• Title/Summary/Keyword: Mobile Message

Search Result 731, Processing Time 0.027 seconds

A Review on Smart Two Wheeler Helmet with Safety System Using Internet of Things

  • Ilanchezhian, P;Shanmugaraja, P;Thangaraj, K;Aldo Stalin, JL;Vasanthi, S
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.11-16
    • /
    • 2021
  • At the present time, the number of accidents has enlarged speedily and in country like India per day there are about 204 accidents occurred. Accidents of two-wheeler compose a foremost segment of every accident and it can be true for the reason that two-wheelers like bikes not able to produce as many as security measurements normally incorporated in cars, truks and bus etc. General main rootcost of the two-wheeler accidents happen only when people community not remember to wearing a device helmet and during the driving time feels like sleep condition, alcohol disbursement, many of the drivers doesn't know heavy vehicles like Loory and buses approaching into very closer to their two wheelers, contravention of two wheelers in traffic rules and regulations. Let's overcome the above situations; our important objective is to develop an intelligent system device that can successfully facilitate in avoidance of every kind of problems. Suppose any of the above stated situations occurs, at that moment how system device identify and represents the commanders and community, and finally the stated situation be able to taken care of straight away without any further delay. A smart intelligent helmet system is a defending head covering used by rider for making bike riding safer than earlier. This is finished by incorporating sophisticated features like detecting the usage of helmet by the rider, connected Bluetooth module in helmet. In order to maintain the temperature inside the helmet device we need to include CPU fan module inside the device. RF based helmet prevents road accidents and identify whether people community is not using a component helmet or used. Main responsibility of the system is to detect accidents by vibration sensors, accelerometers and also with the help of modules global positioning system and global system for mobile commnicaiton module. A wireless communication device used to discover the accident area site location and likewise notifying the two-wheeler drived people's relatives and short message text information passed to the positioned hospitals.

OneNet Cloud Computing Based Real-time Home Security System (OneNet 클라우드 컴퓨팅 기반 실시간 홈 보안 시스템)

  • Kim, Kang-Chul;Zhao, Yongjiang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.101-108
    • /
    • 2021
  • This paper builds a real-time home security system based on the OneNet cloud platform to control the status of the house through a smartphone. The system consists of a local part and a cloud part. The local part has I/O devices, router and Raspberry Pi (RPi) that collects and monitors sensor data and sends the data to the cloud, and the Flask web server is implemented on a Rasberry Pi. When a user is at home, the user can access the Flask web server to obtain the data directly. The cloud part is OneNet in China Mobile, which provides remote access service. The hybrid App is designed to provide the interaction between users and the home security system in the smartphone, and the EDP and RTSP protocol is implemented to transmit data and video stream. Experimental results show that users can receive sensor data and warning text message through the smartphone and monitor, and control home status through OneNet cloud.

The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network (무선 애드 혹 네트워크에서 효과적인 메시지 전달을 위한 Directional Partial Dominant Pruning 알고리즘)

  • Han, In-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.16-22
    • /
    • 2009
  • The most efficient method to reduce duplicated messages is a partial dominant pruning for receiving and forwarding messages by in-fly format on the mobile ad hoc network. In this paper, we propose directional partial dominant pruning method by expanding partial dominant pruning for reducing not only number of forwarding nodes but number of antenna elements on the ad hoc network with directional antennas. by simulation, we prove superiority that average number of forwarding nodes for each antenna element and the ratio of duplicated messages for each nodes rather than existing partial dominant pruning method though the number of antenna elements are increasing rather than in case of using omni antennas.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

Network Mobility Handoff Scheme to Support Fast Route Optimization in Nested Network Mobility (중첩된 이동 네트워크 환경에서 빠른 경로 최적화를 지원하는 핸드오프 방안)

  • Lee, Il-Ho;Lee, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.119-131
    • /
    • 2009
  • Existing proposals on route optimization for nested Network Mobility(NEMO) have a problem that it is difficult to optimize a route promptly in an environment where a MR moves frequently. Also, they have L3 handoff latency as well as route optimization latency until an optimized route is formed. In this paper, we propose a L3 handoff scheme that supports fast route optimization for nested NEMO without any additional optimization procedure. To achieve this, our proposed scheme is designed to include a procedure that an AR acquires address informations of a MR. After receiving binding update message from the MR, the AR performs the binding update procedure with the MR's HA on behalf of the MR. Packets are delivered to the AR only passing by the MR's HA after a bi-directional tunnel is formed between the AR and the HA. The result of our performance evaluation has shown that the proposed scheme could provide excellent performance compared with the RRH and the ONEMO.

Suggestions of Bus Station Service in Gangnam - Using HCI methods - (서울시 강남역 광역버스 정류장 서비스 개선 제안 - HCI방법론을 중심으로 -)

  • Kim, Sora;Kang, Ji Yeon;Han, Hae Jung;Kim, Sora
    • Design Convergence Study
    • /
    • v.13 no.5
    • /
    • pp.131-145
    • /
    • 2014
  • Considering the number of population commuting from Gyeonggi to Seoul, the development of the bus system is relatively slow. There are many problems to be solved but it has been overlooked, leaving the users in discomfort. The goal of this research is to improve the current system to satisfy the unmet needs, using HCI methods, which is composed of five steps, including Define, Find, Analyze & Synthesize, Ideation, Develop. In Define, we recruited the interviewees using the extreme user method to find their needs. In Find, we proceeded 'be the customer', shadowing for background research and in-depth interview. In Analyze & Synthesis, we analyzed the customer needs and clustered to similar needs to draw useful ideas. After that we suggested sophisticated ideas based on design principles from previous stage and visualized in user scenarios and mock-ups. Overall, the research suggests with text message service, informative light service and mobile application to improve the existing bus station.

