• Title/Summary/Keyword: Smart Mobile Devices

Search Result 798, Processing Time 0.026 seconds

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices (저전력 모바일 장치에 적합한 효율적인 동적 그룹 키 동의)

  • Cho Seokhyang;Nam Junghyun;Kim Seungjoo;Won Dongho;Lee Hyejoo;Choi Jinsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.157-168
    • /
    • 2005
  • Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.

Analysis on Constitutes and Contents of Mobile Application for Reading (독서용 모바일 애플리케이션 구성과 내용 분석)

  • Lim, Seong-Gwan
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.1
    • /
    • pp.397-421
    • /
    • 2017
  • The utilization and integration of different reading technologies has increased exponentially in recent years with no limits in the foreseeable future. This is no surprise, as the versatility of new technology devices makes information accessible at any minute of any day anywhere in the world. The possible reading uses for such devices are immeasurable, and have already seen widespread usage by readers all over the country. While these statements are more or less obvious, more research must be conducted to discover which means are the most effective and why. This study aims to provide a basic framework for analyzing the organization and quality of mobile application devices for reading comprehension purposes. The study also hopes to highlight and/or clarify more effective reading means with differing technologies.

Smartphone-based structural crack detection using pruned fully convolutional networks and edge computing

  • Ye, X.W.;Li, Z.X.;Jin, T.
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.141-151
    • /
    • 2022
  • In recent years, the industry and research communities have focused on developing autonomous crack inspection approaches, which mainly include image acquisition and crack detection. In these approaches, mobile devices such as cameras, drones or smartphones are utilized as sensing platforms to acquire structural images, and the deep learning (DL)-based methods are being developed as important crack detection approaches. However, the process of image acquisition and collection is time-consuming, which delays the inspection. Also, the present mobile devices such as smartphones can be not only a sensing platform but also a computing platform that can be embedded with deep neural networks (DNNs) to conduct on-site crack detection. Due to the limited computing resources of mobile devices, the size of the DNNs should be reduced to improve the computational efficiency. In this study, an architecture called pruned crack recognition network (PCR-Net) was developed for the detection of structural cracks. A dataset containing 11000 images was established based on the raw images from bridge inspections. A pruning method was introduced to reduce the size of the base architecture for the optimization of the model size. Comparative studies were conducted with image processing techniques (IPTs) and other DNNs for the evaluation of the performance of the proposed PCR-Net. Furthermore, a modularly designed framework that integrated the PCR-Net was developed to realize a DL-based crack detection application for smartphones. Finally, on-site crack detection experiments were carried out to validate the performance of the developed system of smartphone-based detection of structural cracks.

A Case Study on Strategic Shift from Smart-Work to Work-Smart of Company K

  • Kang, Yong-Sik;Kwon, Sun-Dong;Woo, Su-Han
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.55-66
    • /
    • 2018
  • Early smart-work of company K was a technology-led way of applying ICT such as smart phones and mobile devices to business. After company K perceived the limitations of ICT-driven smart work, it propelled the work-smart, doing a work smart toward the way that human beings become central and a creative organizational culture is engendered. Company K propelled work-smart strategy in eight categories: simplification of data requirements, establishment efficient meeting culture, streamlining reporting and approval process, simplified document creation, overtime decrease, spreading flexible work system, settlement of healing leave, creating work-smart place. Company K set up an organizational culture secretariat dedicated to work-smart promotion and selected task priorities in consideration of urgency and effectiveness. Owing to such efforts, the company K's work-smart index rose sharply to 72 points this year from 56 points in the previous year. At the organizational culture survey, employees responded that organizational culture improved in all area. For a better future, company K analyzed its work-smart outcomes and planned progressively to improve its work-smart efforts based on employees opinions. This case study will serve as a guideline, for companies to make efforts to going forward to today work-smart beyond yesterday smart-work.

Study On the Development of Convenience Evaluation Tool for Mobile VR Device (모바일 VR 디바이스의 사용편의성 평가도구 개발에 관한 연구)

  • Seo, Ji-Young;Jang, Joong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.11
    • /
    • pp.221-228
    • /
    • 2021
  • This study was conducted to improve the convenience of design of mobile VR devices use in a way binds smart phones. Research on traditional mobile VR devices is insufficient. So the first survey was conducted on users 100 to understand the current status and status of mobile VR devices. As a result, it was found that the satisfaction with the convenience of use was significantly lowered, and countermeasures were needed. Then, a second survey of 30 Heavy Users was conducted to find out specific usability and problems of mobile VR devices. Through this, problems, ease of use, and other opinions of mobile VR devices were found. The survey results were analyzed through the Descriptive Statistics Act, and it was found that improvement was urgent due to low satisfaction with wearing and network. In-depth interviews were conducted with the same respondents. As with the problems derived first, problems such as wearing satisfaction, excessive head weight for long-term use, and lack of content could be found. Based on the previous studies, the focus group interview consisting of 6 experts derived the ease of use evaluation element. It consists of elements that can satisfy the convenience of use of mobile VR devices for creation, wearing satisfaction, network, morphology, learning, and spatiality, and has a total of 26. Using this evaluation elements, it is intended to provide better ease of use to users who will use the mobile VR device.

