• Title/Summary/Keyword: Internet Applications

Search Result 2,427, Processing Time 0.027 seconds

Analysis of Key Fourth Industrial Revolution Technologies and Their Applications

  • Leen, Byeong Hyeon;Seo, Kiwon;Jo, Sung-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.552-553
    • /
    • 2022
  • Key technologies of Fourth Industrial Revolution and their innovative applications are expected to bring another technological revolution going forward. The present study takes a close look at the Internet of Things (IoT) among the key technologies of the Fourth Industrial Revolution. In particular, sensor devices, which serve as the core of IoT-based application systems, are analyzed. This study also examines various applications and solutions using IoT-based systems.

  • PDF

GreenIoT Architecture for Internet of Things Applications

  • Ma, Yi-Wei;Chen, Jiann-Liang;Lee, Yung-Sheng;Chang, Hsin-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.444-461
    • /
    • 2016
  • A power-saving mechanism for smartphone devices is developed by analyzing the features of data that are received from Internet of Things (IoT) sensors devices to optimize the data processing policies. In the proposed GreenIoT architecture for power-saving in IoT, the power saving and feedback mechanism are implemented in the IoT middleware. When the GreenIoT application in the power-saving IoT architecture is launched, IoT devices collect the sensor data and send them to the middleware. After the scanning module in the IoT middleware has received the data, the data are analyzed by a feature evaluation module and a threshold analysis module. Based on the analytical results, the policy decision module processes the data in the device or in the cloud computing environment. The feedback mechanism then records the power consumed and, based on the history of these records, dynamically adjusts the threshold value to increase accuracy. Two smart living applications, a biomedical application and a smart building application, are proposed. Comparisons of data processed in the cloud computing environment show that the power-saving mechanism with IoT architecture reduces the power consumed by these applications by 24% and 9.2%.

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

Design and Implementation of Development Environment for WIPI Applications (위피 응용프로그램 개발환경 설계 및 구현)

  • You Yong-Duck;Park Choong-Bum;Choi Hoon;Kim Woo-Sik
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.749-756
    • /
    • 2005
  • We developed the CNU nt emulator which is an development environment for WIPI applications, wireless Internet applications for cellular phones with the WIPI software platform. The CNU WIPI emulator provides stable memory management and ability of installing, executing, deleting or managing WIPI applications. WIPI WAM provides quick execution of applications and convenient debugging function. In this paper, we describe the design, implementation issues of the CNU WIPI emulator and show its correctness of executing and performance improvement over $25\%$ by comparing it with other WIPI emulators.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

Performance Analysis on X-Internet Based Applications and Web Applications (X-Internet 기반의 어플리케이션과 웹 어플리케이션의 성능평가)

  • Lee, Woo-Key;Lee, Jeong-Hoon;Yoon, Seok-Ho;Cha, Chang-Il;Choi, Young-Mi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.67-70
    • /
    • 2005
  • 최근 응용 프로그램은 대다수가 웹으로 이루어져 있다. 그것은 빠르게 변화하는 비즈니스 시장에서 살아남기 위해 기업들이 배포 및 유지보수가 쉬운 웹 응용프로그램을 선호했기 때문이다. 하지만 이제는 다양한 고객의 요구조건을 웹 응용 프로그램이 충족시키기에는 한계가 있다. 이런 문제를 해결하고자 많은 기업은 앞 다투어서 새로운 인터넷 구조인X-Internet기반의 응용프로그램을 출시하고 있으면 기업들도 도입을 서두르고 있다. 본 논문은 X-Internet 기반의 응용프로그램과 웹 응용프로그램의 성능을 비교 분석함으로써 X-Internet 기술의 가능성을 알아보고자 한다.

  • PDF

Internet Roundtrip Delay Prediction Using the Maximum Entropy Principle

  • Liu, Peter Xiaoping;Meng, Max Q-H;Gu, Jason
    • Journal of Communications and Networks
    • /
    • v.5 no.1
    • /
    • pp.65-72
    • /
    • 2003
  • Internet roundtrip delay/time (RTT) prediction plays an important role in detecting packet losses in reliable transport protocols for traditional web applications and determining proper transmission rates in many rate-based TCP-friendly protocols for Internet-based real-time applications. The widely adopted autoregressive and moving average (ARMA) model with fixed-parameters is shown to be insufficient for all scenarios due to its intrinsic limitation that it filters out all high-frequency components of RTT dynamics. In this paper, we introduce a novel parameter-varying RTT model for Internet roundtrip time prediction based on the information theory and the maximum entropy principle (MEP). Since the coefficients of the proposed RTT model are updated dynamically, the model is adaptive and it tracks RTT dynamics rapidly. The results of our experiments show that the MEP algorithm works better than the ARMA method in both RTT prediction and RTO estimation.

Quality Discrimination on the Internet under Congestion Effects and Strategic Behavior by Users (혼잡효과가 있는 경우의 인터넷 백본서비스의 품질차별화 전략)

  • Jung, Choong-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.9 no.4
    • /
    • pp.740-758
    • /
    • 2006
  • This paper is related to the optimal pricing of Internet Backbone Services that are differentiated according to the size of the bandwidth required for applications with different quality sensitivities, Itdiscusses IBP (Internet Backbone Provider) optimal nonlinear pricing process in the presence of a congestion externality in addition to strategic behavior by users. In this scenario, the quality of service provided may reach its socially optimal level irrespective of strategic behavior by users and may be independent of the characteristics of the applications delivered over the Internet.

  • PDF

Distributed Design System as a New Paradigm Towards Future Collaborative Architectural Design Process

  • Han, Seung Hoon
    • Architectural research
    • /
    • v.7 no.2
    • /
    • pp.23-33
    • /
    • 2005
  • The use of computers in architectural professions has grown with the power of easy data management, increased sophistication of standalone applications, inexpensive hardware, improved speed of processing, use of standard library and tools for communication and collaboration. Recently, there has been a growing interest in distributed CAAD (Computer-Aided Architectural Design) integration due to the needs of direct collaboration among project participants in different locations, and Internet is becoming the optimal tool for collaboration among participants in architectural design and construction projects. The aim of this research is to provide a new paradigm for a CAAD system by combining research on integrated CAAD applications with recent collaboration technologies. To accomplish this research objective, interactive three-dimensional (3D) design tools and applications running on the Web have been developed for an Internet-based distributed CAAD application system, specifically designed to meet the requirements of the architectural design process. To this end, two different scopes of implementation are evaluated: first, global architecture and the functionality of a distributed CAAD system; and, second, the association of an architectural application to the system.