• Title/Summary/Keyword: Mobile Transactions

Search Result 1,622, Processing Time 0.022 seconds

Degrees of Freedom of 3-user MIMO Interference Channels with Instantaneous Relay Using Interference Alignment

  • Qiang, Wang;Yuquan, Shu;Minhua, Dong;Ji, Xu;Xiaofeng, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1624-1641
    • /
    • 2015
  • Instantaneous relay (relay-without-delay) using interference alignment is a promising approach to neutralizing interference and improving system capacity. In Wang Chenwei's work, a 2-user scenario required both source and relay to access the global channel state information (CSI). This paper shows a new method of interference alignment improves the degrees of freedom (DoF) prominently for the 3-user MIMO interference channel with instantaneous relay. This new method is focused on the relay node that completes the alignment interference neutralization so the global CSI is obtained only once and the pressure on the base station can be mitigated. In addition, the 3-user MIMO interference channels with instantaneous relay can achieve 2M DoF when source and destination have M antennas, respectively. This method shows 33% improvement over the conventional method using interference alignment which obtains 3M/2 DoF.

How Internet has Reshaped the User Experience of Banking Service?

  • Nam, Kiheung;Lee, Zoonky;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.684-702
    • /
    • 2016
  • The changes new technologies have brought to banking over the past decade are enormous in their impact on the ways of doing business and providing customer services, most notably in the areas of customer service channels. Banks have been trying to move away from the traditional, branch-based and costly staff-assisted channels toward self-assisted channels, i.e. internet banking and mobile banking, to drive down costs and improve customer loyalty. How internet and mobile have reshaped the user experience of banking service channel? To provide valuable insights for this question, this research investigates and compares customer's channel choice behavior and profit changes from bank's branch closure. Applying the propensity scoring matching method, the results of analysis demonstrates that the mobile channel can be a realistic alternative to conventional branches. Also, the reserch result shows banks can reduce conventional branches while experiencing a positive implications on their profits from the customers. Another significant implication from the research is, to accelerate the shift to digital channels, banks need to put more efforts on developing functions in the mobile channel that will allow friendly interaction with customers and consultation, such as video consultation, interactive chat, and location-based product recommendation.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

Motion-Capture-Based Animation in Mobile Embedded Systems Using Motion Capture Database Reduction Technique (데이터베이스 축소기법을 사용한 모바일 임베디드 시스템에서의 모션 캡쳐 기반 애니메이션)

  • Han, Young-Mo
    • The KIPS Transactions:PartB
    • /
    • v.14B no.6
    • /
    • pp.437-444
    • /
    • 2007
  • The objective of this paper is to accommodate the existing motion-capture-based animation to small memories and low computing powers of mobile embedded systems. To use efficiently memories, we propose a paradigm in which a motion capture database is compressed on a PC and so-compressed motion capture database is decompressed little by little on mobile embedded systems and the decompressed data are eliminated right after used. As a compression method for this paradigm we propose an approach that compresses captured motion rendering parameters using a polynomial function fitting method. To enhance its performance we also propose an optimization method for the degree of the polynomial fitting function. Using so-obtained compression method we demonstrate motion-capture-based animation on commercial mobile embedded systems.

Location Management Using Static Cache & Carry in Mobile Networks (이동망에서 정적 Cache & Carry을 이용한 위치관리)

  • Rim, Soon-Young;Koo, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.789-798
    • /
    • 2002
  • Even when users are moving, a major problem in such a mobile networks is how to locate mobile clients. Two major operations are involved in managing a mobile client's location : the location registration operation and the call tracking operation. The past methods can only minimize the cost of one of these two operations, but not both. The contribution of this paper is to propose strategy that minimize the costs of both operations simultaneously. Our performance analysis proves that the proposed strategies are superior to the past methods.

A Study on Conceptual Design of Anti-rolling Devices for 250 TEU Class Mobile Harbors (250 TEU급 모바일하버를 위한 횡동요 저감 장치의 개념 설계 연구)

  • Chung, T.Y.;Moon, S.J.;Lew,, J.M.;Park, C.H.;Cho, H.W.;Kim, B.I.;Yoon, H.K.;Kang, J.Y.
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.20 no.7
    • /
    • pp.629-636
    • /
    • 2010
  • A Mobile Harbor is a new transportation platform which can load and unload has containers to and from very large container ships on the sea. Currently designed Mobile Harbor a catamaran type which is equipped with precisely controlled gantry crane on the deck, and can transport 250 TEUs at a time. Loading and unloading works by crane require very small motion of Mobile Harbor in waves, because it may be operated outside of harbors. In this project, applicability of both tuned-type anti-rolling tank and maglev-type active mass driver is studied as anti-rolling systems.

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

Low-cost System with Handheld Analyzer for Optimizing the Position of Indoor Base Stations

  • Lee, C.C.;Xu, Degang;Chan, George
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.404-420
    • /
    • 2021
  • In this paper, an automatic system of locating the indoor area with weak or no mobile signal was proposed and demonstrated experimentally by using the Internet of Things (IoT) technology. Nowadays, the technicians of mobile services providers need to go along with numerous heavy equipment to measure and record the mobile signal strength at outside environment. Recently, there are systems proposed to do such measurement at outdoor area by using the IoT technology automatically. However, these works could not be applied in the indoor area since there are difficulties to do the indoor mapping and positioning. In this work, the Bluetooth Low Energy (BLE) was used to tackle these two difficulties. After a proper placement of BLE in the testing site, while the technician walk around with a handheld analyzer, the data can be obtained accordingly for further analysis in the proposed system which includes the construction of floor plan, detection of mobile signal strength and suggestion of indoor base stations. The gift wrapping and centroid algorithms were used during the analysis. The experimental results showed that the proposed system successfully demonstrated the indoor mapping, positioning of weak mobile signal area and suggestion of indoor base stations for the normal rectangular rooms with an area of 100 m2 on single floor.

Optimizations for Mobile MIMO Relay Molecular Communication via Diffusion with Network Coding

  • Cheng, Zhen;Sun, Jie;Yan, Jun;Tu, Yuchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1373-1391
    • /
    • 2022
  • We investigate mobile multiple-input multiple-output (MIMO) molecular communication via diffusion (MCvD) system which is consisted of two source nodes, two destination nodes and one relay node in the mobile three-dimensional channel. First, the combinations of decode-and-forward (DF) relaying protocol and network coding (NC) scheme are implemented at relay node. The adaptive thresholds at relay node and destination nodes can be obtained by maximum a posteriori (MAP) probability detection method. Then the mathematical expressions of the average bit error probability (BEP) of this mobile MIMO MCvD system based on DF and NC scheme are derived. Furthermore, in order to minimize the average BEP, we establish the optimization problem with optimization variables which include the ratio of the number of emitted molecules at two source nodes and the initial position of relay node. We put forward an iterative scheme based on block coordinate descent algorithm which can be used to solve the optimization problem and get optimal values of the optimization variables simultaneously. Finally, the numerical results reveal that the proposed iterative method has good convergence behavior. The average BEP performance of this system can be improved by performing the joint optimizations.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.