• Title/Summary/Keyword: Internet-based Applications

Search Result 1,475, Processing Time 0.026 seconds

An Efficient Location Aided Routing Protocol for Hybrid Wireless Networks (하이브리드 무선 네트워크에서 위치 정보를 사용한 효율적인 라우팅 프로토콜)

  • Kim, Sun-Il;Lee, Jun-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.117-125
    • /
    • 2009
  • In hybrid wireless networks, a mobile node in MANET can communicate with other mobile nodes as well as nodes in the Internet. Hybrid mobile networks help to expand the application domains of MANET from limited areas, such as military applications to more diverse and general application areas. Previous routing protocols in hybrid wireless networks have not taken advantage of location information of nodes in a network. By using location information of nodes, a routing protocol can reduce the overhead of control messages for efficient network operations. This paper proposes a routing protocol for hybrid mobile networks, called Location-aided AODV+ (LAp) that is based on ADOV+ and takes advantage of node's location information. Performance evaluation shows that LAp performs better than ADOV+ when there are a sufficient number of nodes in a network for route establishments.

Development of a Framework for Improvement of Sensor Data Quality from Weather Buoys (해양기상부표의 센서 데이터 품질 향상을 위한 프레임워크 개발)

  • Ju-Yong Lee;Jae-Young Lee;Jiwoo Lee;Sangmun Shin;Jun-hyuk Jang;Jun-Hee Han
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.186-197
    • /
    • 2023
  • In this study, we focus on the improvement of data quality transmitted from a weather buoy that guides a route of ships. The buoy has an Internet-of-Thing (IoT) including sensors to collect meteorological data and the buoy's status, and it also has a wireless communication device to send them to the central database in a ground control center and ships nearby. The time interval of data collected by the sensor is irregular, and fault data is often detected. Therefore, this study provides a framework to improve data quality using machine learning models. The normal data pattern is trained by machine learning models, and the trained models detect the fault data from the collected data set of the sensor and adjust them. For determining fault data, interquartile range (IQR) removes the value outside the outlier, and an NGBoost algorithm removes the data above the upper bound and below the lower bound. The removed data is interpolated using NGBoost or long-short term memory (LSTM) algorithm. The performance of the suggested process is evaluated by actual weather buoy data from Korea to improve the quality of 'AIR_TEMPERATURE' data by using other data from the same buoy. The performance of our proposed framework has been validated through computational experiments based on real-world data, confirming its suitability for practical applications in real-world scenarios.

Magneto-Mechano-Triboelectric Generator Enabled by Ferromagnetic-Ferroelectric Composite (강자성-강유전성 복합체를 활용한 자기-기계-마찰전기 변환 발전소자)

  • Yeseul Lim;Geon-Tae Hwang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.1
    • /
    • pp.112-117
    • /
    • 2024
  • The Internet of Things (IoT) device is a key component for Industry 4.0, which is the network in homes, factories, buildings, and infrastructures to monitor and control the systems. To demonstrate the IoT network, batteries are widely utilized as power sources, and the batteries inevitably require repeated replacement due to their limited capacity. Magneto-mechano-electric (MME) generators are one of the candidate to develop self-powered IoT systems since MME generators can harvest electricity from stray alternating current (AC) magnetic fields arising from electric power cables. Herein, we report a magneto-mechano-triboelectric generator enabled by a ferromagnetic-ferroelectric composite. In the triboelectric nylon matrix, a ferromagnetic carbonyl iron powder (CIP) was introduced to induce magnetic force near the AC magnetic field for MME harvesting. Additionally, a ferroelectric ceramic powder was also added to the MME composite material to enhance the charge-trapping capability during triboelectric harvesting. The final ferromagnetic-ferroelectric composite-based MME triboelectric harvester can generate an open-circuit voltage and a short-circuit current of 110 V and 8 μA, respectively, which were enough to turn on a light emitting diode (LED) and charge a capacitor. These results verify the feasibility of the MME triboelectric generator for not only harvesting electricity from an AC magnetic field but also for various self-powered IoT applications.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

