• Title/Summary/Keyword: Mobile internet devices

Search Result 799, Processing Time 0.036 seconds

Interface for HMD based AR Applications (HMD 기반 중강현실 응용을 위한 인터페이스)

  • Ahn, Sang-Chul;Lee, Kyong-Joon;Kim, Hyoung-Gon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.13 no.2
    • /
    • pp.39-46
    • /
    • 2007
  • In this paper, we propose that we can use our mobile devices as an effective interface for HMD-based augmented reality(AR) applications. Recently most People have mobile devices, with which they usually watch movies and connect internet So, people get accustomed to the mobile devices. In addition, the mobile devices can show various markers on their displays so that we can implement various AR applications. So, the mobile devices are quite good interface for AR applications. In the paper, we show how we can use the mobile devices as Interface for AR applications by implementing some AR experiments.

  • PDF

Intelligent u-Learning and Research Environment for Computational Science on Mobile Device

  • Park, Sun-Rae;Jin, Duseok;Lee, Jongsuk Ruth;Cho, Kum Won;Lee, Kyu-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.709-722
    • /
    • 2014
  • In the $21^{st}$ century, IT reform has led to the development of cyber-infrastructure owing to the outstanding enhancement of computer and network performance. The ripple effect has continued to increase. Accordingly, this study suggests a new computational research environment using mobile devices. In order to simplify the access of supercomputer, Science AppStore, task management and virtualization technologies are developed on mobile devices. User can be able to research by utilizing computational science SW such as compressible flow solver and nano device simulation tool that in installed on supercomputer in mobile environments. Also, this research environment makes it possible to monitor the simulation result and covers 14 university, 33 subjects, and 1,202 individuals.

Analytic Model for Optimal Checkpoints in Mobile Real-time Systems

  • Lim, Sung-Hwa;Lee, Byoung-Hoon;Kim, Jai-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3689-3700
    • /
    • 2016
  • It is not practically feasible to apply hardware-based fault-tolerant schemes, such as hardware replication, in mobile devices. Therefore, software-based fault-tolerance techniques, such as checkpoint and rollback schemes, are required. In checkpoint and rollback schemes, the optimal checkpoint interval should be applied to obtain the best performance. Most previous studies focused on minimizing the expected execution time or response time for completing a given task. Currently, most mobile applications run in real-time environments. Therefore, it is extremely essential for mobile devices to employ optimal checkpoint intervals as determined by the real-time constraints of tasks. In this study, we tackle the problem of determining the optimal inter-checkpoint interval of checkpoint and rollback schemes to maximize the deadline meet ratio in real-time systems and to build a probabilistic cost model. From this cost model, we can numerically find the optimal checkpoint interval using mathematical tools. The performance of the proposed solution is evaluated using analytical estimates.

Adaptive Success Rate-based Sensor Relocation for IoT Applications

  • Kim, Moonseong;Lee, Woochan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3120-3137
    • /
    • 2021
  • Small-sized IoT wireless sensing devices can be deployed with small aircraft such as drones, and the deployment of mobile IoT devices can be relocated to suit data collection with efficient relocation algorithms. However, the terrain may not be able to predict its shape. Mobile IoT devices suitable for these terrains are hopping devices that can move with jumps. So far, most hopping sensor relocation studies have made the unrealistic assumption that all hopping devices know the overall state of the entire network and each device's current state. Recent work has proposed the most realistic distributed network environment-based relocation algorithms that do not require sharing all information simultaneously. However, since the shortest path-based algorithm performs communication and movement requests with terminals, it is not suitable for an area where the distribution of obstacles is uneven. The proposed scheme applies a simple Monte Carlo method based on relay nodes selection random variables that reflect the obstacle distribution's characteristics to choose the best relay node as reinforcement learning, not specific relay nodes. Using the relay node selection random variable could significantly reduce the generation of additional messages that occur to select the shortest path. This paper's additional contribution is that the world's first distributed environment-based relocation protocol is proposed reflecting real-world physical devices' characteristics through the OMNeT++ simulator. We also reconstruct the three days-long disaster environment, and performance evaluation has been performed by applying the proposed protocol to the simulated real-world environment.

