• Title/Summary/Keyword: Mobile Information

Search Result 15,589, Processing Time 0.037 seconds

A Mobility Management Scheme Using GQS based on the Fuzzy-logic in Wireless Mobile Ad-Hoc Networks (에드-혹 망에서 퍼지로직 기반 GQS를 이용한 이동성 관리방법)

  • Yoon, Il;Oh, Sun-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.431-435
    • /
    • 2005
  • Mobile Ad-Hoc network is the network(MANET) of mobile nodes which has no fixed infrastructure, and mobile node in MANET can move and communicate freely each other. Recently, many researches for mobility management of mobile nodes are actively carried out by using the location information of mobile nodes. The location management is an important issue in MANET because location information of mobile node is frequently changed in MANET. In this paper, an adaptive mobility management scheme using fuzzy-logic based GQS by considering the mobile locality is proposed in order to manage location information of mobile nodes in MANET efficiently. The proposed scheme selects mobility databases adaptively from GQS by considering the locality of mobile node. The performance of the mobility management scheme proposed in this paper is evaluated by an analytic model and compared with that of existing UQS based mobility management scheme.

  • PDF

An Efficient Recovery Method for Mobile Main Memory Database System (모바일 메인메모리 데이터베이스 시스템을 위한 효율적인 복구 기법)

  • Cho, Sung-Je
    • Journal of Information Technology Services
    • /
    • v.7 no.2
    • /
    • pp.181-195
    • /
    • 2008
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. Thus, During transmission in wireless networks a base station failure inevitably causes data loss of the base station buffer. It is required to compensate the loss for communication. The existing methods for a base station failure are not adequate because they all suffer from too much overhead and resolve only the link failure. In this paper, we study an efficient recovry systems for a mobile DBMS. We propose SLL (Segment Log List) that enables the mobile host to compensate data loss efficiently in the case of base station failure. In SLL, a base station deliveries an output information of data cells to a mobile host. when a base station fails, the mobile host can retransmit just next data cells. We also prove the efficiency of new method.

A Typology of Mobile Advertising by Mobile Channel & Methods (모바일 경로와 기법으로 본 모바일 광고 유형에 관한 연구)

  • Lee, Hong-Il;Park, Cheol
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.49-70
    • /
    • 2007
  • There found limitations of mobile advertising researches in methodology, theory building, and research implication. Existing researches were basic and some exploratory studies on mobile advertising and its effects. Especially, there was not a systematic typology research on mobile advertising. This paper tried to develop a systematic and empirical typology of mobile advertising and show proper advertising cases. We classified mobile advertising using mobile channels and methods (Text, Icon, Media, and Contents), Also we used advertising effects like information offering, leading transaction and response, and channel connection in classification of mobile advertising. Finally we suggested mobile advertising cases based on this typology and analysed the performance of moile advertising.

  • PDF

A Study of Vulnerability Analysis and Mobile Forensic Technology about Android/Windows Mobile Smart Phone (Android/Windows Mobile Smart Phone의 취약점 분석과 Mobile Forensic 기술)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.191-195
    • /
    • 2011
  • Smart Phone의 OS로 많이 사용하는 Android/Windows Mobile Smart Phone의 사용이 급격히 증가하고 있다. 무료 WiFi Zone과 인터넷 사용에 대한 취약점이 존재한다. Mobile Forensic의 증거 자료를 추출하는 방법은 SYN, JTAG, Revolving 방법이 있지만, 기존 휴대폰과 달리 Smart Phone은 OS와 구조, 사용방식과 기술의 차이로 인한 Mobile Forensic 연구 방법도 달라야 한다. 본 논문에서는 Smart Phone에서는 많이 사용되는 Windows Mobile/Android Smart Phone의 OS와 구조 차이를 분석한 데이터 백업과 스펙 분석 및 증거자료 분석을 한다. 또한 무료 WiFi Zone을 통한 인터넷 사용시에 취약점을 분석한다. 그리고 Android/Windows Mobile Smart Phone의 Forensic 자료를 생성하여 증거를 추출하고, Mobile Forensic 보고서를 생성한다. 본 연구를 통하여 Mobile Forensic의 기술 발전에 초석을 제공할 것이다.

