• Title/Summary/Keyword: sender

Search Result 466, Processing Time 0.027 seconds

A Design and Implementation of Ubiquitous Museum(U-Seum) Using Location Based Service and Augmented Reality (위치기반 서비스 및 증강현실을 이용한 유비쿼터스 박물관(U-Seum)의 설계 및 구현)

  • Lee, Sun-Ho;Lee, Woo-Ski;Kim, Nam-Gi;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.63-71
    • /
    • 2012
  • This paper presents a design and implementation of U-Seum(Ubiquitous Museum) system based on the LBS(Location Based Service) and mobile augmented reality technique. The mobile services under the smart space of the ubiquitous environments have been expanded in the various fields. In this study, we introduce U-Seum which supports tourists in the museum. U-Seum is developed by use of the position tracking technique based on Wi-Fi and mobile augmented reality. The GPS which is widely used in the position tracking has a difficulty to be utilized in the inside of the building because it requires the Line-of-Sight between a sender and a receiver. Therefore, in this paper, we develop a realtime tour-supported service through experience and evaluate the performance of the system in the world famous UNESCO's Hwa-Seong Museum by measuring the distance from the Wi-Fi signal which is suitable to track the position interior of the museum. U-Seum provides various push services such as mobile augmented reality service for explanation of the artifacts of the museum, game services and the statistics information of the tourist when the tourist approach a specific AP. U-Seum is developed in the Haw-Seong Museum by the support of the Swon Haw-Seong Cultural Foundation. With a field test, we prove that the excellence and expandability of the system.

A Time Slot Assignment Scheme for Sensor Data Compression (센서 데이터의 압축을 위한 시간 슬롯 할당 기법)

  • Yeo, Myung-Ho;Kim, Hak-Sin;Park, Hyoung-Soon;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.846-850
    • /
    • 2009
  • Recently, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics such as environmental monitoring, smart spaces, medical applications, and precision agriculture. The sensor nodes are battery powered. Therefore, the energy is the most precious resource of a wireless sensor network since periodically replacing the battery of the nodes in large scale deployments is infeasible. Energy efficient mechanisms for gathering sensor readings are indispensable to prolong the lifetime of a sensor network as long as possible. There are two energy-efficient approaches to prolong the network lifetime in sensor networks. One is the compression scheme to reduce the size of sensor readings. When the communication conflict is occurred between two sensor nodes, the sender must try to retransmit its reading. The other is the MAC protocol to prevent the communication conflict. In this paper, we propose a novel approaches to reduce the size of the sensor readings in the MAC layer. The proposed scheme compresses sensor readings by allocating the time slots of the TDMA schedule to them dynamically. We also present a mathematical model to predict latency from collecting the sensor readings as the compression ratio is changed. In the simulation result, our proposed scheme reduces the communication cost by about 52% over the existing scheme.

Artifacts Analysis of Users Behavior in Korea Random Chat Application (국내 랜덤 챗 어플리케이션에서 사용자의 행위에 따른 아티팩트 분석)

  • Seo, Seunghee;Nam, Gihoon;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.1-8
    • /
    • 2018
  • A random chat application is a type of social dating application that helps people find a lover or spouse by randomly connecting and providing services such as text, voice and video chat. Recently, there has been globally a rapid increase in its use due to the fact that it provides people to quick and convenient encounters at low cost. However, it is used as one of method to prostitute or to trade drugs and become a cause of violent crimes due to various criminal occurring after actual meeting between app users. For this reason, a random chat application is likely to provide proof of prostitution or drug trade and clues to arrest rape, kidnapping and murder suspects. Thus, it is necessary to analyse random chat applications from the viewpoint of digital forensics investigation, but there is no related research at all. Therefore, in this paper, we analyzed artifacts of 6 Korea random chat application's user behaviors; Ranchat, AngTalk, SsumgThing, DaTalk, EveryTalk and Sail. As a result, we found that it is remain on mobile device that time and contents of message transmission/reception, sender/receiver, friend profile and user account creation time when user is using the applications.

