• Title/Summary/Keyword: App Server

Search Result 170, Processing Time 0.024 seconds

Implementation of Fog Computing Architecture for IoT Service on Hybrid Broadcast Environment (하이브리드 방송 환경에서의 IoT 서비스 지원을 위한 Fog Computing Architecture 구현)

  • Kum, Seung Woo;Lim, Tae-Beom;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.107-117
    • /
    • 2017
  • Recently, IoT applications are being deployed in Smart TVs, and these IoT applications are using smart TVs as application platforms rather than broadcast platforms. With the advent of Hybrid broadcast technologies, now it becomes available to develop IoT applications which are coupled to the broadcast information. However, the existing IoT services are not suitable for Hybrid broadcast application since they are built on cloud and require various protocol implementations. In this paper, a Fog Computing-based architecture for hybrid broadcast application is proposed. Instead of accessing IoT services from hybrid broadcast app directly, the proposed architecture places Fog Applet Server between them and distribute loads of hybrid broadcast app to the Fog Applet. The proposed architecture is implemented as a service to control IoT device with hybrid application.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

Implementation of App System for Personalized Health Information Recommendation (사용자 맞춤형 건강정보 추천 앱 구현)

  • Park, Seong-min;Park, Jeong-soo;Lee, Yoon-kyu;Chae, Woo-Joon;Shin, Moon-sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.316-318
    • /
    • 2019
  • Recently, healthy life has become an issue in an aging society, and the number of people who have been interested in continuous health care for better life is increasing. In this paper, we implemented a personalized recommendation systm to provide convenient healthcare management for user. The PHR (Personal Health Record) of user could be stored in the server along with health related information such as lifestyle, disease, and physical condition. The users could be classified into similar clusters according to the PHR profile in order to provide healthcare contents to the users who had similar PHR profile. K-Means clustering was applied to generate clusters based on PHR profile and ACDT(Ant Colony Decision Tree) algorithm was used to provide personalised recommendation of health information stored in knowledge base. The app system developed in this paper is useful for users to perform healthcare themselves by providing information on serious diseases and lifestyle habits to be improved according to the clusters classified by PHR profile.

  • PDF

Implementation of Smart Home System based on AWS IoT and MQTT (AWS IoT 와 MQTT 기반 스마트 홈 시스템 구현)

  • Jung, Inhwan;Hwang, Kitae;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.7-12
    • /
    • 2022
  • This paper introduces the implementation of the AWS IoT service and MQTT based smart home system. The smart home system implemented in this study can monitor temperature and humidity, and can manually adjust the air conditioner heating, and can check the visitors with the camera and remotely control the door lock. The implemented smart home system controls door locks, heating and air conditioners using Arduino, and manages the collected data and control information using the AWS IoT service. In this study, the Android app has been developed to allow users to control IoT devices remotely, and the MQTT protocol was used for data communication and control between the app and the AWS IoT server and Arduino. The implemented smart home system has been implemented based on AWS IoT service, which has scalability to add sensors and devices.

Development of Android App to Record and Manage Travel Routes for Location Information Protection (위치정보 보호를 위한 이동 경로 기록 및 관리 서비스 앱 개발)

  • Seoyeon Kim;Ah Young Kim;Minjung Oh;Saem Oh;Sungwook Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.437-444
    • /
    • 2023
  • Location-based services play a vital role in our daily lives. While these services enhance user convenience, user's privacy is at risk because they lead to a rapid surge in collecting and utilizing location information for a user. In this paper, we design and implement an application that securely records and manages user location information. We enhance the privacy protection aspect concerning location information by providing some features. Utilizing Room DB, we store collected personal location information in the user's local database instead of the server of the location-based service provider. Furthermore, user can initiate and terminate recording at their discretion, thereby enhancing the protection of personal information related to location data. User's unease regarding their movement paths is reduced by empowering them to have control over their own location information.

A Customization Method for Mobile App.'s Performance Improvement (모바일 앱의 성능향상을 위한 커스터마이제이션 방안)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.208-213
    • /
    • 2016
  • In the fourth industrial revolution, customization is becoming a conversation topic in various domains. Industry 4.0 applies cyber-physical systems (CPS), the Internet of Things (IoT), and cloud computing to manufacturing businesses. One of the main phrases in Industry 4.0 is mass customization. Optimized products or services are developed and provided through customization. Therefore, the competitiveness of a product can be enhanced, and satisfaction is improved. In particular, as IoT technology spreads, customization is an essential aspect of smooth service connections between various devices or things. Customized services in mobile applications are assembled and operate in various mobile devices in the mobile environment. Therefore, this paper proposes a method for improving customized cloud server-based mobile architectures, processes, and metrics, and for measuring the performance improvement of the customized architectures operating in various mobile devices based on the Android or IOS platforms. We reduce the total time required for customization in half as a result of applying the proposed customized architectures, processes, and metrics in various devices.

