• Title/Summary/Keyword: Mobile-Based

Search Result 10,799, Processing Time 0.038 seconds

Propose Directions for Effective Marketing in Mobile Game Advertising (모바일 게임 광고에 있어서 효과적인 마케팅 활용 방향성 제안)

  • Park, Sunha
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.2
    • /
    • pp.323-332
    • /
    • 2018
  • Today, the life cycle of mobile games is getting shorter. In order to overcome this problem, we tried to summarize the strategies and marketing types of game marketing. Recently, I considered the TV advertisement that used the star of the marketing form of mobile game. In this research, user survey was analyzed based on correlation between star marketing and mobile game TV advertisement. And, through an interview with Delphi experts, I summarized the important elements of TV advertisement for mobile games. In conclusion, this research presented a total of five elements on a successful mobile game marketing strategy.The direction of mobile game advertising can promote a successful game that needs to set effective advertising marketing strategy, based on the basic nature of the game and main target.

Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6

  • Baek, Jaejong
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.2
    • /
    • pp.89-96
    • /
    • 2016
  • In mobile communication, there are various types of handoff for the support of all forms of mobility. Proxy mobile IPv6 (PMIPv6) enables local network-based mobility management of a mobile node without any effect of mobility-related signaling. Recently, PMIPv6 has been considered for supporting mobility management in LTE/SAE-based mobile networks. To support seamless mobility in heterogeneous mobile networks, the overall cost of handoffs needs to be minimized and the procedure should be guaranteed to be secure. However, the reduction of the authentication cost has not been fully investigated to provide seamless connectivity when mobile users perform a handoff between the PMIPv6 domains. This paper proposes secure pre-authentication schemes, completing an authentication procedure before performing a handoff, for a fast handoff in PMIPv6. Analytic models have been used for measuring the authentication latency and for the overhead cost analysis. In addition to providing fast authentication, the proposed pre-authentication schemes can prevent threats such as replay attacks and key exposure.

A Study of the HTML5-based Mobile Order Communication System

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • International Journal of Contents
    • /
    • v.9 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • Recently, online real-time web accessible mobile devices such as smartphones, tablet PCs and application services have been developing rapidly. Hospitals also need to adopt an efficient information system that can provide decent medical services under mobile computing environments to complete future medical services. This study proposes a system in which a doctor can examine a patient and make out a prescription in a ward on a real-time based on the current Order Communication Systems (OCSs) through mobile interfaces. The proposed system implements mobile web pages using HTML5, instead of a mobile app. Web processing speed can be enhanced using the web socket and web storage functions of HTML5.

The Criteria, Procedure, and Classification of Traffic-Sensitive and Non-Traffic-Sensitive Components: A Case of CDMA Mobile System

  • Kim, Moon-Soo
    • ETRI Journal
    • /
    • v.28 no.6
    • /
    • pp.777-786
    • /
    • 2006
  • Since the introduction of competition in the telecommunication market due to the growth of the interconnection between heterogeneous networks, particularly fixed and mobile networks, the interconnection charge based on traffic-sensitive (TS) and non-traffic-sensitive (NTS) costs has become more important. Although there have been many studies of the public switched telephone network (PSTN), previous studies of TS and NTS costs in mobile networks are very few. In this paper, as a pilot study, we propose three criteria and a procedure for the classification of TS and NTS costs based on mobile systems. The three criteria are the following: function type, investment requirement, and main exhaust driver. Moreover, for a CDMA mobile system, strongly TS, strongly NTS, and mixed components are classified by the proposed criteria and procedure. The proposed criteria, procedure, and classification can provide a systematic and useful guideline to decide the scope of mobile facilities and to determine the terminating cost on mobile networks from fixed networks.

  • PDF

Chord System Algorithm Based on the mobility in the mobile environment (모바일 환경에서 이동성을 고려한 Chord 시스템 알고리즘)

  • Hong, Rok Ji;Moon, Il Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.75-81
    • /
    • 2010
  • Due to the increasing use of smart phones, using Wifi, Wibro of mobile devices spread. Accordingly, Need of using peer-to-peer file sharing between mobile devices is growing. However, common Peer-to-Peer(P2P) system is too complex and is not suitable to be applied to mobile devices. Thus, the need of research has shown to improve way in a mobile environment that has a constraints as mobility and the scope of communication. Among them, there is a Chord as contents look up algorithm. Chord is the issue. Chord as the DHT-based P2P protocol shares files, index-key and distributed key across the network. However, exist Chord doesn't consider the mobility. So, It has a lot of problems in the mobile environment. Thus, in this paper, I will try to explore an appropriate way of Chord in a mobile environment.

A Constrained Triangulation Technique for Visualization on Mobile Devices (모바일 장치에서의 가시화를 위한 경계기반 삼각화)

  • Yang, Sang-Wook;Choi, Young
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.6
    • /
    • pp.413-421
    • /
    • 2007
  • 3D rendering is becoming a common feature of mobile application programs with the rapid advance of mobile devices. Since the existing rendering engines do not provide triangulation functions, mobile 3D programs have focused on an efficient handling with pre-tessellated geometry. In addition, triangulation is comparatively expensive in computation, so it seems that the triangulation cannot be easily implemented on mobile devices with limited resources. Triangulation of 3D geometry is the essential process of visualization of 3D model data and many different triangulation methods have been reported. We developed a light and fast visualization process that involves constrained triangulation based on Voronoi diagram and applied it to a mobile computer application. In this paper, we applied kd-tree to the original incremental construction algorithm and produced new O(nlogn) incremental construction algorithm. And we show a simple and efficient constrained triangulation method based on Voronoi diagram. This paper also describes an implementation of mobile STEP data viewer as an application of our proposed algorithms.

A Study on Map Building of Mobile Robot Using RFID Technology and Ultrasonic Sensor (초음파센서와 RFID 시스템을 이용한 이동로봇의 맵 빌딩에 관한 연구)

  • Lee, Do-Kyoung;Im, Jae-Sung;Kim, Sang-Bong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.3
    • /
    • pp.239-244
    • /
    • 2010
  • This paper is to present map building of mobile robot using RFID (Radio Frequency Identification) technology and ultrasonic sensor. For mobile robot to perform map building, the mobile robot needs its localization and accurate driving in space. In this reason, firstly, kinematic modeling of mobile robot under non-holonomic constrains is introduced. Secondly, based on this modeling, a tracking controller is designed for tracking a given path based on backstepping method using Lyapunov function. The Lyapunov function is also introduced for proving the stability of the designed tracking controller. Thirdly, 2D map building is performed by RFID system, mobile robot system and ultrasonic sensors. The RFID mobile robot system is composed of DC motor, encoder, ultra sonic sensor, digital compass, RFID receiver and RFID antenna. Finally, the path tracking simulation results and map building experimental results are presented to show the effectiveness of the designed controller.

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Development of Quality Assurance Criteria for Mobile Device Based e-learning Contents (모바일 기기 기반의 이러닝 콘텐츠 품질관리 평가 기준 개발)

  • Kim, JaMee;Kim, Yong;Kim, Seongjin
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.475-482
    • /
    • 2014
  • A wide variety of contents are now provided along with the development of information appliances. The purpose of this study was to examine what should be considered to boost the quality of mobile device based e-learning contents. For this study, 12 evaluation domains and 26 evaluation items were selected using the Delphi method. The factors to be considered for mobile device based e-learning contents quality are summarized 4 factor. In other words, for the purpose of managing the quality of mobile device based e-learning contents, there exist four areas to be considered, 'foundation', 'contents', 'teaching design' and 'technology.' The findings of this study are expected to contribute to the improvement of the quality of the educational contents.