• Title/Summary/Keyword: mobile devices

Search Result 3,424, Processing Time 0.032 seconds

A Study on a Location Determination System using Infrastructure Information of a WLAN Network (무선랜 네트워크의 인프라 정보를 이용한 위치측위 시스템에 관한 연구)

  • Lim, Joong-Seon;Choi, Gyung-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.6
    • /
    • pp.98-107
    • /
    • 2011
  • In this paper, we propose the location determination system of an agent mobile device using the information provided by the WLAN(Wireless LAN) infrastructure. This system is configured as a typical ESS(Extended Service Set)-type WLAN structure with real-time location positioning engine and thru AP(Access Point) controller. The positioning engine collects the information of agent devices using SNMP(Small Network Management Protocol) thru AP controller and utilize those information as Cell ID. for LBS(Location Based Service). In the result of a real office environment implementation, the average success rate of inter-AP roaming is measured to 62.5% and the duration time of the device information update within the AP is average of 11 second of time, which means this system is adaptable to the location based service of above average accuracy but somewhat less urgency.

A Study of the Health Monitoring System for u-Healthcare (u-Healthcare를 위한 건강모니터링 시스템에 관한 연구)

  • O, Ji-Soo;Lee, Myoung-Hwa;Lim, Myung-Jae;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.9-15
    • /
    • 2009
  • As disease and aging increased on the map of nuclear families, the interests in protecting individual privancy and u-Healthcare has increased as well. Until now, the health management of individual medical institutions have limited their researches on the future of offline diagnostics and treatment works, time and space only to medical services. However, in the future, healthcare through mobile medical devices to real-time online personality, mobility, and bulwark where patients can receive personal health statues anywhere seems inevitable. Therefore, in this paper, the PDA based on the each individual elderly and patients that updates their physical health statues through the signal meter management system can notify both the individual and the hospital when a medical emergency occurs. Additionally, it provides relevant information on the results of measurements monitoring system.

  • PDF

Touch-based Gaming System using Augmented Reality Technology (증강현실 기술을 이용한 터치기반 게임 시스템)

  • Lee, Jae-Young;Kwon, Jun-Sik
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.69-76
    • /
    • 2014
  • In this study, by using the control technique of the user using augmented reality technology, to provide a game system touch-based. The augmented reality technology, can be advantageously used vehicle is easily recognized as a technique for synthesizing (images, video, text) object of the virtual image of the real world. Augmented reality technology has been studied to make the application in various fields. Studies of natural marker-based marker and base are underway, but there is no sense of incongruity in reality research natural marker-based and has been studied much. By using the augmented reality technology natural marker-based In this paper, we implemented a game system. The system also has the advantage that can be absorbed in the game by using the techniques of the interaction through a user's touch. Touch interface-based, are available as well as user environments, even in mobile devices such as smart-phone and touch pad.

A Survey on Service Demand and Industrial Classification of Smart Work (스마트워크 산업의 분류 체계 및 서비스별 수요 조사 분석)

  • Kim, Hoontae;Ji, Yong Gu;Oh, Seongtak;Han, Hyeongjin
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.145-157
    • /
    • 2014
  • The advent of ubiquitous connectivity from smart devices and network is changing the lifestyles of workers and work patterns. However, the smart work for the knowledge workers and mobile workers is not yet popular due to not enough services in supporting smart work and difficulties in employing smart work. For these reasons, it is necessary to study the current smart work industry to provide the bases for incubating smart work industry and increasing the smart work adoption. In this study, first, we reviewed and analyzed the smart work services. And then, we classified the smart work industry based on their services. Second, we conducted a survey study to identify the factors that affect on the adoption of smart work. Finally, we provided the current adoption rate of smart work services and discussed the Willing-To-Use, cost, and barriers from the smart work adoption.

