• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.024 seconds

Research on Efficiency of Interest-Data Handshaking in Wireless Content-Centric Networks (무선 Content-Centric Network에서의 Interest-Data Handshaking의 효율성에 대한 연구)

  • Lee, Seung-Jin;Park, Chan-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.81-86
    • /
    • 2014
  • Content Centric Network (CCN) is one of candidate technologies for the future Information Centric Networks. Recently, adopting CCN concept to wireless networks has extensively been studied. One of the well-known studies is Enhanced-Content-centric multiHop wireless NETwork (E-CHANET), which proposes efficient methods to deliver contents adopting CCN concept over wireless environment. In E-CHANET, in order for a provider to send a data packet, one interest packet from a consumer is required. In this paper, efficiency of data-interest handshaking in E-CHANET has been investigated. It is compared with a method using only one interest packet for all data packets through simulations. As results, while the handshaking provides transmission reliability, it increses content down load time too much.

A Study on Average Range Setting in Adaptive KNN of WiFi Fingerprint Location Estimation Method (WiFi 핑거프린트 위치추정 방식의 적응형 KNN에서 평균 범위 설정에 관한 연구)

  • Oh, Jongtaek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.129-134
    • /
    • 2018
  • Research on the technique for estimating the indoor position has been actively carried out. In particular, the WiFi fingerprint method, which does not require any additional infrastructure, is being partially used because of its high economic efficiency. The KNN method which estimates similar points to the corresponding points by comparing intensity information of the WLAN reception signal measured at various points in advance with intensity information measured at a specific point in the future is simple but has a good performance. However, in the conventional KNN scheme, since the number K of average candidate positions is constant, there is a problem that the position estimation error is not optimized according to a specific point. In this paper, we proposed an algorithm that adaptively changes the K value for each point and applied it to experimental data and evaluated its performance.

Smart Factory Platform based on Multi-Touch and Image Recognition Technologies (멀티터치 기술과 영상인식 기술 기반의 스마트 팩토리 플랫폼)

  • Hong, Yo-Hoon;Song, Seung-June;Jang, Kwang-Mun;Rho, Jungkyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.23-28
    • /
    • 2018
  • In this work, we developed a platform that can monitor status and manage events of factory workplaces by providing events and data collected from various types of multi-touch technology based sensors installed in the workplace. By using the image recognition technology, faces of the people in the factory workplace are recognized and the customized contents for each worker are provided, and security of contents is enhanced by the authenticating an individual worker through face recognition. Contents control function through gesture recognition is constructed, so that workers can easily search documents. Also, it is possible to provide contents for workers by implementing face recognition function in mobile devices. The result of this work can be used to improve workplace safety, convenience of workers, contents security and can be utilized as a base technology for future smart factory construction.

A Study on Routing Protocol for Multi-Drone Communication (멀티드론 통신을 위한 라우팅 프로토콜 연구)

  • Kim, Jongkwon;Chung, Yeongjee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.41-46
    • /
    • 2019
  • In this paper, it is necessary to study the bandwidth and network system for efficient image transmission in the current era of drone imaging, and to design routing protocols to round out and cluster two or more multi-drones. First, we want to construct an ad hoc network to control the multidrone. Several studies are underway for the clustering of drones. The aircraft ad hoc network (FANET) is an important foundation for this research. A number of routing protocols have been proposed to design a FANET, and these routing protocols show different performances in various situations and environments. The routing protocol used to design the FANET is tested using the routing protocol used in the existing mobile ad hoc network (MANET). Therefore, we will use MANET to simulate the routing protocol to be used in the FANET, helping to select the optimal routing protocol for future FANET design. Finally, this paper describes the routing protocols that are mainly used in MANET and suitable for FANET, and the performance comparison of routing protocols, which are mainly used in FANET design.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

Communication Characteristics of Fashion Shows Using Digital Images (디지털 영상을 활용한 패션쇼의 커뮤니케이션 특성)

  • Hong, Hye Rim;Kim, Young In
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.6
    • /
    • pp.1-15
    • /
    • 2014
  • In the fashion industry, the thing that shows the latest trends and makes issues is the fashion show. The function of fashion shows is changing from a promotional mean to a method of communication with customers. Recently, some fashion shows have used digital images and omitted traditional parts of a fashion show such as models, stages, garments, music and audiences. In this study, 30 fashion shows that used digital images were selected from the 2000-2010 collections of Paris, Milan, London and New York, and its communication characteristics were analyzed and discussed. The three categories of the communication characteristics are as follows: First, the shows used digital images as stage sceneries or effects to create desired stage effects. The digital images were used as extra tools to reinforce the concept of the fashion show. Second, the fashion shows used real-time videos to extend its presentation into the virtual space. The interactive videos were designed to encourage audiences to actively participate in the show. Third, the digital images were the focus of the show for the internet-only digital fashion shows. Since the Internet is not constrained by time or space, multi-faceted, communication between audiences and fashion designers or among audiences is possible. In addition, the number of audience it can reach is higher than traditional fashion shows. Digital images will be used more often in the fashion shows. In the future, fashion shows will try to become more interactive with audiences through the use of new digital image technology.

Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric (하이퍼레저 패브릭 기반의 안전한 헬스케어 데이터 관리 및 공유 플랫폼 개발 연구)

  • Choi, Ye-Jin;Kim, Kyoung-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.95-102
    • /
    • 2020
  • In this paper, we present a healthcare data integration management and sharing platform based on a permissioned blockchain-based system called the Hyperledger fabric. The Hyperledger fabric allows patients to easily access their data, share the data with agencies that need it, and also reward participants. The healthcare data is stored in the blockchain by a de-identification process. Privacy is protected by setting detailed access rights to the stored data. The proposed model provides higher security than other models using a public blockchain. This study confirms that patient data can be stored more securely, by comparing the data stored in the blockchain with that from existing information storage methods.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Effect of Mobile Advertising Characteristics on the Continuity and Avoidance Intention of Mobile Advertisement (모바일 광고특성이 모바일광고 지속의도와 회피의도에 미치는 영향)

  • Moon, Jun-Hwan;Lee, Sin-Bok;Lee, Jae-Beom
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.237-252
    • /
    • 2017
  • This study suggests a strategy to provide effective mobile advertising marketed by identifying factors affecting the use and avoidance intention of mobile advertising on SNS. This article has three main findings. First, each factor of usefulness, novelty and irritation have a significant effect on satisfaction and usefulness, clutter and irritation factor have a significant effect on dissatisfaction. Second, satisfaction and dissatisfaction of mobile advertising exist at the same time, and it is confirmed that they are considered when consumers use mobile advertising. The third finding is that effective mobile advertising avoids the boredom of ads through moderating irritation and should be used in fresh form with more useful information than other ads' form. The result of this study should be an important criterion that mobile advertising providers make advertisements that consumers want in the future.