상거래 웹사이트의 성능 측정 및 향상 방법)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.223-230
    • /
    • 2017
  • In the current wireless Internet environment, using a mobile device to quickly access a web site is closely related to measuring the performance of a website. When accessing a website, the user has a long time to access the website and has no access to the website.In this case, the performance of the web site should be improved by measuring and analyzing the performance of the connection delay due to a problem of the web site.Among the performance measurement factors of Web sites, Web page loading time is a very important factor for a successful service business in the situation where most of e-commerce business is being developed as a web-based service.An open source tool was analyzed to analyze the performance of the e-commerce web page to present problems, software optimization methods and hardware optimization methods. Applying two optimization methods to suit the environment will enable stable and e-commerce websites.

Design and Implementation of a System to Detect Zigzag Driving using Sensor (센서를 이용한 사행 운전 검출 시스템 설계 및 구현)

  • Jeong, Seon-Mi;Kim, Gea-Hee;Mun, Hyung-Jin;Kim, Chang-Geun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.305-311
    • /
    • 2016
  • Even though automakers have actively been conducting studies on autonomous navigation thanks to the development and application of wireless Internet technology, the traffic accident has been kept unsolved. The causes of the accident are drowsy driving, a mistake of a driver, environmental factors, and a wrong road structure; Driving manner and characteristics of a driver among the causes are significantly influential for the accident. In this paper, a study to measure characteristics of zigzag driving that can be seen before an occurrence of an accident regarding traffic accidents that can be incurred while driving manually or autonomously was conducted. While existing studies measured zigzag driving based on characteristics of the change of lateral angular velocity by imaging techniques or driving manner on the first and second lane, this study proceeded to measure zigzag driving by setting a lateral moving distance and a critical value range by utilizing the value of a sensor.