• 제목/요약/키워드: Service Quality of Network

검색결과 1,741건 처리시간 0.03초

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

호스피스 전달체계 모형

  • 최화숙
    • 호스피스학술지
    • /
    • 제1권1호
    • /
    • pp.46-69
    • /
    • 2001
  • Hospice Care is the best way to care for terminally ill patients and their family members. However most of them can not receive the appropriate hospice service because the Korean health delivery system is mainly be focussed on acutly ill patients. This study was carried out to clarify the situation of hospice in Korea and to develop a hospice care delivery system model which is appropriate in the Korean context. The theoretical framework of this study that hospice care delivery system is composed of hospice resources with personnel, facilities, etc., government and non-government hospice organization, hospice finances, hospice management and hospice delivery, was taken from the Health Delivery System of WHO(1984). Data was obtained through data analysis of litreature, interview, questionairs, visiting and Delphi Technique, from October 1998 to April 1999 involving 56 hospices, 1 hospice research center, 3 non-government hospice organizations, 20 experts who have had hospice experience for more than 3 years(mean is 9 years and 5 months) and officials or members of 3 non-government hospice organizations. There are 61 hospices in Korea. Even though hospice personnel have tried to study and to provide qualified hospice serices, there is nor any formal hospice linkage or network in Korea. This is the result of this survey made to clarify the situation of Korean hospice. Results of the study by Delphi Technique were as follows: 1.Hospice Resources: Key hospice personnel were found to be hospice coordinator, doctor, nurse, clergy, social worker, volunteers. Necessary qualifications for all personnel was that they conditions were resulted as have good health, receive hospice education and have communication skills. Education for hospice personnel is divided into (i)basic training and (ii)special education, e.g. palliative medicine course for hospice specialist or palliative care course in master degree for hospice nurse specialist. Hospice facilities could be developed by adding a living room, a space for family members, a prayer room, a church, an interview room, a kitchen, a dining room, a bath facility, a hall for music, art or work therapy, volunteers' room, garden, etc. to hospital facilities. 2.Hospice Organization: Whilst there are three non-government hospice organizations active at present, in the near future an hospice officer in the Health&Welfare Ministry plus a government Hospice body are necessary. However a non-government council to further integrate hospice development is also strongly recommended. 3.Hospice Finances: A New insurance standards, I.e. the charge for hospice care services, public information and tax reduction for donations were found suggested as methods to rise the hospice budget. 4.Hospice Management: Two divisions of hospice management/care were considered to be necessary in future. The role of the hospice officer in the Health & Welfare Ministry would be quality control of hospice teams and facilities involved/associated with hospice insurance standards. New non-government integrating councils role supporting the development of hospice care, not insurance covered. 5.Hospice delivery: Linkage&networking between hospice facilities and first, second, third level medical institutions are needed in order to provide varied and continous hospice care. Hospice Acts need to be established within the limits of medical law with regards to standards for professional staff members, educational programs, etc. The results of this study could be utilizes towards the development to two hospice care delivery system models, A and B. Model A is based on the hospital, especially the hospice unit, because in this setting is more easily available the new medical insurance for hospice care. Therefore a hospice team is organized in the hospital and may operate in the hospice unit and in the home hospice care service. After Model A is set up and operating, Model B will be the next stage, in which medical insurance cover will be extended to home hospice care service. This model(B) is also based on the hospital, but the focus of the hospital hospice unit will be moved to home hospice care which is connected by local physicians, national public health centers, community parties as like churches or volunteer groups. Model B will contribute to the care of terminally ill patients and their family members and also assist hospital administrators in cost-effectiveness.

  • PDF

2차원 바코드를 이용한 오디오 워터마킹 알고리즘 (A digital Audio Watermarking Algorithm using 2D Barcode)

  • 배경율
    • 지능정보연구
    • /
    • 제17권2호
    • /
    • pp.97-107
    • /
    • 2011
  • 본 논문에서는 2차원 바코드를 이용한 오디오 워터마킹 알고리즘을 제안하였다. 삽입되는 워터마크 정보로는 2차원 바코드인 QR 코드를 변형하여 이용하였다. 2차원 바코드가 1차원 바코드에 비하여 많은 정보를 표현할 수 있고, 코드자체가 에러 보정능력을 내재하고 있는 장점을 이용하여 워터마킹 알고리즘의 견고성을 높였다. 또한 부분적인 워터마크 정보의 손실에 대응하기 위하여 직교코드를 이용하여 삽입대역을 확산했으며, 삽입강도 0.7에서 50dB 이상의 우수한 품질을 확보할 수 있었다.

