• Title/Summary/Keyword: Mobile Task Information

Search Result 366, Processing Time 0.025 seconds

An User-driven Service Creation Architecture in Consumer Networking Environments (소비자 네트워킹 환경에서의 사용자 주도 서비스의 효율적 생성)

  • Jung, Yuchul;Kim, Jin-Young;Lee, Hyejin;Kim, Kwang-Young;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.479-487
    • /
    • 2016
  • In a Web 2.0 context, users are exposed to numerous smart devices and services that allow real-time interaction between users (or consumers) and developers (or producers). For the provisioning of new user-created services based on user's context, the data management of service creation experiences becomes a non-trivial task. This article introduces a data model for service creation and then proposes a service creation management architecture which enables new service creation using the data model, the management of the service creation data, and the semantic service discovery across internal/external service repositories. The article also explains the use of the proposed architecture with two different scenarios: home and mobile environments. The proposed architecture for service creation data management offers consistent and seamless handling of the service creation data throughout its usage lifecycle.

On a mobile security token using the PingPong-128 Generator (PingPong-128 키 수열 발생기를 이용한 모바일 보안 토큰에 관한 연구)

  • Kim, Nack Hyun;Cho, Sang Il;Kim, Tae Yong;Jang, Won Tae;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.351-354
    • /
    • 2009
  • In the internet communication technology, authentication of the user is main task. So far, very popular researches have been proposed for user authentications based on user_id and password. These existing methods have some merits as well as demerits also. In this paper, we analyzed the existing authentication method problems and implement a secure PingPong-128 based key generator for internet technology. In our new scheme, we are using one time password and security card numbers to generate the secure tokens for the user and internet service provider.

  • PDF

The study on effective PDV control for IEE1588 (초소형 기지국에서 타이밍 품질 향상을 위한 PDV 제어 방안)

  • Kim, Hyun-Soo;Shin, Jun-Hyo;Kim, Jung-Hun;Jeong, Seok-Jong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.275-280
    • /
    • 2009
  • Femtocells are viewed as a promising option for mobile operators to improve coverage and provide high-data-rate services in a cost-effective manner Femtocells can be used to serve indoor users, resulting in a powerful solution for ubiquitous indoor and outdoor coverage. TThe frequency accuracy and phase alignment is necessary for ensuring the quality of service (QoS) forapplications such as voice, real-time video, wireless hand-off, and data over a converged access medium at the femtocell. But, the GPS has some problem to be used at the femtocell, because it is difficult to set-up, depends on the satellite condition, and very expensive. The IEEE 1588 specification provides a low-cost means for clock synchronisation over a broadband Internet connection. The Time of Packet (ToP) specified in IEEE 1588 is able to synchronize distributed clocks with an accuracy of less than one microsecond in packet networks. However, the timing synchronization over packet switched networks is a difficult task because packet networks introduce large and highly variable packet delays. This paper proposes an enhanced filter algorithm to reduce ths packet delay variation effects and maintain ToP slave clock synchronization performance. The results are presented to demonstrate in the intra-networks and show the improved performance case when the efficient ToP filter algorithm is applied.

  • PDF

DMRUT-MCDS: Discovery Relationships in the Cyber-Physical Integrated Network

  • Lu, Hongliang;Cao, Jiannong;Zhu, Weiping;Jiao, Xianlong;Lv, Shaohe;Wang, Xiaodong
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.558-567
    • /
    • 2015
  • In recent years, we have seen a proliferation of mobile-network-enabled smart objects, such as smart-phones and smart-watches, that form a cyber-physical integrated network to connect the cyber and physical worlds through the capabilities of sensing, communicating, and computing. Discovery of the relationship between smart objects is a critical and nontrivial task in cyber-physical integrated network applications. Aiming to find the most stable relationship in the heterogeneous and dynamic cyber-physical network, we propose a distributed and efficient relationship-discovery algorithm, called dynamically maximizing remaining unchanged time with minimum connected dominant set (DMRUT-MCDS) for constructing a backbone with the smallest scale infrastructure. In our proposed algorithm, the impact of the duration of the relationship is considered in order to balance the size and sustain time of the infrastructure. The performance of our algorithm is studied through extensive simulations and the results show that DMRUT-MCDS performs well in different distribution networks.

