• Title/Summary/Keyword: Internet-Enabled Engineering

Search Result 111, Processing Time 0.024 seconds

Development of River Quality Management Information System Using Web-GIS of Nonsan-si(I) (Web-GIS를 이용한 논산시 하천수질 관리 정보 지원시스템 구현(I))

  • 박기학;오승교;박성규
    • Journal of environmental and Sanitary engineering
    • /
    • v.18 no.4
    • /
    • pp.15-23
    • /
    • 2003
  • The purpose of this study is to construct e-Nonsan, a user friendly river quality management information system for Nonsan-si basin using GIS (geographical information system) technology. GIS was ideally suited featuring a geographical characteristics(e.g., industries, cattle sheds) and very effectively used in mapping and symbolization for the distribution of the spatial/periodic status(e.g., pie or column chart) of the point/non-point pollutant source loads which can be effectively applied to a information system on the web-site. And a user interface, GUI(graphic user interface) was designed very diversely and simply enabled the and non environmental experts connect with the system and obtain a useful information of river quality. e-Nonsan, a visual mapping system for river quality was developed by reframing the monitoring data as graphic symbols and it was ideally suited to exploring area-wide river quality at a user-friendly manner due to extensibility and scalability along the various survey points. Eventually the final step of this study was to construct e-Nonsan based on Web-GIS could be assessed anywhere if internet service is available and offer a very useful information services of the river quality to the publics.

Supply Chain Modelling for JIT of the Costruction (건설공사의 적시생산을 위한 자재공급 모델링 -전기설비 케이블덕트관 사례-)

  • Kim Bo-Hyun;Kim Chang-Duk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.490-493
    • /
    • 2002
  • There have to be a pooled procurement in order to control construction in every stage. And we need also efficient supply chains to utilize the process. Researching and developing the method, which make it possible the supply chain management by modeling for Internet-enabled pooled procurement in construction, through breakdown in materials is currently in-progress the inside and out side of country. The objective of this paper is to find a reform while modeling the production process of cable duct moreover understanding the wasting factors in each step.

  • PDF

Authoring Personal Virtual Studio Using Tangible Augmented Reality (탠저블 증강현실을 활용한 개인용 가상스튜디오 저작)

  • Rhee, Gue-Won;Lee, Jae-Yeol;Nam, Ji-Seung;Hong, Sung-Hoon
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.2
    • /
    • pp.77-88
    • /
    • 2008
  • Nowadays personal users create a variety of multi-media contents and share them with others through various devices over the Internet since the concept of user created content (UCC) has been widely accepted as a new paradigm in today's multi-media market, which has broken the boundary of contents providers and consumers. This paradigm shift has also introduced a new business model that makes it possible for them to create their own multi-media contents for commercial purpose. This paper proposes a tangible virtual studio using augmented reality to author multi-media contents easily and intuitively for personal broadcasting and personal content generation. It provides a set of tangible interfaces and devices such as visual markers, cameras, movable and rotatable arms carrying cameras, and miniaturized set. They can offer an easy-to-use interface in an immersive environment and an easy switching mechanism between tangible environment and virtual environment. This paper also discusses how to remove inconsistency between real objects and virtual objects during the AR-enabled visualization with a context-adaptable tracking method. The context-adaptable tracking method not only adjusts the locations of invisible markers by interpolating the locations of existing reference markers, but also removes a jumping effect of movable virtual objects when their references are changed from one marker to another.

Analysis and Management Policies for Memory Thrashing of Swap-Enabled Smartphones (스왑 지원 스마트폰의 메모리 쓰레싱 분석 및 관리 방안)

  • Hyokyung Bahn;Jisun Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.61-66
    • /
    • 2023
  • As the use of smartphones expands to various areas and the level of multitasking increases, the support of swap is becoming increasingly important. However, swap support in smartphones is known to cause excessive storage traffic, resulting in memory thrashing. In this paper, we analyze how the thrashing of swaps that occurred in early smartphones has changed with the advancement of smartphone hardware. As a result of this analysis, we show that the swap thrashing problem can be resolved to some extent when the memory size increases. However, we also show that thrashing still occurs when the number of running apps continues to increase. Based on further analysis, we observe that this thrashing is caused by some hot data and suggest a way to solve this through an NVM-based architecture. Specifically, we show that a small size NVM with judicious management can resolve the performance degradation caused by smartphone swap.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

Development of Air Pollution Information System Using GIS (e-AIR) (GIS를 이용한 대기질 관리 정보 지원시스템(e-AIR) 구현( I ))

