• Title/Summary/Keyword: mobile techniques

Search Result 1,069, Processing Time 0.028 seconds

Turbo-coded STC schemes for an integrated satellite-terrestrial system for cooperative diversity (협동 다이버시티 이득을 위한 위성-지상간 통합망에서의 터보 부호화된 시공간 부호)

  • Park, Un-Hee;Kim, Soo-Young;Kim, Hee-Wook;Ahn, Do-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.62-70
    • /
    • 2010
  • In this paper, we evaluate the performance of various diversity techniques which can contribute to provide efficient multimedia broadcasting services via hybrid/integrated satellite and terrestrial network. Space-time coding (STC) can achieve the diversity gain in a multi-path environment without additional bandwidth requirement. Recent study results reported that satellite systems can achieve high diversity gains by appropriate utilization of STC and/or forward error correction schemes. Based on these previous study results, we present various cooperative diversity techniques by combining STC and rate compatible turbo codes in order to realize the transmit diversity for the mobile satellite system. The satellite and several terrestrial repeaters operate in unison to send the encoded signals, so that receiver may realize diversity gain. The results demonstrated in this paper can be utilized in future system implementation.

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Femto-Caching File Placement Technique for Overlapped Helper Coverage Without User Location Information (사용자 위치정보를 사용하지 않는 헬퍼 간 중첩 커버리지 영역을 위한 펨토-캐싱 파일 분배 기술)

  • Shim, Jae-Nam;Min, Byoung-Yoon;Kim, Dong Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.682-689
    • /
    • 2014
  • Due to explosive growth of mobile data traffic, many kind of techniques based on small cell is proposed as solution for phenomenon. However, those techniques essentially demands increase of backhaul capacity and causes performance degradation if not satisfied. Based on that, the approach applying the storage capacity in place of backhaul capacity, which is known as femto-caching, is proposed to reduce data downloading delay of users in system. In this paper, we expanded previous research by proposing file placement strategy with distribution of user position, which is more practical scenario. Simulation results verify that our proposed scheme has better performance gains mainly because when coverage of helpers are overlapped, users get more opportunity to connect various helpers which enables users to download a variety kind of files from helpers, not base station.

Temporal Pattern Mining of Moving Objects for Location based Services (위치 기반 서비스를 위한 이동 객체의 시간 패턴 탐사 기법)

  • Lee, Jun-Uk;Baek, Ok-Hyeon;Ryu, Geun-Ho
    • Journal of KIISE:Databases
    • /
    • v.29 no.5
    • /
    • pp.335-346
    • /
    • 2002
  • LBS(Location Based Services) provide the location-based information to its mobile users. The primary functionality of these services is to provide useful information to its users at a minimum cost of resources. The functionality can be implemented through data mining techniques. However, conventional data mining researches have not been considered spatial and temporal aspects of data simultaneously. Therefore, these techniques are inappropriate to apply on the objects of LBS, which change spatial attributes over time. In this paper, we propose a new data mining technique for identifying the temporal patterns from the series of the locations of moving objects that have both temporal and spatial dimension. We use a spatial operation of contains to generalize the location of moving point and apply time constraints between the locations of a moving object to make a valid moving sequence. Finally, the spatio-temporal technique proposed in this paper is very practical approach in not only providing more useful knowledge to LBS, but also improving the quality of the services.

A Study on the development of mobile system for younger generation based on the experience-based product development process (경험디자인을 적용한 모바일 상품 컨셉 개발에 관한 연구)

  • 이종호
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.421-430
    • /
    • 2004
  • The aim of this research is to develop communication model and tools that would help in incorporating user experience into information appliance product development. To do so, this research suggested three major modelling techniques, including user-experience model, design strategy model and experience product model. Using these modelling tools, any members in design teams (investigator and designers) will be able to communicate their own ideas and research results each other at any period of the product development process. Each tools have distinct factors that would help identify elements in the user research stages, idea generation stages and product development stages. To verify the efficiency of these models, the case study was conducted with final year students at their studio class. As a result, the benefit of using these tools were identified as 1) these tools accelerate the communication between user researchers, designers and engineers and 2) evaluation process of the product is much more dearer that before. and 3) various user research techniques can be explored.

  • PDF

A Study on Conditional Access Message Multiplexing Method in T-DMB Conditional Access System (T-DMB 제한수신시스템에서 제한 수신 메시지 다중화 기법 연구)

  • Kim, Dong-Hyun;Seo, Hyung-Yoon;Bae, Byung-Jun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.722-724
    • /
    • 2010
  • CAS(Conditional Access System) was developed for paid-for service in cable and fixed satellite broadcast system and technology and market maturity are high. However, these assessment is limited by CAS in fixed broadcasting system. In case of digital mobile broadcast such as T-DMB is difficult to apply CAS technology of fixed broadcasting system because of a use method and technology characteristic. Expecially, in case T-DMB using limited resources, a CAS message which must transmit in each service channel can cause problems. It is desirable that system transmits the CAS message which transmitted by each service channel through logical CAS message-only channel. In order to make a logical CAS message channel, we need a multiplexing techniques for CAS message using in each channel. In this paper, we design the CAS message multiplexing techniques for composition of CAS message-only channel.

  • PDF

Study on DPSAM Turbo TCM in Time-Selective Fading Channels (시간 선택적 페이딩 채널 환경에서 DPSAM Turbo TCM에 관한 연구)

  • Kim, Jeong-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.107-113
    • /
    • 2013
  • Mobile mobility and data reliability should be guaranteed as well as amounts of data services are essential in the era of smart media. In order to improve the reliability of high-speed data, strong channel coding and modulation techniques are required. In this paper, the structure of Turbo TCM decoder, applying high-order modulation techniques and the DPSAM method which improves performances in time-selective fading channels in the case of burst errors are suggested through the optimal decoding method and iteration decoding so as to improve bandwidth efficiency in Turbo Codes with excellent encoding gain. The proposed method in comparison with the existing method is that 3dB is superior in case that BER is $10^{-2}$ and the number of iterations is 3. In addition, the function is improved at approximately 6dB in case that BER is $10^{-3}$ and the number of iterations is 7. The proposed method requires additional bandwidth; however, the bandwidth loss can be overcome through Turbo TCM technology on the additional bit rate from the bandwidth loss.

Convergence and integration study related to development of digital contents for radiography training using dental radiograph and augmented reality (치과방사선사진과 증강현실을 활용한 방사선촬영법 숙련용 디지털 콘텐츠 개발에 대한 융복합 연구)

  • Gu, Ja-Young;Lee, Jae-Gi
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.441-447
    • /
    • 2018
  • This study aims to develop digital techniques that enable repeated practice of dental radiography using augmented reality technology. A three-dimensional object was fabricated by superimposing a photograph of an adult model and a computed tomography image of a manikin phantom. The system was structured using 106 radiographs such that one of these saved radiographs is opened when the user attempts to take a radiograph on a mobile device. This system enabled users to repeatedly practice at the pre-clinical stage without exposure to radiation. We attempt to contribute to enhancing dental hygienists' competency in dental radiography using these techniques. However, a system that enables the user to actually take a radiograph based on face recognition would be more useful in terms of practice, so additional studies are needed on the topic.

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.