Photoactivated Metal Oxide-based Chemiresistors: Revolutionizing Gas Sensing with Ultraviolet Illumination

  • Sunwoo Lee;Gye Hyeon Lee;Myungwoo Choi;Gana Park;Dakyung Kim;Sangbin Lee;Jeong-O Lee;Donghwi Cho
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.5
    • /
    • pp.274-287
    • /
    • 2024
  • Chemiresistors play a crucial role in numerous research fields, including environmental monitoring, healthcare, and industrial safety, owing to their ability to detect and quantify gases with high sensitivity and specificity. This review provides a comprehensive overview of the recent advancements in photoactivated chemiresistors and emphasizes their potential for the development of highly sensitive, selective, and low-power gas sensors. This study explores a range of structural configurations of sensing materials, from zero-dimensional quantum dots to three-dimensional, porous nanostructures and examines the impact of these designs on the photoactivity, gas interactions, and overall sensor performance-including gas responses and recovery rates. Particular focus is placed on metal-oxide semiconductors and the integration of ultraviolet micro-light emitting diodes, which have gained attention as key components for next-generation sensing technologies owing to their superior photoactivity and energy efficiency. By addressing existing technical challenges, such as limited sensitivity, particularly at room temperature (~22℃), this paper outlines future research directions, highlighting the potential of photoactivated chemiresistors in developing high-performance, ultralow-power gas sensors for the Internet of Things and other advanced applications.

Design of Intersection Simulation System for Monitoring and Controlling Real-Time Traffic Flow (실시간 교통흐름의 모니터링 및 제어를 위한 교차로 시뮬레이션 시스템 설계)

  • Jeong Chang-Won;Shin Chang-Sun;Joo Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.85-97
    • /
    • 2005
  • In this paper, we construct the traffic information database by using the acquired data from the traffic information devices installed in road network, and, by referring to this database, propose the intersection simulation system which can dynamically manage the real-time traffic flow for each section of road from the intersections, This system consists of hierarchical 3 parts, The lower layer is the physical layer where the traffic information is acquired on an actual road. The traffic flow control framework exists in the middle layer. The framework supports the grouping of intersection, the collection of real-time traffic flow information, and the remote monitoring and control by using the traffic information of the lower layer, This layer is designed by extending the distributed object group framework we developed. In upper layer, the intersection simulator applications controlling the traffic flow by grouping the intersections exist. The components of the intersection application in our system are composed of the implementing objects based on the Time-triggered Message-triggered Object(TMO) scheme, The intersection simulation system considers the each intersection on road as an application group, and can apply the control models of dynamic traffic flow by the road's status. At this time, we use the real-time traffic information collected through inter-communication among intersections. For constructing this system, we defined the system architecture and the interaction of components on the traffic flow control framework which supports the TMO scheme and the TMO Support Middleware(TMOSM), and designed the application simulator and the user interface to the monitoring and the controlling of traffic flow.

  • PDF

A Design of Open GIS Compliant Object Web (개방형 GIS 표준에 따른 오브젝트 웹 시스템 설계)

  • Park, Ki-Ho;Jeong, Jae-Gon
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.47-62
    • /
    • 1999
  • To meet the interoperability requirements associated with geospatial data access and geoprocessing, much efforts to design prototypical systems conforming to $OpenGIS^{TM}$ specification has been made. With respect to Object Web GIS, however, current internet mapping technology mainly focuses on either developing mapping libraries or client applications regardless of the future needs for interoperability such as an integration of $OpenGIS^{TM}$ standard for CORBA. In this paper, we propose an $OpenGIS^{TM}$ compliant mapping kernel. OpenViews, which is designed to meet those requirements. The kernel of OpenViews encapsulates the process of acquiring geospatial data in the format of $OpenGIS^{TM}$ Geometry through ORB(Object Request Broker). OpenViews, being designed based on well-known design patterns, is a highly extensible in that programmers can easily customize it on the object oriented architecture. The components implemented in OpenViews are CORBA/Java objects, and as such are portable and scalable in a networked environment. A companion package, OpenBroker, is also developed as a portable geoprocessing application server to facilitate the implementation and configuration of server side CORBA objects. It can be used for implementing objects for spatial analysis service which would be independent of legacy spatial database systems in many cases. OpenViews, together with OpenBroker, has been successfully prototyped using the technologies including EJB and servlet as the core components of an Open GIS compliant internet mapping.

