• Title/Summary/Keyword: Mobile communication industry

Search Result 319, Processing Time 0.027 seconds

The Effect of Mongolian Mobile Banking Service Quality on User Satisfaction

  • DAGVADORJ BOLOR ERDENE;Min Jung Kang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.226-232
    • /
    • 2024
  • This study attempted to demonstrate the role of perceived value and trust in the relationship between mobile banking service quality and use satisfaction. A survey was conducted on customers of Mongolian banks, and an analysis was conducted based on the collected data With the development of the fintech industry, the Internet-based mobile banking market is striving to provide convenient services to consumers. The result led to the introduction of an online-oriented Internet bank that can operate 24 hours a day regardless of time and space. The characteristic of operating only with the Internet has a positive aspect of providing services quickly and conveniently, but at the same time, including concerns about security and personal information leakage. This can make you hesitate to use the service. Therefore, we attempted to find out how the quality of mobile banking service affects the perceived value and satisfaction of using trust. A survey was conducted to verify the contents of the research model and hypothesis. This is to secure data to be used for empirical analysis of research hypotheses. The survey was conducted with 124 consumers in Ulaanbaatar, the capital of Mongolia. Based on the analysis results, we understood the satisfaction of consumers using mobile banking and suggested ways for consumers to improve their actual satisfaction using mobile banking. Specifically, service quality sensitivity, security, convenience, and design had a positive effect on perceived value or trust, ultimately leading to consumer satisfaction.

Multi-Slice Joint Task Offloading and Resource Allocation Scheme for Massive MIMO Enabled Network

  • Yin Ren;Aihuang Guo;Chunlin Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.794-815
    • /
    • 2023
  • The rapid development of mobile communication not only has made the industry gradually diversified, but also has enhanced the service quality requirements of users. In this regard, it is imperative to consider jointly network slicing and mobile edge computing. The former mainly ensures the requirements of varied vertical services preferably, and the latter solves the conflict between the user's own energy and harsh latency. At present, the integration of the two faces many challenges and need to carry out at different levels. The main target of the paper is to minimize the energy consumption of the system, and introduce a multi-slice joint task offloading and resource allocation scheme for massive multiple input multiple output enabled heterogeneous networks. The problem is formulated by collaborative optimizing offloading ratios, user association, transmission power and resource slicing, while being limited by the dissimilar latency and rate of multi-slice. To solve it, assign the optimal problem to two sub-problems of offloading decision and resource allocation, then solve them separately by exploiting the alternative optimization technique and Karush-Kuhn-Tucker conditions. Finally, a novel slices task offloading and resource allocation algorithm is proposed to get the offloading and resource allocation strategies. Numerous simulation results manifest that the proposed scheme has certain feasibility and effectiveness, and its performance is better than the other baseline scheme.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

A Study on Region-based Secure Multicast in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 영역기반 보안 멀티캐스트 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • MANET is a network composed only mobile network having limited resources and has dynamic topology characteristics. Therefore, every mobile node acts as a route and delivers data by using multi-hop method. In particular, group communication such as multicast is desperately needed because of characteristics such as battery life of limited wireless bandwidth and mobile nodes. However, the multicast technique can have different efficient of data transmission according to configuring method of a virtual topology by the movement of the nodes and the performance of a multicast can be significantly degraded. In this paper, the region based security multicast technique is proposed in order to increase the efficiency of data transmission by maintaining an optimal path and enhance the security features in data transmission. The group management node that manages the state information of the member nodes after the whole network is separated to area for efficient management of multicast member nodes is used. Member node encrypts using member key for secure data transmission and the security features are strengthened by sending the data after encrypted using group key in group management node. The superiority of the proposed technique in this paper was confirmed through experiments.

New Fashion Industry Trend Corresponding to New Media & Internet Infrastructure (뉴미디어 및 인터넷 시대에 부응하는 패션산업의 새로운 동향)

  • 김수진;한명숙
    • The Research Journal of the Costume Culture
    • /
    • v.10 no.3
    • /
    • pp.293-305
    • /
    • 2002
  • This paper describes the new trends of fashion industry in the era of digital media and Internet paradigm, where fashion is no longer just static contents. Fashion becomes crucial and dynamic contents for infotainment, mobile Internet, and digital media. As therefore, the fashion industry could be positioned as fashion information industry and key elements of fashion communication. In the future, fashion education should be repositioned as dynamic Intermediary not only for traditional textile design, costume design, and merchandising, but also for dynamic fashion information provider, fashion communication and fashion-oriented media related to digital Information, and Internet. As a case study, we briefly describe the successful co-marketing strategies of world-class luxury fashion brands, fashion media, and Internet service provider.

