• Title/Summary/Keyword: Mobile Transactions

Search Result 1,617, Processing Time 0.027 seconds

Joint Optimization for Residual Energy Maximization in Wireless Powered Mobile-Edge Computing Systems

  • Liu, Peng;Xu, Gaochao;Yang, Kun;Wang, Kezhi;Li, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5614-5633
    • /
    • 2018
  • Mobile Edge Computing (MEC) and Wireless Power Transfer (WPT) are both recognized as promising techniques, one is for solving the resource insufficient of mobile devices and the other is for powering the mobile device. Naturally, by integrating the two techniques, task will be capable of being executed by the harvested energy which makes it possible that less intrinsic energy consumption for task execution. However, this innovative integration is facing several challenges inevitably. In this paper, we aim at prolonging the battery life of mobile device for which we need to maximize the harvested energy and minimize the consumed energy simultaneously, which is formulated as residual energy maximization (REM) problem where the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device are all considered as key factors. To this end, we jointly optimize the offloading ratio, energy harvesting time, CPU frequency and transmission power of mobile device to solve the REM problem. Furthermore, we propose an efficient convex optimization and sequential unconstrained minimization technique based combining method to solve the formulated multi-constrained nonlinear optimization problem. The result shows that our joint optimization outperforms the single optimization on REM problem. Besides, the proposed algorithm is more efficiency.

Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM)

  • Amrutha Sasidharan;Santhi Venkatakrishnan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1059-1074
    • /
    • 2024
  • The paper is an attempt to study the individual's intention to use mobile banking. In light of the results obtained from the study, the proposed model offers a better fit with the data and explains the intention of individuals to use mobile banking services. Government support, trust, and compatibility significantly contribute to the Perceived behavioral control of a bank customer to use mobile banking while Perceived ease of use, Perceived usefulness, Security and privacy, and risk have a significant positive impact on the attitude of the individuals to utilize mobile banking service. The study uses primary data and the final instrument was administered to 950 respondents, across the country of which 904 data were used for the analysis after editing to accommodate the missing values. The study has adopted structural equation modeling approach to analyze the relationships between the variables in the study. The proposed framework in this study can be utilized to identify the factors that promote the adoption of mobile banking practices and the study also has the potential to provide updated and comprehensive literature on mobile banking, which can accelerate future research in this field.

An Efficient Movement Management Method of Mobile Node in Mobile IPv6 (Mobile IPv6환경에서 이동노드의 효율적인 위치 관리 방안)

  • Shin Chung-Soo;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.211-218
    • /
    • 2006
  • The Mobile IPv6 provides the enhanced internet services to user by supporting a node's mobility. In Mobile IPv6(MIPv6), the mobile node sends the binding message which binds home address(HoA) with care-of address(CoA) to the home agent whenever it changes its point of attachment to the internet. To reduce the mobility management signal message the Paging Hierarchical Mobile IPv6(PHMIPv6) is proposed. The mobile node does not send the binding message within the domain if the mobile node's state is idle. Therefore the mobility signal message cost can be reduced. However, when the mobile node's session arrival rate is high the many mobility management signal cost are needed because the paging cost is very high. In this paper, we analysis the drawback of PHMIPv6 and propose the scheme which can reduce the mobility management signal cost. The proposed scheme works independent of the number of subnet in the domain. Therefore the proposed scheme can improve the mobile node's mobility management scheme.

Silent Mobile Content Delivery and Control Scheme using Multimedia Message Service (MMS를 이용한 암묵적 모바일 컨텐츠 전송 및 제어 기법)

  • Kim, Kyu-Won;Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.527-534
    • /
    • 2009
  • Almost every mobile phone supports MMS to send and receive multimedia messages among users. MMS is suitable for different types of mobile phones and effectively operates in wireless environments. So the mobile content delivery method using MMS can be efficient. However, there would be some problems if a mobile service provider tries to deliver mobile content to subscribers by using the existing MMS. In this paper, we propose an improved data transmission and control scheme for MMS. Our scheme assists mobile service providers to deliver mobile contents easily by modifying the MMS system software. By using our scheme, mobile service providers are able to manage mobile contents stored in mobile devices. Therefore, they can provide various services such as mobile daily news service, automatic software upgrade service, mobile advertising service, etc. We verify the possibility of the proposed scheme through simulation.

