• Title/Summary/Keyword: 모바일 컴퓨팅(Mobile computing)

Search Result 551, Processing Time 0.026 seconds

Development of Mobile Computing System for Electric Power Facility Management based on Geographic Information (지리정보 기반의 전력설비관리 모바일 컴퓨팅 시스템 개발)

  • Shin, Jin-Ho;Yi, Bong-Jae;Song, Jae-Ju;Kang, Ju-Young;Lee, Jung-Il
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.529-531
    • /
    • 2005
  • 무선 통신망의 발전과 휴대용 단말기의 일반화에 따라 이동성을 기반으로 하는 모바일 컴퓨팅 기술개발이 활발히 진행되어 산업전반에 적용되고 있는 가운데 현장에서 발생하는 정보는 현장에서 처리하는 개념으로 변모하고 있다. 한편, 전력회사에서는 가공, 지중을 망라한 현장설비정보가 지리정보 기반에서 Digital Map형태의 데이터베이스로 구축되어 대부분의 전력설비관리 업무가 수행되고 있으나, 모바일 컴퓨팅을 근간으로 하는 시스템적인 연계처리는 구비되지 않은 상태이다. 따라서 본 연구에서 현장 작업차량의 위치를 사무실에서 상시 파악하여 보수대상 설비위치로 신속히 출동시키게 하고, 현장에서는 사무실과 동일한 기본도와 설비계통도를 내장하여 지리정보 기반에서 고장복구 및 순시점검 등 전력설비관리를 현장에서 즉시 처리할 수 있는 모바일 컴퓨팅 시스템을 개발하고 구현 결과를 제시한다.

  • PDF

Implementation of Patient Monitoring System based on Mobile Healthcare (모바일 헬스케어 기반의 환자 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.1-10
    • /
    • 2012
  • In this paper, we propose an patient monitoring system which is suitable for mobile healthcare system. The mobile healthcare system is using portable device such as smartphone and it consists of small computing device. The mobile healthcare system is carry out same performance with desktop computer. We designed medical message structure based on TinyOS to transmit patient's biometric data on the smartphone of medical team, patient and family over the mobile carrier environment, and ported successfully in HBE-Ubi-ZigbeX using NesC. And We confirmed reliable transmission of biometric data on the smartphone by implementing the Android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

An Efficient Data Replacement Algorithm for Performance Optimization of MapReduce in Non-dedicated Distributed Computing Environments (비-전용 분산 컴퓨팅 환경에서 맵-리듀스 처리 성능 최적화를 위한 효율적인 데이터 재배치 알고리즘)

  • Ryu, Eunkyung;Son, Ingook;Park, Junho;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.20-27
    • /
    • 2013
  • In recently years, with the growth of social media and the development of mobile devices, the data have been significantly increased. MapReduce is an emerging programming model that processes large amount of data. However, since MapReduce evenly places the data in the dedicated distributed computing environment, it is not suitable to the non-dedicated distributed computing environment. The data replacement algorithms were proposed for performance optimization of MapReduce in the non-dedicated distributed computing environments. However, they spend much time for date replacement and cause the network load for unnecessary data transmission. In this paper, we propose an efficient data replacement algorithm for the performance optimization of MapReduce in the non-dedicated distributed computing environments. The proposed scheme computes the ratio of data blocks in the nodes based on the node availability model and reduces the network load by transmitting the data blocks considering the data placement. Our experimental results show that the proposed scheme outperforms the existing scheme.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

MTCMOS ASIC Design Methodology for High Performance Low Power Mobile Computing Applications (고성능 저전력 모바일 컴퓨팅 제품을 위한 MTCMOS ASIC 설계 방식)

