• Title/Summary/Keyword: Wireless Internet

Search Result 3,076, Processing Time 0.036 seconds

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Radiological Science Curriculum on the Digital Radiology Environments : Problems and Suggestions (디지털 방사선 환경에서의 방사선학과의 교육과정에 대한 현황과 개선 방향)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.2
    • /
    • pp.129-135
    • /
    • 2005
  • IT communication industries of current society are developed in enormous growth, our country leading the world in the number of super high speed internet equipments in use. In the pride oneself on communication network of those, mobile terminal technology and wireless phone production hold a high rank. Data communication and networking may be the fastest growing technologies in our culture today. In this way, IT fields conjugated in the daily quick, the fact that department of radiological science didn't discharged one's duties on current IT education. The curriculum of radiological technologists that play an important part between skill and occupation's education as major and personality didn't performed one's part most effectively on current IT environments and digital radiological equipments interface. Therefore, in this paper current curriculum of radiological science are catched hold of trend and problems on digital radiology environments, on fact the present state of problems, for radiological engineering and HIS manager, new curriculum course are suggested a reform measure of culture and major education curriculum introduction.

  • PDF

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

Design And Implementation of WebDAV Virtual Storage System based on Android (안드로이드 기반의 WebDAV 가상 스토리지 시스템의 설계 및 구현)

  • Kim, Sang-Geon;Byun, Sung-Jun;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.669-671
    • /
    • 2010
  • IStorage is a technology, which can use resources of server PC by using Android Phone supporting wireless internet access. IStorage utilizes resources of server PC through WebDAV protocol. And with GUI interface, Users upload their resources to the server PC and They can perform various kinds of works like Opening, Searching, Deleting and Downloading files. Since it is possible for them to use resources of server PC as if they are originally stored in their mobile devices, there is no limit on using the functions such as watching movies, listening musics and opening document files in real time. We expect this study can to overcome the limitation of storage space and also be a useful technology in the smart phone market.

  • PDF

A Study on the OFDM System Using Multi-Block SDM (Multi-Block SDM을 이용한 OFDM 시스템에 관한 연구)

  • Lee, Kyu-Jin;Kim, Ji-Sung;Kim, Nam-Il;Lee, Kye-San
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.5
    • /
    • pp.122-130
    • /
    • 2008
  • Improving the transmission rates of multi-media delivery, such as moving pictures and internet services, has become increasingly important in modern society. To satisfy such high data rate requirements, the MIMO technique, which has the capacity to transmit large amounts of data using limited frequency resources, was developed. The Space Division Multiplexing (SDM) system is one of the MIMO techniques to be able to improve the transmission capacity. However, it is unable to achieve diversity gain because of interference due to the use of multiple antennas. In this paper, an SDM system that utilizes a Multi-Block method as an advanced transmission technique in a wireless communication system to obtain diversity gain is proposed and discussed fur the performance of the proposed system.

  • PDF

Mobility Management Scheme for Vehicles Moving Repeated Path (반복 경로를 운행하는 차량의 이동성 관리 기법)

  • Choi, Gyu-Yeon;Han, Sang-Hyuck;Lee, Jung-Girl;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.104-111
    • /
    • 2012
  • It is advantageous to avoid the handover to cell whose dwell time is short or can be ignored in terms of service continuity and average throughput. This paper proposes the handover scheme that is suitable for vehicle in order to improve the wireless Internet service quality. In the proposed scheme, the handover process continues to be learned before being modeled to Discrete-Time Markov Chain (DTMC). This modeling reduces the handover frequency by preventing the handover to cell that could provide service sufficiently to passenger even when vehicle passed through the cell but there was no need to perform handover. In order to verify the proposed scheme, we observed the average number of handovers, the average RSSI and the average throughput on various moving paths that vehicle moved in the given urban environment.

A System of Mobile Device Information Processing (모바일 단말 정보 처리 시스템)

  • Bang, Jin-Suk;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2135-2142
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices is HTTP headers about under using provides device information to contents provider in the provide the contents. However, There is no standard for device information provided, so interoperability problems, because external contents using mobile phone companies to provide the device information in a different way. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. However, in using the UAProf can not provide for the complete device information, because MMS support information, smart card support, information and support for external storage is not specified. Thus, In this paper, we designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessar, and it used to design and implementation of the Contents Adaptation System.

Design and Implementation of JAIN SIP-based Softphone Client (JAIN SIP 기반 소프트폰 클라이언트의 설계 및 구현)

  • Kim, Byung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2301-2306
    • /
    • 2008
  • SIP(Session Initiation Protocol) has become an universal standard for multimedia communications for both wired and wireless networks since it has been adopted as a standard protocol for IMS platform in 3GPP standardization organization at November 2000. In this paper, we design and implement a SIP-based softphone client program which provides telephony service between internet users and a call center equipped with VoIP gateway. A softphone client based on PC-to-phone connection should guarantee to provide interoperability with various VoIP gateways and higher portability to be able to operate on different PC environments. The softphone client program in this paper has been developed with SIP 2.0 standard protocol to support interoperability and with JAIN SIP and JMF package to achieve higher portability.

A Study of Efficient Transmission of SVG File using SMETA (SMETA를 이용한 효과적인 SVG 파일 전송에 관한 연구)

  • Yoo, Nam-Hyun;Son, Cheol-Su;Kim, Won-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.14-19
    • /
    • 2007
  • As XML is used by standard format for information expression and information exchange in various field, Many Company began to use SVG by user interface or information expression tool of embedded system such as mobile phone based wireless internet. Because SVG has many additional information to keep structure of SVG document exception real data, there is a problem that transfer time of SVG file is so cost for quantity of transmitted data actually. To solve this problem, many researches using compression conception have been conducted for applying to an embedded system. This paper proposes SMETA that can use existing researches using compression concept at once. SMETA divides SVG file to each part that can allocate meaning, and gives semantic metadata to each part without alteration of SVG structure. SMETA can reduce site of transmitted SVG file actually by transmitting specification part of SVG file that metadata does not agree or has unlisted part in an embedded system between an embedded system and server, before transmit whole SVG file. By size of transmitting SVG file is decreasing, transfer time can be shortened accordingly.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.