• Title/Summary/Keyword: Group Mobile Users

Search Result 194, Processing Time 0.027 seconds

Cluster-Based Routing Mechanism for Efficient Data Delivery to Group Mobile Users in Wireless Ad-Hoc Networks (그룹 이동성을 가지는 모바일 사용자들 간의 효율적인 데이터 공유를 위한 클러스터 기반 그룹 라우팅 기법 메커니즘)

  • Yoo, Jinhee;Han, Kyeongah;Jeong, Dahee;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1060-1073
    • /
    • 2013
  • In this paper, we present a cluster-based routing scheme for efficiently delivering data to group mobile users by extracting and clustering mobile user group simply from beacon message information in wireless ad-hoc networks. First, we propose an online-clustering mechanism that uses a local neighbor table on each node by recursively transmitting to neighbor nodes, and forms a group table where a set of listed nodes are classified as group members, without incurring much overhead. A node that appears the most frequently from neighbor tables throughout the network is selected as the cluster-head node, serving as a data gateway for the intra-cluster. Second, we design an inter-cluster routing that delivers data from stationary data sources to the selected cluster-head node, and a intra-cluster routing to deliver from the cluster-head node to users. Simulation results based on ns-2 in the ad-hoc networks consisting of 518 stationary nodes and 20 mobile nodes show that our proposed clustering mechanism achieves high clustering accuracy of 96 % on average. Regarding routing performance, our cluster-based routing scheme outperforms a naive one-to-one routing scheme without any clustering by reducing routing cost up to 1/20. Also, our intra-cluster routing utilizing a selected cluster-head node reduces routing cost in half as opposed to a counterpart of the intra-cluster routing through a randomly-selected internal group member.

A Study on User Experience on Ant Insurance Claims China's Mobile Insurance Platform -Focused on Alipay- (중국 모바일 보험 플랫폼 개미 보험청구에 관한 사용자 경험 연구 -알리페이 중심으로-)

  • Son, Young-Ho;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.317-322
    • /
    • 2021
  • This study focuses on user experience of Ant Insurance Platform(insurance product of Alibaba) and provides insights and improvement advises based on the survey conducted. Given that insurance claim is the most controversial part during the whole process, it is essential to conduct corresponding research from users' prospective. Some Chinese users between their 20's and 40's, who are major users of mobile insurance platforms, were selected as a sample group. Questionaire survey, which was made based on measurement items from Information systems success model, as well as in-depth interview was conducted within the group. According to the result, health, among all kinds, is the most difficult insurance to claim, which was mainly cause by security and information concerns. In order to enhance security, more options should be given to users. As for information, complains should be delt carefully and transparently. This study is expected to be used as referential material for mobile insurance platforms and user experience of insurance claims.

A Study on the User Authentication and Key Exchange Service for Group Environment (그룹 환경의 사용자 인증 및 키 교환 서비스 프로토콜 연구)

  • Byun, Jin-Wook;Lee, Su-Mi;Lee, Dong-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.117-136
    • /
    • 2009
  • Over the years a password has been used as a popular authentication method between a client and a server because of its easy-to-memorize property. But, most password-based authentication services have focused on a same password authentication scheme which provides an authentication and key exchange between a client and a server with the same password. With rapid change of communication environments in the fields such as mobile networks, home networking, etc., the end-to-end security allowing users to hold different password is considered as one of main concerns. In this paper, we consider a new authentication service of how each client with different own password is able to authenticate each other, which is a quite new service paradigm among the existing services. This new service can be used in the current or next generation network environment where a mobile user in cell A wants to establish a secure end-to-end channel with users in ceil B, C, and D using only their memorable passwords. This end-to-end security service minimizes the interferences from the operator controlled by network components. To achieve this end-to-end security, we propose an authentication and key exchange service for group users in different realm, and analyze its security in a formal way. We also discuss a generic construction with the existing authentication schemes.

Study of the effective use pattern using Data Mining in a mobile grid (모바일 그리드에서 데이터마이닝을 이용한 효율적인 사용자 패턴 연구)

  • Kim, Hyu Chan;Kim, Mi Jung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2013
  • The purpose of this study is to make effective mobile grid considered general environment, which can be summarized as irregular mobility, service exploration, data sharing, variety of machines, limit to the battery duration, etc. The data was extracted from the Dartmouth College. We analysed mobile use pattern of a specific group and applied pattern using hybrid method. As a result, we could adjust infra usage effectively and appropriately and cost cutting and increase satisfaction of user. In this study, by applying weighting method based on access time interval, we analysed use pattern added time variation with association rule during users in mobile grid environment. We proposed more stable way to manage patterns in a mobile grid environment that is being used as a hybrid form to process the data value received from the server in real time. Further studies are needed to get appropriate use pattern by group using use patterns of various groups.

