• Title/Summary/Keyword: Internet Uses

Search Result 1,469, Processing Time 0.025 seconds

An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks

  • Remesh Babu, KR;Preetha, KG;Saritha, S;Rinil, KR
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3151-3168
    • /
    • 2021
  • Internet of Things (IoT) connects several objects with embedded sensors and they are capable of exchanging information between devices to create a smart environment. IoT smart devices have limited resources, such as batteries, computing power, and bandwidth, but comprehensive sensing causes severe energy restrictions, lowering data quality. The main objective of the proposal is to build a hybrid protocol which provides high data quality and reduced energy consumption in IoT sensor network. The hybrid protocol gives a flexible and complete solution for sensor selection problem. It selects a subset of active sensor nodes in the network which will increase the data quality and optimize the energy consumption. Since the unused sensor nodes switch off during the sensing phase, the energy consumption is greatly reduced. The hybrid protocol uses Dijkstra's algorithm for determining the shortest path for sensing data and Ant colony inspired variable path selection algorithm for selecting active nodes in the network. The missing data due to inactive sensor nodes is reconstructed using enhanced belief propagation algorithm. The proposed hybrid method is evaluated using real sensor data and the demonstrated results show significant improvement in energy consumption, data utility and data reconstruction rate compared to other existing methods.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

Web-based Interference Verification System for Injection Mold Design (사출금형 설계를 위한 웹 기반 간섭 검사시스템)

  • Park Jong-Myoung;Song In-Ho;Chung Sung-Chong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.7 s.250
    • /
    • pp.816-825
    • /
    • 2006
  • This paper describes the development of a web-based interference verification system in the mold design process. Although several commercial CAD systems furnish interference verification functions, those systems are very expensive and inadequate to perform collaborative works over the Internet. In this paper, an efficient and precision hybrid interference verification algorithm for the web-based interference verification system over the distributed environment has been studied. The proposed system uses lightweight CAD files produced from the optimally transformed CAD data through ACIS kernel and InterOp. Collaborators related to the development of a new product are able to verify the interference verification over the Internet without commercial CAD systems. The system reduces production cost, errors and lead-time to the market. Validity of the developed system is confirmed through case studies.

A Study Tunnel telemetering with wireless internet make use of CDMA for a basis (CDMA를 이용한 무선인터넷기반의 터널 원격 계측)

  • 신현식;강경태;강창훈;길동욱;윤형득
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.342-346
    • /
    • 2003
  • Present CDMA technology is development continuously to internet technology and new communication infra called internet construction for quality of high quality offer the changing existent existence. wireless data communication area. In the meantime, our country is tunnel of whole country over 500 by special quality that is photograph because Safety diagnosis consists to manage preservation administration is in dangerous state about safety. Domestic telemeter technology is real condition that is depending on expensive foreign goods and engineer to improve that. Therefore tunnel preservationㆍadministration more improved telemeter system develop wish to this research uses CDMA net.

  • PDF

Internet Protocols Over ABR and UBR Services: Problems, Approaches, and Their Evaluation (ABR과 UBR 서비스 상에서 인터넷 프로토콜: 문제점, 해결방안, 그리고 성능평가)

  • Park, Seung-Seop;Yuk, Dong-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3260-3268
    • /
    • 1999
  • As the proliferation of multimedia traffic over High-speed Internet increases, ATM network will be vital to adopt as backbone network over various parts of Internet. In this paper, we investigate the performance of TCP/IP traffic flow over ABR and UBR of ATM service to study for the high throughput and good fairness by simulation technique. Although TCP is run in the transport layer, it is controlled by several methods, e.g, EPD, PPD, RED, EFCI, ER etc, in ATM layer when TCP uses the ABR/UBR service. Therefore, if one cell is discarded in ATM layer, a packet of TCp will be laost. And, also, along with the increasing of the number of VC among switches, the throughput and fairness will be degraded. In order to improve these degradations, we propose the effective parameter control operations of EFCI and ER on ABR service, and also suggest the buffer management methods on UBR service. Finally, through the simulation results, the improved throughput and fairness are shown.