시장분석 및 영업관리 역량 강화를 위한 통신사의 GIS 적용 사례 (GIS-based Market Analysis and Sales Management System : The Case of a Telecommunication Company)

  • 장남식
    • 지능정보연구
    • /
    • 제17권2호
    • /
    • pp.61-75
    • /
    • 2011
  • 시설물이나 토지, 도로, 방재 등 다방면에서 GIS의 효과성이 입증됨에 따라 최근 들어 상권이나 고객, 영업 관리 등에 GIS를 도입하여 시장분석 및 영업관리 역량을 강화하려는 민간 기업들이 증가하고 있다. 본 사례 연구에서는 날로 치열해지고 있는 통신시장의 경쟁환경 속에서 K사가 정교한 상권 및 고객 분석 역량을 확보하기 위해 GIS 영업정보 시스템을 구축 한 전 과정과 영업현장에서의 시스템 활용방안 등을 살펴보았다. 전사적으로 시스템을 오픈한 후 지사들로부터의 반응은 담당 관할구역에 대한 경쟁상황 파악 및 일/월 추세조회가 용이해 졌고, 왜곡되지 않은 실제 데이터를 제공받아 제한된 시간 내에 정확한 타겟 고객 선정이 가능해졌으며, 동별 시설분포와 같은 시설물 관련정보를 영업활동에 활용할 수 있어 매우 효과적이었다는 등이 주를 이루었다. 이와 같은 과정과 결과를 정리함으로써 향후 GIS 영업정보시스템 구축을 고려하고 있는 타 조직이나 기업들에게 의미 있는 가이드라인을 제시할 수 있기를 기대한다.

해방 이후 우리나라 산업보건관리에 관한 문헌분류 및 연구동향 (Trends of Study and Classification of Reference on Occupational Health Management in Korea after Liberation)

