• Title/Summary/Keyword: location

Search Result 23,009, Processing Time 0.039 seconds

An Analysis of the Operation of the GPS Location Provider in the Android Platform (안드로이드 플랫폼의 GPS 위치 제공자에 대한 동작 분석)

  • Lee, Kyesang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.50-56
    • /
    • 2014
  • Recently Android apps utilizing location based services are widely used. Understanding the operation of the GPS location provider, among various location providers supported in the Android platform, is an essential task for developers using the Android. This paper, based on the analysis of source codes of the GPS subsystem in the Android platform, shows clearly and orderly the operation of the GPS location provider, in key threads' perspectives as well as in a stepwise fashion from the initialization up to the final location report steps.

Study on the Acupoint Location of Sameumgyo (SP6) - Regarding the Theory of 8 Cun above the Tip of the Medial Malleoulus - (삼음교(SP6) 혈위에 관한 연구 - 족내과상 8촌설에 대하여 -)

  • Park, Sang Kyun
    • Korean Journal of Acupuncture
    • /
    • v.37 no.2
    • /
    • pp.122-129
    • /
    • 2020
  • Objectives : The objective of this study was to examine the acupoint location of Sameumgyo (SP6) from classic literatures. Methods : A review of SP6 acupoint location on 13 classics of acupuncture and moxibustion was performed. Results : Differences of SP6 acupoint location were found by classics of acupuncture and moxibustion. 9 classics of acupuncture and moxibustion said the acupoint of SP6 was located on 3 cun above the tip of the medial malleoulus, however acupoint location of SP6 was described on 8 cun above the tip of the medial malleoulus by 4 classics of acupuncture and moxibustion. Conclusions : Through a classic literature review, it was possible for the explanation that the location of SP6 was 8 cun above the tip of the medial malleoulus, but it was not intended to overturn the theory of 3 cun above the tip of the medial malleoulus regarding location of SP6. This study may be the starting point for future experimental or clinical studies for exploring new acupoint, and is expected to follow up.

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL

  • Li, Yan;Kim, Dongho;Shin, Byeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.263-274
    • /
    • 2016
  • The exceptional development of electronic device technology, the miniaturization of mobile devices, and the development of telecommunication technology has made it possible to monitor human biometric data anywhere and anytime by using different types of wearable or embedded sensors. In daily life, mobile devices can collect wireless body area network (WBAN) data, and the co-collected location data is also important for disease analysis. In order to efficiently analyze WBAN data, including location information and support medical analysis services, we propose a geohash-based spatial index method for a location-aware WBAN data monitoring system on the NoSQL database system, which uses an R-tree-based global tree to organize the real-time location data of a patient and a B-tree-based local tree to manage historical data. This type of spatial index method is a support cloud-based location-aware WBAN data monitoring system. In order to evaluate the proposed method, we built a system that can support a JavaScript Object Notation (JSON) and Binary JSON (BSON) document data on mobile gateway devices. The proposed spatial index method can efficiently process location-based queries for medical signal monitoring. In order to evaluate our index method, we simulated a small system on MongoDB with our proposed index method, which is a document-based NoSQL database system, and evaluated its performance.

The Study on the Size of the Registration Database for Location Registration Area in Mobile Communication Networks (이동통신망에서의 위치등록 데이타베이스 크기에 대한 연구)

  • Park, Jeong-Hoon
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.81-85
    • /
    • 1998
  • Location Registration and deregistration is necessary to mobility management in a Mobile Communication networks when a mobile phone moves between location registration areas. After considering several deregistration schemes, a sample scheme that eliminate network traffic is chosen. However, this scheme may delete valid registration record, so the size of location registration database must be sufficiently large to ensure low probability that a valid records are deleted. This paper describes an analytic model to determine the size of location registration database for a location registration area in this simple scheme. The simulation results of analytic model show that the size of database must 3-5 times than the expected number of mobile phones in a location registration area.(Mobile, Communications, Location, Deregistration, Database)

  • PDF

A Design and Implementation of Security Image Information Search Service System using Location Information Based RSSI of ZigBee (ZigBee의 RSSI 위치정보기반 보안 영상정보 검색 시스템 설계 및 구현)

