• Title/Summary/Keyword: ubiquitous application

Search Result 786, Processing Time 0.021 seconds

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Tangible Interaction : Application for A New Interface Method for Mobile Device -Focused on development of virtual keyboard using camera input - (체감형 인터랙션 : 모바일 기기의 새로운 인터페이스 방법으로서의 활용 -카메라 인식에 의한 가상 키보드입력 방식의 개발을 중심으로 -)

  • 변재형;김명석
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.441-448
    • /
    • 2004
  • Mobile devices such as mobile phones or PDAs are considered as main interlace tools in ubiquitous computing environment. For searching information in mobile device, it should be possible for user to input some text as well as to control cursor for navigation. So, we should find efficient interlace method for text input in limited dimension of mobile devices. This study intends to suggest a new approach to mobile interaction using camera based virtual keyboard for text input in mobile devices. We developed a camera based virtual keyboard prototype using a PC camera and a small size LCD display. User can move the prototype in the air to control the cursor over keyboard layout in screen and input text by pressing a button. The new interaction method in this study is evaluated as competitive compared to mobile phone keypad in left input efficiency. And the new method can be operated by one hand and make it possible to design smaller device by eliminating keyboard part. The new interaction method can be applied to text input method for mobile devices requiring especially small dimension. And this method can be modified to selection and navigation method for wireless internet contents on small screen devices.

  • PDF

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

Numerical Study of Breakup Process of Diesel Spray (디젤분무의 분열과정에 대한 수치해석 연구)

  • Yeom, Jeong Kuk;Jung, Woo Sung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.12
    • /
    • pp.1489-1495
    • /
    • 2013
  • High-pressure flows are ubiquitous in many industrial fields. A representative application is fuel injection using a common-rail control system in diesel engines, where the injection pressure in the injector exceeds 1000 bar. In high-speed injection, the fluid injected through the nozzle undergoes breakup owing to the interaction with the ambient gas. The breakup process influences mixture formation, which in turn influences combustion in diesel engines. Therefore, it is very important to analyze the breakup process of fuel spray. The Reitz and Diwakar model and cascade atomization and breakup (CAB) model were used in this study as sub-models for the numerical analysis of the breakup process of fuel spray. This study aims to precisely analyze the breakup process of spray and to investigate the breakup frequency of the injected fuel. Consequently, it proposes a suitable sub-model for analyzing the breakup process of a diesel spray by using CFX, a commercial CFD program.

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.

A method of mobile RFID code processing for ALE middleware (ALE 미들웨어를 위한 모바일 RFID 코드 처리 방법)

  • Byun, Ji-Yoong;Lee, Sang-Joon;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.461-468
    • /
    • 2008
  • RFID technology is one of the core technologies for ubiquitous computing, and many research activities have been going on in this research area currently. Related with these researches, mobile RFID network services using mobile devices having a built-in RFID reader and mobile networks have been launched in Korea, for the first time in the world. In this paper, we propose a method to coulect ALE middleware suggested by EPCglobal and existing mobile RFID network services. Especially, a RFID code conversion method is proposed to process mobile RFID code systems within ALE middleware systems. Using the proposed method, application developers and(or) content business industries can acquire the information they want, which is filtered and refined in real-time or periodically, from mobile RFID users. So, they can Provide customized services to users by using the user preference information. In this war, the ALE middleware system can be easily extended to process mobile RFID code effectively.

DTNB oxidation effects on T-type $Ca^{2+}$ channel isoforms

  • Lee, Sang-Soo;Kang, Ho-Won;Park, Jin-Yong;Lee, Jung-Ha
    • Animal cells and systems
    • /
    • v.15 no.2
    • /
    • pp.131-138
    • /
    • 2011
  • Redox regulation is one of the ubiquitous mechanisms to modulate ion channels. We here investigated how 5,5'-dithio-bis (2-nitrobenzoic acid), a cysteine specific oxidizing reagent, modulates $Ca_v3.1$ and $Ca_v3.2$ T-type $Ca^{2+}$ channels expressed in Xenopus oocytes. Application of the reagent inhibited $Ca_v3.1$ and $Ca_v3.2$ currents in a dose-dependent manner. The oxidizing reagent (1 mM) reduced the peak amplitude of $Ca_v3.1$ and $Ca_v3.2$ currents by ~50% over 2-3 minutes and the decreased currents were fully recovered upon washout of it. The reagent slowed the activation and inactivation kinetics of $Ca_v3.1$, $Ca_v3.2$, and $Ca_v3.3$ channel currents. Notably, the reagent positively shifted both activation and steady-state inactivation curves of $Ca_v3.1$, while it did not those of $Ca_v3.2$. Utilizing chimeric channels from $Ca_v3.1$ and $Ca_v3.2$, we localized the domains III and IV of $Ca_v3.1$ responsible for the positive shifts of channel activation and steady-state inactivation. These findings provide hints relevant to the electrophysiological and molecular mechanisms accounting for the oxidative regulation of T-type channels.

Implementation of a pervasive health care system for Cardiac patient on mobile environment (모바일 환경에서 심장병 환자를 위한 편재형 헬스 케어 시스템의 구현)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.117-124
    • /
    • 2008
  • It improves human being's life quality that all people can have mure convenient medical service under pervasive computing environment. For a pervasive health care application for cardiac patient, we've implemented a health care system, which is composed of three parts. Various sensors monitor outer as well as inner environment of human such as temperature, humidity, light and electrocardiogram, etc. These sensors form a network based on Zigbee. And medical information server accumulates sensing values and performs back-end processing. To simply transfer these sensing values to a medical team is a simple level's medical service. So, we've designed a new service model based on back propagation neural network for more improved medical service. Our experiments show that a proposed healthcare system can give high level's medical service because it can recognize human's context more concretely.

  • PDF