  • 하은희;박혜숙;김영복;송현종
    • Journal of Preventive Medicine and Public Health
    • /
    • 제28권4호
    • /
    • pp.809-844
    • /
    • 1995
  • 산업보건관리영역의 범위를 정하고 이를 분류하기 위해 우선적으로 저자들이 정의한 산업보건관리영역의 범위에 따라 분류하고 이에 대하여 설문조사를 실시한 후 의견수렴과정을 거쳐 재분류하였다. 이를 토대로 해방 이후 우리나라의 산업보건관리문헌을 분류하여 연구동향을 파악하고자 정기간행물기사색인에 수록된 21종의 문헌을 분석하였으며 산업보건관리내용에 대한 우선순위 및 향후 산업보건관리 연구 방향을 조명함으로써 앞으로 산업보건관리의 방향설정에 대한 기초자료를 제공하고자 하였으며 다음과 같은 결과를 얻었다. 1 대부분의 응답자들이 산업보건을 전공하고(71.6%) 있었고, 대학에서 근무하고 있었으며(68.3%), 남자가 많았고 연령은 40세 이상이었다. 산업보건관리영역의 분류에 대찬 의견으로는 분류가 필요하다는 찬성의견이 70.0%였고 반대의견은 100.0%였다. 2. 응답자들의 의견수렴을 거쳐 재분류한 산업보건 관리영역을 크게 산업보건사법과 산업보건사업을 지지해 주는 산업보건관리체계 및 이를 평가하는데 도움을 주는 여러 가지 방법론들로 구분하였다. 3. 산업보건관리 문헌 총 510편을 연도별로 살펴본 결과 연도별로 서서히 증가하다가 1986년 이후에 급격 히 증가하고 있었으며, 학술지별 분포는 대한산업의학회지(18.2%), 한국의 산업의학(15.1%), 예방의학회지(15.1%) 순으로 나타났다. 연구 내용별로는 산업보건관리체계에 대한 연구는 33편(6.5%)에 지나지 않았으며 산업보건사업에 대한 연구가 477편(93.5%)으로 주를 이루고 있었다. 산업보건관리체계에 대한 연구는 산업보건자원체계에 대한 연구가 15편(45.5%), 산업보건재원조달체계 8편(24.2%), 산업보건관리운영체계 6편(18.2%), 산업보건조직체계 3편(9.1%), 산업보건서비스전달체계 1편 (3.0%)의 순이었으며 산업보건사업에 대한 연구는 질병관리 269편(57.2%),보건관리 116편(24.7%),작업환경관리 85편(18.1%)으로 질병관리에 관한 연구가 가장 많았다. 연구대상별로는 일반근로자 대상이 185편(71.1%)으로 가장 많았으며 여성근로자, 전문직, 서비스근로자 순이었다. 4. 산업보건관리내용의 우선순위에 대한 의견으로는 산업장근로자들에 대한 건강관리, 작업환경관리, 보건교육 등의 산업보건사업이 가장 필요하다고 하였고 다음으로는 산업보건인력에 대한 교육훈련 및 직무내용, 성인병 및 직업병 의뢰체계, 산업보건조직 등에 관한 산업보건의료체계에 관한 분석 등을 순위로 제시하였다. 5. 산업보건관리영역의 향후 연구방향에 대하여 병의 응답자가 48건의 의견을 제시하였으며 산업보건사업에 관한 실제적인 연구가 31.3%로 가장 많았으나 조직, 체계에 대한 연구(27.1%), 정보망구축에 관한 연구(8.3%) 등 산업보건체계에 관한 연구도 필요하다고 하였다. 건강진단에 대한 비용-편익분석 (10.4%), 산업보건사업평가(4.2%), 유해물질폭로평가(2.1%), 노동조건에 관한 연구(6.2%)등 다양한 새로운 분야의 연구에 대한 의견을 제시하였다. 본 연구에서 해방 이후 우리나라의 산업보건관리에 관한 연구는 1945년부터 서서히 증가하다가 1986년 이후부터 활발히 진행되어졌고, 대부분의 연구가 산업보건사업에 치중되어 있으며 산업보건관리체계에 대한 연구는 미약함을 알 수 있었다 산업보건사업에 관한 연구의 대부분도 직업병 실태와 건강관련행태 및 실태를 파악하는 수준에 머무르고 있으며 산업보건관리체계의 경우도 대부분 인력의 실태 파악에 그치고 있어 산업장에서 실제로 활용할 수 있는 연구가 절실히 필요하다고 여겨진다. 따라서 우리나라의 현실에 비추어볼 때 산업보건사업에 관한 연구는 계속적으로 활발히 이루어져야 하며, 이와 더불어 산업보건관리체계 및 근로자참여, 경제성분석, 보건사업 후 평가, 연구방법론(역학연구)등의 연구들도 산업보건관리의 중요한 부분으로서 향후 보다 더 적극적으로 연구되어져야 할 것이다.

  • PDF

소방에서의 도상훈련 기초자료 영상화작업 매뉴얼 개발 (Development of Video Work Manual for Rock-Drill Data In Fire Service)

