• Title/Summary/Keyword: mobile techniques

Search Result 1,060, Processing Time 0.037 seconds

Touch-based Gaming System using Augmented Reality Technology (증강현실 기술을 이용한 터치기반 게임 시스템)

  • Lee, Jae-Young;Kwon, Jun-Sik
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.69-76
    • /
    • 2014
  • In this study, by using the control technique of the user using augmented reality technology, to provide a game system touch-based. The augmented reality technology, can be advantageously used vehicle is easily recognized as a technique for synthesizing (images, video, text) object of the virtual image of the real world. Augmented reality technology has been studied to make the application in various fields. Studies of natural marker-based marker and base are underway, but there is no sense of incongruity in reality research natural marker-based and has been studied much. By using the augmented reality technology natural marker-based In this paper, we implemented a game system. The system also has the advantage that can be absorbed in the game by using the techniques of the interaction through a user's touch. Touch interface-based, are available as well as user environments, even in mobile devices such as smart-phone and touch pad.

A Study on the FSK Synchronization and MODEM Techniques for Mobile Communication Part II : Performance Analysis and Design of The FSK MODEM (이동통신을 위한 FSK 동기 및 변복조기술에 관한 연구 II부. FSK 모뎀 설계 및 성능평가)

  • Kim, Gi-Yun;Choe, Hyeong-Jin;Jo, Byeong-Hak
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.3
    • /
    • pp.9-17
    • /
    • 2000
  • In this paper we implement computer simulation system of 4FSK signal MODEM using Quadrature detector and analyze overall tranceiver system. We follow the FLEX wireless paging system standards and construct premodulation filter and data frame. We propose an efficient open loop symbol timing recovery algorithm which takes advantage of 128 bit length preamble pattern and also propose a 32 bit UW pattern which Is based on the optimal UW detection method, and excellent aperiodic autocorrelation characteristic. The BER simulation in the fading channel as well as AWGN is performed with BCH coding and Interleaving to the Quadrature detector system and it is shown that a high coding fain occurs in the fading channel rather than AWGN channel.

  • PDF

A Study on the FSK Synchronization and MODEM Techniques for Mobile Communication Part I :Design of Quadrature Detector for FSK Demodulation. (이동통신을 위한 FSK동기 및 변복조기술에 관한 연구 I부. FSK 복조를 위한 Quadrature Detector 설계)

  • Kim, Gi-Yun;Choe, Hyeong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.3
    • /
    • pp.1-8
    • /
    • 2000
  • This paper presents a simulation model of the Quadrature detector to demodulate FSK signal, which is widely used in wireless paging system for its simple hardware implementation and economics of It fabrication. Quadrature detecter has nonlinear phase characteristic for changes linear changes of input signal frequency. So until now Quadrature detector system analysis remained a difficult problem and performance analysis has not been carried out adequately On these backgrounds, this paper presents the FSK signal demodulation process using Quadrature detector and optimal performance derived from digital simulation technique. First, PSN(Phase Shift Network) which is composed of analog RLC tank circuit is transformed into its equivalent digital transfer function using First-order-hold theorem. Though the demodulated outputs of the Quadrature detector for 4FSK are 4-level signals, only 2 comparators are used and it is shown that optimal performance can be obtained by choosing operation parameter Q value and threshold level decision which are proposed herein.

  • PDF

A study on the Privacy threats factors of Cloud Services (클라우드 서비스의 프라이버시 침해 요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.87-95
    • /
    • 2015
  • Recently, The cloud computing technology is emerging as an important issue in the world, and In technology and services, has attracted much attention. Cloud services have evolved from simple forms to complex forms(using multiple mobile devices and communication services(Kakao talk, Facebook, etc.). In particular, as the cloud is especially facilitated the collection of user information, it can now be analyzed with the user's taste and preference. And many of the benefits of the cloud became increasingly closely with our lives. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the Hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies of attack and vulnerability to the privacy threats factors of the cloud computing services. and In the future, this is expected to be utilized as a basis for the Privacy security and Response.