  • 박기학;오승교
    • Journal of environmental and Sanitary engineering
    • /
    • v.18 no.2
    • /
    • pp.42-51
    • /
    • 2003
  • Public awareness of air pollution problem has increased the need for real time air pollution information system about changes in air pollution level. The purpose of this study is to construct e-AIR, a user-friendly air pollution information system for urban air quality using GIS(geographic information system) technology for windows. GIS was ideally suited featuring a geographical characteristics(e.g., road, traffics, buildings) and very effectively used in mapping and symbolization for the distribution of the spatial/periodic pollution status(e.g., pie or column chart, graduated symbols) which can be effectively applied to a information system on the web-site. And a user interface, GUI(graphic user interface) was designed very diversely and simply enabled the users connect with e-AIR and obtain a useful information of air quality. A interpretive technique, air pollution health index(e.g., PSI, AEI) was used also which transforms complex data on measured atmospheric pollutant concentrations into a single number or set of numbers in order to make the data more understandable. Eventually the final-step of this study was to construct e-AIR based on Web GIS could be assessed anywhere if internet is available and offer a very useful information services of the air pollution to the public like a weather news.

Trusted Fog Based Mashup Service for Multimedia IoT based Smart Environmental Monitoring

  • Elmisery, Ahmed M.;Sertovic, Mirela
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.171-178
    • /
    • 2017
  • Data mashup is a web technology that combines information from multiple sources into a single web application. Mashup applications create a new horizon for new services, like environmental monitoring. Environmental monitoring is a serious tool for the state and private organizations, which are located in regions with environmental hazards and seek to gain insights to detect hazards and locate them clearly. These organizations utilize a data mashup to merge datasets from different Internet of multimedia things (IoMT) context-based services in order to leverage its data analytics performance and the accuracy of the predictions. However, mashup different datasets from multiple sources is a privacy hazard as it might reveal citizens specific behaviors in different regions. The ability to preserve privacy in mashuped datasets and at the same time provide accurate insights becomes a key success for the spread of mashup services. In this paper, we present our efforts to build a fog-based middleware for private data mashup (FMPM) to serve a centralized environmental monitoring service. The proposed middleware is equipped with concealment mechanisms to preserve the privacy of the merged datasets from multiple IoMT networks involved in the mashup application. Also, these mechanisms preserve the aggregates in the dataset to maximize the usability of information to attain accurate analytical results. We also provide a scenario for IoMT-enabled data mashup service and experimentation results.

Virtual Force(VF)-based Disaster Monitoring Network Using Multiple UAVs (대규모 공중무인기를 이용한 가상력 기반 재난 감시 네트워크)

  • Chun, Jeongmyong;Yoon, Seokhoon;Kim, Daeyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.97-108
    • /
    • 2016
  • In this paper, we consider a cooperative monitoring network, which consists of a large number of UAVs, in order to promptly detect event in a disaster area. A command center may not be able to control each UAV individually due to resource constraints. Therefore, UAVs need to autonomously construct a mobile monitoring network in order to maximize monitoring coverage and to adapt the network formation according to environment changes in the disaster area. To that end, we propose multiple UAVs-based cooperative monitoring schemes that uses virtual forces. In this monitoring scheme, an effective monitoring is enabled by extending monitoring coverage using each UAV's circle movements. The UAVs-based monitoring network can also be splitted or merged in order to increase the monitoring effectiveness. Through simulations, we show that the proposed scheme can effectively monitor a large area and achieve a high event detection ratio.

Real-time Tele-operated Drone System with LTE Communication (LTE 통신을 이용한 실시간 원격주행 드론 시스템)

  • Kang, Byoung Hun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.35-40
    • /
    • 2019
  • In this research, we suggest a real-time tele-driving system for unmanned drone operations using the LTE communication system. The drone operator is located 180km away and controls the altitude and position of the drone with a 50ms time delay. The motion data and video from the drone is streamed to the operator. The video is played on the operator's head-mounted display (HMD) and the motion data emulates the drone on the simulator for the operator. In general, a drone is operated using RF signal and the maximum distance for direct control is limited to 2km. For long range drone control over 2km, an auto flying mode is enabled using a mission plan along with GPS data. In an emergency situation, the autopilot is stopped and the "return home" function is executed. In this research, the immersion tele-driving system is suggested for drone operation with a 50ms time delay using LTE communication. A successful test run of the suggested tele-driving system has already been performed between an operator in Daejeon and a drone in Inje (Gangwon-Do) which is approximately 180km apart.