A Recommender System for Device Sharing Based on Context-Aware and Personalization

  • Park, Jong-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.174-190
    • /
    • 2010
  • In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service which is composed of customized devices among sharable devices in a ubiquitous smart space (which is called USS in this paper). However, the situations of each user are different and user preferences also are various. Although users request the same service in the same USS, the most suitable devices for composing the service are different for each user. For these user requirements, this paper proposes a device recommender system which infers and recommends customized devices for composing a user required service. The objective of this paper is the development of the systems for recommending devices through context-aware inference in peer-to-peer environments. For this goal, this paper considers the context and user preference. Also I implement a prototype system and test performance on the real ubiquitous mobile object (UMO).

A Study on the Cooling Block Design for a Large Touch Screen Panel (TSP) Cover Glass Molding System (대형 Touch Screen Panel(TSP) 덮개유리 성형기의 냉각 블록 설계에 관한 연구)

  • Lee, Jun Kyoung
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.19 no.6
    • /
    • pp.36-42
    • /
    • 2020
  • Nowadays, the touch screen panel (TSP) cover glass for mobile smart devices is being developed with a curved glass shape due to different design requirements. Because the sizes of mobile smart devices continue to increase, there has also been a great increase in the demand for large-area curved glass greater than 20 inches. In this study, heat and fluid flow analysis using CFD was performed to optimize the heating surface temperature distribution of the large curved glass formation system. Five cooling water flow paths in the cooling block were designed and analyzed for each case. A function that can quantitatively calculate the temperature uniformity of the heating surface was proposed and these values were obtained for the five models. The temperature distributions of the heating surface and the energy consumption of the heating system were also compared and comprehensively analyzed. Based on the analysis results of the five different cooling channel path models, the optimal path design could be presented.

A Survey on the Mobile Crowdsensing System life cycle: Task Allocation, Data Collection, and Data Aggregation

  • Xia Zhuoyue;Azween Abdullah;S.H. Kok
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.31-48
    • /
    • 2023
  • The popularization of smart devices and subsequent optimization of their sensing capacity has resulted in a novel mobile crowdsensing (MCS) pattern, which employs smart devices as sensing nodes by recruiting users to develop a sensing network for multiple-task performance. This technique has garnered much scholarly interest in terms of sensing range, cost, and integration. The MCS is prevalent in various fields, including environmental monitoring, noise monitoring, and road monitoring. A complete MCS life cycle entails task allocation, data collection, and data aggregation. Regardless, specific drawbacks remain unresolved in this study despite extensive research on this life cycle. This article mainly summarizes single-task, multi-task allocation, and space-time multi-task allocation at the task allocation stage. Meanwhile, the quality, safety, and efficiency of data collection are discussed at the data collection stage. Edge computing, which provides a novel development idea to derive data from the MCS system, is also highlighted. Furthermore, data aggregation security and quality are summarized at the data aggregation stage. The novel development of multi-modal data aggregation is also outlined following the diversity of data obtained from MCS. Overall, this article summarizes the three aspects of the MCS life cycle, analyzes the issues underlying this study, and offers developmental directions for future scholars' reference.

Vulnerability Countermeasures for Information Security in Smart Work Services (스마트워크 서비스에서 정보보호를 위한 취약성 대응 방안)

  • Kim, Ji Seog;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.69-81
    • /
    • 2017
  • Smart work refers to enhancing the efficiency of work by utilizing smart devices. Smart work improves business productivity by improving business productivity of companies, reducing costs, but there is a threat to various information protection. To operate telecommuting, mobile office, and smart work center, hardware and software are needed to support various network resources, servers, and platforms. As a result, there are many vulnerabilities to security and information protection that protect information resources. In this paper, we analyze the smart work environment for smart work service and analyze vulnerability for smart work information protection through analysis of IOS27001 and KISA-ISMS. We have developed requirements for information protection requirements for users and service providers. We have developed a solution for information security protection for smart work environments such as common parts, mobile office, telecommuting, and smart work center for security threats and weaknesses per smart work type.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.