  • Kim, Myung-Hwan;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.243-258
    • /
    • 2011
  • With increasing interest in ubiquitous computing technology, an infrastructure for the short-distance wireless communication has been extended socially, bringing spotlight to the security system using the image or location. In case of existing security system, there have been issues such as the occurrences of blind spots, difficulty in recognizing multiple objects and storing of the unspecified objects. In order to solve this issue, zone-based location-estimation search system for the image have been suggested as an alternative based on the real-time location determination technology combined with image. This paper intends to suggest the search service for the image zone-based location-estimation. For this, it proposed the location determination algorism using IEEE 802.15.4/ZigBee's RSSI and for real-time image service, the RTP/RTCP protocol was applied. In order to combine the location and image, at the event of the entry of the specified target, the record of the time for image and the time of occurrence of the event on a global time standard, it has devised a time stamp, applying XML based meta data formation method based on the media's feature data based in connection with the location based data for the events of the object. Using the proposed meta data, the service mode which can search for the image from the point in time when the entry of the specified target was proposed.

Two Location Algorithm with Call Information in Mobile Communication Networks (이동통신에서 발신호를 고려한 이중영역 위치등록방법)

  • Jang, Hee-Seon;Cho, Kee-Seong;Hwang, Hark
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.3
    • /
    • pp.342-350
    • /
    • 1999
  • Two location algorithm (TLA) considers two location areas (LAs) to track the location of a mobile station (MS). The TLA significantly outperforms the single location algorithm when the call-to-mobility ratio (CMR) is low (i.e., the user moves more frequently than to receive calls). However, because of the paging cost for the users moving back to the previously visited LA, the performance of the TLA degrades when the CMR is high. To reduce those paging cost, we propose the new algorithm called TLA with call information (TLAC). In TLAC, we use the location information of the MS within the setup message when the MS originates a call in the previously visited LA. Through the setup message, the system can know the exact location of the MS without the additional location registration operation, and the paging cost for the arriving calls in the visited LA can be reduced. An analytical model is proposed to compare the TLAC and previous TLA protocol. Our study indicates that the TLAC always guarantees better performance than the TLA. We also observe that the TLAC is much better than the TLA when the CMR is high.

  • PDF

Design of efficient location system for multiple mobile nodes in the wireless sensor network

  • Kim, Ki-Hyeon;Ha, Bong-Soo;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.81-84
    • /
    • 2005
  • Various design schemes for network using wireless sensor nodes have been widely studied on the several application areas ranging from the real world information collection to environmental monitor. Currently, the schemes are focused on the design of sensor network for low power consumption, power-aware routing protocol, micro miniature operating system and sensor network middleware. The indoor localization system that identifies the location of the distributed nodes in a wireless sensor network requires features dealing with mobility, plurality and other environmental constraints of a sensor node. In this paper, we present an efficient location system to cope with mobility of multiple mobile nodes by designing a location handler that processes location information selectively depending on the nodes' density in a specific region. In order to resolve plurality of multiple mobile nodes, a routing method for the location system is also proposed to avoid the occurrence of overlapped location data.

  • PDF

G-File stored in the location information management algorithm (G-File에 저장된 위치정보 관리 알고리즘)

  • Choi, Sang-Kyoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.742-748
    • /
    • 2011
  • G-File on the position of the photo shoot pictures with built-in picture file to the user, the location and orientation of the image files using the data refers to the [1]. G-File is to store photo files, photo files and receiving means for receiving input, and picture files, photos and location information extracted by separating the subject's location information with location information and location analysis by means of the corresponding coordinates on the map including the location indicated in the guide means is characterized in that. In this paper, the G-File on the location information stored in the algorithm that can be managed is proposed. G-File on the algorithm used to manage the information to the user, G-File management is to provide convenience.

A Design of Indoor Location Tracking System for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 실내 위치 추적 시스템의 설계)

  • Woo Sung-Hyun;Jeon Hyeon-Sig;Kim Ki-Hwan;Park Hyun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.71-82
    • /
    • 2006
  • This paper propose a realtime tracking algorithm of mobile object in indoor environment. this proposed system selects location data closer to mobile objects in real time that are results of Triangulation method and DCM(Database Correlation Method)method. Also, this system applies adjusted location data selected by using Kalman filter, and in result it improved location accuracy of transfer object. Be studied in existing the Kalman filter have unstable location data until its settlement because of it extracts current values by using the past the information. However, proposed location tracking system don't apply existent Kalman filter to this system and it permits precisional tracking location by uses more effective methods.

  • PDF

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF