• Title/Summary/Keyword: Internet Broadcasting Service

Search Result 844, Processing Time 0.025 seconds

A Design of Smart Sensor Framework for Smart Home System Bsed on Layered Architecture (계층 구조에 기반을 둔 스마트 홈 시스템를 위한 스마트 센서 프레임워크의 설계)

  • Chung, Won-Ho;Kim, Yu-Bin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.49-59
    • /
    • 2017
  • Smart sensing plays a key role in a variety of IoT applications, and its importance is growing more and more together with the development of artificial intelligence. Therefore the importance of smart sensors cannot be overemphasized. However, most studies related to smart sensors have been focusing on specific application purposes, for example, security, energy saving, monitoring, and there are not much effort on researches on how to efficiently configure various types of smart sensors to be needed in the future. In this paper, a component-based framework with hierarchical structure for efficient construction of smart sensor is proposed and its application to smart home is designed and implemented. The proposed method shows that various types of smart sensors to be appeared in the near future can be configured through the design and development of necessary components within the proposed software framework. In addition, since it has a layered architecture, the configuration of the smart sensor can be expanded by inserting the internal or external layers. In particular, it is possible to independently design the internal and external modules when designing an IoT application service through connection with the external device layer. A small-scale smart home system is designed and implemented using the proposed method, and a home cloud operating as an external layer, is further designed to accommodate and manage multiple smart homes. By developing and thus adding the components of each layer, it will be possible to efficiently extend the range of applications such as smart cars, smart buildings, smart factories an so on.

An Accuracy Enhancement for Anchor Free Location in Wiresless Sensor Network (무선 센서 네트워크의 고정 위치에 대한 정확도 향상)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.77-87
    • /
    • 2018
  • Many researches have been focused on localization in WSNs. However, the solutions for localization in static WSN are hard to apply to the mobile WSN. The solutions for mobile WSN localization have the assumption that there are a significant number of anchor nodes in the networks. In the resource limited situation, these solutions are difficult in applying to the static and mobile mixed WSN. Without using the anchor nodes, a localization service cannot be provided in efficient, accurate and reliable way for mixed wireless sensor networks which have a combination of static nodes and mobile nodes. Also, accuracy is an important consideration for localization in the mixed wireless sensor networks. In this paper, we presented a method to satisfy the requests for the accuracy of the localization without anchor nodes in the wireless sensor networks. Hop coordinates measurements are used as an accurate method for anchor free localization. Compared to the other methods with the same data in the same category, this technique has better accuracy than other methods. Also, we applied a minimum spanning tree algorithm to satisfy the requests for the efficiency such as low communication and computational cost of the localization without anchor nodes in WSNs. The Java simulation results show the correction of the suggested approach in a qualitative way and help to understand the performance in different placements.

A Route Stability-based Direction Guided Routing Protocol in Mobile Ad-hoc Wireless Networks (모바일 Ad-hoc 무선 네트워크에서 경로 안정성 기반 방향성 안내 라우팅 프로토콜)

  • Ha, Suehyung;Le, The Dung;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.257-264
    • /
    • 2012
  • In this paper, we propose a Route Stability-based Direction Guided Routing protocol(RSDGR) in mobile ad-hoc wireless networks. The main features and contributions of the proposed routing protocol are as follows. First, it can calculate link stability between two nodes as well as route stability of multi hop quantitatively by using nodes' mobility. And this protocol can establish the most stable path between a source node and a destination node. Second, according to the route stability between a source node and a destination node, it can control and optimize the direction guided region dynamically for route setup. Third, we suggest theoretical model for quantitative calculation of link stability between two nodes and route stability of multi hop path. The performance evaluation of the proposed routing protocol is performed by simulation using OPNET(Optimized Network Engineering Tool) and theoretical analysis. The results of performance evaluation show that the patterns of PDR are similar in simulation and analysis according to route stability. The faster mobile nodes' velocity and the smaller source node's direct guided reigion, the lower route stability and PDR and the higher delay and control overhead related to this.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Design and Implementation of the Spatio-Temporal DSMS for Moving Object Data Streams (이동체 데이타 스트림을 위한 시공간 DSMS의 설계 및 구현)

  • Lee, Ki-Young;Kim, Joung-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.159-166
    • /
    • 2008
  • Recently, according to the rapid development of location positioning technology and wireless communications technology and increasement of usage of moving object data, many researches and developments on the real-time locating systems which provides real time service of moving object data stream are under proceeding. However, MO (Moving Object) DBMS used based system in the in these systems is the inefficient management of moving object data streams, and the existing DSMS (Data Stream Management System) has problems that spatio-temporal data are not handled efficiently. Therefore, in this thesis, we designed and implemented spatio-temporal DSMS for efficient real-time management of moving object data stream. This thesis implemented spatio-temporal DSMS based STREAM (STanford stREam dAta Manager) of Stanford University is supporting real-time management of moving object data stream and spatio-temproal query processing and filtering for reduce the input loading. Specifically, spatio-temporal operators of the spatio-temporal DSMS support standard interface of SQL form which extended "Simple Feature Specification for SQL" standard specifications presented by OGC for compatibility. Finally, implemented spatio-temporal DSMS in this thesis, proved the effectiveness of the system that as applied real-time monitoring areas that require real-time locating of object data stream DSMS.

  • PDF

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

A Study on Customized Smart Fire and Security System for one person household (1인 가구를 위한 맞춤형 스마트 화재 및 방범 시스템에 대한 연구)

  • Han, Hoonyoung;Kim, Gyunho;Ju, Minsu;Ko, Dongbeom;Kim, Jungjoon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.295-304
    • /
    • 2019
  • This paper introduces a customized Smart Fire and Crime system for one person households. Recently, the number of one person household has skyrocketed due to the increasing number of one person household and the aging population. As a result, the demand for private security companies for one person household is increasing and smart security systems that are applied with rapidly evolving IoT and sensor technologies are also becoming a major issue. However, despite the increasing trend of one person households, the existing system focuses on multiple households, so that there are disadvantages of the one person households to operate in such a big system which operate separately. Therefore, in this paper, we design and implement a system that provides a personalized safety service for one person household that integrates a security system and a fire monitoring system. This will help prevent criminal activity in places where the police can not reach at a lower cost than using existing private companies, and help monitor the situation of the houses in real time.

Effect of Using Home Training App on Quality of Life in the Untact Era (홈 트레이닝 앱 사용이 언택트 시대의 삶의 질에 미치는 영향)

  • Chen, Qiuying;Lee, Sang-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.155-163
    • /
    • 2022
  • In order to avoid the spread of Covid-19, outdoor activities are decreasing worldwide and the time spent at home is increasing. As physical activity declines, the number of people who feel bored, restless and immune deficient is increasing. As indoor life becomes more permanent, multiple approaches to home workout are becoming active. This paper examines how the Covid blue (boredom and social anxiety) produced in the no-touch era affects quality of life through the use of home training applications. Questionnaires were collected from Chinese people using a website dedicated to Chinese questionnaires, and finally 383 appropriate data were analyzed using SPSS24.0 and AMOS24.0. The research results showed that the actual experience of using home workout had a positive impact on quality of life. The higher the user's sense of social unease about being late in the untact, It was found that the higher the social anxiety perceived by users about the untact era, the higher the interactivity and exercise satisfaction with the home workout app. Home workout application can improve exercise satisfaction and quality of life, which are more positive effects beyond the result of resolving consumers' boredom. Therefore, it can be used as a channel for digital services.

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.