• Title/Summary/Keyword: Mobile computing environment

Search Result 704, Processing Time 0.024 seconds

An Efficient Medical Information Authentication Scheme in Mobile Cloud Environment (모바일 클라우드 환경에서 효율적인 의료정보 인증 기법)

  • You, Mi-kyeong;Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.721-723
    • /
    • 2015
  • Recently importance and scalability of cloud computing technology is rapidly emerging, it tends to have applied to various information systems. Many services have been made in mobile cloud environment, and medical information service quick application is required. When the medical information is important information of individuals to leakage, because you can cause serious problems, the problem of secure authentication procedures must be resolved. Therefore, in this paper, we propose an authentication scheme that can be more efficiently manage the medical information system in a mobile cloud environment.

  • PDF

A Study for u-Yuhan System Design using Mobile in Ubiquitous Environment. (유비쿼터스 환경에서의 모바일을 이용한 u-유한 시스템 설계 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-Suk
    • Management & Information Systems Review
    • /
    • v.21
    • /
    • pp.155-168
    • /
    • 2007
  • In the ubiquitous which is rapidly developing with ultra speed thes days, constructing the u-Campus which is using the sensor-network as its base is keep developing. Also, any information related equipments like PC and mobile, computing is possible whenever and wherever you want and due to the development of the wireless network, the service environment is continually developing. In this article, I'd like to suggest the u-Campus which is very suitable to the user's environment which had used application of mobile. In u-Campus, various techniques are adopted and applied along with development of info-communication related technidques. Especially, the new type of campus which is constructed by adopting the ubiquitous computing net-work technique to the campus of university is the u-Campus. In this article, by suggesting u-Yuhan designing methods, more effective and advanced school activities of students to make possible.

  • PDF

Proxync : A Framework for Proxy-based Mobile Database with SyncML

  • Park, Dong M.;Eenjun Hwang
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.186-191
    • /
    • 2001
  • Mobile agent technologies are getting popular as means for accessing network resources efficiently. In order for mobile agents to be accepted as a reliable technology for applications such as e-commerce, a proper framework for mobile database should be established. In this paper, we first discuss weak points of current mobile computing systems that mostly result from the limitations of current mobile computing technology including frequent disconnection, limited battery capacity, low-bandwidth communication and reduced storage capacity. These weak points also have become the cause of transaction problem where mobile devices issue transactions. In order to eliminate this transaction problem in the mobile environment, we propose a mobile database framework, Proxyne, which is based on the proxy and SyncML.

  • PDF

A Concurrency Control Method of Mobile Real-time Transactions Using Committed Transaction Precedence (완료 트랜잭션 우선의 이동 실시간 트랜잭션 동시성 제어 기법)

  • Kim, Gyoung-Bae;Cho, Sook-Kyoung;Bae, Hae-Young
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1213-1220
    • /
    • 2004
  • With the significant advances in mobile computing technology, there is an increasing demand for various mobile applications to process trans-actions in a real-time. When remote data access is considered in a mobile environment, data access delay becomes one of the most serious problems in meeting the deadline of real-time transaction. The mobile real-time transaction should be assured not only correctness of result of trans-action but also completion time of transaction. In this paper, we propose an optimistic concurrency control method to solve conflict among mobile real-time transactions. It minimizes influence on the cascade abort and delay of transactions that occur by disconnection and hand over in a mobile environment.

A Mobile Agent-based Computing Environment for Pedestrian Tracking Simulation

  • Xie, Rong;Shibasaki, Ryosuke
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.354-356
    • /
    • 2003
  • The study of pedestrian behavior covers wide topics, including way finding, choice and decision make, as well as spatial cognition and environmental perception. To address the problem, simulation is now put forward as suitable technique and method for analyzing human spatial behavior. In the paper we present a development architecture for simulating tracking pedestrian in a distributed environment. We introduce and explore the potential of using mobile agent-enabled distributed implementation model as a tool for development and implementation of the simulation. Three kinds of mobile agents are designed for implementation of managing and querying data of pedestrian. Finally, simulation result of JR 10,000 passengers’ movement is developed and implemented as a case study.

