• Title/Summary/Keyword: mobile techniques

Search Result 1,060, Processing Time 0.034 seconds

DSRC Strategy and Future ITS (DSRC 전략과 향후의 ITS)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.105-119
    • /
    • 2006
  • The car navigation system to be accompanied to the car on-board equipment system or the development of mobile communication technique, the demand in information communication which connects an interior and the car outside is coming to be high, As applications, ETC/VISC/AHS classes get deceived supply are advanced. The research of DSRC radio systems actively, with medium of communication between the automobile and road, is advanced. DSRC radio systems are appropriate in massive data transfer, in the case which the traffic accident evasion is urgent, the notarization of the preferential control function which is necessary to a medium of communication, guarantee and security are suitable in the high-speed network. Accompanied to the cellular phone which is to be supplied recently suddenly, By complementing and coexisting each other, and it will be developed simultaneously. However, in a connection of this kind of communication system and high-speed DSRC radio system, Hand-over technique (network, radio transmission hand-over), there is a technical subject of the high-speed transmission techniques against the mobile devices and the realization is expected to be difficult in near, until 2010 year is becoming the plan of putting to practical use. Also as the next generation DSRC with 5.8GHz built-on board equipment and the road-side equipment are expected in near. In this paper DSRC systems which will be developed are discussed.

A Study on Analysis of Multipath Signal Detection using GPS Signal Strength Information (GPS 신호세기 정보를 이용한 다중경로신호 검출 분석에 대한 연구)

  • Kim, Dusik;Park, Kwan-Dong;Kim, Hye-In;Tae, Hyunu
    • Journal of Navigation and Port Research
    • /
    • v.39 no.1
    • /
    • pp.7-13
    • /
    • 2015
  • The number of mobile terminals equipped with a GPS module is steadily increasing today. However, because they using code pseudorange measurements in positioning, the positioning accuracy of mobile terminals is lower than that of those receivers using carrier phases. Especially, the multipath signal causes more significant errors in code pseudoranges. Therefore, the techniques of multipath detection and elimination is necessary. In this study, as an initial analysis of multipath detection and elimination technique development, we tested the feasibility of multipath signal detection using GPS signal strength information. We found that the GPS signal strength increases as the elevation angle gets higher in the open-sky environment. Also, we found that the signal strength decreases when there were some signal reflectors nearby. We checked the repeatability of the signal strength variation characteristics by reflecting repeat time of GPS satellites. As a result, this characteristics repeats almost perfectly when GPS satellites pass the same orbit. Therefore, we found that it is not a temporary phenomenon and the multipath signal detection should be possible by using GPS signal strength information.

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.

Design and Implementation of B-Tree on Flash Memory (플래시 메모리 상에서 B-트리 설계 및 구현)

  • Nam, Jung-Hyun;Park, Dong-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • Recently, flash memory is used to store data in mobile computing devices such as PDAs, SmartCards, mobile phones and MP3 players. These devices need index structures like the B-tree to efficiently support some operations like insertion, deletion and search. The BFTL(B-tree Flash Translation Layer) technique was first introduced which is for implementing the B-tree on flash memory. Flash memory has characteristics that a write operation is more costly than a read operation and an overwrite operation is impossible. Therefore, the BFTL method focuses on minimizing the number of write operations resulting from building the B-tree. However, we indicate in this paper that there are many rooms of improving the performance of the I/O cost in building the B-tree using this method and it is not practical since it increases highly the usage of the SRAM memory storage. In this paper, we propose a BOF(the B-tree On Flash memory) approach for implementing the B-tree on flash memory efficiently. The core of this approach is to store index units belonging to the same B-tree node to the same sector on flash memory in case of the replacement of the buffer used to build the B-tree. In this paper, we show that our BOF technique outperforms the BFTL or other techniques.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

An Adaptive Signal Transmission/Reception Scheme for Spectral Efficiency Improvement of Multiple Antenna Systems in Cellular Environments (셀룰러 환경에서 다중 안테나 시스템의 전송 효율 증대를 위한 적응적 송수신 방안)

