• Title/Summary/Keyword: Mobile technology

Search Result 6,583, Processing Time 1.503 seconds

Controlling Position of Virtual Reality Contents with Mouth-Wind and Acceleration Sensor

  • Kim, Jong-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.57-63
    • /
    • 2019
  • In this paper, we propose a new framework to control VR(Virtual reality) contents in real time using user's mouth-wind and acceleration sensor of mobile device. In VR, user interaction technology is important, but various user interface methods is still lacking. Most of the interaction technologies are hand touch screen touch or motion recognition. We propose a new interface technology that can interact with VR contents in real time using user's mouth-wind method with acceleration sensor. The direction of the mouth-wind is determined using the angle and position between the user and the mobile device, and the control position is adjusted using the acceleration sensor of the mobile device. Noise included in the size of the mouth wind is refined using a simple average filter. In order to demonstrate the superiority of the proposed technology, we show the result of interacting with contents in game and simulation in real time by applying control position and mouth-wind external force to the game.

Localization of Mobile Users with the Improved Kalman Filter Algorithm using Smart Traffic Lights in Self-driving Environments

  • Jung, Ju-Ho;Song, Jung-Eun;Ahn, Jun-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.67-72
    • /
    • 2019
  • The self-driving cars identify appropriate navigation paths and obstacles to arrive at their destinations without human control. The autonomous cars are capable of sensing driving environments to improve driver and pedestrian safety by sharing with neighbor traffic infrastructure. In this paper, we have focused on pedestrian protection and have designed an improved localization algorithm to track mobile users on roads by interacting with smart traffic lights in vehicle environments. We developed smart traffic lights with the RSSI sensor and built the proposed method by improving the Kalman filter algorithm to localize mobile users accurately. We successfully evaluated the proposed algorithm to improve the mobile user localization with deployed five smart traffic lights.

미취학 아동을 대상으로 한 AR 기반 모바일 애플리케이션 연구 (A Study on AR-based mobile applications for preschoolers)

  • 신영협;김여민;서혜진;김시현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.490-493
    • /
    • 2020
  • 최근 혁신 기술로 떠오르고 있는 AR 기술을 활용하여 유아용 AR 모바일 애플리케이션을 기획했다. 놀이와 교육을 접목시킨 형태로 아이들의 흥미를 유발하여 다양한 분야로의 교육 접근성을 증대시킨다. Unity 3D Engine과 Vuforia SDK를 주로 사용하여 Android 기반의 모바일 애플리케이션을 설계했다.

CDMA 의 비경제적 가치평가 (The Non-economic Value of CDMA)

  • 한남대
    • 기술혁신학회지
    • /
    • 제3권1호
    • /
    • pp.127-138
    • /
    • 2000
  • This pape applies the multi-attribute utility theory for estimating the non-economci value of technology. The technology of the code division multiple access in mobile communications is used as a case study. The technology of the code division multiple access in mobile communications is used as a case study. The result shows that the multi-attribute utility theory is a useful method for es-tinmating the non-economic value of technology and gaining an insight into the importance of tech-nology innovation.

  • PDF

Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing

  • Li, Yang;Xu, Gaochao;Ge, Jiaqi;Liu, Peng;Fu, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2422-2443
    • /
    • 2020
  • This paper studies a single-user Mobile Edge Computing (MEC) system where mobile device (MD) includes an application consisting of multiple computation components or tasks with dependencies. MD can offload part of each computation-intensive latency-sensitive task to the AP integrated with MEC server. In order to accomplish the application faultlessly, we calculate out the optimal task offloading strategy in a time-division manner for a predetermined execution order under the constraints of limited computation and communication resources. The problem is formulated as an optimization problem that can minimize the energy consumption of mobile device while satisfying the constraints of computation tasks and mobile device resources. The optimization problem is equivalently transformed into solving a nonlinear equation with a linear inequality constraint by leveraging the Lagrange Multiplier method. And the proposed dual Bi-Section Search algorithm Bi-JOTD can efficiently solve the nonlinear equation. In the outer Bi-Section Search, the proposed algorithm searches for the optimal Lagrangian multiplier variable between the lower and upper boundaries. The inner Bi-Section Search achieves the Lagrangian multiplier vector corresponding to a given variable receiving from the outer layer. Numerical results demonstrate that the proposed algorithm has significant performance improvement than other baselines. The novel scheme not only reduces the difficulty of problem solving, but also obtains less energy consumption and better performance.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

Mobile GIS를 이용한 홍수관리시스템 구축 (The construction of Flood Disaster Management System by Using Mobile GIS)

  • 장광진;김성범;서영민;지홍기
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2007년도 정기총회 및 학술발표대회
    • /
    • pp.616-619
    • /
    • 2007
  • Recently, flood damage has been increased annually by severe rain storm and Typhoon. In this case, it needs to the effective flood management using not only hydrologic data but also numerical map, DEM(Digital Elevation Model), satellite image and so on. At this point in time, therefore, applying mobile GIS technology is expected to increase efficiency about the management of hydraulic structures and can promote LBS(Location Based Service) service for residents. In this study, the flood management technology using mobile GIS is suggested by standing on the basis of a super-highway information network.

  • PDF

Design of Fuzzy Logic System for Mobile Robot based on Visual Servoing

  • Song, Un-Ji;Yoo, Seog-Hwan;Choi, Byung-Jae
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.113-117
    • /
    • 2005
  • This paper describes a visual control scheme, fuzzy logic system for visual servoing of an autonomous mobile robot. An existing communication autonomous mobile robot always needs to keep the object in image to detect the moving object. This is a problem in an autonomous mobile robot for spontaneous activity. To solve it, some features for an object are taken from an image and then use in the design of fuzzy logic system for decision of moving location and direction of visual servoing contrivance(apparatus). So continuous tracking is possible by moving the visual servoing contrivance. We present some simulation results and further studies in the Section of Simulation and Concluding Remarks.

  • PDF

3-L Model: A Model for Checking the Integrity Constraints of Mobile Databases

  • Ibrahim, Hamidah;Dzolkhifli, Zarina;Affendey, Lilly Suriani;Madiraju, Praveen
    • Journal of Computing Science and Engineering
    • /
    • 제3권4호
    • /
    • pp.260-277
    • /
    • 2009
  • In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

An Effective Pre-refresh Mechanism for Embedded Web Browser of Mobile Handheld Devices

  • Li Huaqiang;Kim Young-Hak;Kim Tae-Hyung
    • 한국멀티미디어학회논문지
    • /
    • 제7권12호
    • /
    • pp.1754-1764
    • /
    • 2004
  • Lately mobile handheld devices such as Personal Digital Assistant (PDA) and cellular phones are getting more popular for personal web surfing. However, today most mobile handheld devices have relatively poor web browsing capability due to their low performance so their users have to suffer longer communication latency than those of desktop Personal Computers (PCs). In this paper, we propose an effective pre-refresh mechanism for embedded web browser of mobile handheld devices to reduce this problem. The proposed mechanism uses the idle time to pre-refresh the expired web objects in an embedded web browser's cache memory. It increases the utilization of Central Processing Unit (CPU) power and network bandwidth during the idle time and consequently reduces the client's latency and web browsing cost. An experiment was done using a simulator designed by us to evaluate the efficacy of the proposed mechanism. The experiment result demonstrates that it has a good performance to make web surfing faster.

  • PDF