  • Kim Kyosun;Won Hyo-Sig
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.2 s.332
    • /
    • pp.31-40
    • /
    • 2005
  • The Multi-Threshold CMOS (MTCMOS) technology provides a solution to the high performance and low power design requirements of mobile computing applications. In this paper, we (i) motivate the post-mask-tooling performance enhancement technique combined with the MTCMOS leakage current suppression technology, and (ii) develop a practical MTCMOS ASIC design methodology which fine-tunes and integrates best-in-class techniques and commercially available tools to fix the new design issues related to the MTCMOS technology. Towards validating the proposed techniques, a Personal Digital Assistant (PDA) processor has been implemented using the methodology, and a 0.18um Process. The fabricated PDA processor operates at 333MHz which has been improved about $23\%$ at no additional cost of redesign and masks, and consumes about 2uW of standby mode leakage power which could have been three orders of magnitude larger if the MTCMOS technology was not applied.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

A Study on UI/UX design of mobile application of Mindfulness (마음챙김 훈련을 위한 모바일 인터페이스 디자인)

  • OH, Jun-yep;Ma, Jung-Yi;Kyu, Mam-Sang;Gim, Wan-Suk;Lee, Joo-yeop
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.179-192
    • /
    • 2018
  • The purpose of this study is to research the design solutions that should be taken into consideration when developing mobile applications of Mindfulness Training. We aim to provide basic UI / UX design guidances for being effectiveness of mobile application of Mindfulness Training. For this purpose, We research in various aspects. Base on this, We select an approach and apply the application screen prototypes. We suggest some points for to be considered in the development of UI / IX design for mobile applications for Mindfulness Training based on obtained knowledge through this research process.

Mobile Interface in Condor Distributed Systems (콘도 분산 시스템의 모바일 인터페이스)

  • 이송이
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.1
    • /
    • pp.75-88
    • /
    • 2004
  • Condor is a distributed batch system for sharing the workload among the computers connected by a network. Condor distributed system was developed on the basis that every machine in a Condor pool is always connected by a network to run a Condor Job. Due to advances in wireless communication and mobile computing technology, conventional distributed computer systems can now include “mobile” clients as well as “fixed” clients. Moreover, mobile users want to lower their power consumption by off-loading potentially power and resource consuming jobs. In this paper, we describe the design and implementation of mobile interface for mobile clients in Condor distributed batch system. The main purpose of this work is to enable users on mobile computers to interact with Condor environment any time anywhere regardless of their connection to a Condor pool. The mobile Condor distributed system also aims to provide mobile users the same Condor services without making any significant changes to the existing Condor system.

Proactive Retrieval Method Using Context Patterns in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 컨텍스트 패턴을 이용한 프로액티브 검색 기법)

  • Kim, Sung-Rim;Kwon, Joon-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1017-1024
    • /
    • 2004
  • Ubiquitous system requires intelligent environment and system that perceives context in a proactive manner. This paper describes proactive retrieval method using context patterns in ubiquitous computing. And as the user's contexts change, new information is delivered proactively based on user's context patterns. For proactive retrieval, we extract context patterns based on sequential pattern discovery and association rule in data mining. By storing only information to be needed in near future using the context patterns, we solved the problem of speed and storage capacity of mobile devices in ubiquitous computing. We explain algorithms and an example. Several experiments are performed and the experimental results show that our method has a good information retrieval.

  • PDF

Design of U-School Framework Based on User-Centric Scenario (사용자 중심 시나리오에 따른 U-스풀 프레임워크 설계)

  • Hong, Myoung-Woo;Cho, Dae-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.283-291
    • /
    • 2007
  • In the age of ubiquitous computing, computer systems will be seamlessly integrated into our everyday life, providing services and information to us in an anywhere, anytime fashion. This ubiquitous computing can be used for developing a ubiquitous learning (U-learning). In this paper, we present a framework for U-school in which ubiquitous computing technologies are applied to advance the existing ERSS (Korea's Educational Resources Sharing System). Our framework applies mobile, sensor, and context-aware technologies to the existing ERSS. This framework presents a user-centric learning environment, using user-centric scenario. The U-school with context-aware services therefore can lead to the just-in-time learning or learner-led learning based on dynamic contexts acquired from learners, teachers and computing entities.