• 제목/요약/키워드: MOBILE

Search Result 25,713, Processing Time 0.055 seconds

The Position/Orientation Determination of a Mobile-Task Robot Using an Active Calibration Scheme

  • Jin, Tae-Seok;Lee, Jang-Myung
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.10
    • /
    • pp.1431-1442
    • /
    • 2003
  • A new method of estimating the pose of a mobile-task robot is developed based upon an active calibration scheme. The utility of a mobile-task robot is widely recognized, which is formed by the serial connection of a mobile robot and a task robot. To be an efficient and precise mobile-task robot, the control uncertainties in the mobile robot should be resolved. Unless the mobile robot provides an accurate and stable base, the task robot cannot perform various tasks. For the control of the mobile robot, an absolute position sensor is necessary. However, on account of rolling and slippage of wheels on the ground, there does not exist any reliable position sensor for the mobile robot. This paper proposes an active calibration scheme to estimate the pose of a mobile robot that carries a task robot on the top. The active calibration scheme is to estimate a pose of the mobile robot using the relative position/orientation to a known object whose location, size, and shape are known a priori. For this calibration, a camera is attached on the top of the task robot to capture the images of the objects. These images are used to estimate the pose of the camera itself with respect to the known objects. Through the homogeneous transformation, the absolute position/orientation of the camera is calculated and propagated to get the pose of a mobile robot. Two types of objects are used here as samples of work-pieces: a polygonal and a cylindrical object. With these two samples, the proposed active calibration scheme is verified experimentally.

An Analysis and modeling of Mobile IP network in VoIP Network (VoIP Network에서 Mobile IP 분석 및 설계)

  • Eom, Ki-Bok;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.414-418
    • /
    • 2003
  • VoIP is a core technology used to transmit both voice and data in an integrated packet' form. Within this technology, SIP is the signaling protocol used for 'real time' call services; particularly those where H323 is used. Yet, when considering the needs of mobile users, it is essential we integrate VoIp within the mobile technology so the mobile host is able to receive the 'packet' transported and by, and connected to, any available internet-address. For all this to occur, we need to improve Network Delay by reducing transmission problems associated with mobile services. If we are to obtain an optimal service then we must reduce any network delays which may arise from joining Mobile IP and VoIp services. This paper, therefore, considers how, unlike previous research, these delays may be improved through the use of the signaling technology\ulcorner SIP. It also considers how this research may be introduced into current wired and wireless integrated services enabling them to use the IP 'packet'.

  • PDF

Network Management Architecture using Mobile Agent technology (Mobile Agent 기술을 이용한 네트워크 관리 구조)

  • 오양훈;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.747-754
    • /
    • 1999
  • Mobile Agent is a movable software program that autonomously runs on behalf of its operator in a network environment. It has been widely applied to various kinds of computer engineering. In this paper, a network management architecture using the mobile agent technology in the distributed network environment is proposed. After manager system creates the mobile agent, it searches a proxy, a distributed object that acts as the substitute for a SNMP agent. In order to get the management information that manager requires, the mobile agent goes to the proxy and does operations on it. So, only the concise results from the operation are sent to the managing system. The proposed architecture is based on CORBA that provides several transparent characteristics in the distributed environment. In additional, the proxy object that represents the SNMP agent enables the mobile agent and the SNMP agent to converse with themselves. In this architecture, the mobile agent can carry out an automated management function, easily change and modify management functions. Therefore, it can provide an efficient management way.

  • PDF

A Study on Gamers Segmentation based upon Uses and Gratifications of Mobile games (모바일게임 이용 충족이론을 기반으로 한 모바일 게이머 유형 분석에 관한 연구)

  • Han, Kwang-Hyun;Kim, Tae-Ung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.133-164
    • /
    • 2005
  • Mobile games have emerged as the most innovative entertainment technology, adding new revenue streams, taking advantage of the potential of wireless applications and service offerings. Mobile games, like any other types of computer game, offer a unique value for users in providing an exciting digital experience in virtual worlds. Players can become empowered through the development of new characters and strategies within games to achieve rewarding successes against the computers and other players. The overall trend for mobile games is towards bigger, more colorful, more involving and exciting contents, which will build upon the developing capabilities of mobile phones and networks in order to bring new styles, concepts and experiences of game play to the users. In this paper, we attempt to investigate the demographic factors which play critical roles in determining the level of playing times; classify mobile gamers based on their motives for playing games; and empirically test differences in their demographic factors and mobile game usage. Statistical results show that significant differences in playing times exist, depending upon their age, gender, mobile device, mobile phone usage, mobile game experiences, and preferred games genres. Applying Factor analysis, we have identified Escape, Social interaction, Challenge and Competition, Fantasy, Diversion and Relaxation, Ease of Accessibility as key motivators for playing mobile games. Additional cluster analysis shows that the categorization of gamers, according to their usage habits and the key motivators for playing, can be made as follows: M-gamers, Multi-gamers and Communication-focused gamers. Further correlation of these grouping with socio-economic data shows the significant differences in gaming habits and patterns of mobile phone use.