  • 조재관;박희진;황인;권혜란
    • 한국응급구조학회지
    • /
    • 제6권1호
    • /
    • pp.103-128
    • /
    • 2002
  • As a result of trying the various manufacturing methods considering the reality of manpower and equipments with this manual, the following standardized procedures and contents can be suggested. (1) Since tools presenting Rock-Drill data must formalize the order of explanation although explainers are different, it will be valid that it is configured by existing power point method rather than by web document type. Composition of contents are selected on the basis of defence card and survey and then 8 items including initial screen, peripheral conditions, mobilization route, general conditions, use and structure by floor, department of vehicle consideration in activities and end screen are included. (2) Making methods and cautions of data included and used in power point are as follows ; - It was most effective that objects of fire fighting and location of neighboring fire fighting water were expressed by electronic map and drawing of inner building was made by scanning it after paining general architecture drawing(plan by each floor) rather than using drawing tools of EXCEL program or CAD drawing. And it was helpful to simplify contents of architecture drawing to wall, stairs and gate in understanding them. - Photographing of video data should be taken to show available fire fighting facilities in fire, use of planned space and the whole inner structure of each floor from the inside of fire fighting buildings and to display play time between 10 sec. and 1 min, for obstacles to distance from adjacent buildings or passage of special vehicles and fire fighting water from the outside of the building. - File format of video data taken in this way is most suitable to use wmv(window media video) or asf(advanced streaming format) type in consideration of time required for export, screen quality, file capacity and play type in Rock-Drill through network. - Still screen(photo) is more effective to express the department of fire fighting vehicles or other equipments than using video. (3) In configuration work of power point, hyper link was used most and configured to see any part at any situation like web document and then uniformity of presentation order of power point was complemented. (4) In case of sales facilities with the area of $35.557m^2$, the time of 22 hours and 30 minutes for five days was taken with five persons. Therefore, when eight-hour works a day were calculated, the whole process of video work for Rock-Drill can be finished with three day works.

  • PDF

B to C EC에서의 제품유형별 구매요인 (A Study on the Purchase Factor with Goods Type in the B to C EC)

  • 백탁선;최흥섭
    • 통상정보연구
    • /
    • 제1권2호
    • /
    • pp.145-165
    • /
    • 1999
  • 본 연구는 B to EC에서의 쇼핑시 나타나는 소비자의 구매행태를 Physical Goods(물리적 상)와 Digital Goods(디지털 상품)로 구분하여 구매결정 및 지연 요인을 실증분석하여 B to C EC가 활성화될 수 있도록 도모함을 목적으로 한다. 연구의 결과를 종합하면 다음과 같다. 첫째로, B to C EC에서의 구매를 결정하는 요인과 구매를 지연(기피)하는 요인 다섯가지 중 제1순위 요인과 구매한 제품유형과의 교차분석 결과, 어떠한 제품유형을 구매하느냐에 따라 구매결정 요인이 달라짐을 알 수 있었다. 둘째로는, 성별, 연령별, 학력별, 직업별 등 인구통계적 특성에 따라 B to C EC에서의 행동에 차이가 나타났으며, 이는 Cyber-marketing을 구축하는데 시장세분화 전략에 중요한 시사점을 주고 있다. 이와 같은 연구결과는 Cyber-marketing을 촉진시키기 위해서 상품서비스의 개선전략과 고객 시장세분화전략 수립에 적지 않은 도움을 줄 수 있을 것이다. 상품서비스 개선 전략의 측면에서는 상품서비스의 신뢰성을 높이는 기능적 측면 즉 성능, 기술, 품질 등에 대해서 보다 많은 관심을 기울여야 할 것이다. 또한, 인구통계적 특성에 따라 쇼핑행동상에 있어서 많은 차이를 보이고 있으므로 이에 대한 적절한 대응책을 마련해야 할 것이다.

  • PDF

장애인부모 동료상담사의 현장상담 활동경험에 관한 질적 사례연구 (A Case Study on Parents Peer Counselor's for the Disabled Experiences in Field Counseling)

  • 최하나;정종화;김은재
    • 재활복지
    • /
    • 제22권2호
    • /
    • pp.127-159
    • /
    • 2018
  • 본 연구의 목적은 장애인상담현장의 장애인부모동료상담서비스 활성화를 위한 제도개선 방안 및 시스템구축을 위한 기초자료를 제시하기 위하여 장애인부모 동료상담사들의 현장상담경험을 Yin (2009)의 질적 사례연구방법을 활용하여 수행하였다. 이를 위하여 장애인부모 동료상담사 10명을 대상으로 FGI와 개별심층면담을 실시하여 자료를 수집하고 분석했다. 연구결과, 총 87개의 압축개념, 17개의 핵심범주를 도출하였는데 장애인부모동료상담 참여 동기 및 상담효과는 "동병상련의 마음으로 두드림", "조명 받지 못하던 존재에서 희망을 주는 존재로의 전환", "장애인부모들이 만드는 또 다른 사회보험이자 사회안전망" 등으로 나타났다. 장애인부모동료상담활성화 장애요인은 "상담현장의 입지확보 및 위상정립의 문제", "홍보부족으로 인지도가 낮아 내담자 발굴이 어려움" 등으로 나타났으며, 장애인부모동료상담 활성화를 위한 전략은 "현장의 입지확보와 전문가로써의 위상 재정립", "정부의 정책적인 보완과 지원이 필요함", "정규직 전환으로 일자리 창출을 기대함"이 제시되었다.

