• Title/Summary/Keyword: mobile middleware

Search Result 169, Processing Time 0.027 seconds

The architecture for application repository in Open Mobile Cloud environment (개방형 모바일 클라우드 환경에서의 어플리케이션 리파 지토리 구조)

  • Kim, Seong-Hwan;Park, Yong-Sung;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.237-238
    • /
    • 2012
  • 기존의 기업 응용 프로그램들은 스마트폰의 성능 이상의 처리를 요구하는 데스크탑 환경에서 동작하였고 또한 기업의 시스템들은 스마트폰과의 연동과는 적합하지 않았다. 스마트폰 시장의 폭발적인 성장과 함께 일부 기업 업무처리가 스마트폰으로 이동하는 추세에서 이러한 문제들을 해결하기 위한 모바일 플랫폼으로 온-디멘드 클라우드 리소스를 이용한 개방형 모바일 클라우드(Open Mobile Cloud 이하 OMC) 플랫폼이 제안되었다. 본 논문에서는 OMC 플랫폼에서의 어플리케이션 리파지토리의 역할과 구조를 제안한다. 해당 플랫폼에서 리파지토리로의 요구사항으로는 VApp과 HApp의 버전 관리 및 배포가 있다. 또한 확장성, 독립성, 신뢰성 및 고 가용성의 리파지토리를 만족할 수 있는 구조 연구를 통해 이를 시험적으로 구현한 OMC App Repository를 소개한다. 또한 결론에서는 OMC 플랫폼에서 리파지토리를 이용한 추후 연구에 대해서도 다루고 있다.

The Middleware Extension for guaranteeing the Implementation-Independency between C++ and VHDL (SCA에서 C++/VHDL 구현 독립성을 보장하기 위한 미들웨어의 확장)

  • Bae, Myung-Nam;Lee, Byung-Bog;Park, Ae-Soon;Lee, In-Hwan;Kim, Nae-Soo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.66-77
    • /
    • 2009
  • In this paper, we propose a CORBA middleware extension which is suitable to SCA based communication environment. The extensions guarantee the components to interconnect others without consideration about its implementation way and enables the developers to easily achieve the performance improvements in comparison to the existing methodology. This extension includes the HAO, the IDL2VHDL compiler, and the improvement of ORBit. The HAO is ORB implemented in logic level and is limited the some function according to the characteristic of FPGA. In addition, the IDL2VHDL compiler provides the mapping from CORBA IDL to VHDL, the VHSIC hardware description language, and the additional procedures for processing the component. Finally, the improved ORBit, CORBA ORB on GPP, can be direct connecting with the HAO on FPGA.

Construction of Mobile Collaboration Environment for Ubiquitous Computing and its Application (유비쿼터스 컴퓨팅을 위한 모바일 협업 환경 구축 및 응용)

  • Jeong, Chang-Won;Shin, Chang-Sun;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.25-41
    • /
    • 2008
  • In this paper, we describes a Compact Distributed Object Group Framework(CDOGF) for mobile collaboration service in ubiquitous computing. CDOGF support network connections of sensors and devices, management of mobile computing devices, and grouping of objects for mobile collaboration service according to the logical area. For this, we defined methods for detail functions and interface. And, we classified into four interactions of that sensors and a application, the CDOGF and a application, between the components of the CDOGF, the CDOGF on a mobile device and the DOGF on a server. We also defined mobile collaboration environment by analyzing existing technologies. In this environment we used the TMO scheme for interaction and the TMOSM for distributed middleware. Finally, we implemented u-hospital application that applied this environment. This application collects environment and health information by PDAs in wards. Also, It provides the information service for patient management task.

  • PDF

Design of efficient location system for multiple mobile nodes in the wireless sensor network

  • Kim, Ki-Hyeon;Ha, Bong-Soo;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.81-84
    • /
    • 2005
  • Various design schemes for network using wireless sensor nodes have been widely studied on the several application areas ranging from the real world information collection to environmental monitor. Currently, the schemes are focused on the design of sensor network for low power consumption, power-aware routing protocol, micro miniature operating system and sensor network middleware. The indoor localization system that identifies the location of the distributed nodes in a wireless sensor network requires features dealing with mobility, plurality and other environmental constraints of a sensor node. In this paper, we present an efficient location system to cope with mobility of multiple mobile nodes by designing a location handler that processes location information selectively depending on the nodes' density in a specific region. In order to resolve plurality of multiple mobile nodes, a routing method for the location system is also proposed to avoid the occurrence of overlapped location data.

  • PDF

Stroke based Multilingual Input System for Embedded System (임베디드 시스템에서 필획기반 다국어 입력 시스템)

  • Lee, Jin-Yeong;Hong, Sung-Ryrong;Lee, Si-Jin
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.145-153
    • /
    • 2007
  • Recently, development in information technology is mainly focused on mobile service, and most of mobile users are using various services based on wireless network. So the importance of system software or middleware, which enables such mobile services, is growing bigger and bigger, and one of those is character input/output system. This paper will introduce an alphabet input system, which decomposes a character to a series of strokes, by its formation principal. It is designed to make a person, who knows the character, to input characters in the way that he/she is actually writing down the character.

  • PDF

Implementation of Mobile System based on LBS using Design Pattern (디자인 패턴을 활용한 LBS기반 모바일 시스템 구현)

  • Lee, Hong-Ro;Baek, Jeong-Ho;Mun, Young-Chae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.1
    • /
    • pp.26-35
    • /
    • 2009
  • This paper will propose the efficient method that should be designed to utilize the design pattern of GoF(Gang of Four) for implementation of LBS(Location Based Service) mobile system. The design method proposed by this paper can design and implement system interface using creational patterns, structural patterns and behavioral patterns of design pattern from the user and mobile system viewpoint. The design method using design pattern can show increasing reusability of module and software, abridging the development time, minimizing the maintenance and decreasing the efficiency of memory of system to software development. Therefore, we used a design pattern in order to change the middleware applying geographic information system from mobile environment. Finally, the mobile system applied to design pattern shall contribute to showing high stability and reliability, improving reusability and scalability of module and software and developing efficient LBS mobile system.

  • PDF

Development of Service Guide for Mobile Broadcast Considering Interoperability (호환성을 고려한 모바일 방송용 서비스가이드 개발)

  • Kim, Jun-Hwan;Jang, Sung-Man;Jeong, Shin-Il;Kyung, Il-Soo;Kim, Hyun-Soon
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.676-691
    • /
    • 2009
  • Recently mobile broadcast standards that have IP layer between transport layer and service layer such as DVB-IPDC, OMA-BCAST have been commercialized. Specially, IP abstract layer of OMA-BCAST makes it possible to interface diverse transport layers. Service guide, that is important for user interface, of these mobile broadcast standards has complex structure and heterogeneous schema. ESG schema is not interoperable, therefore terminals should have various implementations of service layer to support more than one service layer at a time. In this paper, not only for enabling interoperability of DVB-IPDC and OMA-BCAST but for supporting basic scenarios of mobile broadcast, simple ESG schema was developed. This new schema can be used as an independent ESG schema, especially for the integrated mobile broadcast middleware environment.

Mobile Device CPU usage based Context-awareness in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 상황인지 기반 모바일 장치 CPU사용)

  • Cho, Kyunghee;Jo, Minho;Jeon, Taewoong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.127-135
    • /
    • 2015
  • Context-aware mobile cloud computing is a new promising paradigm that allows to improve user experience by analyzing contextual information such as user location, time of the day, neighboring devices and current activity. In this paper we provide performance study of context-aware mobile cloud computing system with Volare middleware. Volare monitors the resources and context of the device. and dynamically adapts cloud service requests accordingly, at discovery time or at runtime. This approach allows for more resource-efficient and reliable cloud service discovery, as well as significant cost savings at runtime. We also have studied the performance of context-aware mobile cloud computing for different quality of service (QoS) adaptation policies. Our simulations results show that when battery level is low and CPU usage is high and user cannot maintain the initial QoS, service cost is decreased according to current adaptation policy. In conclusion, the current adaptation policy suggested in this paper may improve user experience by providing a dynamically adapted service cost according to a situation.

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

Forward Migration of an Active Rule Mobile Agent using the Meta_data (메타데이터를 이용한 능동규칙 이동에이전트의 정 방향 이주)

  • Lee, Yon-Sik;Lee, Jun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1567-1574
    • /
    • 2012
  • Since a migration method of the mobile agent is a factor that affects the overall performance of the entire distributed system, it is necessary to find efficient migration methods of the mobile agent within the sensor network and to collect and store data related to various components(server, sink and sensor node) of the sensor network, thereby providing consistent naming services. Accordingly, this paper presents design and implementation of MetaTable that is divided into MetaData where information on the sensor data server is stored and SubMetaData where various types of information on sink nodes and data on sensor nodes connected with the sink nodes is stored. Moreover, the paper also presented the implementation of forward migration of an active rule mobile agent applying the naming method based on RMI that used the meta_table and proposed the possibility of constructing efficient sensor network application environment. In this paper, for registration, release and retrieval methods suitable for new sensor network environment, we designed and implemented the naming agent by applying J2EE model based on RMI-IIOP(Internet Inter-ORB Protocol) technique.