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.

Service Delivery Agent System for Mobile Devices

  • Jeong, Seob-Yoon;Lee, Ki-Hyun;Geun, Sik-Jo
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.198-201
    • /
    • 2001
  • Recently the wireless-internet has been spreading extensively. People are spending a large part of their time gaining access to information using a mobile device. With the rapid growth of on-line Electronic Commerce, the use of mobile devices creates a new paradigm that provides users with location-independent real time service. Although this new paradigm does have some advantages, limited process speed, low bandwidth, the low battery capacity of mobile devices, and a high rate of wireless network errors causes many overhead expenses during service time with the server. In this paper, we suggest an autonomous service delivery system, which provides mobile agent capability to users that cannot maintain a connection. We have developed the system based on java mobile agent technology. Using this system, we can provide more effective service to users when the user is sending requirements for service through a mobile device that has limited resources. Furthermore we can manage the contact server dynamically when new services are added.

  • PDF

AR Anchor System Using Mobile Based 3D GNN Detection

  • Jeong, Chi-Seo;Kim, Jun-Sik;Kim, Dong-Kyun;Kwon, Soon-Chul;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.54-60
    • /
    • 2021
  • AR (Augmented Reality) is a technology that provides virtual content to the real world and provides additional information to objects in real-time through 3D content. In the past, a high-performance device was required to experience AR, but it was possible to implement AR more easily by improving mobile performance and mounting various sensors such as ToF (Time-of-Flight). Also, the importance of mobile augmented reality is growing with the commercialization of high-speed wireless Internet such as 5G. Thus, this paper proposes a system that can provide AR services via GNN (Graph Neural Network) using cameras and sensors on mobile devices. ToF of mobile devices is used to capture depth maps. A 3D point cloud was created using RGB images to distinguish specific colors of objects. Point clouds created with RGB images and Depth Map perform downsampling for smooth communication between mobile and server. Point clouds sent to the server are used for 3D object detection. The detection process determines the class of objects and uses one point in the 3D bounding box as an anchor point. AR contents are provided through app and web through class and anchor of the detected object.

The Study on Forensic Techniques of Chromebook (크롬북 포렌식 기법에 관한 연구)

  • Yoon, Yeo-Kyung;Lee, Sang-Jin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.55-70
    • /
    • 2018
  • With the diversification of mobile devices, the development of web technologies, and the popularization of the cloud, an internet-centric web OS that is not dependent on devices has become necessary. Chromebooks are mobile devices in the form of convertible laptops featuring a web OS developed by Google. These Web OS mobile devices have advantages of multi-user characteristics of the same device and storage and sharing of data through internet and cloud, but it is easy to collect and analyze evidence from the forensic point of view because of excellent security and easy destruction of evidence not. In this paper, we propose an evidence collection procedure and an analysis method considering the cloud environment by dividing the Chromebook, which is a web OS mobile device popularized in the future, into user and administrator modes.

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Proxy-based Mobile Syndication with Low Communication Cost (프록시 기반의 저 통신 비용 모바일 신디케이션)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.786-796
    • /
    • 2009
  • Currently, web syndication is usually utilized in desktop environments, but not considering mobile environments. In this paper, we focus on the extension of the desktop based web syndication to the mobile internet. Simply adapting the desktop based web syndication to mobile devices can cause high wireless internet communication cost. We propose PMS(Proxy-based Mobile Syndication) model which achieves low cost mobile syndication. In the PMS model, MWProxy is defined as a proxy server between mobile devices and web sites. It can reduce the communication cost by peeking up modified items from the web sites and reducing the channel size. In this paper, we designed and implemented the PMS system in a mobile phone and evaluated the performance of the PMS system by conducting real experiments using mobile emulators.