Learning of Emergent Behaviors in Collective Virtual Robots using ANN and Genetic Algorithm

  • Cho, Kyung-Dal
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.327-336
    • /
    • 2004
  • In distributed autonomous mobile robot system, each robot (predator or prey) must behave by itself according to its states and environments, and if necessary, must cooperate with other robots in order to carry out a given task. Therefore it is essential that each robot have both learning and evolution ability to adapt to dynamic environment. This paper proposes a pursuing system utilizing the artificial life concept where virtual robots emulate social behaviors of animals and insects and realize their group behaviors. Each robot contains sensors to perceive other robots in several directions and decides its behavior based on the information obtained by the sensors. In this paper, a neural network is used for behavior decision controller. The input of the neural network is decided by the existence of other robots and the distance to the other robots. The output determines the directions in which the robot moves. The connection weight values of this neural network are encoded as genes, and the fitness individuals are determined using a genetic algorithm. Here, the fitness values imply how much group behaviors fit adequately to the goal and can express group behaviors. The validity of the system is verified through simulation. Besides, in this paper, we could have observed the robots' emergent behaviors during simulation.

A Case Study on Strategic Shift from Smart-Work to Work-Smart of Company K

  • Kang, Yong-Sik;Kwon, Sun-Dong;Woo, Su-Han
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.55-66
    • /
    • 2018
  • Early smart-work of company K was a technology-led way of applying ICT such as smart phones and mobile devices to business. After company K perceived the limitations of ICT-driven smart work, it propelled the work-smart, doing a work smart toward the way that human beings become central and a creative organizational culture is engendered. Company K propelled work-smart strategy in eight categories: simplification of data requirements, establishment efficient meeting culture, streamlining reporting and approval process, simplified document creation, overtime decrease, spreading flexible work system, settlement of healing leave, creating work-smart place. Company K set up an organizational culture secretariat dedicated to work-smart promotion and selected task priorities in consideration of urgency and effectiveness. Owing to such efforts, the company K's work-smart index rose sharply to 72 points this year from 56 points in the previous year. At the organizational culture survey, employees responded that organizational culture improved in all area. For a better future, company K analyzed its work-smart outcomes and planned progressively to improve its work-smart efforts based on employees opinions. This case study will serve as a guideline, for companies to make efforts to going forward to today work-smart beyond yesterday smart-work.

Implementation of MAPF-based Fleet Management System (다중에이전트 경로탐색(MAPF) 기반의 실내배송로봇 군집제어 구현)

  • Shin, Dongcheol;Moon, Hyeongil;Kang, Sungkyu;Lee, Seungwon;Yang, Hyunseok;Park, Chanwook;Nam, Moonsik;Jung, Kilsu;Kim, Youngjae
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.4
    • /
    • pp.407-416
    • /
    • 2022
  • Multiple AMRs have been proved to be effective in improving warehouse productivity by eliminating workers' wasteful walking time. Although Multi-agent Path Finding (MAPF)-based solution is an optimal approach for this task, its deployment in practice is challenging mainly due to its imperfect plan-execution capabilities and insufficient computing resources for high-density environments. In this paper, we present a MAPF-based fleet management system architecture that robustly manages multiple robots by re-computing their paths whenever it is necessary. To achieve this, we defined four events that trigger our MAPF solver framework to generate new paths. These paths are then delivered to each AMR through ROS2 message topic. We also optimized a graph structure that effectively captures spatial information of the warehouse. By using this graph structure we can reduce computational burden while keeping its rescheduling functionality. With proposed MAPF-based fleet management system, we can control AMRs without collision or deadlock. We applied our fleet management system to the real logistics warehouse with 10 AMRs and observed that it works without a problem. We also present the usage statistic of adopting AMRs with proposed fleet management system to the warehouse. We show that it is useful over 25% of daily working time.

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • Lusungu Josh Mwasinga;Syed Muhammad Raza;Duc-Tai Le ;Moonseong Kim ;Hyunseung Choo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

Item Recommendation Technique Using Spark (Spark를 이용한 항목 추천 기법에 관한 연구)

  • Yun, So-Young;Youn, Sung-Dae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.715-721
    • /
    • 2018
  • With the spread of mobile devices, the users of social network services or e-commerce sites have increased dramatically, and the amount of data produced by the users has increased exponentially. E-commerce companies have faced a task regarding how to extract useful information from a vast amount of data produced by the users. To solve this problem, there are various studies applying big data processing technique. In this paper, we propose a collaborative filtering method that applies the tag weight in the Apache Spark platform. In order to elevate the accuracy of recommendation, the proposed method refines the tag data in the preprocessing process and categorizes the items and then applies the information of periods and tag weight to the estimate rating of the items. After generating RDD, we calculate item similarity and prediction values and recommend items to users. The experiment result indicated that the proposed method process large amounts of data quickly and improve the appropriateness of recommendation better.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.