• Title/Summary/Keyword: Internet Monitoring

Search Result 1,325, Processing Time 0.024 seconds

CloudSwitch: A State-aware Monitoring Strategy Towards Energy-efficient and Performance-aware Cloud Data Centers

  • Elijorde, Frank;Lee, Jaewan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4759-4775
    • /
    • 2015
  • The reduction of power consumption in large-scale datacenters is highly-dependent on the use of virtualization to consolidate multiple workloads. However, these consolidation strategies must also take into account additional important parameters such as performance, reliability, and profitability. Resolving these conflicting goals is often the major challenge encountered in the design of optimization strategies for cloud data centers. In this paper, we put forward a data center monitoring strategy which dynamically alters its approach depending on the cloud system's current state. Results show that our proposed scheme outperformed strategies which only focus on a single metric such as SLA-Awareness and Energy Efficiency.

A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services

  • Ortega, Juan A.;Fuentes, Daniel;Alvarez, Juan A.;Gonzalez-Abril, Luis;Velasco, Francisco
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1457-1471
    • /
    • 2011
  • A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware.

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems

  • Islam, Md. Tahidul;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2213-2231
    • /
    • 2013
  • Compressed sensing is a novel technology used in the field of wireless communication and sensor networks for channel estimation, signal detection, data gathering, network monitoring, and other applications. It plays a significant role in highly secure, real-time, well organized, and cost-effective data communication in smart-grid (SG) systems, which consist of multi-tier network standards that make it challenging to synchronize in power management communication. In this paper, we present a multi-layer communication model for SG systems and propose compressed-sensing based data transmission at every layer of the SG system to improve data transmission performance. Our approach is to utilize the compressed-sensing procedure at every layer in a controlled manner. Simulation results demonstrate that the proposed monitoring devices need less transmission power than conventional systems. Additionally, secure, reliable, and real-time data transmission is possible with the compressed-sensing technique.

A Study on the Blue-green algae Monitoring Applications Design using Raspberry Pi (라즈베리 파이를 이용한 녹조 모니터링 프로그램 설계에 관한 연구)

  • KIM, Kyung-Min;KIM, Tae-Hyeon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.2
    • /
    • pp.376-383
    • /
    • 2016
  • In this paper, the blue-green algae monitoring program of applying IoT(Internet of things) technologies is designed and implemented that can check out the status of the river's water quality in real time. The proposed system is to extract the image data from the camera of raspberry pi by an wireless network, and it is analyzed through the HSV color model. We measure the temperature using a DS18B20 1-wire temperature sensor. The extracted information of image data and temperature is then analyzed in C and Python programs for use with Raspberry Pi. The XML data in PHP program is made from the analyzed information and provides Web services. It also allows to refer the XML data using mobile devices.

Architecture Design for Guaranteeing Quality of Data Communication in NGcN (차세대 통합망에서 데이터 통신의 품질을 보장하기 위한 기법)

  • Ryu Sang-Hoon;Baik Doo-Kwon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.1-4
    • /
    • 2005
  • Information communication environment integrates communication, broadcasting and internet, and Digital Convergence service emerges in result. Thus, the effective routers are needed so that they can transmit a huge number of data to core internet through appropriate base center. Therefore, the network guaranteeing QoS in transport layer supports interoperability with different wireless networks. So as to users receive necessary information anywhere seamlessly, the network architecture focuses on packet transmission and it is efficient for the control layer switches and controls packets between different networks. Since individual users take advantage of different services and data, the effective router architecture must be designed. Hence in this paper we design monitoring technique to solve security problem and to support premium service to ultimate users. Thereafter, we run opnet simulation and show the improvement of proposed router architecture.

  • PDF

Efficient Driver Attention Monitoring Using Pre-Trained Deep Convolution Neural Network Models

  • Kim, JongBae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.119-128
    • /
    • 2022
  • Recently, due to the development of related technologies for autonomous vehicles, driving work is changing more safely. However, the development of support technologies for level 5 full autonomous driving is still insufficient. That is, even in the case of an autonomous vehicle, the driver needs to drive through forward attention while driving. In this paper, we propose a method to monitor driving tasks by recognizing driver behavior. The proposed method uses pre-trained deep convolutional neural network models to recognize whether the driver's face or body has unnecessary movement. The use of pre-trained Deep Convolitional Neural Network (DCNN) models enables high accuracy in relatively short time, and has the advantage of overcoming limitations in collecting a small number of driver behavior learning data. The proposed method can be applied to an intelligent vehicle safety driving support system, such as driver drowsy driving detection and abnormal driving detection.

Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks

  • Liu, Zhimin;Jiang, Guiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4492-4507
    • /
    • 2021
  • In camera sensor networks (CSNs), in order to better identify the point, full-view problem requires capture any facing direction of target (point or intruder), and its coverage prediction and sensor density issues are more complicated. At present, a lot of research supposes that a large number of homogeneous camera sensors are randomly distributed in a bounded square monitoring region to obtain full-view rate which is close to 1. In this paper, we deduce the sensor density prediction model in heterogeneous deployed CSNs with arbitrary full-view rate. Aiming to reduce the influence of boundary effect, we introduce the concepts of expanded monitoring region and maximum detection area. Besides, in order to verify the performance of the proposed sensor density model, we carried out different scenarios in simulation experiments to verify the theoretical results. The simulation results indicate that the proposed model can effectively predict the sensor density with arbitrary full-view rate.

A Study on the Effects of Internet Shopping Mall Dissatisfaction Factors on Complaint Behavior and Intention to Use Arbitration System (인터넷 쇼핑몰 불만족 요인이 불평행동과 중재제도 이용의도에 미치는 영향에 관한 연구)

  • Lee, Jae-Hak;Park, Hee-Chul
    • Journal of Arbitration Studies
    • /
    • v.30 no.2
    • /
    • pp.145-164
    • /
    • 2020
  • With the development of the Internet, e-commerce is rapidly developing, and e-commerce through the Internet has become a major distribution channel for selling products and services to consumers and buyers. However, as Internet shopping develops, consumer dissatisfaction and conflict are increasing. In this regard, this study examined how consumer dissatisfaction caused by using an Internet shopping mall, which is currently taking the core position in commerce activities, leads to consumer complaints, and how these complaints affect the necessity and intention to use the arbitration system. As a result of the study, the following implications were obtained. First, it will be necessary to remove the root cause of consumer complaints by continuously monitoring consumer complaints, rather than staying at passive consumer complaints such as defective product exchange and damage compensation for dissatisfaction with Internet shopping malls. Second, it can be said that the function of the arbitration system is required to protect the rights and interests of consumers using the Internet shopping mall and to actively improve the problems in the event of a damage situation or a problem situation. Lastly, academia's continuous research will be needed, and governments and related organizations will need to continuously provide and promote information to users of Internet shopping malls.

Monitoring System to Measure the Waste Volume of Landfill Facility using 3D Laser Scanner (3D 레이저 스캐너를 이용한 매립장의 체적 계측을 위한 모니터링시스템)

  • Cho, Sung-Youn;Lee, Young-Dae;Ryu, Seung-Ki
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.135-140
    • /
    • 2013
  • In this paper, we discussed about the volume monitoring system of a landfill facility. We proposed the waste volume calculation method using the point cloud of the surface of three dimensional object by measurement of the point cloud by the three dimensional scanner, which is based upon the robot technique. This computes not only the quantity of waste volume for continuos monitoring but also it helps not only to predict the evaluation factor of the usable age of a landfill. facility. Furthermore, the measuring system of waste volume was applied to the landfill facility in Ansung city.