• Title/Summary/Keyword: Tracking Location

Search Result 910, Processing Time 0.024 seconds

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Creation of 3D Maps for Satellite Communications to Support Ambulatory Rescue Operations

  • Nakajima, Isao;Nawaz, Muhammad Naeem;Juzoji, Hiroshi;Ta, Masuhisa
    • Journal of Multimedia Information System
    • /
    • v.6 no.1
    • /
    • pp.23-30
    • /
    • 2019
  • A communications profile is a system that acquires information from communication links to an ambulance or other vehicle moving on a road and compiles a database based on this information. The equipment (six sets of HDTVs, fish-eye camera, satellite antenna with tracking system, and receiving power from the satellite beacon of the N-star) mounted on the roof of the vehicle, image data were obtained at Yokohama Japan. From these data, the polygon of the building was actually produced and has arranged on the map of the Geographical Survey Institute of a 50 m-mesh. The optical study (relationship between visibility rate and elevation angle) were performed on actual data taken by fish-eye lens, and simulated data by 3D-Map with polygons. There was no big difference. This 3D map system then predicts the communication links that will be available at a given location. For line-of-sight communication, optical analysis allows approximation if the frequency is sufficiently high. For non-line-of-sight communication, previously obtained electric power data can be used as reference information for approximation in certain cases when combined with predicted values calculated based on a 3D map. 3D maps are more effective than 2D maps for landing emergency medical helicopters on public roadways in the event of a disaster. Using advanced imaging technologies, we have produced a semi-automatic creation of a high-precision 3D map at Yokohama Yamashita Park and vicinity and assessed its effectiveness on telecommunications and ambulatory merits.

BIG DATA ANALYSIS ROLE IN ADVANCING THE VARIOUS ACTIVITIES OF DIGITAL LIBRARIES: TAIBAH UNIVERSITY CASE STUDY- SAUDI ARABIA

  • Alotaibi, Saqar Moisan F
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.297-307
    • /
    • 2021
  • In the vibrant environment, documentation and managing systems are maintained autonomously through education foundations, book materials and libraries at the same time as information are not voluntarily accessible in a centralized location. At the moment Libraries are providing online resources and services for education activities. Moreover, libraries are applying outlets of social media such as Facebook as well as Instagrams to preview their services and procedures. Librarians with the assistance of promising tools and technology like analytics software are capable to accumulate more online information, analyse them for incorporating worth to their services. Thus Libraries can employ big data to construct enhanced decisions concerning collection developments, updating public spaces and tracking the purpose of library book materials. Big data is being produced due to library digitations and this has forced restrictions to academicians, researchers and policy creator's efforts in enhancing the quality and effectiveness. Accordingly, helping the library clients with research articles and book materials that are in line with the users interest is a big challenge and dispute based on Taibah university in Saudi Arabia. The issues of this domain brings the numerous sources of data from various institutions and sources into single place in real time which can be time consuming. The most important aim is to reduce the time that lapses among the authentic book reading and searching the specific study material.

Hybrid Indoor Position Estimation using K-NN and MinMax

  • Subhan, Fazli;Ahmed, Shakeel;Haider, Sajjad;Saleem, Sajid;Khan, Asfandyar;Ahmed, Salman;Numan, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4408-4428
    • /
    • 2019
  • Due to the rapid advancement in smart phones, numerous new specifications are developed for variety of applications ranging from health monitoring to navigations and tracking. The word indoor navigation means location identification, however, where GPS signals are not available, accurate indoor localization is a challenging task due to variation in the received signals which directly affect distance estimation process. This paper proposes a hybrid approach which integrates fingerprinting based K-Nearest Neighbors (K-NN) and lateration based MinMax position estimation technique. The novel idea behind this hybrid approach is to use Euclidian distance formulation for distance estimates instead of indoor radio channel modeling which is used to convert the received signal to distance estimates. Due to unpredictable behavior of the received signal, modeling indoor environment for distance estimates is a challenging task which ultimately results in distance estimation error and hence affects position estimation process. Our proposed idea is indoor position estimation technique using Bluetooth enabled smart phones which is independent of the radio channels. Experimental results conclude that, our proposed hybrid approach performs better in terms of mean error compared to Trilateration, MinMax, K-NN, and existing Hybrid approach.

Cost-effective Sensor-based Scalable Automated Conveyance System (저비용 센서 기반의 확장 가능한 자동 운반 시스템)

  • Kim, Junsik;Jung, Woosoon;Lee, Hyung Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.31-40
    • /
    • 2021
  • The important goal of the unmanned vehicle technology is on controlling the direction and speed of the vehicle with information acquired from various sensors, without the intervention of the driver, until the vehicle reaches to its destination. In this paper, our focus is on developing an unmanned conveyance system by exploiting low-cost sensing technology for indoor factories or warehouses, where the moving range of the vehicle is limited. To this end, we propose an architecture of a scalable automated conveyance system. Our proposed system includes a number of unmanned conveyance vehicles, and the efficient control mechanism of the vehicles without neither conflicts nor deadlock between the vehicles being simultaneously moved. By implementing the real prototype of the system, we successfully verify the efficiency and functionality of the proposed system.