  • PDF

Semantic-Based Web Information Filtering Using WordNet (어휘사전 워드넷을 활용한 의미기반 웹 정보필터링)

  • Byeon, Yeong-Tae;Hwang, Sang-Gyu;O, Gyeong-Muk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3399-3409
    • /
    • 1999
  • Information filtering for internet search, in which new information retrieval environment is given, is different from traditional methods such as bibliography information filtering, news-group and E-mail filtering. Therefore, we cannot expect high performance from the traditional information filtering models when they are applied to the new environment. To solve this problem, we inspect the characteristics of the new filtering environment, and propose a semantic-based filtering model which includes a new filtering method using WordNet. For extracting keywords from documents, this model uses the SDCC(Semantic Distance for Common Category) algorithm instead of the TF/IDF method usually used by traditional methods. The world sense ambiguation problem, which is one of causes dropping efficiency of internet search, is solved by this method. The semantic-based filtering model can filter web pages selectively with considering a user level and we show in this paper that it is more convenient for users to search information in internet by the proposed method than by traditional filtering methods.

  • PDF

A Study on the Development of EDI the based on Web (웹 기반 EDI 시스템 구현을 위한 연구)

  • 고규준;김정영;박정선
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.634-636
    • /
    • 2000
  • The importance of EDI has been so emphasized that we need exchange/maintain electronic documents effectively, and convert then to other formats. The traditional EDI, however, is facing on the limitation of growth because of it's high expense, and the closenees of sharing information. The EDls of next generation, like open EDI, object-oriented EDI, and Internet EDI, have appeared to solve these problems. Finally, XML/EDl, which is very effective to solve these kinds of problems, is now replacing the traditional EDI and the HTML in Internet and is influencing on e-Business. So, we are going to suggest a solution which uses XML/EDl as a substitute for the traditional one. First, we analyzed the problems of the traditional EDI system and organized the structure of XML/EDl system. Next, we have developed the prototype of Internet bookstore to show the effectiveness and strength of XML/EDl over the traditional EDI.

  • PDF

A Simple Cost Analysis of Host ID-LOC Separating protocol using SDN Features

  • Lee, Chan-Haeng;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.41-47
    • /
    • 2016
  • The IP address used in the Internet has the role of both identifier and locator to bind a host and the application, however, this binding restricts some functions such as mobility and multi-homing. As a result, we suggested a host ID-LOC separation protocol using DHT with SDN features. The proposed scheme is a network-based scheme, and uses IPv6 addresses. The underlying network is partitioned into Host Identity domain and IP domain for identifiers and locators. In this paper, we present a simple cost model for analyzing both the proposed scheme and one of the previous works, the MOFI. The result of cost analysis shows better performance of the proposed scheme.

Smart Home System Using Internet of Things

  • Santoso, Leo Willyanto;Lim, Resmana;Trisnajaya, Kevin
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.

The Study on Internet Voice Conference using MGCP and IP-Multicast (MGCP와 IP-Multicast를 이용한 Internet Voice Conference에 관한 연구)

  • Lee, Song-Ho;Choe, Gyeong-Sam;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.130-133
    • /
    • 2001
  • VoIP(voice over internet protocol) technology is based on IP protocol. The IP protocol can be involved in two types of communication: unicasting and multicasting. Unicasting is the communication between one sender and one receiver. It is one-to-one communication. Multicasting is one-to-many communication. So that, many receivers can get same data from one sender simultaneously. and, the different protocol are proposed for VoIP; H.323, SIP and MGCP. MGCP is perfect server-client protocol, so MGCP is very attractive VoIP protocol to ISP. This paper uses MGCP and offers modified MGCP for conference call. So that, Modified MGCP is compatible to MGCP, and supports conference call using IP-multicast.

  • PDF