• Title/Summary/Keyword: MOBILE

Search Result 25,713, Processing Time 0.047 seconds

A Method for Maintaining Mobile Transaction Serializability using Lock Operation and Serialization Graph in Mobile Computing Environments (이동 컴퓨팅 환경에서 록 연산과 직렬화 그래프를 이용한 이동 트랜잭션의 직렬성 유지 방법)

  • Kim, Dae-In;Hwang, Bu-Hyeon;Hwang, Bu-Hyeon
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.9
    • /
    • pp.1073-1084
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 이동 호스트는 제한된 대역폭을 효율적으로 사용하고 이동 트랜잭션의 응답 시간을 향상시키기 위하여 캐쉬를 이용한다. 그리고 이동 호스트에 캐슁된 데이타가 이동 지구국에서 갱신되면 이동 호스트의 캐쉬 일관성을 유지하기 위하여 이동 지구국은 무효화 메시지를 방송한다. 그러나 이동 지구국에서 주기적으로 무효화 메시지를 방송하는 방법은 이동 트랜잭션의 빠른 처리를 위하여 이동 지구국으로부터 데이타를 즉시 캐슁하는 경우에 이동 트랜잭션의 직렬가능한 수행을 보장할 수 없는 경우가 발생한다. 본 연구에서는 캐슁된 데이타를 이용하여 이동 트랜잭션을 수행하는 경우에 록을 이용하여 이동 트랜잭션의 직렬가능한 수행을 보장하는 UCL-MT 방법과 록 관리 방법을 제안한다. 제안하는 UCL-MT 방법은 이동 트랜잭션을 완료하기 이전에 이동 트랜잭션이 접근한 데이타 정보를 이용하여 지구국에서 사이클을 탐지함으로써 이동 트랜잭션의 직렬가능한 수행을 보장한다. 또한 제안하는 록 관리 방법은 이용할 수 있는 대역폭의 크기에 따른 무효화 메시지 내용의 변화에 유연하게 적용될 수 있다. Abstract In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time of a mobile transaction. If the cached data in mobile host is updated at a mobile support station, the mobile support station broadcasts an invalidation message for maintaining the cache consistency of a mobile host. But when a mobile transaction accesses the data which is not in cache, if a mobile host caches the data immediately from a mobile support station for processing a mobile transaction rapidly, the method that a mobile support station broadcasts an invalidation message periodically, happens to the case that can not guarantee the serializable execution of a mobile transaction. In this paper, we propose the UCL-MT method and lock management method, as a mobile transaction is executed using cached data. Since, using the data a mobile transaction accessed, the UCL-MT method detects a cycle in a mobile support station before the completion of the mobile transaction, it guarantees the serializable execution of the mobile transaction. Also, proposing lock management method can be adapted flexibly at the change of invalidation message content, according to the available bandwidth.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

A Study on Route Optimization in Nested Mobile Network (중첩된 이동 네트워크에서 경로 최적화에 관한 연구)

  • Choi, Ji-Hyoung;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.65-68
    • /
    • 2008
  • The Mobile IP provides the mobility of Mobile Node, but does not provide the mobility of network. For support the mobility of network, the IETF has proposed NEMO(Network Mobility). Route Optimization is a serious problem in mobile network, so several solutions for route optimization in nested mobile network have been suggested by the IETF NEMO WG. This paper proposes scheme about Route Optimization in nested mobile network.

  • PDF

A Study on Mobile Telecommunication Business and Satisfactio of Mobile-phone Users (휴대폰 단말기에 관한 消費者 滿足度 및 使用에 관한 理論的 考察)

  • Jeon, Kyu-Lim
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.11-25
    • /
    • 2005
  • The purposes of this study were to explain consumer attitude, expenses and satisfaction of mobile-phone Users. The data of this study used from Pollever.com. This study was satisfaction of mobile-phone users in Korea. The users were consumers of Samsung, LG, SK-Telecom and Pantack. The critical success factor was on the subside for mobile-phone in the growth of mobile service, which we can analyze in its positive effects. Fifty percent of consumers were unsatisfaction with local companies without Samsung. Now most of local mobile-companies will developed music-phone, high-tec camera-phone, hi-slim phone, and health-phone. But, the results of this study are as fallow: Most of consumer' main issues were design, weight, and brand power. It was in that it played the driving force to upgrade the local mobile-phone services into international level with the explosive growth in business by providing cheap phones.