  • PDF

Combined Service Subscription and Delivery Energy-Efficient Scheduling in Mobile Cloud Computing

  • Liu, Xing;Yuan, Chaowei;Peng, Enda;Yang, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1587-1605
    • /
    • 2015
  • Mobile cloud computing (MCC) combines mobile Internet and cloud computing to improve the performance of applications. In MCC, the data processing and storage for mobile devices (MDs) is provided on the remote cloud. However, MCC faces the problem of energy efficiency caused by randomly varying channels. In this paper, by introducing the Lyapunov optimization method, we propose a combined service subscription and delivery (CSSD) algorithm that can guide the users to subscribe to services reasonably. This algorithm can also determine whether to deliver the data and to whom data is sent in the current time unit based on the queue backlog and the channel state. Numerical results validate the correctness and effectiveness of our proposed CSSD algorithm.

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

Can Coupon Holding Duration and Message Framing Increase the Effect of Push Notifications on Mobile Coupon Redemption? Evidence from A Randomized Field Experiment

  • Soonki Hwang;Jai-Yeol Son;Sunju Park;Kil-Soo Suh
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.812-830
    • /
    • 2023
  • We propose a mobile coupon strategy designed to increase the effect of push notifications on redemption. The proposed strategy recommends that firms deliver mobile coupons with distant expiration dates and remind them through push notifications framed negatively once these expiration dates become imminent, rather than frequently sending coupons with near expiration dates. We test the effectiveness of the proposed strategy using data collected through a randomized field experiment. The findings indicate that push notifications enhance coupon redemption rates for coupons that are held longer by customers than those that are recently received. Additionally, we found that sending negatively framed push notification messages to remind customers of imminent coupon expiration dates further resulted in higher coupon redemption rates. The findings can be employed to offer useful guidance on how to effectively design mobile coupons for achieving higher redemption rates.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.

An Open Source Mobile Cloud Service: Geo-spatial Image Filtering Tools Using R (오픈소스 모바일 클라우드 서비스: R 기반 공간영상정보 필터링 사례)

  • Kang, Sanggoo;Lee, Kiwon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.1-8
    • /
    • 2014
  • Globally, mobile, cloud computing or big data are the recent marketable key terms. These trend technologies or paradigm in the ICT (Information Communication Technology) fields exert large influence on the most application fields including geo-spatial applications. Among them, cloud computing, though the early stage in Korea now, plays a important role as a platform for other trend technologies uses. Especially, mobile cloud, an integrated platform with mobile device and cloud computing can be considered as a good solution to overcome well known limitations of mobile applications and to provide more information processing functionalities to mobile users. This work is a case study to design and implement the mobile application system for geo-spatial image filtering processing operated on mobile cloud platform built using OpenStack and various open sources. Filtering processing is carried out using R environment, recently being recognized as one of big data analysis technologies. This approach is expected to be an element linking geo-spatial information for new service model development and the geo-spatial analysis service development using R.

An Efficient Fault Tolerance Protocol with Backup Foreign Agents in a Hierarchical Local Registration Mobile IP

  • Hong, Choong-Seon;Yim, Ki-Woon;Lee, Dae-Young;Yun, Dong-Sik
    • ETRI Journal
    • /
    • v.24 no.1
    • /
    • pp.12-22
    • /
    • 2002
  • A Mobile IP allows IP hosts to move between different networks without changing their IP addresses. Mobile IP systems supporting local registration were introduced to reduce the number of times a home registration with the remotely located home agent was needed. The local registration Mobile IP scheme enhanced performance by processing registration requests of mobile nodes at a local agent. The local registration approach may affect other aspects of the Mobile IP systems such as fault tolerance. In this paper, we briefly review previous solutions for supporting fault tolerance in local registration Mobile IP systems and propose a fault tolerance protocol with a backup foreign agent in a hierarchical local registration mobile IP to enhance the efficiency of such systems against foreign agent failures. We also describe the specification of the proposed protocol using LOTOS and perform its validation using MiniLite. Finally, we analyze the performance of our proposed fault tolerance protocol through simulation.

  • PDF