• Title/Summary/Keyword: smart mobile device

Search Result 491, Processing Time 0.029 seconds

A design of embedded PC-Fi system with interactive remote control (인터렉티브 원격제어 기능을 갖는 임베디드 PC-Fi 시스템 설계)

  • Bae, Min-Eui;Shin, Ok-Keun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.1
    • /
    • pp.55-61
    • /
    • 2016
  • As the price-performance ratio of embedded PCs improves, the benefits of the PC-Fi can be maximized by designing an embedded PC-Fi system. In this paper presents the design of an embedded PC-Fi that can be manipulated by a remote controller based on mobile devices such as smart phones or tablets. Additionally, an interactive control system and its GUI, through which the user can select and play music as they like at ease, are presented. The case that a large amount of music is stored in the PC-Fi system requires a function allowing the user to easily select the music they want to listen to. In order to implement this function, a DB containing detailed information of each track can be used to find the location of the desired music with keywords provided by the user. In this proposed system, the embedded PC-Fi system and remote controller are mutually connected via a WiFi network, and more than one user can remotely control the embedded system with their own mobile device.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Implementation of IMS Core SIP Gateway based on Embedded (임베디드 기반의 IMS 코아 SIP 게이트웨이 구현)

  • Yoo, Seung-Sun;Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.209-214
    • /
    • 2014
  • IMS(IP Multi-Media Subsystem) is in the limelight as the Integrated wire and wireless Systems because of a sudden increase of smart mobile devices and growth of multimedia additional services such as IPTV. The structure of IMS is designed as a session control layer to provide various multimedia summative service using SIP based on IP communication network in order to carry out set-up, change and release by NGN of course, the existing voice services. But now It is broadly substituting in the IPTV, wire phone company and it is substituted in internet platform base on the soft-switch in currently. Especially, in currently, 4G LTE in a mobile communication company is rapidly growing in market. Therefore, in this study, we had designed and developed to the main prosser that can admit to 1000 user over and SIP gateway which can link the IMS Core that can link SIP Device which adopt the standard protocol on the SIP and to provide variable multimedia services.

A Real-time Electronic Attendance-absence Recording System using Face Detection and Face Recognition (얼굴 검출 및 인식 기술을 이용한 실시간 전자 출결 시스템)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1524-1530
    • /
    • 2016
  • Recently, research about an electronic attendance-absence recording system has been actively carried out using smart devices. Using an electronic attendance-absence recording system, professors can check their students' attendance on a real-time basis and manage their attendance records. In this paper, we proposed a real-time electronic attendance-absence recording system using face detection and face recognition based on web application. It can solve the spatial, temporal, cost issues belong to electronic attendance-absence recording system using AIDC(Automatic Identification and Data Capture). A proposed system is running on web server and made by HTML5(Hyper Text Markup Language ver.5). So professor connect to server using mobile web browser on mobile device and real-time manage electronic attendance-absence recording with real-time send or receive image data. In addition, the proposed system has an advantage capable of installation and operation, regardless of the operating system because it operates based on the Python flask framework.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Implementation of Visible Light Communication Transceiver of Mobile Devices for Location-Based Services (위치기반서비스 제공을 위한 휴대기기용 가시광통신 송수신기 구현)

  • Park, Sangil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.889-891
    • /
    • 2017
  • Visible light communication technology, which is a communication using LED lighting, is defined by IEEE 802.15.7 WG and active research is under way. Visible light communication is advantageous not only to avoid interference with existing RF communication but also to provide location based service through accurate positioning by utilizing LOS (Line of Sight) characteristic. Therefore, it is very easy and efficient to locate and track the user's location. In this paper, we implemented a visible light communication transceiver using USB interface for easy application to portable devices. It supports the mobility of mobile devices through internet protocol and showed BER performance of less than $10^{-3}dBm$ at over 1m, which is the height of lighting and smart device during walking.

Design and Implementation of Navigation Operating System APIs for Set-based POI Search Algorithm (집합 기반 POI 검색을 지원하는 내비게이션 운영체제 기능 설계 및 구현)

  • Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.269-274
    • /
    • 2015
  • As smart device companies such as Google or Apple develop competitive mobile-based automotive operating systems and navigation systems, the range of choice for users in such markets is expanding. Navigation systems equipped with mobile operating systems have increased convenience for users. However, since an API for the POI databases used in navigation systems doesn't exist, the number of applications using POI data is insufficient. In this paper, we designed and implemented system calls for navigation operating systems with a focus on POI search, in order to resolve such limitations. The system calls support set-based POI search functions, and therefore provides solutions to search performance degradation problems caused by false inputs. As a result of performance evaluation, not only did the search performance improve, but there was also no problem in applying APIs in applications.

A Study of Call Admission Scheme using Power Strength Threshold value between APs in Wireless LAN Environments (무선랜 환경에서 AP간 전력임계치값을 통한 호 처리 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.107-112
    • /
    • 2015
  • A smart phone and the number of wireless terminals are mobile-to the nature of the AP mobility are many call transfer between wireless terminals and AP (Access Point). Each wireless terminal that is the call processing process for each is relatively large to cause the wireless traffic, and a factor that inhibits the efficient use of the radio band on the AP. In this paper, we use the power intensity threshold and threshold timer of the AP received by the mobile station to reduce the amount of switching traffic between the AP's cause and traffic generation factors between the wireless device and the AP that can effectively utilize the radio traffic from the AP the measures proposed. The proposed method and the conventional method is improved by simulation to handle the amount of radio traffic from the AP it was confirmed that it is possible to effectively utilize the whole of the radio band.

The traffic performance evaluation between remote server and mobile for applying to encryption protocol in the Wellness environment (웰니스 환경에서 암호화 프로토콜 적용을 위한 모바일과 원격 서버간 트래픽 성능 평가)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lee, Jae-Kwang
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.415-420
    • /
    • 2013
  • U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in order to look into the influence that the encryption module influences on the communication evaluation in the biometric information transmission gone to the smart mobile device and Hospital Information System.In the case of the U-WHS model, the client used the Objective-c programming language for software development of iOS Xcode environment and SEED and HIGHT encryption module was applied. In the case of HIS, the MySQL which is the Websocket API of the HTML5 and relational database management system for the client and inter-server communication was applied. Therefore, in WIFI communication environment, by using wireshark, data transfer rate of the biometric information, delay and loss rate was checked for the evaluation.

M-Learning Application for Ubiquitous Learning Based on Android Web Platform (안드로이드 웹 플랫폼 기반 U-Learning을 위한 M-Learning 애플리케이션)

  • Kim, Hye-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5564-5569
    • /
    • 2011
  • In this paper we introduced Augmented Reality (AR) on Android platform for ubiquitous learning (u-learning). Android is breaking new ground for mobile computing and open technologies. Android is versatile as it is not limited only to mobile phones, but it can be installed on various devices. Android gives developers the opportunity to leverage their development skills, while also building an exciting and active community. Augmented Reality (AR) is going to be the future of most apps; all it takes is a decent processor, a camera, a compass and a GPS, all of which are becoming increasingly common on smart phones. Through AR we can have educational tools that provide individuals with total flexibility to receive, send, and review training and detailed product information through an increasingly ubiquitous web-enabled communication device. In this paper, we proposed Augmented Reality for Species Identification using Android Smartphone with augmented reality in species determination. This study is appropriate in the field of Biology. This is useful in outdoor experimental activities of the students. Like for example while they are visiting the zoo, botanical garden and etc.