  • PDF

Performance analysis of Hierarchical Mobile IPv6 depending on the paging size (페이징 영역크기에 따른 계층적 이동 IPv6 의 성능분석)

  • 정계갑;이상욱;김준년
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12A
    • /
    • pp.964-974
    • /
    • 2003
  • With increasing use of a personal mobile computer. the Mobile IPv6 is one of the main protocols that support mobility and complies with IPv6 specification. Similar to the mobile IPv6, the mobile IPv6 also has limitations on fast moving condition. The Hierarchical Mobile IPv6 is a solution that overcomes these limitations. The Hierarchical Mobile IPv6 is a micro mobility protocol that supports fast mobile IP handover and reduces signaling overhead with Mobility Anchor Point(MAP). But until now no paging method is applied to the Hierarchical Mobile IPv6 to reduce unnecessary signaling overhead and power consumption of mobile nodes. So, the paging mechanism for the Hierarchical Mobile IPv6 is proposed in this paper. the mechanism is implemented by making use of the destination option header and extension function and the last location algorithm. The results show that the Hierarchical Mobile IPv6 with the paging ability reduces the traffic of mobile networks by removing unnecessary binding update packet generated whenever handover takes place. Also, the larger the paging size is. the less the number of BU(Binding Update) massage generated.

Data transfer Rate of the Wireless Node Moving in the Static Wireless Network Space (고정 무선네트워크 공간 내에서의 무선노드 이동시 데이터 전송률)

  • Lee, Cheol;Lee, Jung-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.941-948
    • /
    • 2016
  • In this paper, we efficiently simulated for collecting the data from the fixed sensor and mobile sensor of patients using the LEACH-Mobile method. The LEACH-Mobile method is the protocol to increase the mobility by adding the mobile node to the existed LEACH(:Low Energy Adaptive Clustering Hierarchy) protocol. It improves the mobility of The LEACH-Mobile in the LEACH, however it consumes more energy than the existed LEACH. There is reason why we use the LEACH-Mobile that the monitoring system is generally done by the CCTV and an periodic checkup by nurses. However the number of nurse is a few in the most of hospital. It can happen the accidents of the patients in out of the CCTV when the nurse can not see the monitoring system in the hospital. Therefore it is simulated to continuously gather the data of the position and sensors in the five situation of moving the patients in the hospital, it gets the result that the management of the mobile patients is more efficient.

An Estimation-Based Scanning Method of Mobile Relay (이동릴레이의 추정기반 스캐닝 방안)

  • Lee, Hyun-Jin;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.850-857
    • /
    • 2012
  • A moving network is the usage model that provides the mobile stations to the communication service via the mobile relay deployed in the high-speed vehicle. The mobile relay periodically performs the signal strength measurement of the neighbor base stations to select the target base station during the handover procedure. The mobile stations experience the service disruption during the measurement of the mobile relay. In this paper, we propose the estimation based scanning method to overcome the service disruption of the mobile stations connected via the mobile relay. In the proposed method, mobile stations subordinated in the mobile relay periodically measure the signal strength of neighbor base stations in order to perform handover. The measured signal strength is used to estimate the signal strength between the mobile relay and the neighbor base station. We performed simulations in order to evaluate the performance of the proposed method in terms of the estimation accuracy and the overhead due to the exchange of channel information. By the simulation result, The estimation error is less than 4dBm when more than 6 mobile stations are used for the estimation. The overhead caused by the proposed method is less than that caused by the direct measurement of the mobile relay when the data rate is more than 8Mbps.

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Handover Scheme between WiFi and Mobile WiMax (WiFi와 mobile WiMax간 핸드오버 방안)

  • Park, Seung-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.34-41
    • /
    • 2011
  • At present wireless internet access service is available through the 3G network, mobile WiMAX and WiFi anytime and anywhere. In this environment where there are various networks, users should be able to select specific networks depending on different situations. And it is necessary to provide mobility support between homogeneous and between heterogenous networks. Given this situation, the many proposals have been presented to link 3G, which has the largest service area among various networks, with mobile WiMAX(IEEE 802.16e), or with WiFi(IEEE 802.11). But, recently, with the increasing volume of wireless internet use and wireless internet data, due to the advents of net-book, e-book and smart phone, the service area of WiFi and mobile WiMAX has rapidly expanded. Especially, the availability of real-time application such as internet phone has led to the relative shrinking of the proportion of 3G mobile communication network giving conventional voice service, and enlargement of those of wireless internet access networks like WiFi and mobile WiMAX. This paper suggests a handover scheme based on PMIPv6, whitch support mobility between WiFi and mobile WiMAX, and minimizes handover delay. In this scheme, the mobile node has a dual stack structure composed of two interfaces-WiFi and mobile WiMAX. Since WiFi dose not support mobility, it is suggested that the mobile node have the capacity to deal with handover signaling between gateway in case of handover between homogeneous networks. This handover scheme, suggested comparing with current handovers between homogeneous networks, has proved, in its analytic evaluation, to be able to reduce handover, transmission, and signaling overhead.