A Design of MR-MNN Protocol to Improve Mobile Router's Network Mobility (네트워크 이동성 성능향상을 위한 모바일 라우터 및 MR-MNN프로토콜 설계)

  • Kim, Nam-Hoon;Kang, Moon-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.658-667
    • /
    • 2009
  • NEMO (Network Mobility) introduces the concept of mobile router in order to supply users with group mobility over wireless and mobile networks. This paper investigates the advantages and disadvantages of NEMO in terms of the overhead of group mobility management. This paper proposes the additional requirements to enhance NEMO performance. Moreover, we analyze the main communication paths, CN-HA, HA-MR, and MR-MNN, in the real NEMO testbed.

Priority Analysis of User Interface Evaluation Criteria for the Elderly Based on User's Lifestyle (라이프스타에 의한 노인 사용자 인터페이스 평가 우선 순위 분석)

  • Shin, Won-Kyoung;Park, Min-Yong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.3
    • /
    • pp.287-296
    • /
    • 2010
  • The purpose of this research is to analyze priority of the elderly user interface (UI) evaluation criteria based on user's lifestyle. Since the elderly population will occupy over 20% of the all Korean population in the near future, we need to know older users' needs and information because elderly users will be main customers in the super-aged society. This paper investigated the definition of elderly users and characteristics demographically, socio-economically, and physically/cognitively. A total of 238 questionnaires from older users were analyzed based on a segmentation table for the elderly developed by the previous study. According to factor analysis and cluster analysis, 6 types of lifestyle and 4 groups of the elderly users were classified, respectively. The priority of UI evaluation criteria for large electronic home appliances and mobile products was analyzed by analyses of variance (ANOVAs). The results indicated that the priority of (physical, emotional, and cognitive) UI criteria was significantly different among elderly users' lifestyles for both home appliances and mobile products. Consequently, the results of this study may help the company develop some competitive silver products and give higher satisfaction to the elderly users by suggesting different priority of UI evaluation criteria according to the target elderly group. The results may also contribute to revitalize national economy by significantly increasing senior market shares.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

A Study on Fast Handover Scheme for Seamless Multimedia Transmission in Wireless Networks (무선환경에서 끊김없는 멀티미디어 전송을 위한 고속의 핸드오버 기법 연구)

  • Song, Min-Ho;Park, Byung-Joo;Park, Gil-Cheol;Kim, Yong-Tae;Lee, Dong-Cheul;Chang, Byeong-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.101-108
    • /
    • 2009
  • Since the use of wireless communication instruments was standardized, users expect to be provided with seamless information whenever and wherever they use the instruments. Also, some technology is required to satisfy the users' needs which will cover their mobility. To support the mobility of host, the Internet Engineering Task Force (lETF) Mobile IP Working Group proposed a protocol called MIPv6 (Mobile IPv6). But in the case of the existing MIPv6, sometimes Mobile Node cannot receive data packet if Handover occurs although it is a temporal phenomenon. For solving these Handover problems, there are many methods like FMIPv6 (Fast Handover for Mobile IPv6) and HMIPv6 (Hierarchical Mobile IPv6) have been suggested. This paper suggested the use of Dual Buffer of Access Point and an effective way of registration as a way of reducing delayed time caused by Handover. Also, it analyzed and compare the existing MIPv6 with a proposed scheme concerning delayed time of Handover. Finally, the main objective of this paper is to proposed scheme that can reduce the delayed time of Handover compare to the existing MIPv6.

  • PDF

A Study on the Influence of Mobile Commerce Characteristics Perception on Mobile Shopping Intentions (모바일 커머스 특성 인식이 모바일 쇼핑 이용의도에 미치는 영향 연구)

  • Kim, Kyu-Dong;Yu, Yung-Mok;Kim, Jeong-Lae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.297-303
    • /
    • 2013
  • This study was conducted to analyze the Influence of mobile commerce characteristics perception on mobile shopping intentions. The result of this study showed that mobile commerce characteristics perceptions have influence on mobile shopping intentions. The study also showed that the Influence of mobile commerce characteristics perception on mobile shopping intentions was different between mobile shopping experience group and none experience group. So the companies which is competing in the mobile commerce industry have to plan the various strategical marketing programs for the mobile devices users.

Multicast Tree Construction with User-Experienced Quality for Multimedia Mobile Networks

  • Jung, Hoejung;Kim, Namgi
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.546-558
    • /
    • 2017
  • The amount of multimedia traffic over the Internet has been increasing because of the development of networks and mobile devices. Accordingly, studies on multicast, which is used to provide efficient multimedia and video services, have been conducted. In particular, studies on centralized multicast tree construction have attracted attention with the advent of software-defined networking. Among the centralized multicast tree construction algorithms, the group Takahashi and Matsuyama (GTM) algorithm is the most commonly used in multiple multicast tree construction. However, the GTM algorithm considers only the network-cost overhead when constructing multicast trees; it does not consider the temporary service disruption that arises from a link change for users receiving an existing service. Therefore, in this study, we propose a multiple multicast tree construction algorithm that can reduce network cost while avoiding considerable degradation of service quality to users. This is accomplished by considering both network-cost and link-change overhead of users. Experimental results reveal that, compared to the GTM algorithm, the proposed algorithm significantly improves the user-experienced quality of service by substantially reducing the number of linkchanged users while only slightly adding to the network-cost overhead.