An eBook Service System based on VOD Broadcasting Contents of Smart TV (스마트 TV의 VOD 방송 콘텐츠 기반 전자책 서비스 시스템 개발)

  • Jun, Eung Sup;Chang, Yong Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.257-266
    • /
    • 2014
  • In this paper, we propose the development of an eBook Service System based on VOD Broadcasting Contents(eBSS-VOD) which protects the illegal copy through the effective DRM strategy. Here, eBSS-VOD is composed of three sub-systems - eBook server management system, ePub Builder, and eBook App - according to the functional points of view. The eBook server management system operates to manage the eBooks, the encription keys, the VOD contents, the membership and the history of users' viewing log. The ePub Builder assists to produce eBooks by DRM strategy. The eBook App provides users with the utility services of VOD viewing and eBook purchase processing. The proposed eBSS-VOD, differently from the current eBook systems, helps to increase the users' interests in reading books and to motivate the users' purchasing needs and it also makes new distribution channel for eBooks based on VOD broadcasting contents through smart applications. We provides the differentiated eBook builder which are based on ePub3.0 and DRM strategy. Through empirical survey results on users' interests and purchase intention for eBooks, we show that the proposed eBSS-VOD has the comparative effects compared to the current systems.

Development of Genuine Product Authentication Framework and Genuine Distinction Algorithm Using Design QR Code (디자인 QR코드 기반 정품인증 프레임워크 및 정품판별 알고리즘 개발)

  • Heo, Gyeongyong;Lee, Imgeun;Park, Some Sick;Woo, Young Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.13-20
    • /
    • 2015
  • A genuine product authentication framework and genuine distinction algorithm based on design QR code is proposed in this paper. The proposed framework consists of design QR code, a smart phone application for authentication, and a server system. Design QR code is a shape-modification of conventional QR code according to manufacturer's and/or product's need. In the design QR code, information about manufacturer and product is written. The written information can be read with general QR code reader, however, the content is transformed with authentication code, used in the first step authentication, and the meaning cannot be inferred. The application conducts the first step authentication and sends the resulting information to the server system for the second step authentication. The server system decides the genuinity using look-up history. The proposed framework can improve the authentication effect while minimizing the additional costs by managing the history through the server system. The proposed framework has proven to be effective in actual use, such as that used for the management of garbage bags in Ansan city.

Location Management System of Moving Objects to Considering Location of Guardian based on WiFi Technology (보호자의 위치를 고려한 WiFi 기술 기반 이동 객체의 위치 관리 시스템)

  • Kim, Jin-Deog;Kang, Hyo-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2345-2351
    • /
    • 2013
  • LBS(Location Based System) usually uses GPS technology to measure the exact position of the moving object. However, the method of managing location which utilizes the WiFi technology of mobile phone has not been introduced so far. The method of managing moving objects in view of the location of guardian has also not been proposed. In this paper, a new location management system of moving objects which take guardian's location into consideration is proposed. Specifically, the three methods of searching for missing child proposed in this paper are as follows : 1) a method based on an app for smart phone, 2) a method based on control server, 3) a method based on control server and fixed APs. Because the proposed system reflects the location of the guardian, the guardian is able to identify the state of child immediately and the workload can be reduced.

A Location-based Highway Safety System using Smart Mobile Devices (스마트 모바일 장치를 이용한 위치기반 고속도로 안전시스템)

  • Lee, Jaehyun;Park, Sungjin;Yoo, Joon
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.389-397
    • /
    • 2016
  • In this paper, we propose a highway safety system that comprises a small number of central servers and smart mobile devices. To implement this system, we constructed a central server that collects GPS location information on cars, whose update messages are decreased via the car location estimation algorithm. The in-car mobile devices use the accelerometer sensors to detect hazardous situations; this information is updated to the central server that relays the information to the corresponding endangered cars via location-based unicast using LTE communication. To evaluate the proposed algorithm, we equipped a mobile device app on a real car and conducted real experiments in various environments such as city streets, rural areas, and highway roads. Furthermore, we conducted simulations to evaluate the propagation of danger information. Finally, we conducted simulated experiments to detect car collisions as well as exceptions, such as falling of the mobile device from the cradle.