• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.023 seconds

Effectiveness Evaluation of Demand Forecasting Based Inventory Management Model for SME Manufacturing Factory (중소기업 제조공장의 수요예측 기반 재고관리 모델의 효용성 평가)

  • Kim, Jeong-A;Jeong, Jongpil;Lee, Tae-hyun;Bae, Sangmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.197-207
    • /
    • 2018
  • SMEs manufacturing Factory, which are small-scale production systems of various types, mass-produce and sell products in order to meet customer needs. This means that the company has an excessive amount of material supply to reduce the loss due to lack of inventory and high inventory maintenance cost. And the products that fail to respond to the demand are piled up in the management warehouse, which is the reality that the storage cost is incurred. To overcome this problem, this paper uses ARIMA model, a time series analysis technique, to predict demand in terms of seasonal factors. In this way, demand forecasting model based on economic order quantity model was developed to prevent stock shortage risk. Simulation is carried out to evaluate the effectiveness of the development model and to demonstrate the effectiveness of the development model as applied to SMEs in the future.

A Study on Remote IoT operating time for Fire Detector of Smart Home (스마트 홈에서 연소에 따른 화재감지기 원격 IoT 작동 시간에 관한 연구)

  • Ko, Eun-young;Hong, Sung-Ho;Cha, Jae-sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.235-238
    • /
    • 2020
  • In the smart home era, fire safety is very important for human life and facility safety. Casualties and property damage from the fire would be a huge national loss. In this paper, we propose to predict the risk by determining the operating time of the fire detector according to the fire in the smart home. Among IoT fire detectors, heat detectors and smoke detectors, the risk can be predicted due to the difference in the operating time depending on the fire. Based on the results of this experiment, the ion-type smoke detector shows very fast characteristics, so it would be good to use the results in future fire prevention facility.

Subjectivity Study on Cloud-based Smart Work Service of a Quasi-Governmental Agency (준 정부기관 C공단의 클라우드 기반 스마트워크 서비스 유형화 연구)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.113-123
    • /
    • 2014
  • Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. The purpose of this study is to propose Improvement plans on cloud-based smart work service of a quasi-governmental agency based on the view point of preference and tendency. To discover three types of cloud-based smart work issues and interpret theoretical definitions of those, we conducted a subjectivity analysis through qualitative methodology. At the result, the study draws three elements of typology: convenience type, concentration type, and collaboration type, and provides directions to strategic-policy studies for future cloud-based smart work services of quasi-governmental agency.

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach

  • Khan, Murad;Park, Gisu;Cho, Wooseong;Seong, Gihyuk;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.344-357
    • /
    • 2015
  • With the increase in a number of access technologies and data rates, a continuous connection among different networks is demand of the future wireless networks. In the last decade, user connectivity among different access networks remained a challenging job. Therefore, in this article, we proposed a user-centric and user-perspective based network selection mechanism for fast handover management in heterogeneous wireless networks. The proposed scheme selects the most appropriate network among available networks on the basis of resources i.e. cost, data rate, and link quality. Initially, we load the Media Independent Information Service (MIIS) with the information of cost and data rate provided by different network operators. Similarly, Mobile Node (MN) is also loaded with the user preferred cost and data rate for different applications. The MN obtains the information of cost and data rate from MIIS server upon a predefined threshold, and make a decision for handover according to its current cost and data rate. Furthermore, we employ an optimal threshold mechanism for initiation of the handover execution phase to minimize false handover indications. The proposed scheme is based on a survey for network selection and its implementation in C programming language to validate its performance and accuracy. The simulation result shows that the proposed scheme performs superior then the schemes present in the current literature.

Joint Mode Selection and Resource Allocation for Mobile Relay-Aided Device-to-Device Communication

  • Tang, Rui;Zhao, Jihong;Qu, Hua;Zhu, Zhengcang;Zhang, Yanpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.950-975
    • /
    • 2016
  • Device-to-Device (D2D) communication underlaying cellular networks is a promising add-on component for future radio communication systems. It provides more access opportunities for local device pairs and enhances system throughput (ST), especially when mobile relays (MR) are further enabled to facilitate D2D links when the channel condition of their desired links is unfavorable. However, mutual interference is inevitable due to spectral reuse, and moreover, selecting a suitable transmission mode to benefit the correlated resource allocation (RA) is another difficult problem. We aim to optimize ST of the hybrid system via joint consideration of mode selection (MS) and RA, which includes admission control (AC), power control (PC), channel assignment (CA) and relay selection (RS). However, the original problem is generally NP-hard; therefore, we decompose it into two parts where a hierarchical structure exists: (i) PC is mode-dependent, but its optimality can be perfectly addressed for any given mode with additional AC design to achieve individual quality-of-service requirements. (ii) Based on that optimality, the joint design of MS, CA and RS can be viewed from the graph perspective and transferred into the maximum weighted independent set problem, which is then approximated by our greedy algorithm in polynomial-time. Thanks to the numerical results, we elucidate the efficacy of our mechanism and observe a resulting gain in MR-aided D2D communication.

