• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.028 seconds

Review of Simultaneous Wireless Information and Power Transfer in Wireless Sensor Networks

  • Asiedu, Derek Kwaku Pobi;Shin, Suho;Koumadi, Koudjo M.;Lee, Kyoung-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.105-116
    • /
    • 2019
  • Recently, there has been an increase in research on wireless sensor networks (WSNs) because they are easy to deploy in applications such as internet-of-things (IoT) and body area networks. However, WSNs have constraints in terms of power, quality-of-service (QoS), computation, and others. To overcome the power constraint issues, wireless energy harvesting has been introduced into WSNs, the application of which has been the focus of many studies. Additionally, to improve system performance in terms of achievable rate, cooperative networks are also being explored in WSNs. We present a review on current research in the area of energy harvesting in WSNs, specifically on the application of simultaneous wireless information and power transfer (SWIPT) in a cooperative sensor network. In addition, we discuss possible future extensions of SWIPT and cooperative networks in WSNs.

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Suggest Schema for Machine Socialization of Technical Development (Machine Socialization 기술개발을 위한 스키마 제안)

  • Park, Sung-hyun;Kim, Yong-Un;Yoo, Sang-keun;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.865-867
    • /
    • 2014
  • IoT is a kind of business means to maintain the scenario in aware of the situation with the user's through collaboration for M2M have intelligence to each appliance is of machine socializations. The existing IoT Progress from one situation one control of through a simple sensor data, mean from machine socialization is regulate and control on overall the flow of machine manager to solved a scenarios as the situation. In this paper, suggest schema for to apply the M2M of SNS of existing H2H, suggest is schema in information each appliance in solve scenario for machine manager.

  • PDF

Determinants of Firms' Standardization Activity: Evidence from the Korean Service Firms (기업의 표준화활동 결정요인 : 우리나라 서비스기업에 대한 실증연구)

  • Sung, Tae-Kyung
    • Management & Information Systems Review
    • /
    • v.28 no.2
    • /
    • pp.95-112
    • /
    • 2009
  • The paper investigates the determinants of firm's standardization activity in the Korean service industry. Standardization variables as dependent ones are standardization management at the firm level, domestic standardization activity, and international standardization activity. The independent variables include innovative activities(R&D intensity and patent application), firm size, export ratio, network, and firm's organization characteristics. We estimated the logistic regression model, using the data from 102 Korean service firms. The empirical findings are as follows. First, R&D intensity has a positive effect on international standardization activity, but not on the standardization management at the firm level and domestic standardization activity. Second, patent application has a negative effect on the standardization management at the firm level. Third, firm size doesn't have any influence on firms' standardization activities in the service sector. Fourth, the level of chief executive officer's interest on standardization is a very important factor in determining firms' efforts to participate standardization process, regardless of types of standardization activity.

  • PDF

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Design of Anomaly Detection System Based on Big Data in Internet of Things (빅데이터 기반의 IoT 이상 장애 탐지 시스템 설계)

  • Na, Sung Il;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.377-383
    • /
    • 2018
  • Internet of Things (IoT) is producing various data as the smart environment comes. The IoT data collection is used as important data to judge systems's status. Therefore, it is important to monitor the anomaly state of the sensor in real-time and to detect anomaly data. However, it is necessary to convert the IoT data into a normalized data structure for anomaly detection because of the variety of data structures and protocols. Thus, we can expect a good quality effect such as accurate analysis data quality and service quality. In this paper, we propose an anomaly detection system based on big data from collected sensor data. The proposed system is applied to ensure anomaly detection and keep data quality. In addition, we applied the machine learning model of support vector machine using anomaly detection based on time-series data. As a result, machine learning using preprocessed data was able to accurately detect and predict anomaly.

Mapping of QoS Information Elements and Implementation of Rs/Rw Interface Resource Control Protocols in NGN (NGN에서의 QoS 정보요소 매핑 및 Rs/Rw 인터페이스의 자원제어 프로토콜 구현)

  • Jeon, Jin-Su;Kim, Hae-Hyun;Cha, Young-Wook;Kim, Choon-Hee;Jeong, You-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.429-438
    • /
    • 2008
  • NGN is a packet-based converged network to support session and non-session services in QoS-enabled broadband transport network. QoS based resource control must be defined to support differentiated services for various network users in NGN. We designed and implemented DIAMETER protocol as the Rs interface, and also defined mapping rules between DIAMETER information elements and SDP(Session Description Protocol) attributes for QoS based resource control in NGN. We selected and implemented DIAMETER protocol among alternate resource control protocols in ITU-T as the Rw interface because of simple interworking method with Rs interface and adequate AAA functionality. We defined mapping rules of messages and information elements between Rs and Rw interfaces for resource control from a service layer to a transport layer. Based on the mapping rule of QoS information elements and the interworking method between Rs and Rw interfaces, we built up a test-bed that support differentiated delivery services.

The Design of Intramedia Synchronization based QoS (QoS 기반의 미디어내 동기화 설계)

  • Park, Hong-Jin;Lee, Jun-Yeon;Kim, Chang-Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2042-2049
    • /
    • 1999
  • In contrast to traditional data communication, the multimedia communication must support variable requirements to multimedia application service. Specially, it is a critical issue that the synchronization supports a continuous and temporal relationship media playout in a distributed environment. But the continuously generated media in source can't guarantee the constant interval on playout for the destination due to the inconsistent network transmission delay and transmission error. In this paper, we introduce a intramedia synchronization mechanism for the continuous and synchronous playout of multimedia stream such as audio and video across a communication network. The proposed mechanism is based on the user defined QoS(Quality of Service) and the playout correction algorithm to guarantee the continuous media playout at the receiver.

  • PDF

Research of Anti-DDoS SW Efficiency Test (Anti-DDoS SW 성능평가에 관한 연구)

  • Lee, Jae-Guen;Jo, In-June;Shin, Seok-Kyoo;Kim, Sun-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.363-367
    • /
    • 2009
  • From the recent, an big issue of the internet attack is DDoS(Distributed Denial of Service). Some government agencies and companies will buy Anti-DDoS SW for protect their their network system form DDoS attack. But We don't have any objective valuation standard of Anti-DDoS SW. So When you try to buy an Anti-DDoS SW, you can get only subjective Anti-DDoS SW information which from Anti-DDoS SW vender. Anti-DDoS SW market is getting bigger, so market needs objective valuation standard of Anti-DDoS SW for a fair evaluation. In this paper, we describe a part of Anti-DDoS SW performance tests in valuation standard of Anti-DDoS SW.

  • PDF

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.