• Title/Summary/Keyword: mobile storage

Search Result 477, Processing Time 0.02 seconds

A Mobile Flash File System - MJFFS (모바일 플래시 파일 시스템 - MJFFS)

  • 김영관;박현주
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.29-43
    • /
    • 2004
  • As the development of an information technique, gradually, mobile device is going to be miniaturized and operates at high speed. By such the requirements, the devices using a flash memory as a storage media are increasing. The flash memory consumes low power, is a small size, and has a fast access time like the main memory. But the flash memory must erase for recording and the erase cycle is limited. JFFS is a representative filesystem which reflects the characteristics of the flash memory. JFFS to be consisted of LSF structure, writes new data to the flash memory in sequential, which is not related to a file size. Mounting a filesystem or an error recovery is achieved through the sequential approach. Therefore, the mounting delay time is happened according to the file system size. This paper proposes a MJFFS to use a multi-checkpoint information to manage a mass flash file system efficiently. A MJFFS, which improves JFFS, divides a flash memory into the block for suitable to the block device, and stores file information of a checkpoint structure at fixed interval. Therefore mounting and error recovery processing reduce efficiently a number of filesystem access by collecting a smaller checkpoint information than capacity of actual files. A MJFFS will be suitable to a mobile device owing to accomplish fast mounting and error recovery using advantage of log foundation filesystem and overcoming defect of JFFS.

  • PDF

An Efficient Data Transmission to Cloud Storage using USB Hijacking (USB 하이재킹을 이용한 클라우드 스토리지로의 효율적인 데이터 전송 기법)

  • Eom, Hyun-Chul;No, Jae-Chun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.47-55
    • /
    • 2011
  • The performance of data transmission from mobile devices to cloud storages is limited by the amount of data being transferred, communication speed and battery consumption of mobile devices. Especially, when the large-scale data communication takes place using mobile devices, such as smart phones, the performance turbulence and power consumption become an obstacle to establish the reliable communication environment. In this paper, we present an efficient data transmission method using USB Hijacking. In our approach, the synchronization to transfer a large amount of data between mobile devices and user PC is executed by using USB Hijacking. Also, there is no need to concern about data capacity and battery consumption in the data communication. We presented several experimental results to verify the effectiveness and suitability of our approach.

Mobile Energy Efficiency Study using Cloud Computing in LTE (LTE에서 클라우드 컴퓨팅을 이용한 모바일 에너지 효율 연구)

  • Jo, Bokyun;Suh, Doug Young
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.24-30
    • /
    • 2014
  • This study investigates computing offloading effect of cloud in real-time video personal broadcast service, whose server is mobile device. Mobile device does not have enough computing resource for encoding video. The computing burden is offloaded to cloud, which has abundant resources in terms of computing, power, and storage compared to mobile device. By reducing computing burden, computation energy can be saved while transmission data amount increases because of decreasing compression efficiency. This study shows that the optimal operation point can be found adaptively to time-varying LTE communication condition result of tradeoff analysis between offloaded computation burden and increase in amount of transmitted data.

A Container Stacking System for the Mobile Harbor (모바일하버에 적용할 컨테이너 적재 유도 시스템)

  • Kim, In-Su;Kim, Kwang-Hoon;Son, Kwon
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.10
    • /
    • pp.672-678
    • /
    • 2010
  • The purpose of this study is to develop a stacking guidance system (SGS) of containers in the mobile harbor (MH). A mobile harbor is a floating structure especially designed for loading and unloading containers from and to a large container ship. A novel stacking guidance system was proposed for unloading the container in an effective way against possible vibrations of the floating body. The guidance system works as an aid for loading containers with a wider opening for easier stacking of a container into a moving storage cell due to waves. In order to determine the most effective inclination angle of the cell-guide, this study performed the dynamic analysis of the SGS equipped in the MH subject to fluctuations of the sea. The motions of the guidance system and a container loaded were calculated using ADAMS. The simulation results of the contact force between the two rigid bodies showed that a desirable angle of the cell-guide should be around 20 degrees from the vertical. This proposed SGS can considerably reduce the loading and unloading time, and will enhance the performance of the MH.

Application of Mobile GIS for Structure Safety and Management (건축물 안전관리를 위한 Mobile GIS의 적용)

  • Yoo, Hwan-Hee;Kang, Sung-Bong;Lee, Sung-Min;Kang, Teack-Sun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.11 no.2 s.25
    • /
    • pp.3-9
    • /
    • 2003
  • Recent construction industry is going through much change as getting high-quality, high-technology and environment-friendly, and a safety countermeasure is required urgently as construction structures become larger and more complex. But, Safety management was ignored under quantity-oriented construction policy and that has led to large-scale accidents. Recently, interest for safety management and effective construction of safety management system has been enhanced. Therefore, in this study, we constructed safety management system using Mobile GIS for effective building safety management. As the result, we proposed a method which can manage buildings quickly and effectively as performing data accessibility, storage, and analysis directly in the field.