Abdominal Wall Motion-Based Respiration Rate Measurement using An Ultrasonic Proximity Sensor (복부 움직임에 따른 초음파 근접센서를 이용한 호흡측정에 관한 연구)

  • Min, Se-Dong;Kim, Jin-Kwon;Shin, Hang-Sik;Yun, Young-Hyun;Lee, Chung-Keun;Lee, Jeong-Whan;Lee, Myoung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.10
    • /
    • pp.2071-2078
    • /
    • 2009
  • In this paper, we proposed a non-contact respiration measurement system with ultrasonic proximity sensor. Ultrasonic proximity sensor approach of respiration measurement which respiration signatures and rates can be derived in real-time for long-term monitoring is presented. 240 kHz ultrasonic sensor has been applied for the proposed measurement system. The time of flight of sound wave between the transmitted signal and received signal have been used for a respiration measurement from abdominal area. Respiration rates measured with the ultrasonic proximity sensor were compared with those measured with standard techniques on 5 human subjects. Accurate measurement of respiration rate is shown from the 50 cm measurement distance. The data from the method comparison study is used to confirm the performance of the proposed measurement system. The current version of respiratory rate detection system using ultrasonic can successfully measure respiration rate. The proposed measurement method could be used for monitoring unconscious persons from a relatively close range, avoiding the need to apply electrodes or other sensors in the correct position and to wire the subject to the monitor. Monitoring respiration using ultrasonic sensor offers a promising possibility of non-contact measurement of respiration rates. Especially, this technology offers a potentially inexpensive implementation that could extend applications to consumer home-healthcare and mobile-healthcare products. Further advances in the sensor design, system design and signal processing can increase the range of the measurement and quality of the rate-finding for broadening the potential application areas of this technology.

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

A Study of Balanced TCP Bandwidth Allocation over Wired and Wireless Heterogeneous Network (유무선 혼합 망에서 TCP의 공평한 대역폭 분배를 위한 연구)

  • Kim, Seong-Chul;Cho, Yong-Bum;Moon, Il-Young;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.113-116
    • /
    • 2005
  • In general, multiple mobile hosts (MH) access at a base station (BS) that terminates the wired link and relays data flow to the wireless link in wired and wireless heterogeneous network. In this network, the BS is tend to be a bottleneck and to degrade a network performance. Many studies have been done throughout several protocol layers. Especially on the transport layer, many techniques were studied to enhance TCP performance. But most of them are concerned to enhance TCP throughput and TCP fairness is hardly considered. In this paper, an algorithm for enhancing TCP fairness is proposed and its performance is verified by ns-2 simulation.

  • PDF

Improved Differential Detection Scheme of Space Time Trellis Coded MDPSK For MIMO (MIMO에서 시공간 부호화된 MDPSK의 성능을 향상시키기 위한 차동 검파 시스템)

  • Kim, Chong-Il;Lee, Ho-Jin;Yoo, Hang-Youal;Kim, Jin-Yong;Kim, Seung-Youal
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.164-167
    • /
    • 2005
  • Recently, STC techniques have been considered to be candidate to support multimedia services in the next generation mobile radio communications and have been developed the many communications systems in order to achieve the high data rates. In this paper, we propose the Trellis-Coded Differential Space Time Modulation system with multiple symbol detection. The Trellis-code performs the set partition with unitary group codes. The Viterbi decoder containing new branch metrics is introduced in order to improve the bit error rate (BER) in the differential detection of the unitary differential space time modulation. Also, we describe the Viterbi algorithm in order to use this branch metrics. Our study shows that such a Viterbi decoder improves BER performance without sacrificing bandwidth and power efficiency.

  • PDF

Key Techniques and Performance Comparison of 5G New Waveform Technologies (5G 새로운 파형 핵심 기술 및 성능 비교 분석)

  • Kang, Hyeon Su;Song, Young Bae;Kwon, Doyle;Kim, Duk Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.142-155
    • /
    • 2016
  • In order to satisfy 5th generation mobile system's requirements, recently many works have been done in various layers. Especially in physical layer, new waveforms like Filter bank Multi-Carrier(FBMC), Universal Filtered Multi-Carrier(UFMC), Generalized Frequency Division Multiplexing(GFDM) have been proposed and their performance have been evaluated. But most previous researches have provided limited information by comparing couple new waveforms each other with different assumptions and simulation parameters. In this paper, we investigate the key technique of each 5G new waveform, and compare them in various aspects and the same simulation environment, and finally provide what waveform is appropriate in different application scenarios.

An Insight Study on Keyword of IoT Utilizing Big Data Analysis (빅데이터 분석을 활용한 사물인터넷 키워드에 관한 조망)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.146-147
    • /
    • 2017
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Internet of things" keyword, one month as of october 8, 2017. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Internet of things" has been found to be technology (995). This study suggests theoretical implications based on the results.

  • PDF