• Title/Summary/Keyword: mobile terminal.

Search Result 752, Processing Time 0.033 seconds

One-wavelength Ultrasonic Horn Design for Ultrasonic Machining of Mobile Phone Battery Terminal Welding (휴대폰 배터리 단자접합 초음파 가공을 위한 한파장 혼 설계)

  • Seo, Jeong-Seok;Jang, Sung-Min;Beck, Si-Young
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.21 no.1
    • /
    • pp.70-75
    • /
    • 2012
  • The technique with ultrasonic vibration refers to the many industries. Especially Ultrasonic Connection Method is widely used for mobile battery, secondary battery, automobile components and also they recently started using it for terminal connecting of solar community battery. In this study, ultrasonic welding horn is analysed and designed with FEM, then manufactured based on it. Resonance frequency and amplitude of horn would be measured and compared with the designing result to judge the suitability. Al/Al specimen is welded by the manufactured horn and verify its performance via the weldability evaluation.

A Implementation of Real-Time IP Address-Location Mapping System for LBS on High-Speed Internet (초고속 인터넷상에서 위치기반 서비스를 위한 실시간 IP/위치 매핑 시스템 구현)

  • Kim, Min-Kyung;Baek, Gyu-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.10-15
    • /
    • 2005
  • In the area of mobile communication, Location Based Services (LBS) using the location of mobile terminal to provide their services are rapidly spreading as communication network and terminal evolves. Despite the LBS are highly demanded in high speed internet area, the services are very rare due to the difficulty locating terminals. In this paper, we propose the method to locate terminals in real time and describe its implementation system. The proposed system is designed to collect the information in real time for more than a terminal connecting internet. And, the system shows high performancecollecting and generating location information through simulation tests.

  • PDF

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

An Integrated Evaporation Intenna used sputtering technology for Wireless Microsystems

  • Park, Book-Sung;Jung, In-Sung;Kwon, Sung-Hun;Lee, Seon-Gu;Lee, Jee-Myun;Son, Sung-Il;Kim, Eun-Tae;Kim, Chul-Ju
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.158-158
    • /
    • 2008
  • In general, a wireless communication device has employed a whip antenna or a stubby antenna. Recently, wireless communication device is increasingly employing an embedded antenna, Intenna, for the sake of miniaturization. Further, it may employ both external and embedded antennas. Examples of the embedded antenna include a multi-band monopole antenna, which radiates uniformly in all directions when viewed from above, and a planar inverted F antenna (PIFA), which is a variation of the monopole antenna. However, since the conventional antenna is mounted in a finished state on the mobile communication terminal, there is a limitation of space required for providing the antenna. According to the present study, there is provided an Intenna that is deposited on a front or back case of the mobile communication terminal by a sputtering method. Accordingly, it is possible to overcome a limitation of space required for providing the Intenna and to improve the performance of the Intenna formed on the front or back case of the mobile communication terminal.

  • PDF

A Renewal Mechanism of Group Key on Digital Mobile Communication Employing the Fiat-shamir Method (Fiat-Shamir 방식을 적용한 디지털 모바일 통신 그룹키 갱신 메카니즘)

  • Tak, Dong-Kil;Chung, Il-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.571-578
    • /
    • 2006
  • To renew the group key securing on the mobile communication needs that it can be not oかy re-shared by all members of the group with the exception of members excluded but also prevented from making a fraudulent use of a terminal's registered key because of a leakage of information from the loss of terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key in a small-scale conference employing the Fiat-Shamir method. It can guarantee the security of terminals, since a terminal generates security information needed for key renewal, and then renews the group key for mutual communication.

A Study of Ubiquitous Hair Changing (Ubiquitous Hair Changing에 관한 연구)

  • Park Dae Woo;Kang Nan Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.157-166
    • /
    • 2005
  • The Hair part of Cosmetology is development with Ubiquitous age. In this paper, 1 would design and implement for Ubiquitous Hair Changing on Ubiquitous network. Hair artist have customer's features in use digital camera for operating hair beauty. They are agree with hair design and style in monitor on internet at customer's choose in digital contents of cut, permanent, up-style, dye, long hair from web server. After operation on customer's hair from image of mobile terminal, hair artists take a photograph of customer's face and update it on internet. Customer's features was saved in her's mobile terminal. I would contribute to development of Beauty Information Society that the design of Ubiquitous Hair Changing System and the implement of digital hair contents that on-line internet system Sl mobile terminal were applied by Ubiquitous Network.

  • PDF

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

A Study on Efficient Telematics System Construction (효율적인 텔레매틱스 시스템 구성)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.670-671
    • /
    • 2012
  • This paper presents a method of constructing telematics terminal embedded architecture for DMB TPEG data service The proposed embedded architecture was designed for terminal. Also, we use WIPI which was used for standard based on mobile middle-ware, and TPEG decoding which was used for Window CE. We can see the advantage compare with previous methods.

  • PDF

Graph theoretical considerations of a channel assignment problem on multihop wireless networks

  • Tamura, Hiroshi;Watanabe, Kaoru;Sengoku, Masakazu;Shinoda, Shoji
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.967-970
    • /
    • 2002
  • Multihop wireless networks consist of mobile terminals with personal communication devices. Each terminal can receive a message from a terminal and send it to the other terminal. In this paper, we discuss edge coloring problems related to multihop wireless networks. We show some relations about the problems.

  • PDF

Power Management for Mobile Terminal (모바일 단말에서의 전원관리 기술)

  • Lee, Junghee;Park, Hojun;Kim, Jaemyoung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.194-201
    • /
    • 2007
  • As the performance of the mobile terminal becomes higher, the power consumption gradually increases. As a result, power management is one of the most important issues in mobile system with battery. In this paper, we describe an DPM(Dynamic Power Management) using DVS(Dynamic Power Management) as a power management mechanism in Qplus operating system. DVS generally considers a specific device such as CPU, whereas we consider the relations with other hardware components as well as each component. We specially focus on the relation between CPU, memory and LCD devices. We also designs a kernel monitor to collect information to decide the policy for power management. According to the experimental results, the proposed method enables to save much power.

  • PDF