• Title/Summary/Keyword: mobile internet use

Search Result 884, Processing Time 0.028 seconds

An Adaptation System based on Personalized Web Content Items for Mobile Devices

  • Kim, Su-Do;Park, Man-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.628-646
    • /
    • 2009
  • Users want to browse and search various web contents with mobile devices which can be used anywhere and anytime without limitations, in the same manner as desktop. But mobile devices have limited resources compared to desktop in terms of computing performance, network bandwidth, screen size for full browsing, and etc, so there are many difficulties in providing support for mobile devices to fully use desktop-based web contents. Recently, mobile network bandwidth has been greatly improved, however, since mobile devices cannot provide the same environment as desktop, users still feel inconvenienced. To provide web contents optimized for each user device, there have been studies about analyzing code to extract blocks for adaptation to a mobile environment. But since web contents are divided into several items such as menu, login, news, shopping, etc, if the block dividing basis is limited only to code or segment size, it will be difficult for users to recognize and find the items they need. Also it is necessary to resolve interface issues, which are the biggest inconvenience for users browsing in a mobile environment. In this paper, we suggest a personalized adaptation system that extracts item blocks from desktop-based web contents based on user interests, layers them, and adapts them for users so they can see preferred contents first.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

The Analysis of the Level of Technological Maturity for the u-Learning of Public Education by Mobile Phone (휴대폰을 이용한 공교육 u-러닝의 기술 성숙도 분석)

  • Lee, Jae-Won;Na, Eun-Gu;Song, Gil-Ju
    • IE interfaces
    • /
    • v.19 no.4
    • /
    • pp.306-315
    • /
    • 2006
  • In this paper we analyze whether we can use the mobile phone having been highly distributed into young generation as a device for the u-learning in Korean public education. For this purpose we deal with the technical maturity in three axes. Firstly, we examine the authoring nature of mobile internet-based contents such as both text and motion picture for the contents developers in the public education. As a research result the authoring of text has almost no difficulty, but that of the motion picture shows some problems. Secondly, we deal with whether u-learners can easily get and use u-contents on both mobile phone and PC respectively. After analysing this factor, we found that the downloading of motion picture contents into mobile phone is very limited. Therfore we talk about the usability and problem of various PC Sync tools and propose their standardization. Finally, the needs of the introduction of the ubiquitous SCORM which could enable to reuse u-contents among different Korean telco’s mobile phones are discussed. Here we describe some functionality of both ubiquitous SCORM and u-LMS. Our study looks like almost the first work examining the technological maturity for the introduction of u-learning with mobile phone in Korean public education and it could be used as a reference for the study of any other wireless telecommunication-based u-learning other than mobile telecommunication.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Mobile App for social communications of the school (학교의 소셜 커뮤니케이션을 위한 모바일 앱)

  • Ryu, Chang-Su;Hur, Chang-Wu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.397-400
    • /
    • 2012
  • To activate the use of the mobile Internet, its service must be changed itself, as well as improvement of its use environment, and the changing direction must orient 'SMART SERVICE', which it provides in the fastest, easiest, most comfortable way by selecting the core information users want most. This paper suggests that the users of smartphones access diverse contents out of the mobile apps anytime and anywhere and use them conveniently, by activating social communication among the users of school information through the mobile app development suitable for Android OS.

  • PDF

PPD: A Robust Low-computation Local Descriptor for Mobile Image Retrieval

  • Liu, Congxin;Yang, Jie;Feng, Deying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.305-323
    • /
    • 2010
  • This paper proposes an efficient and yet powerful local descriptor called phase-space partition based descriptor (PPD). This descriptor is designed for the mobile image matching and retrieval. PPD, which is inspired from SIFT, also encodes the salient aspects of the image gradient in the neighborhood around an interest point. However, without employing SIFT's smoothed gradient orientation histogram, we apply the region based gradient statistics in phase space to the construction of a feature representation, which allows to reduce much computation requirements. The feature matching experiments demonstrate that PPD achieves favorable performance close to that of SIFT and faster building and matching. We also present results showing that the use of PPD descriptors in a mobile image retrieval application results in a comparable performance to SIFT.

A Scheme for Providing Anonymity and Untraceability in Mobile Computing Environments (이동 컴퓨팅 환경에서의 익명성과 불추적성 지원 기법)

  • Choi, Sun-Young;Park, Sang-Yun;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.570-577
    • /
    • 2001
  • In recent years, Internet-based application services on the mobile environment have been activated, and the developments of mobile internet application for user authentication and privacy have been required. Especially, the research for preventing disclosure of identity caused by user mobility is on the progress. In this paper, we introduce the study of an authentication protocol for anonymity and untraceability supporting the protection of user identity and the authenticated secure association mechanism between mobile hosts and remote domains. In this protocol use public cryptography.

  • PDF

모바일 기기의 사용편리성, 채널선호도, 인지된 가치가 모바일 뱅킹시스템 사용에 미치는 영향

  • Kang, Hyun-Jeong
    • Proceedings of the Korea Database Society Conference
    • /
    • 2008.05a
    • /
    • pp.43-53
    • /
    • 2008
  • Various mobile Internet services have been commercialized these days and mobile banking service is considered one of the most potential business models. However, the market growth has been limited since the implementation environment is different from that of wired-internet business services. This study is investigating the effect of mobile channel preference, perceived usability, perceived value on sustained use of mobile banking service and discussed the direction of future research at the end.

  • PDF

Design of Mobile Supervisory System that Apply Action Tracing by Image Segmentation (영상분할에 의한 동작 추적 기법을 적용한 모바일 감시 시스템의 설계)

  • 김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.282-287
    • /
    • 2002
  • This paper action tracing by techniques to do image sequence component to watch invader based on Mobile internet use. First, detect frame in animation that film fixed area, and make use of image subtraction between two frame that adjoin, segment fixed backing and target who move. Segmentalized foreground object detected and did so that can presume middle value of gouge that is abstracted to position that is specified and watch invader by analyzing action gouge. Those watch information is stored, and made Mobile client send out SMS Message about situation of watch place to server being stored to sensed serial numbers, date, Image file with recording of time.