• Title/Summary/Keyword: 모바일 컴퓨팅(Mobile computing)

Search Result 548, Processing Time 0.026 seconds

Re-Ordering of Users in the Group Key Generation Tree Protocol (사용자 순서 재조정을 통한 그룹 키 생성 트리 프로토콜)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.247-251
    • /
    • 2012
  • Tree-based Group Diffie-Hellman (TGDH) is one of the efficient group key agreement protocols to generate the GK. TGDH assumes all members have an equal computing power. As one of the characteristics of distributed computing is heterogeneity, the member can be at a workstation, a laptop or even a mobile computer. Therefore, the group member sequence should be reordered in terms of the member's computing power to improve performance. This research proposes a reordering of members in the group key generation tree to enhance the efficiency of the group key generation.

Efficient Flooding Algorithm for Mobile P2P Systems using Super Peer (슈퍼피어를 이용한 모바일 P2P시스템을 위한 효율적인 플러딩 알고리즘)

  • Kang, So-Young;Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.217-221
    • /
    • 2010
  • As the appearances of various new mobile devices and the explosive growth of mobile device users, many researches related to mobile P2P systems have been proceeded actively. In this paper, we propose a new search algorithm for the double-layered super peer system in the mobile environment. For the proposed search algorithm, we divide the entire experiment region into a grid of cells, each of which has the same size. The grid is configured properly by considering the communication range of a mobile device and the number of peers in the system. The proposed search algorithm is a partial flooding search method based on the directions of cells involved with the search. It reduces successfully the network traffic, but shows a low search hit ratio. To enhance the search hit ratio, we introduce a bridge-peer table for a super peer and utilize an n-way search. The experimental results show that the proposed algorithm made an average of 20~30% reduction in the number of message packets over the double-layered system. The success ratio was also improved about 2~5% over the double-layered system.

Face Recognition Under Ubiquitous Environments (유비쿼터스 환경을 이용한 얼굴인식)

  • Go, Hyoun-Joo;Kim, Hyung-Bae;Yang, Dong-Hwa;Park, Jang-Hwan;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.431-437
    • /
    • 2004
  • This paper propose a facial recognition method based on an ubiquitous computing that is one of next generation intelligence technology fields. The facial images are acquired by a mobile device so-called cellular phone camera. We consider a mobile security using facial feature extraction and recognition process. Facial recognition is performed by the PCA and fuzzy LDA algorithm. Applying the discrete wavelet based on multi-resolution analysis, we compress the image data for mobile system environment. Euclidean metric is applied to measure the similarity among acquired features and then obtain the recognition rate. Finally we use the mobile equipment to show the efficiency of method. From various experiments, we find that our proposed method shows better results, even though the resolution of mobile camera is lower than conventional camera.

Implementations of Record_Level Synchronized Safe Personal Cloud (레코드 단위의 동기화를 지원하는 개별 클라우드 구현 기법)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.239-244
    • /
    • 2014
  • As the usefulness of mobile device is kept growing the privacy of the cloud computing is receiving more attentions. Even though many researches and solutions for privacy matters are suggested we are still worrying about the security problems. In addition most of cloud computing systems uses file-level synchronization which make it difficult to modify a part of a file. If we use data-centric app that stores data on embedded DBMS such as SQLite, a simple synchronization may incur some loss of information. In this paper we propose a solution to build a personal cloud that supports record-level synchronization. And we show a prototype system which uses RESTful web services and the same schema on mobie devices and the cloud storage. Synchronization is achieved by using a kind of optimistic concurrency control.

Broadcast Method based on Data Access Frequencies and Semantic Relationships in Mobile Computing Environments (이동컴퓨팅 환경에서 데이타의 접근빈도 및 시맨틱 관계를 고려한 방송 방법)

  • 최성환;정성원;이송이
    • Journal of KIISE:Databases
    • /
    • v.30 no.5
    • /
    • pp.476-493
    • /
    • 2003
  • Data broadcast is an effective data transmission method from a data base server to numerous mobile clients due to the restrictions on mobile environment such as low wireless communication bandwidth and energy shortage of mobile devices. There are various broadcast methods based on clients' data access frequencies or semantic relationship of data. The broadcast schedule based only on the access frequencies does not consider semantic relations of data, so that when a client needs to access a series of semantically related data, the client has to listen to the wireless channel for a long time. On the other hand, the broadcast schedule based only on semantic relationship of data makes data access time longer when clients highly request specific data which are not semantically related but frequently accessed. In this paper, we present an efficient data broadcast method based on not only data access frequencies but also semantic relationship to improve mobile clients' query response time. The new hybrid broadcast method we propose creates a data broadcast schedule according to the data access frequencies and then the schedule is adjusted to reflect semantic relationship of data. We show our method is efficient by experimental performance analysis.