  • PDF

Omni Camera Vision-Based Localization for Mobile Robots Navigation Using Omni-Directional Images (옴니 카메라의 전방향 영상을 이용한 이동 로봇의 위치 인식 시스템)

  • Kim, Jong-Rok;Lim, Mee-Seub;Lim, Joon-Hong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.3
    • /
    • pp.206-210
    • /
    • 2011
  • Vision-based robot localization is challenging due to the vast amount of visual information available, requiring extensive storage and processing time. To deal with these challenges, we propose the use of features extracted from omni-directional panoramic images and present a method for localization of a mobile robot equipped with an omni-directional camera. The core of the proposed scheme may be summarized as follows : First, we utilize an omni-directional camera which can capture instantaneous $360^{\circ}$ panoramic images around a robot. Second, Nodes around the robot are extracted by the correlation coefficients of Circular Horizontal Line between the landmark and the current captured image. Third, the robot position is determined from the locations by the proposed correlation-based landmark image matching. To accelerate computations, we have assigned the node candidates using color information and the correlation values are calculated based on Fast Fourier Transforms. Experiments show that the proposed method is effective in global localization of mobile robots and robust to lighting variations.

The Study on Forensic Techniques of Chromebook (크롬북 포렌식 기법에 관한 연구)

  • Yoon, Yeo-Kyung;Lee, Sang-Jin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.55-70
    • /
    • 2018
  • With the diversification of mobile devices, the development of web technologies, and the popularization of the cloud, an internet-centric web OS that is not dependent on devices has become necessary. Chromebooks are mobile devices in the form of convertible laptops featuring a web OS developed by Google. These Web OS mobile devices have advantages of multi-user characteristics of the same device and storage and sharing of data through internet and cloud, but it is easy to collect and analyze evidence from the forensic point of view because of excellent security and easy destruction of evidence not. In this paper, we propose an evidence collection procedure and an analysis method considering the cloud environment by dividing the Chromebook, which is a web OS mobile device popularized in the future, into user and administrator modes.

Thermally assisted IRSL and VSL measurements of display glass from mobile phones for retrospective dosimetry

  • Discher, Michael;Kim, Hyoungtaek;Lee, Jungil
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.429-436
    • /
    • 2022
  • Investigations of retrospective dosimetry have shown that components of mobile phones are suitable as emergency dosimeters in case of radiological incidents. For physical dosimetry, components can be read out using optically stimulated luminescence (OSL), thermoluminescence (TL) and phototransferred thermoluminescence (PTTL) methods to determine the absorbed dose. This paper deals with a feasibility study of display glass from modern mobile phones that are measured by thermally assisted (Ta) optically stimulated luminescence. Violet (VSL, 405 nm) and infrared (IRSL, 850 nm) LEDs were used for optical stimulation and two protocols (Ta-VSL and Ta-IRSL) were tested. The aim was to systematically investigate the luminescence properties, compare the results to blue stimulated Ta-BSL protocol (458 nm) and to develop a robust measurement protocol for the usage as an emergency dosimeter after an incident with ionizing radiation. First, the native signals were measured to calculate the zero dose signal. Next, the reproducibility and dose response of the luminescence signals were analyzed. Finally, the signal stability was tested after the storage of irradiated samples at room temperature. In general, the developed Ta-IRSL and Ta-VSL protocols indicate usability, however, further research is needed to test the potential of a new protocol for physical retrospective dosimetry.

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges

  • Alqarni, Manal M.;Cherif, Asma;Alkayal, Entisar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.952-973
    • /
    • 2021
  • In recent years, mobile devices have become an essential part of daily life. More and more applications are being supported by mobile devices thanks to edge computing, which represents an emergent architecture that provides computing, storage, and networking capabilities for mobile devices. In edge computing, heavy tasks are offloaded to edge nodes to alleviate the computations on the mobile side. However, offloading computational tasks may incur extra energy consumption and delays due to network congestion and server queues. Therefore, it is necessary to optimize offloading decisions to minimize time, energy, and payment costs. In this article, different offloading models are examined to identify the offloading parameters that need to be optimized. The paper investigates and compares several optimization techniques used to optimize offloading decisions, specifically Swarm Intelligence (SI) models, since they are best suited to the distributed aspect of edge computing. Furthermore, based on the literature review, this study concludes that a Cuckoo Search Algorithm (CSA) in an edge-based architecture is a good solution for balancing energy consumption, time, and cost.

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.