  • Jin, Gwy-Un;Kim, Seong-Min;Chang, Jae-Won;Sung, Won-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.429-437
    • /
    • 2008
  • Multiple-input multiple-output (MIMO) techniques can be used for the spectral efficiency enhancement of the cellular systems, which can be categorized into spatial multiplexing (SM) and spatial diversity schemes. MIMO systems suffer a severe performance degradation due to the intercell interference from the adjacent cells as the mobile terminal moves toward the cell boundary. Therefore for the spectral efficiency enhancement, an appropriate transmission scheme for the given channel environment and reception scheme which can mitigate the intercell interference are required. In this paper, we propose an adaptive signal transmission/reception scheme for the spectral efficiency improvement of $M_R{\times}M_T$ MIMO systems, present the decision criteria for the adaptive operation of the proposed scheme, and demonstrate the performance gain. The proposed scheme performs adaptive transmission using spatial multiplexing and spatial diversity, and adaptive reception using maximal ratio combining (MRC) and intercell spatial demultiplexing (ISD) when the spatial diversity transmission is used at the transmitter. Spatial multiplexing/demultiplexing is performed at the high signal-to-interference ratio (SIR) range, and the transmit diversity in conjunction with the adaptive reception uses either conventional MRC or ISD which can mitigate the $M_R-1$ interference signals, based on the mobile location. For the performance evaluation of the proposed adaptive scheme, the probability density function (pdf) of the effective SIR for the transmission/reception methods in consideration are derived for $M_R{\times}M_T$ MIMO systems. Using the results, the average effective SIR and spectral efficiency are presented and compared with simulation results.

Effective Response Time Verify of Active Decoy Against Anti-Ship Missile Using DEVS Simulation (DEVS 시뮬레이션을 사용한 능동기만기의 대함미사일에 대한 효과적인 대응시간 검증)

  • Choi, Soon-Ho;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.495-501
    • /
    • 2015
  • Abroad warships are confronted with various menaces. The most critical threat of the warship is an Anti-Ship Missile (ASM). The ASM is able to be launched at a variety of environments and platforms. The ASM can evades conventional naval radar systems and electronic countermeasure techniques for providing a fatal damage to the warship. To cope with the ASM, an active decoy is an effective method to minimize the direct damage to the warship. The active decoy increases survivability of the warship because the ASM can lure pursuit of the active decoy instead of the warship. In this paper, our proposed method verifies an available response time of the active decoy to deal with the ASM using the active decoy of the warship in marine environments. We defined models of the warship, the ASM, and the active decoy, and executed simulation by combining the models. By the simulation result, the proposed method demonstrated the superiority of the mobile active decoy of the response time decoy among various active decoys, and estimated a protection area to prevent the ASM according the response time of the mobile active decoy against the ASM.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

The Negotiation Model of Negotiation Agents for m-Commerce (모바일 전자상거래를 위한 협상 에이전트의 협상모델)

  • 정진국;이순근;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.155-175
    • /
    • 2003
  • In context of e-commerce, negotiation is a procedure to help negotiate between buyer and seller by adjusting their negotiation issues such as price and in terms of payment. We used intelligent agent and mobile device to promote new framework of e-commerce. Moreover, this framework can help buyers and sellers to carry their commercial transactions effectively. In regard to that issue, we need to carry out the research of negotiation agent that can be used in e-commerce fields. In this paper, we modeled the negotiation using CSP for the performance of agent in m-commerce environment. Furthermore we implemented interface for mobile device to extract buyer's requirement and preference easily Besides that we used utility function to make a decision for various evaluation functions and suggestions that are used for evaluation of negotiation issues. A difficulty of generating offer is dependent on the number of negotiation issues and the range of the values. Therefore, if any offer has a number of negotiation issues and the range of values are wide, the search space will be exponentially expanded. There have been many studies fur solving this problem, we applied those techniques to improve the agent's ability of negotiation. For example, a contract can be accomplished by exchanging seller and buyer's offer that is generated by agent to adjust the requisite profit for each party. Finally, we show the improvement of satisfaction as the negotiation is processed.

  • PDF

An Energy-Balancing Technique using Spatial Autocorrelation for Wireless Sensor Networks (공간적 자기상관성을 이용한 무선 센서 네트워크 에너지 균등화 기법)

  • Jeong, Hyo-nam;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.33-39
    • /
    • 2016
  • With recent advances in sensor technology, CMOS-based semiconductor devices and networking protocol, the areas for application of wireless sensor networks greatly expanded and diversified. Such diversification of uses for wireless sensor networks creates a multitude of beneficial possibilities for several industries. In the application of wireless sensor networks for monitoring systems' data transmission process from the sensor node to the sink node, transmission through multi-hop paths have been used. Also mobile sink techniques have been applied. However, high energy costs, unbalanced energy consumption of nodes and time gaps between the measured data values and the actual value have created a need for advancement. Therefore, this thesis proposes a new model which alleviates these problems. To reduce the communication costs due to frequent data exchange, a State Prediction Model has been developed to predict the situation of the peripheral node using a geographic autocorrelation of sensor nodes constituting the wireless sensor networks. Also, a Risk Analysis Model has developed to quickly alert the monitoring system of any fatal abnormalities when they occur. Simulation results have shown, in the case of applying the State Prediction Model, errors were smaller than otherwise. When the Risk Analysis Model is applied, the data transfer latency was reduced. The results of this study are expected to be utilized in any efficient communication method for wireless sensor network monitoring systems where all nodes are able to identify their geographic location.