A Multi-Dimensional Node Pairing Scheme for NOMA in Underwater Acoustic Sensor Networks (수중 음향 센서 네트워크에서 비직교 다중 접속을 위한 다차원 노드 페어링 기법)

  • Cheon, Jinyong;Cho, Ho-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.1-10
    • /
    • 2021
  • The interest in underwater acoustic sensor networks (UWASNs), along with the rapid development of underwater industries, has increased. To operate UWASNs efficiently, it is important to adopt well-designed medium access control (MAC) protocols that prevent collisions and allow the sharing of resources between nodes efficiently. On the other hand, underwater channels suffer from a narrow bandwidth, long propagation delay, and low data rate, so existing terrestrial node pairing schemes for non orthogonal multiple access (NOMA) cannot be applied directly to underwater environments. Therefore, a multi-dimensional node pairing scheme is proposed to consider the unique underwater channel in UWASNs. Conventional NOMA schemes have considered the channel quality only in node pairing. Unlike previous schemes, the proposed scheme considers the channel gain and many other features, such as node fairness, traffic load, and the age of data packets to find the best node-pair. In addition, the sender employs a list of candidates for node-pairs rather than path loss to reduce the computational complexity. The simulation results showed that the proposed scheme outperforms the conventional scheme by considering the fairness factor with 23.8% increases in throughput, 28% decreases in latency, and 5.7% improvements in fairness at best.

A Study on the Delivery Pattern of Korean letters during 1900-1945 (한국 우편 전달의 정착 양상 고찰)

  • Jeon, Byeong Yong
    • (The)Study of the Eastern Classic
    • /
    • no.73
    • /
    • pp.415-444
    • /
    • 2018
  • This study was designed to analyze the delivery patterns of early(1900-1945) letters from the beginning of the postal service in order to examine the process of establishing the modern postal system after the constitution of the Postal Service(1884). In Chapter 2, we examined the 'change of the way letters are delivered', Chapter 3 is about the 'change of expression' and Chapter 4 is about 'double-faced of the post'. In the examination of aspects of changing the way letters were delivered, the phase of postal delivery by personal delivery to postal delivery were divided into three phases: [the period of personal delivery delivery] > [the coexistence period of personal delivery and postal deliveryy] > [the period of postal delivery]. In particular, it was interesting to see that the same sender and receiver mixed up postal delivery and personal delivery by the case in the second period. In addition, the functional differences between the express, telegram and particular post were found in the examination fo contents of the letter. In the examination of aspects of changing in expression, a change of common expression in 'greeting, ending, and receiving expressions' were confirmed. Also, it was confirmed that 'woo-pyeon' was not used as the basic term, but instead replaced with various terms, and that 'woo' was used independently and productively. In the double-faced aspects of post, there were disadvantages of the postal delivery such as 'discontent of the lost' and 'security of confidentiality', despite the advantages of 'economic, rapid, and long-distance delivery'. Because the disadvantage of postal delivery could be supplemented by personal delivery, postal delivery and personal delivery could coexist for a considerable period of time.

A Study on the Effectiveness of Emotional Communication According to Types of Emoticon - Focusing on the Differences in Gender and Major of the Receiver - (이모티콘 유형에 따른 감정소통의 효과성 연구 - 수신자의 성별 및 전공계열별 차이를 중심으로 -)

  • Kang, Jung Ae;Kim, Hyun Ji;Lee, Sang Soo
    • Design Convergence Study
    • /
    • v.15 no.4
    • /
    • pp.45-58
    • /
    • 2016
  • The purpose of this study is to investigate the most effective emoticon type in on-line communication context through analysis decoding(by their interpretation, empathy, reaction) of receiver about emotional message included the various emoticon types. Message types were all 5 - only text message and messages included texticon, graphicon, anicon, and photocon that reflected the transitional process of emoticon. Survey questionnaire that included various emotional situations was developed and utilized to undergraduate students to analyze the differences in their gender and majors. Results are as follow. First, the graphicon, anicon and photocon messages had higher effectiveness than others in the pleasure while the text only message had the highest effectiveness of them in the displeasure. Second, female students responded that the graphicon, anicon and photocon messages were more effective while male students responded that text only message was. Third, between Arts/Physical and Science/Engineering majors had significant differences in some message types, and especially Science/Engineering majors showed higher average than other majors in all of the emoticon types. These results can provide the information to design messages by the emotional situation of sender and gender and major of receiver.

Modeling Consumers' WOM (Word-Of-Mouth) Behavior with Subjective Evaluation and Objective Information on High-tech Products (하이테크 제품에 대한 소비자의 주관적 평가와 객관적 정보 구전 활동에 대한 연구)

