• Title/Summary/Keyword: Internet Based Laboratory

Search Result 495, Processing Time 0.034 seconds

A Study on Application of Common Phrase Function Based on WIPI Platform (WIPI 플랫폼 기반의 상용어구 기능 적용에 관한 연구)

  • Kim Chang-Soo;Yim Chang-Mook;Yim Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.480-486
    • /
    • 2005
  • Recently, domestic interest about wireless internet is rising gradually. Characteristic of present domestic wireless market is that mobile communication businessmans appropriate each other different mobile platform. So, contents provider's development environment can not be same each other. This makes contents providers repeat same work. To solve this problem, standardization work of wireless internet market was begun. The three mobile communication companies and TTA (Telecommunications Technology Association), RRU(Radio Research Laboratory), ETRI(Electronics and Telecommunications Research Institute) progressed standardization. By the result, May 2002, WIPI that is wireless standard platform selected by mobile platform standard that is TTA organization standard. In this paper, 1 am going to examine the WIPI. WIPI can reduce mostly expense that happen when we use different platform. 1 design and embody common phrase function. Through this, 1 am going to show improvement of the character input speed in cellular phone. And I wish to discuss expected cost decrease effect. Investigate about platform of treatise that is used in domestic. analyze about the characteristic, merits and demerits. Chatting service and common phrase function design and embody. Finally, wish to discuss about advantage of common phrase function and practical use field.

Individual Presence-and-Preference-Based Local Intelligent Service System and Mobile Edge Computing (개인 프레즌스-선호 기반 지능형 로컬 서비스 시스템과 모바일 엣지 컴퓨팅 환경에서의 적용 방안)

  • Kim, Kilhwan;Jang, Jin-San;Keum, Changsup;Chung, Ki-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.523-535
    • /
    • 2017
  • Local intelligent services aim at controlling local services such as cooling or lightening services in a certain local area, using Internet-of-Things (IoT) sensor data in the area. As the IoT paradigm has evolved, local intelligent services have gained increasing attention. However, most of the local intelligent service mechanism proposed so far do not directly take the users' presence and service preference information into account for controlling local services. This study proposes an individual presence-and-preference-based local service system (IPP-LISS). We present a intelligent service control algorithm and implement a prototype system of IPP-LISS. Typically, the intelligence part of IPP-LISS including the prediction models, is generated on remote server in the cloud because of their compute-intense aspect. However, this can cause huge data traffic between IoT devices and servers in the cloud. The emerging mobile edge computing technology will be a promising solution of this challenge of IPP-LISS. In this paper, we implement IPP-LISS in the cloud, and then, based on the implementation result, we discuss applying the mobile edge computing technology to the IPP-LISS application.

Implementation of Virtual Laboratory based on the Internet (인터넷 기반 가상실험실의 구현)

  • 김문환;이호재;주영훈;박진배
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.05a
    • /
    • pp.311-314
    • /
    • 2003
  • 많은 공학 연구에서 실제 시스템을 활용한 검증은 매우 중요하다. 특히 제어공학의 경우 개발된 신 이론을 적용 및 검증할 수 있는 실험장비의 확보는 필수적이다. 그러나 현실적으로 적절한 실험장비를 확보하는 것은 비경제적이다. 인터넷을 활용하여 실험장비의 원격실험을 가능케 한 가상실험실은 제어공학 연구에 유용하다. 인터넷의 보급과 함께 가상실험실에 대한 연구가 활발히 진행되고 있으나, 대부분의 경우가 특정 시스템에 한정된 가상 실험실의 구축에 한정되어 있다. 본 논문에서는 기존 연구와 달리 다양한 실험 장비에 적용 가능하며 다양한 제어 기법을 제공하는 가상실험실의 구현을 제안한다. 제안된 가상실험실은 서버-클라이언트 구조를 가지며 다중 제어 인터페이스로 구현된다.

  • PDF

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network

  • Tama, Bayu Adhi;Rhee, Kyung-Hyune
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1203-1212
    • /
    • 2017
  • Intrusion detection systems (IDSs) are crucial in this overwhelming increase of attacks on the computing infrastructure. It intelligently detects malicious and predicts future attack patterns based on the classification analysis using machine learning and data mining techniques. This paper is devoted to thoroughly evaluate classifier ensembles for IDSs in IEEE 802.11 wireless network. Two ensemble techniques, i.e. voting and stacking are employed to combine the three base classifiers, i.e. decision tree (DT), random forest (RF), and support vector machine (SVM). We use area under ROC curve (AUC) value as a performance metric. Finally, we conduct two statistical significance tests to evaluate the performance differences among classifiers.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Development of SCADA System based on Web Technology (웹 기술을 이용한 변전소 감시제어 시스템 개발)

  • Lee K. S.;Zhang Li;Lim S. I.;Lee S. J.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.85-87
    • /
    • 2004
  • Supervisory control and data acquisition (SCADA) systems are essential parts of power system which employ a wide range of computers and communication technologies. The traditional SCADA system is mainly for information exchange in only one company, and the information is provided only to the operator or administrator. But in the deregulated environment, we need much more information, which can be exchanged among different companies. With the rapid development of internet, we can use it to access information easily. This paper proposes web technologies to be applied in power system in order to display some important information through accessing data from database, and to realize the real time control of the substation. The functions of SCADA system will be implemented by a set of Web-based components. The monitoring and control of standard 154[kV] substation model is already realized in the laboratory test. The Web-based SCADA system is able to provide sufficient information and control for pow or system through an efficient and economical way.

