• Title/Summary/Keyword: mobile internet use

Search Result 881, Processing Time 0.03 seconds

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

Study on Establishment of Deoksugung Palace, Tourist Information Services using Augmented Reality(AR) Technology (증강현실(AR) 기술을 이용한 덕수궁 관광안내서비스 구축방안 연구)

  • Oh, Sung-hwan;Kim, Ki-duk
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.2
    • /
    • pp.26-45
    • /
    • 2013
  • Sudden increase exceeding 30million in the number of smart phone users, and rising interest in the technology of augmented reality, is now trying to combine it with AR technology in other areas very much. The field of cultural heritage, which has been constructed by the Internet and 3D technology, is not unusual and this field is now rapidly changing thanks to the AR technology which can make users experience cultural heritage with high reality. The Palaces in Seoul, however, use fragmentary tools of information - lack of heritage commentators, leaflet, etc, even though the number of visitors is gradually increasing. Therefore, three-dimensional and comprehensive cultural heritage information service is needed with the guidance in the mobile era. This study utilizes the AR technology for building the Deoksugung Tourist Information Service Application(App.) applying the markerless-based recognition technology which is a more advanced tool than the location-based AR technology. This new AR technology can switch perceived real images such as the tablet of the King in the Palace of in the real world, patterns and pedestals into virtual world, which can reproduce the damaged cultural assets as 3D. This also composes photos of the past with the current buildings, which can increase people's interest and absorption of the contents, and helps them understand and be aware of Korean traditional culture and cultural heritage effectively. In addition, convergence between IT new technology, Augmented Reality(AR) and humanities through storytelling based implementation of cultural heritage in smart phone is attempted to demonstrate that there is strength in which augmented reality technique exerts infinite creativity based on actual reality world.

Improvement Mechanism for Automatic Web Vulnerability Diagnosis (웹취약점 자동진단 개선방안)

  • Kim, Tae-Seop;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.125-134
    • /
    • 2022
  • Due to the development of smartphone technology, as of 2020, 91.9% of people use the Internet[1] to frequently acquire information through websites and mobile apps. As the number of homepages in charge of providing information is increasing every year, the number of applications for web vulnerability diagnosis, which diagnoses the safety of homepages, is also increasing. In the existing web vulnerability check, the number of diagnostic personnel should increase in proportion to the number of homepages that need diagnosis because the diagnosticians manually test the homepages for vulnerabilities. In reality, however, there is a limit to securing a web vulnerability diagnosis manpower, and if the number of diagnosis manpower is increased, a lot of costs are incurred. To solve these problems, an automatic diagnosis tool is used to replace a part of the manual diagnosis. This paper explores a new method to expand the current automatic diagnosis range. In other words, automatic diagnosis possible items were derived by analyzing the impact of web vulnerability diagnosis items. Furthermore, automatic diagnosis identified possible items through comparative analysis of diagnosis results by performing manual and automatic diagnosis on the website in operation. In addition, it is possible to replace manual diagnosis for possible items, but not all vulnerability items, through the improvement of automatic diagnosis tools. This paper will explore some suggestions that can help improve plans to support and implement automatic diagnosis. Through this, it will be possible to contribute to the creation of a safe website operating environment by focusing on the parts that require precise diagnosis.

A study on the detection of fake news - The Comparison of detection performance according to the use of social engagement networks (그래프 임베딩을 활용한 코로나19 가짜뉴스 탐지 연구 - 사회적 참여 네트워크의 이용 여부에 따른 탐지 성능 비교)

  • Jeong, Iitae;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.197-216
    • /
    • 2022
  • With the development of Internet and mobile technology and the spread of social media, a large amount of information is being generated and distributed online. Some of them are useful information for the public, but others are misleading information. The misleading information, so-called 'fake news', has been causing great harm to our society in recent years. Since the global spread of COVID-19 in 2020, much of fake news has been distributed online. Unlike other fake news, fake news related to COVID-19 can threaten people's health and even their lives. Therefore, intelligent technology that automatically detects and prevents fake news related to COVID-19 is a meaningful research topic to improve social health. Fake news related to COVID-19 has spread rapidly through social media, however, there have been few studies in Korea that proposed intelligent fake news detection using the information about how the fake news spreads through social media. Under this background, we propose a novel model that uses Graph2vec, one of the graph embedding methods, to effectively detect fake news related to COVID-19. The mainstream approaches of fake news detection have focused on news content, i.e., characteristics of the text, but the proposed model in this study can exploit information transmission relationships in social engagement networks when detecting fake news related to COVID-19. Experiments using a real-world data set have shown that our proposed model outperforms traditional models from the perspectives of prediction accuracy.

