• 제목/요약/키워드: mobile computing

검색결과 1,908건 처리시간 0.027초

모바일 클라우드 컴퓨팅 서비스를 위한 위성영상 병렬 정보처리 성능 예비실험 (Preliminary Performance Testing of Geo-spatial Image Parallel Processing in the Mobile Cloud Computing Service)

  • 강상구;이기원;김용승
    • 대한원격탐사학회지
    • /
    • 제28권4호
    • /
    • pp.467-475
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 경제성, 확장성, 보안성, 공유성, 접근성 등에서 특장점이 있기 때문에 단순한 사무용 시스템에서 전문적 과학정보처리까지 여러 분야에서 활용되고 있다. 그러나 공간정보 분야, 특히 원격탐사 분야에서는 연구나 기술 개발 단계가 아직 초기 수준이다. 이번 연구에서는 기존 연구에서 구축한 스마트폰 위성영상 정보처리 시스템을 아마존 웹 서비스와 연계된 모바일 클라우드 컴퓨팅 환경으로 이동하고 연산 성능 향상을 위해 병렬처리 프로그래밍 기법을 적용하였다. 앞으로 모바일 클라우드 컴퓨팅 서비스에 대한 산업적 수요와 관련 기술개발 사례가 증가할 것이므로 이 연구에서는 주로 영상처리 기능에 대한 성능 측정 실험을 우선적으로 수행하였다. 모바일 클라우드 컴퓨팅 환경의 운영이나 서비스 방식이 다양한 데, 이번 연구에서 적용된 실험 조건에서는 클라우드 서버가 단일 서버 방식에 비하여 성능이 우수한 것으로 나타났다. 이 연구는 모바일 클라우드를 위성영상정보처리와 연계하기 위한 예비 연구이다.

모바일 클라우드 컴퓨팅을 위한 예측 기반 동적 컴포넌트 오프로딩 프레임워크 (A Prediction-based Dynamic Component Offloading Framework for Mobile Cloud Computing)

  • 박진철;김수동
    • 정보과학회 논문지
    • /
    • 제45권2호
    • /
    • pp.141-149
    • /
    • 2018
  • 모바일 디바이스의 보편적인 보급으로 인하여 모바일 컴퓨팅은 사용자들의 일상 생활에 편리를 가져다 주는 컴퓨팅 패러다임으로 되었다. 다양한 타입의 모바일 애플리케이션의 출현으로 인하여 사용자들은 언제 어디서나 자신의 스케줄 관리 등 다양한 업무 수행이 가능해졌지만 모바일 디바이스의 리소스 제한적인 문제로 인하여 일정 수준의 컴퓨팅 작업만 수행 가능하고 비교적 큰 컴퓨팅 작업을 수행하기에는 불편한 점이 존재한다. 클라우드 컴퓨팅 연구에서는 제한된 모바일 디바이스의 자원을 해결하기 위하여 기능 컴포넌트를 다른 서버 노드로 오프로딩(Offloading) 시킴으로써, 모바일 노드의 자원 문제를 해결하는 솔루션을 제공하였다. 그러나, 현재 진행되고 있는 동적 오프로딩 기법에 관한 연구는 개념적인 수준의 기법만 제시되고 있다. 본 논문에서는 모바일 노드의 성능을 보장하기 위한 예측 기반 동적 오프로딩 기법 및 프레임워크 설계 모델을 제안한다. 그리고 제안한 예측 기반 오프로딩 기법의 유효성 검증을 위한 실험 및 평가를 수행한다.

모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인 (Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services)

  • 노미진;김병곤;박순창
    • Journal of Information Technology Applications and Management
    • /
    • 제18권1호
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

부하 분산을 적용한 효율적인 Domain FA 관리 기법 (An Effective Management Technique of Domain FA using Load Balancing in Mobile Computing Environment)

  • 김용철;김윤정;정민교;이웅재
    • 인터넷정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.25-32
    • /
    • 2004
  • 이동 컴퓨팅 환경이란 사용자가 어떤 장소로 이동하더라도 동일한 환경에서 네트워크 서비스를 지속적으로 끊임없이 제공받을 수 있는 환경을 말하며, Mobile IP는 이러한 환경이 가지는 특성들을 고려한 네트워크 표준 프로토콜이다. 하지만 이 프로토콜도 이동 노드의 빈번한 핸드오프 시 위치 등록 절차에서 반드시 흠 에이전트 (Home Agent, HA)를 접근해야 하므로 네트워크 자원과 서비스 지연을 초래하는 단점을 가진다. 따라서 본 논문에서는 지역적 외부 에이전트 (Foreign Agent, FA) 기법을 도입하여 방문 도메인에서의 등록을 지역화 하여 이동 노드의 빈번한 핸드오프 시 위치 등록 절차에 대한 지연 부하를 최소화 하는 방안을 제안한다. 또한 부하 분산 요소를 부가하여, 모든 FA가 상황에 따라 동적으로 루트 권한 FA가 될 수 있는 기법을 도입하여 중앙으로만 집중되는 위치 등록 메시지를 지역적 FA에 분산하여 네트워크 자원 낭비를 줄이고 빠른 위치 등록 응답 시간을 얻을 수 있으며 기존 Mobile IP에서의 패킷 지연 및 손실 그리고 재전송을 예방하고자 한다.

  • PDF

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

이동 서비스를 위한 터널링 기법의 구현과 성능분석 (Implementation and Analysis of Tunneling Method for Mobile Service)

  • 천정훈;정진우강현국
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

Characterization Studies on Data Access Bias in Mobile Platforms

  • Bahn, Hyokyung
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.52-58
    • /
    • 2021
  • Data access bias can be observed in various types of computing systems. In this paper, we characterize the data access bias in modern mobile computing platforms. In particular, we focus on the access bias of data observed at three different subsystems based on our experiences. First, we show the access bias of file data in mobile platforms. Second, we show the access bias of memory data in mobile platforms. Third, we show the access bias of web data and web servers. We expect that the characterization study in this paper will be helpful in the efficient management of mobile computing systems.

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

User Mobility Model Based Computation Offloading Decision for Mobile Cloud

  • Lee, Kilho;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • 제9권3호
    • /
    • pp.155-162
    • /
    • 2015
  • The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are becoming more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as a desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to choose good offloading decisions in mobile environments. In general, users' mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision-making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation results show that the proposed technique can help boost the performance of mobile devices in terms of response time and energy consumption, when users are highly mobile.

An Efficient Mutual Exclusion Protocol in a Mobile Computing Environment

  • Park, Sung-Hoon
    • International Journal of Contents
    • /
    • 제2권4호
    • /
    • pp.25-30
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF