• 제목/요약/키워드: mobile storage

Search Result 475, Processing Time 0.023 seconds

Design of a Linear Ultrasonic Actuator for Small Lens Actuation (초소형 렌즈 구동을 위한 선형 초음파 구동기 설계)

  • Kwon, Tae-Seong;Choi, Yo-Han;Lee, Seung-Yop
    • Transactions of the Society of Information Storage Systems
    • /
    • v.2 no.4
    • /
    • pp.251-256
    • /
    • 2006
  • There is a great demand of micro-actuators for mobile information devices such as SFF optical drives and mobile phone cameras. However, the magnetic coils used in conventional electromagnetic motors are a major obstacle for the miniaturization because of their complicated structures and large power consumption. In this paper, a linear ultrasonic motor to actuate focusing lens of mobile devices is proposed. The new actuator uses a ring type bimorph piezoelectric material, and $d_{31}$ mode is adopted for applying linear motion. The interaction between inertia force and friction force makes linear motion by high-frequency saw signal input. The saw signal gives steady forces on the one direction by asymmetric inclination property of the signal itself on time domain. A commercial FEM(ANSYS) was used in this investigation for simulating structural analysis, identification of dynamic property, such as resultant displacement and coupled analysis with piezoelectric material. To evaluate the performance of the new design, a prototype was manufactured and experiments were carried out. Experimental results show the actuator motion of 5.4 mm/s at 10V saw signal of 41 kHz.

  • PDF

Improvement of Dynamic Characteristics of OIS System using Improved Band Notch and Analysis of Images (노치 대역을 개선한 이미지 흔들림 보정 장치의 동특성 향상과 이미지 분석)

  • Son, Dong-Hun;Park, No-Cheol;Park, Young-Pil;Park, Kyoung-Su
    • Transactions of the Society of Information Storage Systems
    • /
    • v.7 no.2
    • /
    • pp.70-74
    • /
    • 2011
  • The mobile camera module is a device to be inserted in the digital device for camera feature. The mobile camera module is being shaken by vibrations such as handshake during the exposure time. The clarity is compromised by these vibrations, thus the vibration is considered as an external disturbance. Moreover the use of mobile camera module has been being expanded for automotive vibration should be considered. These external disturbances can cause image blurring, thus optical image stabilization should be applied for image compensation. The compensator is fulfilled mechanically by movable lens group or image sensor that adjusts the optical path to the camera movement. Open loop control is useful for well-defined systems like compliant mechanism. Notch filter and lead compensator are designed and applied to improve the stability and bandwidth. The final level of image compensating is confirmed by image processing with MATLAB and CODE V to verify the better performance.

Vector Data Compression Method using K-means Clustering (K평균 군집화를 이용한 벡터 데이터 압축 방법)

  • Lee, Dong-Heon;Chun, Woo-Je;Park, Soo-Hong
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.45-53
    • /
    • 2005
  • Nowadays, using the mobile communication devices, such as a mobile phone, PDA, telematics device, and so forth, are increasing. The large parts of the services with these mobile devices are the position tracking and the route planning. For offering these services, it is increasing the use of the spatial data on the mobile environment. Although the storage of mobile device expands more than before, it still lacks the necessary storage on the spatial data. In this paper, lossy compression technique on the spatial data is suggested, and then it is analyzed the compression ratio and the amount of loss data by the test. Suggested compression technique on the spatial data at this paper is applied to the real-data, and others methods, suggested at the previous studies, is applied to same data. According as the results from both are compared and analyzed, compression technique suggested at this study shows better performance when the compression result is demanded the high position accuracy.

  • PDF

A Study on the Prefetch Method for Multimedia Presentations to play on the Low Bandwidth Mobile Devices (낮은 대역폭을 갖는 이동 단말기에서 멀티미디어 프리젠테이션을 재생하기 위한 프리패치 방법)

  • Hong Maria;Yang Hyuck;Lim Young-Haw
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.65-74
    • /
    • 2003
  • Recently, It is required that multimedia data display on not only PC but also the Mobile device such as cellar phone, PDA. Mobile divieces has not sufficient of storage space or main memory and has slow network speed. So we can't process the multimedia data with the existing way on PC. This paper presents various methods for MultimediaPresentation which are able to display on the mobile device with the low-bandwidth and small storage. There Is an analysis that Is playable on the mobile device using presentation area devision method and replayable analysis method. If the display of multimedia presentation is impossible from this analysis, to apply prefetch techniques a using EPOB apoint and as User QoS of multimedia data through prefetch techniques have keep, do so that playable. Then, it is proposed to playable smooth multimedia presentation as that each of the presentations through prefetch Scheduling techniques point and quantity of data which are prefetch.

  • PDF

End-to-End Resource Management Techniques for Supporting Real-time Tasks in Mobile Devices (모바일 기기의 실시간 작업 지원을 위한 종단간 자원 관리 기술)

  • Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.43-48
    • /
    • 2022
  • With the recent performance improvement of mobile devices as well as the emergence of various applications, not only interactive tasks but also real-time tasks are rapidly increasing. As real-time tasks have deadline requirements, resource management policies used in the conventional time-sharing systems have limitations in satisfying real-time constraints. In this paper, we examine how to efficiently manage resources while satisfying the constraints of real-time tasks through end-to-end resource management of CPU, memory, and storage when interactive and real-time tasks are executed concurrently on a mobile device. Instead of suggesting complicated resource management policies, we focus on examining the basic concepts necessary for each resource management. Specifically, we first look at basic policies such as assigning dedicated CPU cores for real-time tasks, allocating a certain working set of real-time tasks in memory, and using fast storage without context switch in I/O. We then consider how these basic policies can be adopted efficiently.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.

Smart Warehouse Management System Utilizing IoT-based Autonomous Mobile Robot for SME Manufacturing Factory (중소제조기업을 위한 IoT기반의 자율이동모듈을 활용한 스마트 창고관리 시스템 개발)

  • Kim, Jeong-A;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.237-244
    • /
    • 2018
  • The Smart Factory level of manufacturing factories of SMEs now lacks a system for grasping the accurate inventory amount associated with inventory movements in managing warehouses at the basic level. Also, it is difficult to manage accurate materials for loss of data due to worker manual work and production method due to experience. In order to solve this problem, in this paper, automatic acquisition of inventory to minimize manual work to grasp workers' Inventory and improve automation is done. In the smart warehouse management system using the IoT-based autonomous mobile module, the autonomous mobile module acquires the data of the inventory storage while moving through the line. In order to grasp the material of the Inventory storage, The Camera module recognizes the name of the inventory storage. And Then, If output matches, the data measured by the sensor is transferred to the server. This data can be processed, saved in a database, and real-time inventory quantity and location can be grasped in a web-based monitoring environment for administrators. The Real-time Automatic Inventory (RAIC) systems is reduce manual tasks and expect the effects of automated inventory management systems.

Vector Map Simplification Using Poyline Curvature

  • Pham, Ngoc-Giao;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.249-254
    • /
    • 2017
  • Digital vector maps must be compressed effectively for transmission or storage in Web GIS (geographic information system) and mobile GIS applications. This paper presents a polyline compression method that consists of polyline feature-based hybrid simplification and second derivative-based data compression. Experimental results verify that our method has higher simplification and compression efficiency than conventional methods and produces good quality compressed maps.

Secure and Scalable Key Aggregation Scheme for Cloud Storage

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.2
    • /
    • pp.11-18
    • /
    • 2015
  • As the communication technology and mobile devices develop, the need for the efficient and secure remote storage is required. And recently, many companies support cloud storages to meet the requirements of the customers. Especially in the business field where various companies collaborate, data sharing is an essential functionality to enhance their work performance. However, existing researches have not fully satisfied the requirement either efficiency and security. This paper suggests efficient and secure data sharing scheme for cloud storage by using secret sharing scheme. Proposed scheme can be applied to business collaborations and team projects.