• 제목/요약/키워드: Mobile Computer

검색결과 5,775건 처리시간 0.037초

A Mobile Stress Management System utilizing Variable Voice Information According to the Wearing Area

  • Kang, Byeongsoo;Vannroath, Ky;Kang, Hyun-syug
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권6호
    • /
    • pp.95-100
    • /
    • 2017
  • Recently, as stress has become a major threat to people's health, there is a growing interest in wearable stress management services for stress relief. In this paper, we developed a wearable device(Care-on) capable of extracting changeable human voice information at each site and a Healthcare App(S-Manager) that enables stress management in real time using the wearable device. It collects and analyzes variable real-time voice information for each part of the person's body. And It also provides the ability to monitor stress conditions in a mobile environment and provide feedback on the analysis results in step by step in the mobile environment. We tested the developed wearable devices and app in a mobile environment and analyzed the results to confirm their usefulness.

Mobile IP 기반 인터넷 IP Accounting System의 설계 및 구현 (Design and Implement of IP Accounting System based on Mobile IP)

  • 김재영;이정준;정운영;정선화;박석천
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 춘계학술발표논문집 (하)
    • /
    • pp.1357-1360
    • /
    • 2002
  • 기존의 유선 기반의 네트워크에서 무선 기반의 네트워크로 진화하는 현재의 흐름 속에서 서비스 및 망 자원의 유료화를 위해 무선 네트워크 기반 IP Accounting System에 대한 연구는 필수적이라 할 수 있다. 따라서 본 논문에서는 향후 무선망에서 중요한 위치를 차지하게 될 Mobile IP 기반 네트워크에서 망 자원 및 컨텐츠의 유료화를 실현시키기 위하여 IETF의 Mobile IP 표준화 동향 및 관련 표준 문서와 유선 네트워크 기반의 IP Accounting 시스템 구축 동향 및 핵심 기술, IP Accounting관련 표준화 기술 문서와 기술 동향 등을 연구 분석하였고, 그 내용을 토대로 IP Accounting 산정을 위한 시스템과 산정 절차를 감안한 Mobile IP Accounting 시스템을 설계하고 구현하였다.

  • PDF

A Congestion Control Mechanism for Supporting Differentiated Service in Mobile Ad hoc Networks

  • Kim Jin-Nyun;Ha Nam-Koo;Cho Dong-Hoon;Kim Hyun-Sook;Han Ki-Jun
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.143-146
    • /
    • 2004
  • Differentiated services (DiffServ) has been widely accepted as the service model to adopt for providing quality-of­service (QoS) over the next-generation IP networks. There is a growing need to support QoS in mobile ad hoc networks. Supporting DiffServ in mobile ad hoc networks, however, is very difficult because of the dynamic nature of mobile ad hoc networks, which causes network congestion. The network congestion induces long transfer packet delay and low throughput which make it very difficult to support QoS in mobile ad hoc networks. We propose DiffServ module to support differentiated service in mobile ad hoc networks through congestion control. Our DiffServ module uses the periodical rate control for real time traffic and also uses the best effort bandwidth concession when network congestion occurs. Network congestion is detected by measuring the packet transfer delay or bandwidth threshold of real time traffic. We evaluate our mechanism via a simulation study. Simulation results show our mechanism may offer a low and stable delay and a stable throughput for real time traffic in mobile ad hoc networks.

  • PDF

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • 제44권6호
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy

  • Hamid, Khalid;Iqbal, Muhammad Waseem;Muhammad, Hafiz Abdul Basit;Fuzail, Zubair;Ghafoor, Zahid Tabassum;Ahmad, Sana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.250-260
    • /
    • 2022
  • Mobile Banking Applications (MBAPs) is one of the recent fads in mobile trading applications (Apps). MBAPs permit users to execute exchanges of money and many more whenever it might suit them; however, the primary issue for mobile banking Apps is usability. Hardly any investigation analyzes usability issues dependent on user's age, gender, exchanging accomplices, or experience. The purpose of this study is to determine the degree of usability issues, and experience of mobile banking users. The survey employs a quantitative method and performs user experiment on 240 participants with six different tasks on the application's interface. The post experiment survey is done with concerning participants. On the other hand, banking experts and Information Technology (IT) expert's group is also involved after the experiment. Expert's opinions about existing mobile banking Apps and suggestions for improving usability of MBAPs are collected through physical means (like questionnaire and interview) and online means like Google form. After that comparison of the opinions of users and experts about MBAPs is performed. The experimentation measures the tasks usability of various mobile banking apps with respect to its effectiveness, efficiency, trustfulness, learnability, memorability and satisfaction. The usability testing was led at different Universities and the outcomes acquired show that there are privacy and trust issues with their mobile banking apps. There is also a gap between users and experts which should be minimized by applying customized usability models, modes concept like other application software and also by adding complete features of banking in MBAPs. It will benefit mobile banking apps users, developers and usability engineers by providing user-friendly which are up to the mark of user's requirements.