  • Chung, Jaihak
    • Asia Marketing Journal
    • /
    • v.11 no.1
    • /
    • pp.73-92
    • /
    • 2009
  • Consumers influence other consumers' brand choice behavior by delivering a variety of objective or subjective information on a particular product, which is called WOM (Word-Of-Mouth) activities. For WOM activities, WOM senders should choose messages to deliver to other consumers. We classify the contents of the messages a consumer chooses for WOM delivery into two categories: Subjective (positive or negative) evaluation and objective information on products. In our study, we regard WOM senders' activities as a choice behavior and introduce a choice model to study the relationship between the choice of different WOM information (WOM with positive or negative subjective evaluation and WOM with objective information) and its influencing factors (information sources and consumer characteristics) by developing two bivariate Probit models. In order to consider the mediating effects of WOM senders' product involvement, product attitude, and their characteristics (gender and age), we develop three second-level models for the propagation of positive evaluations, of negative evaluations, and of objective information on products in an hierarchical Bayesian modeling framework. Our empirical results show that WOM senders' information choice behavior differs according to the types of information sources. The effects of information sources on WOM activities differ according to the types of WOM messages (subjective evaluation (positive or negative) and objective information). Therefore, our study concludes that WOM activities can be partially managed with effective communication plans influencing on consumers' WOM message choice behavior. The empirical results provide some guidelines for consumers' propagation of information on products companies want.

  • PDF

A 2×2 MIMO Spatial Multiplexing 5G Signal Reception in a 500 km/h High-Speed Vehicle using an Augmented Channel Matrix Generated by a Delay and Doppler Profiler

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.1-10
    • /
    • 2023
  • This paper proposes a method to extend Inter-Carrier Interference (ICI) canceling Orthogonal Frequency Division Multiplexing (OFDM) receivers for 5G mobile systems to spatial multiplexing 2×2 MIMO (Multiple Input Multiple Output) systems to support high-speed ground transportation services by linear motor cars traveling at 500 km/h. In Japan, linear-motor high-speed ground transportation service is scheduled to begin in 2027. To expand the coverage area of base stations, 5G mobile systems in high-speed moving trains will have multiple base station antennas transmitting the same downlink (DL) signal, forming an expanded cell size along the train rails. 5G terminals in a fast-moving train can cause the forward and backward antenna signals to be Doppler-shifted in opposite directions, so the receiver in the train may have trouble estimating the exact channel transfer function (CTF) for demodulation. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceller is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number n to receiver sub-carrier number l is generated. In case of n≠l, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 8 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, 2×2MIMO QPSK and 16QAM modulation schemes, BER (Bit Error Rate) improvement was observed when the number of taps in the multi-tap equalizer was set to 31 or more taps, at a moving speed of 500 km/h and in an 8-pass reverse doppler shift environment.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

Fluid bounding effect on FG cylindrical shell using Hankel's functions of second kind

  • Khaled Mohamed Khedher;Shahzad Ali Chattah;Mohammad Amien Khadimallah;Ikram Ahmad;Muzamal Hussain;Rana Muhammad Akram Muntazir;Mohamed Abdelaziz Salem;Ghulam Murtaza;Faisal Al-Thobiani;Muhammad Naeem Mohsin;Abeera Talib;Abdelouahed Tounsi
    • Advances in nano research
    • /
    • v.16 no.6
    • /
    • pp.565-577
    • /
    • 2024
  • Vibration investigation of fluid-filled functionally graded cylindrical shells with ring supports is studied here. Shell motion equations are framed first order shell theory due to Sander. These equations are partial differential equations which are usually solved by approximate technique. Robust and efficient techniques are favored to get precise results. Employment of the Rayleigh-Ritz procedure gives birth to the shell frequency equation. Use of acoustic wave equation is done to incorporate the sound pressure produced in a fluid. Hankel's functions of second kind designate the fluid influence. Mathematically the integral form of the Langrange energy functional is converted into a set of three partial differential equations. A cylindrical shell is immersed in a fluid which is a non-viscous one. These shells are stiffened by rings in the tangential direction. For isotropic materials, the physical properties are same everywhere where the laminated and functionally graded materials, they vary from point to point. Here the shell material has been taken as functionally graded material. After these, ring supports are located at various positions along the axial direction round the shell circumferential direction. The influence of the ring supports is investigated at various positions. Effect of ring supports with empty and fluid-filled shell is presented using the Rayleigh - Ritz method with simply supported condition. The frequency behavior is investigated with empty and fluid-filled cylindrical shell with ring supports versus circumferential wave number and axial wave number. Also the variations have been plotted against the locations of ring supports for length-to-radius and height-to-radius ratio. Moreover, frequency pattern is found for the various position of ring supports for empty and fluid-filled cylindrical shell. The frequency first increases and gain maximum value in the midway of the shell length and then lowers down. It is found that due to inducting the fluid term frequency result down than that of empty cylinder. It is also exhibited that the effect of frequencies is investigated by varying the surfaces with stainless steel and nickel as a constituent material. To generate the fundamental natural frequencies and for better accuracy and effectiveness, the computer software MATLAB is used.