• Title/Summary/Keyword: Heterogeneous Device

Search Result 183, Processing Time 0.028 seconds

A study on the discharge ratio of two solutions with different viscosities using computational fluid analysis (전산유체해석을 이용한 점도가 다른 이종 용액의 토출 비율 연구)

  • Ko, Min-Sung;Wi, Eun-Chan;Yun, Yi-Seob;Kong, Jung-Shik;Lee, Joong-Bae;Kim, Min-Su;Baek, Seung-Yub
    • Design & Manufacturing
    • /
    • v.15 no.4
    • /
    • pp.43-50
    • /
    • 2021
  • Pump-cap is a device for discharging the contents stored inside a container to the outside of the container by a simple operation by a certain amount. In particular, in recent years, as the number of cosmetic products made of functional materials has rapidly increased, the development of convenient containers for functional materials is being actively conducted. Among these, there are a growing number of products that show their efficacy only by mixing two components, so the development of a dual pump cap container is necessary. However, the conventional dual pump cap container has a problem in that it is difficult to implement a quantitative discharge as solutions having different viscosities are used. Therefore, in this study, a discharge port of a dual pump cap that can apply an optimal ratio was designed by analyzing the discharge amount of two components with different viscosities through computational fluid dynamics. Since the discharge amount is affected by the size of the discharge port, the higher the viscosity of the solution, the larger the discharge port should be set. Conversely, the lower the viscosity, the smaller the discharge port should be. Through this, it is possible to dispense a fixed amount of a heterogeneous solution by one pumping, and it is determined that the user's convenience will increase.

Improved Sensor Filtering Method for Sensor Registry System (센서 레지스트리 시스템을 위한 개선된 센서 필터링 기법)

  • Chen, Haotian;Jung, Hyunjun;Lee, Sukhoon;On, Byung-Won;Jeong, Dongwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.7-14
    • /
    • 2022
  • Sensor Registry System (SRS) has been devised for maintaining semantic interoperability of data on heterogeneous sensor networks. SRS measures the connectability of the mobile device to ambient sensors based on positions and only provides metadata of sensors that may be successfully connected. The step of identifying the ambient sensors which can be successfully connected is called sensor filtering. Improving the performance of sensor filtering is one of the core issues of SRS research. In reality, GPS sometimes shows the wrong position and thus leads to failed sensor filtering. Therefore, this paper proposes a new sensor filtering strategy using geographical embedding and neural network-based path prediction. This paper also evaluates the service provision rate with the Monte Carlo approach. The empirical study shows that the proposed method can compensate for position abnormalities and is an effective model for sensor filtering in SRS.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things (사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.707-714
    • /
    • 2023
  • The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

Awareness and Application of Internet of Things in Universities Libraries in Kwara State, Nigeria

  • Saliu Abdulfatai
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.4
    • /
    • pp.65-84
    • /
    • 2024
  • The study was conducted on the awareness and application of internet of things in universities libraries in Kwara State, Nigeria. the study formulated used four research questions and used eighty five (85) samples as the population using total enumerative sampling techniques. A survey method was used in undertaking the study, in which answers were sought on the level of awareness of the internet of things in universities libraries in Kwara State, the extent of application of the internet of things in universities libraries in Kwara State, the benefit of internet of things in universities libraries in Kwara State, the challenges faced in the application of internet of things in universities libraries in Kwara State. The data collected from the study were analyzed using frequency tables and percentage. The study discovered that there the students are aware of the internet of things in universities libraries in Kwara State and the benefit of internet of a things include: Device in the IoT platforms are heterogeneous and are based on different hardware platforms and networks, It gives the high level of interoperability and interconnectivity, IoT platform has sensors which detect or measure any changes in the environment to generate data that can report on their status or even interact with the environment, IoT comes with the combination of algorithms and computation, software & hardware that makes it smart and Anything can be interconnected with the global information and communication infrastructure and the study identified data interpretation problem, Lack of skilled and specialized workers, Cost and Challenges in online security as well as Software complexity are major challenges faced in the application of internet of things in universities libraries in Kwara State. In conclusion the study made some recommendations which include that: Future libraries should be equipped with new technologies and networking devices as soon as possible. As this will be essential for users and librarians to have sufficient knowledge about IOT technologies.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

An Algorithm for Managing Storage Space to Maximize the CPU Availability in VOD Systems (VOD 시스템에서 CPU 가용성을 최대화하는 저장공간관리 알고리즘)