The Implementation and Performance Measurement for Hadoop-Based Android Mobile TPC-C Application (모바일 TPC-C: 하둡 기반 안드로이드 모바일 TPC-C 어플리케이션 구현 및 성능 측정)

  • Jang, Han-Uer;No, Jaechun;Kim, Byung-Moon;Lee, Ji-Eun;Park, Sung-Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.203-211
    • /
    • 2013
  • Due to the rapid growth of mobile devices and applications, mobile cloud computing is becoming an important platform in the development of cloud services. However, the mobile cloud computing is facing many challenges in terms of the computing resources and communications. One of them is the performance issue between mobile devices and cloud server. In the paper, we implemented a hadoop-based android mobile application, called mobile TPC-C, and used it for evaluating the performance aspect between mobile devices and cloud server. The mobile TPC-C was implemented based on the existing TPC-C, to make it possible to execute on top of android mobile devices. The performance measurement using mobile TPC-C was executed on various transactions while changing the number of mobile clients. By comparing it to the evaluation on the personal PC, we tried to point out the important aspects affecting the performance improvement between mobile clients and cloud server.

Asynchronous Cache Invalidation Strategy to Support Read-Only Transaction in Mobile Environments (이동 컴퓨팅 환경에서 읽기-전용 트랜잭션을 지원하기 위한 비동기적 캐쉬 무효화 기법)

  • Kim, Il-Do;Nam, Sung-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.325-334
    • /
    • 2003
  • In stateless server, if an asynchronous cache invalidation scheme attempts to support local processing of read-only transaction in mobile client/sever database systems, a critical problem may occur ; the asynchronous invalidation reports provide no guarantees of waiting time for mobile transactions requesting commit. To solve this problem, the server in our algorithm broadcasts two kind of messages, asynchronous invalidation report to reduce transaction latency and periodic guide message to avoid the uncertainty of waiting time for the next invalidation report. The asynchronous invalidation report has its own sequence number and the periodic guide message has the sequence number of the most recently broadcast asynchronous invalidation report. A mobile client checks its cache validity by using the sequence numbers of these messages.

Factors Affecting Consumer Intention on QR Payment of Mobile Banking: A Case Study in Indonesia

  • KOSIM, Krisananda Putera;LEGOWO, Nilo
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.391-401
    • /
    • 2021
  • Technological developments facilitate payment transactions. In 2020, Bank Indonesia issued a regulation that supports QR payments using the Indonesian Standard Quick Response Code (QRIS). PT ABC is one of the banks that launched a QR payment feature on mobile banking with QRIS standards to make it easier for customers to make payment transactions at various merchants. In its implementation, the interest of QR payment users still tends to be small, so an analysis of the interests of QR payment users is carried out. The purpose of this study is to analyze the factors that influence user interest by using a modified UTAUT model. The UTAUT model was modified by adding variables to perceived trust, perceived risk, perceived regulatory support, and promotional benefits. The population taken is the company's customers in the DKI Jakarta area and it takes 403 samples for this case study. The results of empirical analysis show that 8 out of 12 hypotheses are considered proven where business expectations, social influence, perceived trust, perceived risk, perceptions of regulatory support, promotion benefits, age-moderated performance expectations, and age-moderate effort expectations have a significant effect on behavioral intentions, while performance expectations, facilitation conditions, business expectations are moderated by experience and social influence.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Implementation and Analysis of the FMIPv6 (Fast Handover for Mobile IPv6) Using Layer 2 Triggers (제2계층 트리거를 이용한 FMIPv6 구현 및 분석)

  • Oh, Seung-Hun;Lee, Sung-Sik;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.551-558
    • /
    • 2005
  • In this paper, we implement the fast handovers for mobile IPv6 (FMIPv6) on Linux system. Due to its dependency on operations in layer-2 (L2), we have added some functions into the network driver to generate triggers as the mobile node moves. We design and implement the FMIPv6 functions divided into two parts as an access router and a mobile node. We compare the packet loss and delay of the FMIPv6 implementation during the handover period with those of the MIPv6 and investigate the performance improvement.

Mobile Robot with Artificial Olfactory Function

  • Kim, Jeong-Do;Byun, Hyung-Gi;Hong, Chul-Ho
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.4
    • /
    • pp.223-228
    • /
    • 2001
  • We have been developed an intelligent mobile robot with an artificial olfactory function to recognize odours and to track odour source location. This mobile robot also has ben installed an engine for speech recognition and synthesis and is controlled by wireless communication. An artificial olfactory system based on array of 7 gas sensors has been installed in the mobile robot for odour recognition, and 11 gas sensors also are located in the obttom of robot to track odour sources. 3 optical sensors are also in cluded in the intelligent mobile robot, which is driven by 2 D. C. motors, for clash avoidance in a way of direction toward an odour source. Throughout the experimental trails, it is confirmed that the intelligent mobile robot is capable of not only the odour recognition using artificial neural network algorithm, but also the tracking odour source using the step-by-step approach method. The preliminary results are promising that intelligent mobile robot, which has been developed, is applicable to service robot system for environmental monitoring, localization of odour source, odour tracking of hazardous areas etc.

  • PDF