  • PDF

A Study on the Elements of Chinese Animation IP (Intellectual Property) Development Based on the Pan-Entertainment Industry

  • Yan, JiHui;Lee, Byung Chun;Yun, Taesoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.168-179
    • /
    • 2021
  • With the introduction of China's new policies, the Chinese animation industry has gradually formed a sustainable industrial structure chain, and the output value of the animation market is also in a state of continuous growth. Since 2013, domestic animation has been developing from "lower age" to "ageing" and "adults". At the same time, with the popularization of China's pan-entertainment industry model, the multi-domain symbiosis of the Internet and mobile Internet has been realized, creating a fan economy of star IP (Intellectual Property), and promoting the linkage of various industries under the same IP. This paper mainly analyzes the development of the animation IP market in China's pan-entertainment mode in recent years, and analyzes the cross-media operation mode of the animation industry. At the same time, it studies the application of self-media in animation.

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC

  • Zhang, Junsong;Ma, Jian;Li, Xiong;Wang, Wendong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2930-2947
    • /
    • 2014
  • With the rapid growth of the communication technology, intelligent terminals (i.e. PDAs and smartphones) are widely used in many mobile applications. To provide secure communication in mobile environment, in recent years, many user authentication schemes have been proposed. However, most of these authentication schemes suffer from various attacks and cannot provide provable security. In this paper, we propose a novel remote user mutual authentication scheme for multi-server environments using elliptic curve cryptography (ECC). Unlike other ECC-based schemes, the proposed scheme uses ECC in combination with a secure hash function to protect the secure communication among the users, the servers and the registration center (RC). Through this method, the proposed scheme requires less ECC-based operations than the related schemes, and makes it possible to significantly reduce the computational cost. Security and performance analyses demonstrate that the proposed scheme can solve various types of security problems and can meet the requirements of computational complexity for low-power mobile devices.

Case Study of Short Animation with Facial Capture Technology Using Mobile

  • Jie, Gu;Hwang, Juwon;Choi, Chulyoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.56-63
    • /
    • 2020
  • The Avengers film produced by Marvel Comics shows visual effects that were impossible to produce in the past. Companies that produce film special effects were initially equipped with large personnel and equipment, but technology is gradually evolving to be feasible for smaller companies that do not have high-priced equipment and a large workforce. The development of hardware and software is becoming increasingly available to the general public as well as to experts. Equipment and software which were difficult for individuals to purchase before quickly popularized high-performance computers as the game industry developed. The development of the cloud has been the driving force behind software costs. As augmented reality (AR) performance of mobile devices improves, advanced technologies such as motion tracking and face recognition technology are no longer implemented by expensive equipment. Under these circumstances, after implementing mobile-based facial capture technology in animation projects, we have identified the pros and the cons and suggest better solutions to improve the problem.

3GPP 5G Core Network: An Overview and Future Directions

  • Husain, Syed;Kunz, Andreas;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.8-15
    • /
    • 2022
  • The new 5G radio technology (NR) can provide ultra-reliable low latency communications. The supporting 5G network infrastructure will move away from the previous point-to-point network architecture to a service-based architecture. 5G can provide three new things, i.e., wider channels, lower latency and more bandwidth. These will allow 5G to support three main types of connected services, including enhanced mobile broadband, mission-critical communications, and the massive Internet of Things (IoT). In 2015, the 5th generation (5G) mobile communication was officially approved by the International Telecommunication Union (ITU) as IMT-2020. Since then, 3GPP, the international organization responsible for 5G standards, is actively developing specifications for 5G technologies. 3GPP Release 15 provides the first full set of 5G standards, and the evolution and expansion of 5G are now being standardized in Release 16 and 17, respectively. This paper provides an overview of 3GPP 5G technologies and key services.

A Proposal for IT Design Curriculum in Community College based on IT Industry Demand Survey (IT 산업수요 조사에 기초한 전문대학교 IT 디자인 교육과정 제안)

  • Lee, Yun-Hui;Jo, Seong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.345-353
    • /
    • 2016
  • This study was intended to analyze the present condition and problems of education by examining the curriculum of departments relating to IT design in community colleges in the environment of IT that more rapidly grew than any other sector due to the development of information and communication and smart device, focusing on the actual condition. And it was intended to present a scheme for the improvement of IT design curriculum in community colleges in preparation for the surveyed industry demand in IT sector. First of all, this study attempted to check how IT designers' work changed according to the change of technology in industrial scene through a survey of job in IT industry and an analysis of IT industry trends. As a result, it was shown that the work of IT designers who had carried out web design work extended to mobile design, and school education also required mobile education according to the change of the times. Here, through task analysis, it was possible to find that web design and mobile design was not fundamentally entirely different, but was within the range where it was perfectly possible to carry out mobile design work if mobile environment and condition was understood and an education was given together with the existing curriculum.