• Title/Summary/Keyword: Mobile Cloud Computing Service

Search Result 138, Processing Time 0.027 seconds

Worker-Driven Service Development Tool for Smart Factory

  • Lee, Jin-Heung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.143-150
    • /
    • 2020
  • Recently, many companies are interested in smart factory services. Because various smart factory services are provided by the combination of mobile devices, cloud computing, and IoT services. However, many workers turn away from these systems because most of them are not implemented from the worker's point of view. To solve this, we implemented a development tool that allows field workers to produce their own services so that workers can easily create smart factory services. Manufacturing data is collected in real time from sensors which are connected to manufacturing facilities and stored within smart factory platforms. Implemented development tools can produce services such as monitoring, processing, analysis, and control of manufacturing data in drag-and-drop. The implemented system is effective for small manufacturing companies because of their environment: making various services quickly according to the company's purpose. In addition, it is assumed that this also will help workers' improve operation skills on running smart factories and fostering smart factory capable personnel.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Research on Software Classification System based on an Integrated Software Industry (융합소프트웨어산업에 따른 소프트웨어 분류체계에 관한 연구)

  • Yang, Hyo-Sik;Jeon, In-Oh
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.91-99
    • /
    • 2013
  • While there is the active integration of various industries, a convergence of the software and knowledge service industries including software used in finance and counseling products is creating the necessity to include software industry utilization sectors aside from covering only software products and service production activities. Furthermore, to cope with the radical environment changes in the software industry when it comes to categorizing mobile and cloud computing areas into a software and classification system, we are at a point where there is a need to establish a directional nature on what should be included. In order to establish an integrated classification of newly introduced technologies, products and services, this paper aims to discover areas not included in the classification standard because of the ecological characteristics of the software. It also wants to differentiate the classification system and identify its incomplete areas such as the lack of connections within the system to ultimately establish such for newly surfacing software fields.

Implementation of Dynamic Situation Authentication System for Accessing Medical Information (의료정보 접근을 위한 동적상황인증시스템의 구현)

  • Ham, Gyu-Sung;Seo, Own-jeong;Jung, Hoill;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.31-40
    • /
    • 2018
  • With the development of IT technology recently, medical information systems are being constructed in an integrated u-health environment through cloud services, IoT technologies, and mobile applications. These kinds of medical information systems should provide the medical staff with authorities to access patients' medical information for emergency status treatments or therapeutic purposes. Therefore, in the medical information systems, the reliable and prompt authentication processes are necessary to access the biometric information and the medical information of the patients in charge of the medical staff. However, medical information systems are accessing with simple and static user authentication mechanism using only medical ID / PWD in the present system environment. For this reason, in this paper, we suggest a dynamic situation authentication mechanism that provides transparency of medical information access including various authentication factors considering patient's emergency status condition and dynamic situation authentication system supporting it. Our dynamic Situation Authentication is a combination of user authentication and mobile device authentication, which includes various authentication factor attributes such as emergency status, role of medical staff, their working hours, and their working positions and so forth. We designed and implemented a dynamic situation authentication system including emergency status decision, dynamic situation authentication, and authentication support DB construction. Finally, in order to verify the serviceability of the suggested dynamic situation authentication system, the medical staffs download the mobile application from the medical information server to the medical staff's own mobile device together with the dynamic situation authentication process and the permission to access medical information to the patient and showed access to medical information.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Extending the Home Network using UPnP+ (UPnP+를 이용한 홈 네트워크 확장)

  • Kim, Hyun-Sik;Park, Yong-Suk;Koo, Sung Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.540-542
    • /
    • 2014
  • The Universal Plug and Play (UPnP) specification permits networked devices to discover each other and to provide diverse services in the home network environment. Recently, new paradigms such as mobile connected computing, cloud-based service delivery, smart device content sharing, and Internet of Things (IoT) have emerged, but the home network based UPnP shows functional limitations in supporting such paradigms. To support them, the UPnP Forum has recently extended the capabilities of the existing UPnP, calling it UPnP+. In this paper, the UPnP Device Architecture V2.0 (UDA 2.0), which forms the basis of UPnP+, is presented. We present how UDA 2.0 enables the expansion of the home network to wide-area networks and non-IP device domains.

  • PDF

The effects of the Partnership in Supply Chain Management with Appling Social Business on the outcome of the SCM (소셜 비즈니스를 활용한 공급 사슬에서의 파트너십이 SCM 성과에 미치는 영향)

  • Kim, So-Chun;Lim, Wang-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.95-110
    • /
    • 2014
  • The purpose of this research is to further investigate the influence of partnership between with the mediator effect of the social business on the outcome of SCM. IT technology fusion electronic tags, mobile phone, such as cloud computing is also activated in supply chain management of recently, business is faster, if social business is applied here that are smarter, customers or suppliers, there may be communication directly and to further improve the relationship partnership. 150 questionnaires were sent to companies that have introduced SCM to their systems and are operating it. Among 150 questionnaires, 127 collected data were analyzed excluding incomplete 23 data. Statistical methods used in this study were frequency analysis, factor analysis, reliability analysis, t-test, ANOVA, path analysis, Scheffe test and Sobel test with Amos 18.0. and SPSS 21.0. The analytical results are as follows. First, the more the reliability, information share, continuous transaction, effects on the social business are getting higher, the interdependence has little impact on it. Second, the impact on the outcome of SCM, partnerships between companies, showed a significant influence the reliability, the share of information, the continuous transaction, but the interdependence was analysed as an uninfluential factor. Third, the social business is analyses to have a mediator effect in relationship between the partnership and the outcome of SCM.