Fantastic Collaboration of Financial Services and Telecommunication: a Frontier Case of Integrated Marketing Communication of 'Club SK Card'

  • Lee, Seon Min;Chun, Seungwoo;Joo, Young Hyuck;Yoo, Changjo
    • Asia Marketing Journal
    • /
    • v.15 no.4
    • /
    • pp.223-241
    • /
    • 2014
  • In May 2012, the collaboration of Hana Bank, top financial service company, and SK Planet, top telecommunication service provider, introduced a new credit card that was filled with all-in-one benefits into the market. Leveraging strong infrastructure of two companies, each top in its own industries, the awareness and preference of 'Club SK Card' brand rapidly increased to about 25% in less than one year. Moreover, this new card was enthroned in the most sold credit card of year 2012, accounting for a market share of 7.2% in the credit card market and more than 80% in the mobile credit card market. To make these results possible, 'Club SK Card' marketing team developed an effective marketing communication strategy which followed the 6M model. The mission of the marketing communication strategy was simple and clear. It was to deliver the card's inherent strengths on consumer benefits that come from the support of subsidiary and affiliated companies of SK Planet. According to OK Cashbag data, the marketing communication team selected the appropriate target consumers and approached them directly, inducing actual purchase behavior. The target consumers received straightforward messages about 'Club SK Card' and were led to join in the new membership at their most frequently visited supermarket or franchise restaurant. The straightforward communication message embedded in an eye-catching commercial ad with a hook song accompanied with a dance was delivered via public media. The ad became so popular that many other television programs quoted or made parodies of the ad. Courtesy of the commercial ad, the brand name disseminated rapidly and widely among the public. In October 2012, an ingenious planning and persistent implementation of the communication strategy results 'Club SK Card' to be ranked top in brand awareness as well as advertising preference tests.

  • PDF

A Mobility Supporting MAC Protocol to Improve Handover Performance in IEEE 802.16j Multi-hop Relay Networks (IEEE 802.16j 멀티 홉 릴레이 네트워크에서의 핸드오버 성능 향상을 위한 이동성 지원 MAC 프로토콜)

  • Yang, Hyeon-Chae;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.437-452
    • /
    • 2008
  • IEEE 802.16j MR networks introduce RSs (Relay Stations) within the IEEE 802.16 system in order to enhance the data throughput and extend the coverage. However, the current standardization defines that the BS (Base Station) controls MS's (Mobile Station's) handover, not only it induces the large signaling overhead but also handover latency could increase. In this paper, we propose a handover protocol in the MR networks where the high capability RSs that can process the MS's control functions are deployed. First, we classify the handover scenarios for the MR networks with the high capability RSs. Then, we define the MAC handover procedure, corresponding MAC management messages and the transmission routes for the proposed messages so that an 802.16e MS can perform seamless handover without noticing it is attached to an MR network. The simulation results show that the proposed handover protocol not only reduces the MAC management message overhead transferred through the wireless links compared to IEEE 802.16j/D1, which is the current standard for MR networks, but also performs the rapider and more secure MS handover than IEEE 802.16e and IEEE 802.16j/D1.

Improving QoS using Cellular-IP/PRC in Hospital Wireless Network

  • Kim, Sung-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.2
    • /
    • pp.120-126
    • /
    • 2006
  • In this paper, we propose for improving QoS in hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and most of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

  • PDF

Contents Routing in the OpenFlow-based Wireless Mesh Network Environment (OpenFlow기반 무선 메쉬 네트워크 환경에서의 컨텐츠 라우팅)

  • Kim, Won-Suk;Chung, Sang-Hwa;Choi, Hyun-Suk;Do, Mi-Rim
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.810-823
    • /
    • 2014
  • The wireless mesh network based on IEEE 802.11s provides a routing based on a destination address as it inherits legacy internet architecture. However, this architecture interested in not 'what' which is originally the users goal but 'where'. Futhermore, because of the rapid increase of the number of mobile devices recently, the mobile traffic increases geometrically. It reduces the network effectiveness as increasing many packets which have same payload in the situation of many users access to the same contents. In this paper, we propose an OpenFlow-based contents routing for the wireless mesh network(WMN) to solve this problem. We implement contents layer to the legacy network layer which mesh network uses and the routing technique based on contents identifier for efficient contents routing. In addition we provide flexibility as we use OpenFlow. By using this, we implement caching technique to improve effectiveness of network as decreasing the packet which has same payload in WSN. We measure the network usage to compare the flooding technique, we measure the delay to compare environment using caching and non caching. As a result of delay measure it shows 20% of performance improve, and controller message decrease maximum 89%.