A Customization Method for Mobile App.'s Performance Improvement (모바일 앱의 성능향상을 위한 커스터마이제이션 방안)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.208-213
    • /
    • 2016
  • In the fourth industrial revolution, customization is becoming a conversation topic in various domains. Industry 4.0 applies cyber-physical systems (CPS), the Internet of Things (IoT), and cloud computing to manufacturing businesses. One of the main phrases in Industry 4.0 is mass customization. Optimized products or services are developed and provided through customization. Therefore, the competitiveness of a product can be enhanced, and satisfaction is improved. In particular, as IoT technology spreads, customization is an essential aspect of smooth service connections between various devices or things. Customized services in mobile applications are assembled and operate in various mobile devices in the mobile environment. Therefore, this paper proposes a method for improving customized cloud server-based mobile architectures, processes, and metrics, and for measuring the performance improvement of the customized architectures operating in various mobile devices based on the Android or IOS platforms. We reduce the total time required for customization in half as a result of applying the proposed customized architectures, processes, and metrics in various devices.

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices (저전력 모바일 장치에 적합한 효율적인 동적 그룹 키 동의)

  • Cho Seokhyang;Nam Junghyun;Kim Seungjoo;Won Dongho;Lee Hyejoo;Choi Jinsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.157-168
    • /
    • 2005
  • Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.

A Study on a Mobile Malware Detection Method Using a Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 악성코드 탐지 방식 연구)

  • Kim, Ho-Yeon;Choi, Young-Hyun;Jung, Sung Min;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.984-987
    • /
    • 2011
  • 모바일 보안이 이슈화 됨에 따라 안티 바이러스 소프트웨어를 제공하는 벤더들은 시그니쳐 기반의 모바일 안티 바이러스 제품들을 제공하고 있다. 시그니쳐 기반의 악성코드 탐지 방식은 새로운 방식의 악성코드를 탐지 하지 못하는 단점 때문에, 악성코드 행위 자체를 분석하는 악성코드 동적 및 혼합분석이 연구되고 있다. 본 논문에서는 자원의 제약이 있는 모바일 플랫폼에서 동적 행위 분석 및 정적분석을 혼합한 혼합 분석을 클라우드 환경에서 처리하는 프레임워크를 제안하고자 한다.

Video Adaptation Model for User-Centric Contents Delivery in Mobile Computing (모바일 환경에서 맞춤형 콘텐츠 전달을 위한 비디오 적응성 모델)

  • Kim, Svetlana;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.389-394
    • /
    • 2009
  • Lately the usage of multimedia equipment with small LCD displays is rapidly increasing. Although many people use devices like this, videos intended for TV or HDTV are sent to these mobile devices. Therefore cases where it is hard for the user to view the desired scenes are growing more frequent. Currently, most services simply reduce the size of the content to fit the screen when they offer it for mobile devices. However, especially with sports broadcasts, there are many areas that cannot be seen very well because it was simply reduced in size. We therefore consider this weakness and are researching how to let the user choose an area of interest and then sending it to the user in a way that fits the device. In this paper, we address the problem of video delivery and personalization. For the delivered video content, we suggest the UP-SAM User Personalized Context-Aware Service Adaptation Middleware) model that uses the video content description and MPEG-21 multimedia framework.

Efficient Authentication for Convergence of IoT and Mobile IP (사물인터넷과 모바일 IP의 융합을 위한 효율적 인증 메커니즘)

  • Lee, YunJung;Cho, Jungwon;Kim, Chul-Soo;Lee, Bong-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.13-18
    • /
    • 2019
  • This paper proposes efficient and secure two-way authentication protocol for binding update messages between mobile devices and home agents / correspondent nodes in IoT and Mobile IPv6 (MIPv6) environments with limited computing power and resources. Based on the MIPv6 message exchange, the proposed protocol satisfies both the authentication and the public key exchange optimized for both sides of the communication with minimum modification. In the future, we will carry out a performance analysis study by implementing the proposed protocol in detail.