An automatic detection scheme of anti-debugging routines to the environment for analysis (분석 환경에 따른 안티 디버깅 루틴 자동 탐지 기법)

  • Park, Jin-Woo;Park, Yong-Su
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.47-54
    • /
    • 2014
  • Anti-debugging is one of the techniques implemented within the computer code to hinder attempts at reverse engineering so that attackers or analyzers will not be able to use debuggers to analyze the program. The technique has been applied to various programs and is still commonly used in order to prevent malware or malicious code attacks or to protect the programs from being analyzed. In this paper, we will suggest an automatic detection scheme for anti-debugging routines. With respect to the automatic detection, debuggers and a simulator were used by which trace information on the Application Program Interface(API) as well as executive instructions were extracted. Subsequently, the extracted instructions were examined and compared so as to detect points automatically where suspicious activity was captured as anti-debugging routines. Based on experiments to detect anti-debugging routines using such methods, 21 out of 25 anti-debugging techniques introduced in this paper appear to be able to detect anti-debugging routines properly. The technique in the paper is therefore not dependent upon a certain anti-debugging method. As such, the detection technique is expected to also be available for anti-debugging techniques that will be developed or discovered in the future.

A Receiver-Driven Loss Recovery Mechanism for Video Dissemination over Information-Centric VANET

  • Han, Longzhe;Bao, Xuecai;Wang, Wenfeng;Feng, Xiangsheng;Liu, Zuhan;Tan, Wenqun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3465-3479
    • /
    • 2017
  • Information-Centric Vehicular Ad Hoc Network (IC-VANET) is a promising network architecture for the future intelligent transport system. Video streaming applications over IC-VANET not only enrich infotainment services, but also provide the drivers and pedestrians real-time visual information to make proper decisions. However, due to the characteristics of wireless link and frequent change of the network topology, the packet loss seriously affects the quality of video streaming applications. In this paper, we propose a REceiver-Driven loss reCOvery Mechanism (REDCOM) to enhance video dissemination over IC-VANET. A Markov chain based estimation model is introduced to capture the real-time network condition. Based on the estimation result, the proposed REDCOM recovers the lost packets by requesting additional forward error correction packets. The REDCOM follows the receiver-driven model of IC-VANET and does not require the infrastructure support to efficiently overcome packet losses. Experimental results demonstrate that the proposed REDCOM improves video quality under various network conditions.

Outlier Detection Based on MapReduce for Analyzing Big Data (대용량 데이터 분석을 위한 맵리듀스 기반의 이상치 탐지)

  • Hong, Yejin;Na, Eunhee;Jung, Yonghwan;Kim, Yangwoo
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.27-35
    • /
    • 2017
  • In near future, IoT data is expected to be a major portion of Big Data. Moreover, sensor data is expected to be major portion of IoT data, and its' research is actively carried out currently. However, processed results may not be trusted and used if outlier data is included in the processing of sensor data. Therefore, method for detection and deletion of those outlier data before processing is studied in this paper. Moreover, we used Spark which is memory based distributed processing environment for fast processing of big sensor data. The detection and deletion of outlier data consist of four stages, and each stage is implemented with Mapper and Reducer operation. The proposed method is compared in three different processing environments, and it is expected that the outlier detection and deletion performance is best in the distributed Spark environment as data volume is increasing.

Introducing Network Situation Awareness into Software Defined Wireless Networks

  • Zhao, Xing;Lei, Tao;Lu, Zhaoming;Wen, Xiangming;Jiang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1063-1082
    • /
    • 2018
  • The concept of SDN (Software Defined Networking) endows the network with programmability and significantly improves the flexibility and extensibility of networks. Currently a plenty of research works on introducing SDN into wireless networks. Most of them focus on the innovation of the SDN based architectures but few consider how to realize the global perception of the network through the controller. In order to address this problem, a software defined carrier grade Wi-Fi framework called SWAN, is proposed firstly. Then based on the proposed SWAN architecture, a blueprint of introducing the traditional NSA (Network Situation Awareness) into SWAN is proposed and described in detail. Through perceiving various network data by a decentralized architecture and making comprehension and prediction on the perceived data, the proposed blueprint endows the controllers with the capability to aware of the current network situation and predict the near future situation. Meanwhile, the extensibility of the proposed blueprint makes it a universal solution for software defined wireless networks SDWNs rather than just for one case. Then we further research one typical use case of proposed NSA blueprint: network performance awareness (NPA). The subsequent comparison with other methods and result analysis not only well prove the effectiveness of proposed NPA but further provide a strong proof of the feasibility of proposed NSA blueprint.

Emotional Intelligence of Youth Impacted by the Used Time of Smart Devices and Sports Activities (스마트 기기 사용 시간과 스포츠 활동 시간이 청소년의 감성지능에 미치는 영향)

  • Kwon, Mee-Rhan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.211-217
    • /
    • 2014
  • The smart revolution led by Smart Phone in our daily lives is changing the paradigm in general. These smart revolution has provided us a lot of convenience, but on the other hand also appearing an inverse function. The host of the future of young people, especially by the excessive use of smart devices, there is a risk of side effects increased. In this study, the empirical analysis has been done to know how the used time of smart devices and youth sports activities affect to the emotional intelligence. Using regression analysis, the used time of smart devices showed negative relationship and the time of youth sports activities affected positively with the emotional intelligence. Additional analysis of the amount of reading also affected positively to the motional intelligence as a conclusion. Through this study, as a conclusion, traditional activities, namely sports activities and reading to help the youth developing emotional intelligence, while the use of smart devices inhibits the development of emotional intelligence of youth.