물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석 (Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security)

  • 팜옥손;공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.179-187
    • /
    • 2014
  • 언더레이 프로토콜은 2차 시스템이나 인지된 사용자가 1차 사용자의 품질 저하 없이 동일한 주파수를 사용하는 인지 기술이다. 또한, 무선 환경의 중계 특성으로 인해, 몇몇 노드는 도청 노드라고 불리며, 다른 통신 링크를 위한 정보를 수신한다. 이러한 이유로, 물리 계층의 보안은 도청의 발생을 막기 위해 보안 성취율을 고려하여 응용된다. 본 논문에서는, 물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능을 협력 통신 노드를 이용하여 분석한다. 이 모델에서, 중계기는 송신단에서 수신단으로의 신호 전송을 돕기 위해 증폭 후 전송 기법을 사용한다. 우수한 중계기는 기회주의적 중계기 선택 기법으로 선정되며, 단 대 단 보안 성취율을 기초로 한다. 시스템 성능은 보안 성취율의 정전 확률로 평가된다. 정전 확률의 상향, 하향 한계는 국제 통계 채널 상태 정보(CSI)에 기초하며, 또한, 닫힌계로 유도한다. 시뮬레이션 결과는 인지 네트워크는 1차 사용자로부터 충분히 멀 때, 중계기에서 도청 노드까지의 거리가 중계기에서 수신단까지의 거리보다 큰 경우 시스템 성능이 향상된 것을 보여준다.

A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support

  • Chung, Jong-Moon;Kim, Chang Hyun;Lee, Daeyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.618-633
    • /
    • 2014
  • Relay technology is becoming more important for mobile communications and wireless internet of things (IoT) networking because of the extended access network coverage range and reliable quality of service (QoS) it can provide at low power consumption levels. Existing mobile multihop relay (MMR) technology uses fixed-point stationary relay stations (RSs) and a divided time-frame (or frequency-band) to support the relay operation. This approach has limitations when a local fixed-point stationary RS does not exist. In addition, since the time-frame (or frequency-band) channel resources are pre-divided for the relay operation, there is no way to achieve high channel utilization using intelligent opportunistic techniques. In this paper, a different approach is considered, where the use of mobile/IoT devices as RSs is considered. In applications that use mobile/IoT devices as relay systems, due to the very limited battery energy of a mobile/IoT device and unequal channel conditions to and from the RS, both minimum energy consumption and QoS support must be considered simultaneously in the selection and configuration of RSs. Therefore, in this paper, a mobile RS is selected and configured with the objective of minimizing power consumption while satisfying end-to-end data rate and bit error rate (BER) requirements. For the RS, both downlink (DL) to the destination system (DS) (i.e., IoT device or user equipment (UE)) and uplink (UL) to the base station (BS) need to be adaptively configured (using adaptive modulation and power control) to minimize power consumption while satisfying the end-to-end QoS constraints. This paper proposes a minimum transmission power consuming RS selection and configuration (MPRSC) scheme, where the RS uses cognitive radio (CR) sub-channels when communicating with the DS, and therefore the scheme is named MPRSC-CR. The proposed MPRSC-CR scheme is activated when a DS moves out of the BS's QoS supportive coverage range. In this case, data transmissions between the RS and BS use the assigned primary channel that the DS had been using, and data transmissions between the RS and DS use CR sub-channels. The simulation results demonstrate that the proposed MPRSC-CR scheme extends the coverage range of the BS and minimizes the power consumption of the RS through optimal selection and configuration of a RS.