  • PDF

Effective Engineering Experiments Using Remote Virtual Instruments and DC-Motor (원격 가상 계측장치와 DC 모터를 이용한 효과적인 공학실험)

  • Choi, Seong-Joo;Mikhail, G.R.
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.1 no.1
    • /
    • pp.99-105
    • /
    • 2009
  • Computer-based learning with the access to World Wide Web has become a fundamental base for adopting beneficial education. It provides significant facilities such as animation and interactive processes that are not possible with textbooks. Web/Internet-enabled applications which is fully controlled and monitored from remote locations are extensively used by a number of Universities, national laboratories and companies for different kinds of applications all over the world. Continuous advances in computers and electronics coupled with drooping prices of hardware have made Web/Internet-based technologies less costly than before, particularly for educational organizations. Thus, it is more affordable to invest in these technologies that are essential for both expanding education over Web and further improving and advancing such technologies the application of remote virtual instruments will be demonstrated in this context along with experiments that can be adopted to be educational experimental lab for Engineering Education students.

  • PDF

Knowledge Transfer Using User-Generated Data within Real-Time Cloud Services

  • Zhang, Jing;Pan, Jianhan;Cai, Zhicheng;Li, Min;Cui, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.77-92
    • /
    • 2020
  • When automatic speech recognition (ASR) is provided as a cloud service, it is easy to collect voice and application domain data from users. Harnessing these data will facilitate the provision of more personalized services. In this paper, we demonstrate our transfer learning-based knowledge service that built with the user-generated data collected through our novel system that deliveries personalized ASR service. First, we discuss the motivation, challenges, and prospects of building up such a knowledge-based service-oriented system. Second, we present a Quadruple Transfer Learning (QTL) method that can learn a classification model from a source domain and transfer it to a target domain. Third, we provide an overview architecture of our novel system that collects voice data from mobile users, labels the data via crowdsourcing, utilises these collected user-generated data to train different machine learning models, and delivers the personalised real-time cloud services. Finally, we use the E-Book data collected from our system to train classification models and apply them in the smart TV domain, and the experimental results show that our QTL method is effective in two classification tasks, which confirms that the knowledge transfer provides a value-added service for the upper-layer mobile applications in different domains.

Economic application of structural health monitoring and internet of things in efficiency of building information modeling

  • Cao, Yan;Miraba, Sepideh;Rafiei, Shervin;Ghabussi, Aria;Bokaei, Fateme;Baharom, Shahrizan;Haramipour, Pedram;Assilzadeh, Hamid
    • Smart Structures and Systems
    • /
    • v.26 no.5
    • /
    • pp.559-573
    • /
    • 2020
  • One of the powerful data management tools is Building Information Modeling (BIM) which operates through obtaining, recalling, sharing, sorting and sorting data and supplying a digital environment of them. Employing SHM, a BIM in monitoring systems, would be an efficient method to address their data management problems and consequently optimize the economic aspects of buildings. The recording of SHM data is an effective way for engineers, facility managers and owners which make the BIM dynamic through the provision of updated information regarding the occurring state and health of different sections of the building. On the other hand, digital transformation is a continuous challenge in construction. In a cloud-based BIM platform, environmental and localization data are integrated which shape the Internet-of-Things (IoT) method. In order to improve work productivity, living comfort, and entertainment, the IoT has been growingly utilized in several products (such as wearables, smart homes). However, investigations confronting the integration of these two technologies (BIM and IoT) remain inadequate and solely focus upon the automatic transmission of sensor information to BIM models. Therefore, in this composition, the use of BIM based on SHM and IOT is reviewed and the economic application is considered.

Regionalized TSCH Slotframe-Based Aerial Data Collection Using Wake-Up Radio (Wake-Up Radio를 활용한 지역화 TSCH 슬롯프레임 기반 항공 데이터 수집 연구)

  • Kwon, Jung-Hyok;Choi, Hyo Hyun;Kim, Eui-Jik
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • This paper presents a regionalized time slotted channel hopping (TSCH) slotframe-based aerial data collection using wake-up radio. The proposed scheme aims to minimize the delay and energy consumption when an unmanned aerial vehicle (UAV) collects data from sensor devices in the large-scale service area. To this end, the proposed scheme divides the service area into multiple regions, and determines the TSCH slotframe length for each region according to the number of cells required by sensor devices in each region. Then, it allocates the cells dedicated for data transmission to the TSCH slotframe using the ID of each sensor device. For energy-efficient data collection, the sensor devices use a wake-up radio. Specifically, the sensor devices use a wake-up radio to activate a network interface only in the cells allocated for beacon reception and data transmission. The simulation results showed that the proposed scheme exhibited better performance in terms of delay and energy consumption compared to the existing scheme.