• Title/Summary/Keyword: multi-user and multi-service

Search Result 436, Processing Time 0.03 seconds

QoS-Aware Power Management of Mobile Games with High-Load Threads (CPU 부하가 큰 쓰레드를 가진 모바일 게임에서 QoS를 고려한 전력관리 기법)

  • Kim, Minsung;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.328-333
    • /
    • 2017
  • Mobile game apps, which are popular in various mobile devices, tend to be power-hungry and rapidly drain the device's battery. Since a long battery lifetime is a key design requirement of mobile devices, reducing the power consumption of mobile game apps has become an important research topic. In this paper, we investigate the power consumption characteristics of popular mobile games with multiple threads, focusing on the inter-thread. From our power measurement study of popular mobile game apps, we observed that some of these apps have abnormally high-load threads that barely affect the user's gaming experience, despite the high energy consumption. In order to reduce the wasted power from these abnormal threads, we propose a novel technique that detects such abnormal threads during run time and reduces their power consumption without degrading user experience. Our experimental results on an Android smartphone show that the proposed technique can reduce the energy consumption of mobile game apps by up to 58% without any negative impact on the user's gaming experience.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Development of Personal EPG for Purpose-oriented Broadcasting

  • Lee Yun-Ju;Lim Tae-Beom;Kim Yoon-Sang;Lee Seok-Pil
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.59-62
    • /
    • 2005
  • The recent broadcasting environment has shifted to embrace multimedia and multi-channel features through terrestrial, satellite and cable media. This has multiplied the number of broadcasting programs. With the information on a myriad of programs provided to TV viewers, information overload occurs, and thus, the TV viewing environment is shifting to one where viewers cannot select programs passively. Thus, a growing need is emerging to ensure a personalized electronic program guide (EPG) to help individuals select TV programs according to their taste. This paper presents a personalized EPG that enables a purpose-oriented broadcasting service to provide personalized broadcasting programs in tune with the user's requirements and preferences.

  • PDF

Multi-Level Prediction for Intelligent u-life Services (지능형 u-Life 서비스를 위한 단계적 예측)

  • Hong, In-Hwa;Kang, Myung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.123-129
    • /
    • 2009
  • Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.

  • PDF

The Design of Multicase Key distribution Protocol based CBT(Core Based Tree) (CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계)

  • Kim, Bong-Han;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

A Frequency Allocation Method for Cognitive Radio Using the Fuzzy Set Theory (퍼지 집합 이론을 활용한 무선인지 주파수 할당 알고리즘)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.745-750
    • /
    • 2008
  • In a cognitive radio based system, quality of service (QoS) for the secondary user must be maintained as much as possible even while that of the primary user is protected all he time. In particular, switching wireless links for the secondary user during the transmission of multimedia data causes delay and information loss, and QoS degradations occur inevitably. The efficient resource management scheme is necessary to support the seamless multimedia service to the secondary user. This paper proposes a novel frequency selection method based on Multi-Criteria Decision Making (MCDM), in which uncertain parameters such as received signal strength, cell load, data rate, and available bandwidth are considered during the decision process for the frequency selection with the fuzzy set theory. Through simulation, we show that our proposed frequency selection method provides a better performance than the conventional methods which consider the received signal strength only.

Block Error Performance improvement of the DS/CDMA BPSK system with MRC Diversity and Channel coding Techniques in Nakagami Fading Channel. (Nakagami 페이딩 채널에서 MRC 다이버시티와 채널 부호화 기법을 사용한 DS/CDMA BPSK 시스템의 블록 오율 성능 개선)

  • 강희조;노재성;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.391-398
    • /
    • 2000
  • In this paper, MRC(Maximum Ratio Combine) diversity, (23, 12) Golay code, (7, 5) Reed-Solomon code, and (3, 1) majority selection code are employed to improve the performance of DS/CDMA BRSK in Nakagami fading channel. and MRC diversity combined with other coding techniques is suggested, with which, the performance of DS/CDMA BRSK is compared and analyzed. Also, system required Eb/N0 to meet BER=10-5 for multi user data communication is obtained according to each techniques. From the results, when each techniques is employed to DS/CDMA BRSK system. coding employed system shows better performance than diversity employed system. Especially, Golay code shows better performance than oter codes. also MRC diversity is employed, the number of multiple access user to meet data communication requirement of BER=10-5 can accomodate up to 8 users. and when each code is employed, Golay code, majority selection code, and Reed-Solomon code shows the capacity of 14, 12, and 10 user respectively. But MRC diversity combined with coding techniques can reduce restriction of multiple access user. However, it is desirable these combined technique are employed according to service types and requirements provided.

  • PDF

Effects of SNS Quality and Purpose on SNS Discontinuance Intention (SNS 품질 및 이용 목적 관점에서의 SNS 이용 중단 의도)

  • Lee, DongJoo;Kim, MyoungSoo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.2
    • /
    • pp.339-350
    • /
    • 2018
  • Purpose: The purpose of this study is to propose useful suggestions by analyzing the impact of SNS quality and the pressure which comes from SNS usage objectives on SNS discontinuance intention. Methods: We developed a SNS user's discontinuance intention model in terms of SNS quality and pressure of SNS usage. Survey data of SNS users was analyzed using multi-regression analysis for testing hypotheses. Results: We found that information quality plays an important role in lowering the SNS discontinuance intention. In addition, it was founded that pressure of social networking and information processing are positively related with the SNS discontinuance intention. Conclusion: We expect that this research can provide theoretical and practical implications. As for theoretical, this study can suggest the insight on conceptualization of SNS fatigue in the further study. Regarding practical implication, service providers can make their service strategies based on understanding our analysis.

Context-Aware Security System for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 보안 시스템)

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • Many security issues occur in cloud computing service environment such as authentication, access control, and so on. In this paper, we propose an effective authentication and access control model which provide integrated management and control when we access various resources in cloud computing environment. To address these problems, we suggest a context-aware single sign-on and access control system using context-awareness, integrated authentication, access control, and OSGi service platform in cloud computing environment. And we show design and implementation of context-aware single sign-on and access control system. Also we verified the flexibility and convenience of the proposed system through multi fact based integrated authentication in cloud computing environment. We could provide flexible and secure seamless security service by user context in cloud computing environment.

Monitoring System with PLC I/O for Car Parking Lot (Car Parking Lot 모니터링 시스템)

  • Lee, Seong-Jae;Kim, Jae-Yang
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.511-512
    • /
    • 2007
  • The monitoring system has won acceptance as a premium mark that identifies the highest standard of product quality in advanced industry. The TOP features with multi-I/O ports and VGA & RCA TV-out ports supporting mirroring & multiple dual-display modes by windows 0/5. With the choice of versatile stands, panel mount, or VESA wall-mount swing arm and connecting to modem. Wireless keyboard, Customer Display and Card Reader, is your idea Panel system for the application of TOP(Touch Operation Pannel), KIOSK, or Office / Factory Automation. TOP is the hardware and software product that transacts all kind of functions for advanced technology equipment to button, switch, voice and graph etc so that let consumer use easily Industrial HMI System Touch Panel. System characteristics: Easy of use and flexibility to the user, Present a high value solution and advanced function for many Application, Factory Automation, Office Automation, Building Automation System, Information Service System, etc. Analog Touch - 2MB Flash Memory for Saving Screen Data - RS-232C/422 Serial Port - Multi Language Support.

  • PDF