  • Jung, Ji-Chan;Go, Jae-Doo;Song, Min-Seok;Sim, Jeong-Seop
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.3
    • /
    • pp.140-148
    • /
    • 2009
  • Recent advances in communication and multimedia technologies make it possible to provide video-on-demand(VOD) services and people can access video servers over the Internet at any time using their electronic devices, such as PDA, mobile phone and digital TV. Each device has different processing capabilities, energy budgets, display sizes and network connectivities. To support such diverse devices, multiple versions of videos are needed to meet users' requests. In general cases, VOD servers cannot store all the versions of videos due to the storage limitation. When a device requests a stored version, the server can send the appropriate version immediately, but when the requested version is not stored, the server first converts some stored version to the requested version, and then sends it to the client. We call this conversion process transcoding. If transcoding occurs frequently in a VOD server, the CPU resource of the server becomes insufficient to response to clients. Thus, to admit as many requests as possible, we need to maximize the CPU availability. In this paper, we propose a new algorithm to select versions from those stored on disk using a branch and bound technique to maximize the CPU availability. We also explore the impact of these storage management policies on streaming to heterogeneous users.

DDS-Based BLE Adaptor for Standard Profile Data Interoperation in Internet of Things (사물인터넷 환경에서 표준 Profile 데이터 상호운용을 위한 DDS 기반 BLE 어댑터)

  • Oh, Jung-Hoon;Back, Moon-Ki;Oh, Gil-Tak;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.403-410
    • /
    • 2016
  • IoT(Internet of Things) has purpose for providing new kind of service though interaction with everything. With development of IoT, computer model which is based on internet is changed to distributed connection model between heterogeneous things. There is a problem that it is impossible to connect between each other different protocols. To solve this problem, we should abstract each of things of data through using adaptor of middleware structure in order to make consistent data unit. In this paper, we propose BLE(Bluetooth Low Energy) adaptor, which is interaction with things, based on DDS(Data Distribution Service) that is real-time standard middleware. It is possible to data interaction between BLE Devices as well as two-way data interaction with different protocol devices. Also existing BLE Devices and study have a problem that Data exchange without using a standard data format of a profile defined by the Bluetooth SIG. Using the data formats defined independently by a problem that should not exchange data according to the type and manufacturer of the device BLE. The BLE adapter to solve this problem, the classification and analysis of the 12 stand profile was applied to create a profile based on the standard data format. It is possible to get wide interoperability of not affected on the BLE devices type and manufacturer of the device because it is applied a profile that standard data format.

Design of Real-time Vital-Sign Encryption Module for Wearable Personal Healthcare Device (착용형 개인 건강관리 장치를 위한 실시간 생체신호 암호화 모듈의 설계)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.221-231
    • /
    • 2013
  • Exchanging personal health information(PHI) is an essential process of healthcare services using information and communication technology. But the process have the inherent risk of information disclosure, so the PHI should be protected to ensure the reliability of healthcare services. In this paper, we designed encryption module for wearable personal health devices(PHD). A main goal is to guarantee that the real-time encoded and transmitted PHI cannot be allowed to be read, revised and utilized without user's permission. To achieve this, encryption algorithms as DES and 3DES were implemented in modules operating in Telos Rev B(16bit RISC, 8Mhz). And the experiments were performed in order to evaluate the performance of encryption and decryption using vital-sign measured by PHD. As experimental results, an block encryption was measured the followings: DES required 1.802 ms and 3DES required 6.683 ms. Also, we verified the interoperability among heterogeneous devices by testing that the encrypted data in Telos could be decoded in other machines without errors. In conclusion, the encryption module is the method that a PHD user is given the powerful right to decide for authority of accessing his PHI, so it is expected to contribute the trusted healthcare service distribution.

Design and Implementation of an Adaptive User Interface for Home Network Environments (홈 네트워크 환경을 위한 적응형 사용자 인터페이스 설계 및 구현)

  • Jung, Jae-Hwan;Jang, Hyun-Su;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.37-44
    • /
    • 2008
  • With the growing proliferation of mobile computing devices, several industrial and academic research groups have a vigorous studying to remote control for various appliances with mobile devices such as Notebooks, PDAs, and Smartphones in home network environments. We can utilize the good points of mobile devices such as portability and usability so that we can remote control and manage the mobile devices connected on home networks anytime, anywhere. However, mobile devices use different languages. Therefore, they cause some problems because their interfaces and the methods of operation are different each other. To solve these problems, there are two consideration. First, we may be solved development of the user interface and difficulty of maintenance in order to control various heterogeneous devices. Second, we may provide the user interface which is dynamically adapting user's preferences and device characteristics. To satisfy these considerations, we describe the design of an adaptive user interface for home network environments using the UIML (User Interface Markup Language) based on XML (eXtensible Markup Language) and the profile information of the user and device. Therefore, we present several implementation examples that show how the framework can form the basis of prototypical applications.