보안 서비스를 제공하기 위한 이동 에이전트 시스템의 설계에 관한 연구 (A Study for Mobile Agent System to Support Security Service)

  • 김현배
    • 정보교육학회논문지
    • /
    • 제2권1호
    • /
    • pp.130-137
    • /
    • 1998
  • An agent is a computer program that acts autonomously on a computer system. A mobile agent is not bound to the system where it begins execution. It has an ability to transport itself from on e system in a network to another. Mobile agent system solve the network traffic problem. Moreover, the agent may utilize the object services of the destination agent system. In this study the mobile agent system is introduced to support security service.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Fuzzy Control of a Mobile Robot with Camera

  • Cho, Jung-Tae;Lee, Seok-Won;Nam, Boo-Hee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2000년도 제15차 학술회의논문집
    • /
    • pp.381-381
    • /
    • 2000
  • This paper describes the path planning method in an unknown environment for an autonomous mobile robot equipped with CCD(Charge-Coupled Device) camera. The mobile robot moves along the guideline. The CCD camera is useful to detect the existence of a guideline. The wavelet transform is used to find the edge of guideline. Using wavelet transform, we can make an image processing more easily and rapidly. We make a fuzzy control rule using image data then make a decision the position and the navigation of the mobile robot. The center value that indicates the center of guideline is the input of fuzzy logic controller and the steering angle of the mobile robot is the fuzzy output. Some actual experiments for the mobile robot applied fuzzy control show that the mobile robot effectively moves to target position.

  • PDF

분산 웹 환경에서 이동 에이전트 보안 설계 (Mobile Agent Security Design on the Distributed Web Eenvironment)

  • 최길환;배상현;고진광
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 춘계학술발표논문집 (상)
    • /
    • pp.553-556
    • /
    • 2002
  • 인터넷과 World Wide Web의 폭발적인 성장은 네트워크에 많은 정보와 리소스를 제공하고 있다. 그렇지만, 대부분의 사용자들에게 있어서 인터넷 리소스의 사용은 Bandwidth에 의하여 많은 제한을 받고 있다. 그러나 애플릿 방식을 통해서 HTML이 가지고 있는 정적인 면과 CGI의 bandwidth에 따르는 성능 저하 문제를 해결할 수 있다. Mobile Agent는 사용자의 특정 목적을 성취하기 위해서 사용자의 컴퓨터에서 출발하여 네트워크를 이동하면서 작업을 수행한다. 이렇게 수행할 수 있는 코드가 네트워크를 통하여 전송되고, 네트워크에서 수행되기 때문에, 자연스럽게 mobile code의 보안에 중요한 문제가 발생한다. 본 연구에서는 이러한 Mobile Agent를 사용하는 분산 웹 환경에서, Mobile Agent를 호스트와 Agent를 보호할 수 있는 방안을 모색보고, Mobile Agent 의 개념과 Mobile Agent를 구성하면서 생기는 문제를 기술하고, 이러한 문제를 해결하기 위해서 연구중인 방법을 제시하고, 제시된 방법 중에서 현실적으로 적용 가능한 방법을 사용하여 이동 에이전트의 보안 시스템을 설계해 보도록 한다.

  • PDF

The Design of an Election Protocol based on Mobile Ad-hoc Network Environment

  • Park, Sung-Hoon;Kim, Yeong-Mok;Yoo, Su-Chang
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권8호
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper, we propose an election protocol based on mobile ad-hoc network. In distributed systems, a group of computer should continue to do cooperation in order to finish some jobs. In such a system, an election protocol is especially practical and important elements to provide processes in a group with a consistent common knowledge about the membership of the group. Whenever a membership change occurs, processes should agree on which of them should do to accomplish an unfinished job or begins a new job. The problem of electing a leader is very same with the agreeing common predicate in a distributed system such as the consensus problem. Based on the termination detection protocol that is traditional one in asynchronous distributed systems, we present the new election protocol in distributed systems that are based on MANET, i.e. mobile ad hoc network.