Effect of Ginseng on Calretinin Expression in Mouse Hippocampus Following Exposure to 835 MHz Radiofrequency

  • Aryal, Bijay;Maskey, Dhiraj;Kim, Myeung-Ju;Yang, Jae-Won;Kim, Hyung-Gun
    • Journal of Ginseng Research
    • /
    • v.35 no.2
    • /
    • pp.138-148
    • /
    • 2011
  • Exponential rise in the use of mobile communication devices has generated health concerns due to radiofrequency (RF) exposure due to its close proximity to the head. Calcium binding proteins like calretinin regulate the levels of calcium ($Ca^{2+}$) which plays an important role in biological systems. Ginseng is known for maintaining equilibrium in the human body and may play a beneficial radioprotectant role against electromagnetic field (EMF) exposure. In the present study, we evaluated the radioprotective effects of red ginseng (RG) extract in a mouse model. Calretinin (CR) expression was measured using a free-floating immunohistochemical method in the hippocampus of mice after 835 MHz EMF exposure for 5 h/d for 5 d at specific absorption rate=1.6 W/kg for the different experimental groups. The control animals were treated with NaCl while the experimental animals received 10 mg/kg ginseng, or 30 mg/kg; EMF exposed mice were also treated with NaCl, 10 mg/kg ginseng (E10), or 30 mg/kg (E30). Decreases in CR immunoreactivity (IR) along with loss of CA1 and CA3 interneurons and infragranular cells were observed in the ENaCl group while such losses were not observed in the E10 and E30 groups. CR IR significantly increased in the RG-treated group compared to control and EMF-exposed groups treated with NaCl. The study demonstrates that RG extract can serve as a radioprotective agent that maintains $Ca^{2+}$ homeostasis and prevents neuronal loss in the brain hippocampal region caused by RF exposure.

A Study on the Safety Improvement of Structural Weakness Using Accident Analysis for Vehicle-Mounted MEWP (차량탑재형 고소작업대의 재해분석을 통한 취약 구조부의 안전성 향상 방안에 관한 연구)

  • Yoo, Yong-tae;Seo, Su-eun;You, Hee-Jae;Kang, Kyung-sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.1
    • /
    • pp.15-25
    • /
    • 2017
  • The findings were summarized as follows. The safety check by manufacturer showed that 6 of 13 companies are over the average occurrence of defects. It was expected that there would be a difference between manufacturing technology capability and production system of each manufacturer. Consequently, manufacturers should institutionally improve and strengthen certification items for the upward standardization of safety certification before factory. Second, the safety check by year showed that the results of this study accord with those of previous studies on defect time. Consequently, manufacturers should classify the 3-year-old equipment for vehicle-mounted MEWP into a special check subject to do a nondestructive test according to proven results, and also reflect the test in a safety test system to do regular preventive activities of equipment defects. Third, the safety check by part showed that the boom and outrigger parts of vehicle-mounted MEWP have the most defects. Stress concentration resulted in defects as the boom part was most frequently operated in the structural parts for a real work. To prevent this, it is suitable to improve the hardness of boom materials. The outrigger part needs improvement in safety devices with materials. As an outrigger supports the overturning moment of equipment, it is most affected by its load based on the operating radius, resulting in fatigue crack.

A study on the Privacy threats factors of Cloud Services (클라우드 서비스의 프라이버시 침해 요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.87-95
    • /
    • 2015
  • Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. Cloud services have evolved from simple forms to complex forms(using multiple mobile devices and communication services(Kakao talk, Facebook, etc.). In particular, as the cloud is especially facilitated the collection of user information, it can now be analyzed with the user's taste and preference. And many of the benefits of the cloud became increasingly closely with our lives. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies of attack and vulnerability to the privacy threats factors of the cloud computing services. and In the future, this is expected to be utilized as a basis for the Privacy security and Response.

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

Scheduling Management Agent using Bayesian Network based on Location Awareness (베이지안 네트워크를 이용한 위치인식 기반 일정관리 에이전트)

  • Yeon, Sun-Jung;Hwang, Hye-Jeong;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.712-717
    • /
    • 2011
  • Recently, diverse schedule management agents are being researched for the efficient schedule management of smart devices users, but they remain at a confirmatory level. In order to efficiently manage user's schedules, execution of planned schedules should be monitored to help users properly execute their schedules, or feedback must be given so that when setting up new schedules, users can plan their schedule according to their schedule establishment patterns. This research proposes a schedule management agent that infers the user's behaviors by using acquired user context, and provides schedule related feedback depending on the user's behavior patterns, when users are executing their schedules or planning new schedules. For this, collected user context information is preprocessed and user's behavior is inferred by Bayesian network. Also, in order to provide feedbacks necessary for confirming the user's schedule execution and new schedule establishment, a context tree pattern matching method for the user's schedule, location and time contexts was applied, then verified with 6 weeks of user simulation in a mobile environment.