  • PDF

Adaptive Error Control Scheme for Supporting Multimedia Services on Mobile Computing Environment (이동 컴퓨팅 환경에서 멀티미디어 서비스 지원을 위한 적응적 에러 제어 기법)

  • Jeon Yong-Hun;Kim Sung-Jo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.241-248
    • /
    • 2006
  • Mobile computing has such characteristics as portability, wireless network, mobility, etc. These characteristics cause various problems to mobile terminals like frequent disconnection, high error rate, and varying network status. These problems motivate us to develop an adaptive error control mechanism for supporting multimedia service in mobile computing environment. In this paper, we propose the Adaptive Error Control(AEC) scheme using client's buffer size and current error rate. After categorizing the status into four groups according to client's buffer size and current error rate, this scheme applies an appropriate error control scheme to each status. In this scheme, thresholds of buffer size and error rate are determined by the data transmission time, play rate and average VOP size, and by the probability of error for a sequence of packets. The performance of proposed scheme is evaluated by flaying MPEG-4 files on an experimental client/server environment, respectively. The results show that error correcting rate is similar to other schemes while the time for correcting error reduce a little. In addition, the size of data for correcting error is decreased by 23% compared with FEC and Hybrid FEC, respectively. Theses results demonstrate that the proposed scheme is more suitable in mobile computing environment with small bandwidth and varying environment than existing schemes.

Design of Remote management System Using Mobile Agents (이동에이전트를 이용한 원격관리 시스템 설계)

  • Hong, Seong-Pyo;Song, Gi-Beom;Park, Chan-Mo;Lee, Joon;Oh, Moo-Song
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.368-371
    • /
    • 2000
  • The distributed object computing is possible to distributed computing on same or heterogeneous machine environment with growth of distributed computing and object-oriented technology. The typical of model, CORBA is int solved the interoperability in heterogeneous machine environment over the network But, the CORBA has a problem that the server is can't rely on request of client occurs network overhead by extinction of network A plan was on the rise to solve the problem that is combination of mobile agent and distributed computing technology.

  • PDF

A Security Framework for Ubiquitous Computing Environment

  • Chae, Cheol-Joo;Shin, Hyo-Young;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.330-334
    • /
    • 2009
  • Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.

A Study on the Direction of Ubiquitous Office with a Focus on Work Services (업무유형에 따른 유비쿼터스 오피스 계획 방향에 관한 연구)

  • Cho, Myung Eun;Chae, Hee Hwa;Lee, Ju Hyun;Kim, Mi Jeong
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.2
    • /
    • pp.186-196
    • /
    • 2012
  • Information technology has changed the human life as well as the societal and economic paradigm. New office environments have been proposed to cope with emerging changes and to support working performances by reducing costs of office operation and business. Recently, office environments have adopted ubiquitous computing with a focus on collaboration to promote real-time enterprises. They become equipped with various mobile devices and pervasive technologies in wireless networks. This study aims to propose a direction for the adoption of mobile and pervasive computing on the new office environment. We investigate relate works and analyze new office types including mobile offices, telework centers and home offices. Using a customized questionnaire, the current conditions of the office environments and officers' demands were investigated and analyzed. In the end, we propose the direction for a ubiquitous office environment with a focus on two attributes, ubiquity and mobility. This research will be a basis for the development of ubiquitous offices that support the professionalism of works in practices.

  • PDF

Design and Implementation of the Security Components in Ultra-Lightweight Mobile Computing Environment (초경량 이동 컴퓨팅 환경에서의 보안 컴포넌트 설계 및 구현)

  • Park, Rae-Young;You, Yong-Duck;Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.454-461
    • /
    • 2007
  • The next-generation computer is the ultra-lightweight mobile computer that communicates with peripheral handhold devices and provides dynamically the services appropriate to user. To provide the dynamic services on the ultra-lightweight mobile computer, security problem for user or computer system information should be solved and security mechanism is necessary for the ultra-lightweight mobile computing environment that has battery limit and low performance. In this paper, the security mechanism on the component based middleware for the ultra-lightweight mobile computer was implemented using RC-5 cipher algorithm and SHA-1 authentication algorithm. The security components are dynamically loaded and executed into the component based middleware on the ultra-lightweight mobile computer.