  • PDF

A Design of Integrated Scientific Workflow Execution Environment for A Computational Scientific Application (계산 과학 응용을 위한 과학 워크플로우 통합 수행 환경 설계)

  • Kim, Seo-Young;Yoon, Kyoung-A;Kim, Yoon-Hee
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.37-44
    • /
    • 2012
  • Numerous scientists who are engaged in compute-intensive researches require more computing facilities than before, while the computing resource and techniques are increasingly becoming more advanced. For this reason, many works for e-Science environment have been actively invested and established around the world, but still the scientists look for an intuitive experimental environment, which is guaranteed the improved environmental facilities without additional configurations or installations. In this paper, we present an integrated scientific workflow execution environment for Scientific applications supporting workflow design with high performance computing infrastructure and accessibility for web browser. This portal supports automated consecutive execution of computation jobs in order of the form defined by workflow design tool and execution service concerning characteristics of each job to batch over distributed grid resources. Workflow editor of the portal presents a high-level frontend and easy-to-use interface with monitoring service, which shows the status of workflow execution in real time so that user can check the intermediate data during experiments. Therefore, the scientists can take advantages of the environment to improve the productivity of study based on HTC.

Elimination of the Redundant Sensor Data using the Mobile Agent Middleware (이동 에이전트 미들웨어를 이용한 중복 센서 데이터 제거)

  • Lee, Jeong-Su;Lee, Yon-Sik
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.27-36
    • /
    • 2011
  • The sensor nodes of sensor network system are capable of wireless communication with sink nodes. They also acquire and transmit sensor data in broad region where people cannot access easily. However, the transmission of redundant data from sensor nodes reduces the lifetime of the entire system and substantial amount of resulted data needs to be resorted before implementing them to the specific applications. In this paper, the mobile agent middleware to eliminate the redundant sensor data is designed and implemented. In the proposed system, the mobile agent visits the destination sensor nodes according to the migration list offered by the meta table in the name space of the naming agent, eliminates the redundant sensor data corresponding to user condition, and acquires and transmits sensor data according to the purpose and needs. Thus, the excess transmission of the sensor data is avoided and the lifetime of the entire system can be extended. Moreover, the experiments using the mobile agent middleware with the conditions and limitations that are possible in real situation ore done to verify the successful elimination of the redundant sensor data and the efficiency of the data acquisition. Also, we show the potential applicability of the mobile agent middleware in various active sensor networks through the active rule based mobile agent middleware or the interaction with the active rule system.

A Junk Mail Checking Model using Fuzzy Relational Products (퍼지관계곱을 이용한 내용기반 정크메일 분류 모델)

  • Park, Jeong-Seon;Kim, Chang-Min;Kim, Yong-Gi
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.726-735
    • /
    • 2002
  • E-mail service has been a general method for communication as internet is widely used instead of post mails. Many companies have invested in e-mail advertisement as e-mail service is spread. E-mail advertisement has an advantage that it can consider personal characters. A lot of e-mail users have been given e-mails that they did not want to receive because their e-mail addresses were opened out to companies on internet. Therefore, they need junk mail checking systems and several e-mail service providers have supported junk mail filters. However, the junk mail filters can check the junk mail with constraint because they don't check the junk degree of mails by the contents of e-mail. This paper suggests a content-based junk mail checking model using fuzzy relational products. The process of the junk mail checking model using fuzzy relational products is as following: (1) analyzes semantic relation between junk words-base and e-mails, (2) checks the junk degree of the e-mail using the semantic relation, (3) checks the mails with SVJ(Standard Value of Junk) if those are junk mail or non-junk mail. The efficiency of the proposed technique is proved by comparing the junk degree of the e-mail and the number of junk mails that was checked by e-mail users and checked by the proposed junk mail checking model.