  • PDF

A Data Gathering Approach for Wireless Sensor Network with Quadrotor-based Mobile Sink Node

  • Chen, Jianxin;Chen, Yuanyuan;Zhou, Liang;Du, Yuelin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2529-2547
    • /
    • 2012
  • In this paper, we use a quadrotor-based mobile sink to gather sensor data from the terrestrial deployed wireless sensor network. By analyzing the flight features of the mobile sink node, we theoretically study the flight constraints of height, velocity, and trajectory of the mobile sink node so as to communicate with the terrestrial wireless sensor network. Moreover, we analyze the data amount which the mobile sink can send when it satisfies these flight constraints. Based on these analysis results, we propose a data acquisition approach for the mobile sink node, which is discussed detailed in terms of network performance such as the transmission delay, packet loss rate, sojourning time and mobile trajectory when given the flying speed and height of the mobile sink node. Extensive simulation results validate the efficiency of the proposed scheme.

Use of Mobile Phones and Cancer Risk

  • Ayanda, Olushola S.;Baba, Alafara A.;Ayanda, Omolola T.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.1
    • /
    • pp.403-406
    • /
    • 2012
  • Mobile phones work by transmitting and receiving radio frequency microwave radiation. The radio frequency (RF) emitted by mobile phones is stronger than FM radio signal which are known to cause cancer. Though research and evidence available on the risk of cancer by mobile phones does not provide a clear and direct support that mobile phones cause cancers. Evidence does not also support an association between exposure to radio frequency and microwave radiation from mobile phones and direct effects on health. It is however clear that lack of available evidence of cancer as regards the use of mobile phone should not be interpreted as proof of absence of cancer risk, so that excessive use of mobile phones should be taken very seriously and with caution to prevent cancer.

Usability Evaluation and Improvements of Mobile Travel Apps

  • Kim, Yeonsuk;Kim, Heesun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.27-36
    • /
    • 2020
  • The popularization of smartphones allows people to instantly get the information that they want, through mobile apps, including financial services, movies and public transportation reservations, games and shopping. Furthermore, leisure activities through overseas travel are increasing due to the improvement of the living standards of people. These increases in overseas travel and the use of mobile apps lead to the increased use of mobile travel apps when booking tour packages. Although there are many studies on the usability assessment and user interface improvement for mobile apps, studies on the usability assessment for mobile travel apps are limited. We tested the usability for mobile travel apps to present some suggestions for improvements so that anyone can purchase travel packages easily and simply. We selected the top three mobile travel apps on Rankey.com that have different UIs. The heuristic method was used to evaluate usability. We present a better UI to allow users to use the app functions more easily by analyzing user interaction, ease of learning, readability, efficiency, and satisfaction for the entire use.

Path Following Control of Mobile Robot Using Lyapunov Techniques and PID Cntroller

  • Jin, Tae-Seok;Tack, Han-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.1
    • /
    • pp.49-53
    • /
    • 2011
  • Path following of the mobile robot is one research hot for the mobile robot navigation. For the control system of the wheeled mobile robot(WMR) being in nonhonolomic system and the complex relations among the control parameters, it is difficult to solve the problem based on traditional mathematics model. In this paper, we presents a simple and effective way of implementing an adaptive following controller based on the PID for mobile robot path following. The method uses a non-linear model of mobile robot kinematics and thus allows an accurate prediction of the future trajectories. The proposed controller has a parallel structure that consists of PID controller with a fixed gain. The control law is constructed on the basis of Lyapunov stability theory. Computer simulation for a differentially driven nonholonomic mobile robot is carried out in the velocity and orientation tracking control of the nonholonomic WMR. The simulation results of wheel type mobile robot platform are given to show the effectiveness of the proposed algorithm.

Sound Quality Evaluation of the Ring Tones according to Mobile Phone Kind (이동전화 종류에 따른 벨소리의 음질 평가)

  • Jung, Dong-Hyun;Park, Sang-Gil;Kang, Kwi-Hyun;Lee, Jung-Youn;Oh, Jae-Eung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.11a
    • /
    • pp.1288-1292
    • /
    • 2007
  • Mobile phone is necessary articles by increasing mobile communication now. People usually use the Mobile phone in any time and place. Ring tone of Mobile phone effect owner or other person. The sound level of Mobile phone ring tone could be considered as noise if it is too loud a specific situation. Manufacturing company improve ring tone of mobile phone better in consumer's perception. In this study, we record ring tone of mobile phone and estimated the complexity and nonlinear characteristics of the relation between subjective evaluation and sound metrics. Linear regression models were obtained for the subjective evaluation and sound quality metrics. Semantic Differential Method is used to study sound quality Evaluation. To analyze the sound quality of ring tone.

  • PDF