Distribution of Fault-related Landforms and Lineaments Along the Ulsan Fault Zone (울산단층대 주변의 단층 지형 및 선구조 분포)

  • Lee, Gwang-Ryul;Park, Chung-Sun;Shin, Jae-Ryul
    • Journal of The Geomorphological Association of Korea
    • /
    • v.25 no.3
    • /
    • pp.89-103
    • /
    • 2018
  • This study presents results of analysis on fault-related landforms and the Quaternary fluvial landforms, which are important evidences for active faulting by identifying surface deformation, around the Ulsan Fault Zone. In addition, this study suggests lineament map and inferred active fault-line map based on analyzing linearity and continuity of these landforms and by compiling location information of existing active faults. We convince that quantitative tectonic-geomorphological analysis are an effective method for active faults tracking, in particular, considering the conditions of relatively low seismicity and surface ruptured-events in the Korean Peninsula compared to plate boundary active areas. However, research on active fault in South Korea is just an infant stage since the 1990s and requires accumulation of research achievements on development and application of various fault analysis techniques, analysing and standardizing linear structures.

Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system (데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜)

  • Kwon, Hye-Jin;Lee, Jae-Wook;Jeon, Dong-Ho;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.125-134
    • /
    • 2008
  • A great number of RFID authentication protocols have been proposed for the secure RFID system. These are typically divided into three types according to primitive that they use : Hash-based, Re-encryption based, and XORing-based protocol. The well-known attacks in RFID system are eavesdropping. impersonating, location tracking, and so on. However, existing protocols could not provide security against above attacks, or it was not efficient to search for tags on database. Therefore, in this paper we present a protocol which is secure against above attacks by using hash function and makes Database search tags easily by attaining the state information of previous session through the shared values with all tags and database.

An Enhanced Forward Security on JK-RFID Authentication Protocol (JK-RFID 인증 프로토콜에 대한 개선된 전방향 안전성)

  • Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.161-168
    • /
    • 2011
  • In 2009, Jeon et al proposed the lightweight strong authentication and strong privacy protocol, where the tag requrires only simple bitwise operations and random number generator. JK-RFID authentication protocol provides strong security: eavesdropping, replay, spoofing, Location tracking, DoS attack and forward security. Nevertheless, this paper points out the vulnerability of the forward security and improve the process of key updating. As a result, proposes an enhanced JK-RFID authentication protocol providing forward security and verify its satisfaction. In addition, a security and an efficiency of the proposed scheme analyze. Since partial adjustments of the key updating operation in JK-RFID authentication protocol, our protocol improve the forward security.

Pre/post-processing Operator Selection for Accurate Program Bug Localization (정확한 프로그램 결함 위치 추적을 위한 전-후처리 방법론)

  • Kim, Dongsun
    • Journal of Broadcast Engineering
    • /
    • v.27 no.2
    • /
    • pp.240-243
    • /
    • 2022
  • Tracking the location of program defects is an essential task for software maintenance and repair. When a bug report is submitted, bug localization is a costly task because of the developer's manual effort. Many researchers have tried to automate the task, but according to the reported results, the performance is still insufficient in practice. Therefore, in this study, we analyzed a large amount of bug report data and the latest research and found that the existing studies used only one preprocessing without considering the characteristics of the bug report. In this paper, to solve the problems mentioned earlier, we propose a pre/post-processing operator selection approach for bug localization.

A Study on GPS-based Independent Indoor Location Tracking System Design (GPS기반의 독립형 실내위치추적시스템 설계에 관한 연구)

  • Song, Yu-jin;Jeong, Seong-Ryong;Han, Deok-Soo;Lee, Eun-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1384-1387
    • /
    • 2010
  • 최근 무선인터넷의 기술을 이용한 스마트폰의 활용도가 높아짐에 따라 새로운 서비스의 연구분야로 단말기를 이용하여 이동객체의 위치정보를 제공받는 위치 기반 서비스 기술에 관심이 높아지고 있다. 하지만 현재 기술은 GPS를 이용한 위치추적으로 외부의 이동객체를 추적하는 기술로 많이 활용되고 있다. 그리고 고정된 레퍼런스 노드 또는 마스터 노드에 의존하고 있는 문제점과 위치 계산을 위한 기준이 대부분 홉스나 RF신호의 수신강도에 의한 거리차를 이용하는데 전파 특성에 따른 회절 및 반사, 다중 경로 등에 의한 신호감쇠현상으로 정확도를 보장하지 못하는 문제점이 있다. 따라서 본 논문에서는 GPS와 WiFi를 이용하여 고정된 레퍼런스 노드에 의존하지 않고 이동식 GPS-AP를 이용하여 건물내부에 위치하는 특정 단말기의 위치정보를 제공할 수 있는 시스템을 제안한다.