Purchase Intention on Online Financial Products among Chinese Consumer (중국인 소비자의 온라인 금융 상품에 대한 구매의도 분석)

  • LI, Zhipeng;Chong, Hyi-Thaek;Lee, Sang-Joon;Lee, Kyeong-Rak
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.89-102
    • /
    • 2018
  • With the development of mobile technology, asset management on the Internet have also developed a lot. Drawing on Technology Acceptance Model, this study examines YUEBAO deployment to model consumers' purchase intention to use financial products offered online. In this study, we hypothesized that the characteristics of online asset management product will affect the purchase intention through perceived usefulness and conduct empirical analysis on Chinese consumers. In the study model, the independent variables were considered to include individual involvement, experience, product protection, corporate credibility, convenience, mobility, and familiarity. In addition, the parameters constitute the usefulness, and the dependent variable is the purchase. The results are as follows. First, YUEBAO's complementarity, corporate credibility, convenience, and familiarity have a significant influence on YUEBAO's usefulness. Second, The YUEBAO's usefulness has a noticeable effect on the purchase intention. To perceive the high usefulness, the practicality strategy of enhancing the protection property, corporate reliability, convenience and familiarity of the online asset management product is needed. The study of consumer purchase behavior and consumer purchase intention of online wealth management products is very valuable for academic and practical work.

Study on Changes of Street Furniture in Digital Environment (디지털 환경에서 가로시설물의 변화에 관한 연구)

  • In, Chiho;Kim, Hyunsoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1D
    • /
    • pp.129-136
    • /
    • 2008
  • Along with the development in cutting-edge digital technology, the street space is also being changed. Mobile telecommunication units and internet give a big change in a human being's lifestyle. And the ubiquitous computing is proceeding with expanding its application range from the indoor space to the street space. As the street furniture is the convenient facility that allows a human being's life in street space to be abundant, it is getting advanced. First of all, in terms of such phenomenon, this study analyzed the cases of a research on application of street space and the actual condition of a change in the number of individuals for the street furniture, through a literature research of ubiquitous. Also, it researched into the realities of using the street furniture of the walking-desired streets at Daehac-ro and Hongdae district, where are two representative places related to digital generation. The next was carried out FGI (Focus Group Interview) with users of the street space in front of Hongik University and managers of the street furniture, and was researched into the use & management behavior, and recognition level on the street furniture. Thus, the key elements were extracted such as interchange of information for cultural activities, automation for interaction variability in function. Finally the core elements for future vision of street furniture in this digital era were extracted in 3I, namely, Information, Intellectualization, and Integration. This is considered to be applied to the establishment of direction in the process of high-tech digitalization in street furniture related to information hereafter.

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

Development of Smart Packaging for Cream Type Cosmetic (크림 제형 화장품용 스마트 패키징 기술 개발)

  • Jeon, Sooyeon;Moon, Byounggeoun;Oh, Jaeyoung;Kang, Hosang;Jang, Geun;Lee, Kisung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.25 no.3
    • /
    • pp.79-87
    • /
    • 2019
  • The degree of cosmetic's oxidation depends on the storage conditions and external conditions when using the product. The microbial contamination and oxygen exposure often results in the quality deterioration of cosmetics. In addition, the problem is that consumers often use cream-type cosmetics, which have short expiration period (6-12 months), even after the product is expired. When using the deteriorated cosmetics, it can be fatal to consumers' safety including some symptoms such as folliculitis, rashes, edema, and dermatitis. Therefore, it is necessary to develop sealed smart packaging for cosmetics to prevent the deterioration of cosmetics and improve consumer safety. In this study, we have developed smart packaging design for cosmetics that can measure the surrounding environment and expiration date for the cosmetics in the real time. In addition, the smart packaging includes sensor, which are linked to the mobile application. Users can find out the measurement results through the application. Also, the packaging design and functions were set up based on the survey results by the user and feasible model can be produced based on user choice. The measurement in the three environment has been done after manufactured the sensor, PCB, and mobile application. As a result, it works normally within a certain range under all three environmental conditions. It is believed that the information on expiration dates and storage environment can be efficiently delivered to the consumers through developed cosmetics smart packaging and applications. The development of UI/UX design for consumer is further studied. The UX/UI design of the application plays an essential role in achieving this goal through the commercialization the cosmetic products in the wide range.