• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.029 seconds

Development of an Internet Based POP System (인터넷 기반 POP시스템의 구현)

  • Kim, Seong-Hun;Han, Young-Geun
    • IE interfaces
    • /
    • v.12 no.4
    • /
    • pp.567-574
    • /
    • 1999
  • The use of POP(Point of Production) systems which help to report the realtime production information to the supervisor class and to send commands to the shop floor is increasing gradually. Future companies will need to break the limit of regions and to exchange information among remote-sited departments and companies located abroad. In order to achieve this goal, Internet which is growing remarkably nowadays will be the best tool. In this research, a prototype of the POP system based on Internet is developed using the Java language. The developed POP system can monitor production status by collecting information from shop floor through a web server and can control production equipments from remote sites.

  • PDF

Future of Toxicology and Role of Asian Chemical Safety Network

  • Kaminuma, Tsuguchika
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.241-249
    • /
    • 2001
  • Toxicology is under challenge from several new trends in science and technology, namely computer, the Internet, genome projects, genomic technologies, and combinatorial chemistry. These new trends will drastically change research style of toxicology. In addition to conventional uni cellular tests and animal tests using rodents, computer simulation, DNA chips (microarrays), in vivo tests using simple model organisms such as nematodesor flies become important routine screening tests. How to arrange these tests in tiers will become a new problem. Endocrine disruptors hypothesis is a good example for this kind of futuristic approach. Computer, particularly the Internet, is also enabling toxicologists and regulatory experts to collaborate more closely. The IPCS (International Program for Chemical Safety) which is ajoint project of WHO, ILO and UNEP, is a well-known international collaborative research for chemical risk assessments. The GINC project of IPCS is an effort to utilize the Internet for such collaborations. Some efforts were also made to establish regional collaboration network in East Asia under this project.

  • PDF

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

  • Choi, Sang-Il;Koh, Seok-Joo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2017
  • The constrained application protocol (CoAP) can be used for remotely controlling various sensor devices in Internet of Things (IoT) networks. In CoAP, to support the handover of a mobile sensor device, service discovery and message transmission needs to be repeated, although doing so would increase the handover delay significantly. To address this limitation of CoAP, a centralized CoAP scheme has been proposed. However, it tends to result in performance degradation for an inter-domain handover case. In this letter, we propose a distributed CoAP handover scheme to support the inter-domain handover. In the proposed scheme, a distributed mobility agent (DMA) is used for managing the location of mobile sensors in a domain and performing handover control operations with its neighboring DMAs in a distributed manner. A performance comparison reveals that the proposed scheme offers a performance improvement of up to 29.5% in terms of the handover delay.

Feature Selection Algorithms in Intrusion Detection System: A Survey

  • MAZA, Sofiane;TOUAHRIA, Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5079-5099
    • /
    • 2018
  • Regarding to the huge number of connections and the large flow of data on the Internet, Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and redundant features influence on the quality of IDS precisely on the detection rate and processing cost. Feature Selection (FS) is the important technique, which gives the issue for enhancing the performance of detection. There are different works have been proposed, but a map for understanding and constructing a state of the FS in IDS is still need more investigation. In this paper, we introduce a survey of feature selection algorithms for intrusion detection system. We describe the well-known approaches that have been proposed in FS for IDS. Furthermore, we provide a classification with a comparative study between different contribution according to their techniques and results. We identify a new taxonomy for future trends and existing challenges.

A Research on System Interconnection Using XML/EDI, WML (XML/EDI, WML을 사용한 시스템 연계에 관한 연구)

  • 안동률;박정선
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.225-237
    • /
    • 2002
  • As the population of the Internet inneases, so does that of mobile Internet. Currently, the use area of mobile Internet is rather limited due to the low speed of transmission and lack of applications. However, it is evident that the speed will be improved and more applications will be developed. In this paper, we propose: i) to use WAP in SCM, ii) to interconnect WAP and XML/EDI system, iii) to interconnect WAP, XML/EDI, Legacy system in SCM. We implemented a prototype which can show the interconnection among WAP, XML/EDI, and Legacy system. We hope the concept could be used in real applications in the near future.

  • PDF

Dynamic Analysis via Keyword Mapping for Internet of Things (사물 인터넷에 대한 키워드 매핑을 통한 동태적 분석)

  • Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.7
    • /
    • pp.813-818
    • /
    • 2015
  • IoT is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator or other connected devices. Until now many researches have been studied for centering keyword for detecting emerging technology of future and scientometric analysis among the papers. This paper propose searching method of emerging technology for the IOT (internet of things) which is recently interesting area via dynamic analysis for keyword mapping.

A Study on Development of Internet Based Power Management System Using a Microprocessor (마이크로프로세서를 이용한 인터넷기반 전력관리시스템 개발에 관한 연구)

  • 천행춘
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.28 no.5
    • /
    • pp.746-753
    • /
    • 2004
  • In this paper, the Power Management System(PMS) which based on a decision making system according to power strategy is proposed and implemented. PMS is designed to have functions of power monitoring. controlling, synchronizing load sharing and monitoring of driving engine, etc. PMS consists of the internet communication system(ICS). Remote Management System(RMS) and Sensor Driver System (SDS) ICS transmits the monitoring and supervisory data via Internet to Remote Management System(RMS) in real-time SDS detects various power system data on local generator and utility via I/O interface system. I/O interface system receives various status data and outputs control signals. Implemented PMS is tested with dummy signal to verify proposed functions and shows good results. For future study implemented PMS will be tested under real load condition to merchandize.

A Study of Classification Systems in the Internet Shopping Malls (인터넷 쇼핑몰의 상품 분류체계에 대한 연구)

  • 곽철완
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.201-215
    • /
    • 2001
  • The purpose of this study is to identify how to construct an internet shopping mall classification system used on the library classification theories. To aid in identifying classification system, this study focused on the Ranganathan’s classification canons; canons for characteristics, canons for terms. The study shows six priniciples for an internet shopping mall classification system construct: products’characteristics, inclusiveness, various access points, category sequence and term consistency, term currency and obviousness, no term duplication. For future research, product’s search patterns and relationship to interface are suggested.

  • PDF

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

A Research on the Internet-based Cyber-insurance Service (인터넷상의 사이버보험의 현황과 발전 방향에 관한 연구)

  • Nam, Sang-Zo;Lee, Jung-Ho
    • Asia pacific journal of information systems
    • /
    • v.8 no.3
    • /
    • pp.165-180
    • /
    • 1998
  • In this study, we analysed the current situation of Internet-based insurance services which can provide a non-traditional and cost effective communication channel between the customers and insurance companies. The service of Internet-based cyber-insurance extends from mere advertisement to on-line contracts through planning simulations and, furthermore, to customer monitoring. This cyber-insurance is the demand of the times and is not to be overlooked-by the Korean insurance companies which are suffering from accumulated loss and are facing severe economic depression. We performed a comparative analysis between the domestic cyber-insurance service and pioneers'. Also, we suggested future possibilities of cyber-insurance services, presenting an architecture for the construction of a cyber-insurance management module within the meta financial investment system.

  • PDF