• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.026 seconds

Integrated Service Framework for Naval Ship using REST Architecture (REST 아키텍처를 이용한 함정 통합 서비스 프레임워크)

  • Kim, Kyubaek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.1-10
    • /
    • 2017
  • The functions of various systems inside the naval ships have been improved and diversified to prepare for the future battlefield and satisfy new requirements. The number of missions and operating displays with which a crew has to deal has increased. In this paper, Integrated Service Framework for Naval Ships is proposed. The proposed framework is based on REST architecture and it interfaces the networks of each systems in the ship. The connected data and functions are rebuilt as an object and they are provided as HTTP and JSON based APIs. The prototype of the framework was implemented in a combat system test-bed and its feasibility was proved with performance tests. With the proposed framework, operational efficiency for a naval ship can be achieved by designing new integrated displays and HCI which utilize whole ship's capabilities.

A study of Location based Air Logistics Systems with Light-ID and RFID on Drone System for Air Cargo Warehouse Case

  • Baik, Nam-Jin;Baik, Nam-Kyu;Lee, Min-Woo;Cha, Jae-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.31-37
    • /
    • 2017
  • Recently Drone technology is emerging as an alternative new way of distribution systems services. Amazon, Google which are global network chain distribution companies are developing an idea of Drone based delivery service and applied for patent for Drone distribution systems in USA. In this paper, we investigate a way to adopt Drone system to Air Cargo logistics, in particular, drone system based on combination of Light ID and RFID technology in the management procedure in stock warehouse. Also we explain the expected impact of Drone systems to customs declaration process. In this paper, we address the investigated limitations of Drone by the Korean Aviation Act as well as suggest the directions of future research for application of Drone to Air logistics industry with investigated limitations.

Trend and Prospect of Security System Technology for Network (네트워크를 위한 보안 시스템의 기술 개발 동향 및 전망)

  • Yang, Kyung-Ah;Shin, Dong-Woo;Kim, Jong-Kyu;Bae, Byung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2018
  • The latest cyber attack utilizing advanced technologies is more rapidly advancing than developing speed of defense technology, thereby escalates the security risk. In responding to this recent threat, academia and industries are developing some sophisticated security technologies applying various methods. Based on these technologies, security systems are used in many fields. This article aims to select noticeable network security related technologies for the security systems. In particular, we compared and analyzed the trend, performance, and functions of both foreign and domestic technologies in regard to UTM having the largest portions among network security systems so far. We will also discuss the prospect for the change in network infrastructure due to the emergence of the next-generation network technology.

A Study on the Invasion of Privacy in Online Environment (온라인 환경에서 프라이버시 침해에 관한 연구)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.185-187
    • /
    • 2015
  • Increasingly important user based service on the smart media era, and increasing awareness about the user experience. As the connected Internet information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information privacy concerns issues. In this research, we aim to analyze factors influencing of the invasion of privacy on continue using intention in online environment. Based on these findings, several theoretical and practical implications were suggested and discussed. Thus, we have reviewed extensive previous studies on information privacy in local and foreign information systems, marketing and other fields. The purpose of this study is to provide future directions of studies on information privacy concerns by analyzing past and recent trends of the studies.

  • PDF

Interactive Conflict Detection and Resolution for Personalized Features

  • Amyot Daniel;Gray Tom;Liscano Ramir;Logrippo Luigi;Sincennes Jacques
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.353-366
    • /
    • 2005
  • In future telecommunications systems, behaviour will be defined by inexperienced users for many different purposes, often by specifying requirements in the form of policies. The call processing language (CPL) was developed by the IETF in order to make it possible to define telephony policies in an Internet telephony environment. However, user-defined policies can hide inconsistencies or feature interactions. In this paper, a method and a tool are proposed to flag inconsistencies in a set of policies and to assist the user in correcting them. These policies can be defined by the user in a user-friendly language or derived automatically from a CPL script. The approach builds on a pre-existing logic programming tool that is able to identify inconsistencies in feature definitions. Our new tool is capable of explaining in user-oriented terminology the inconsistencies flagged, to suggest possible solutions, and to implement the chosen solution. It is sensitive to the types of features and interactions that will be created by naive users. This tool is also capable of assembling a set of individual policies specified in a user-friendly manner into a single CPL script in an appropriate priority order for execution by telecommunication systems.

Wireless Internet-IMT-2000/Wireless LAN Interworking

  • Roman pichna;Tero Ojanpera;Harro Posti;Jouni Karppinen
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.46-57
    • /
    • 2000
  • Ongoing standardization effort on 3G cellular system in 3GPP (UNTS) is based on GPRS core network and promises a global standard for systems capable of offering ubiquitous access to internet for mobile users. Considered radio access systems(FDD CDMA, TDD CDMA, and EDGE) are optimized for robust mobile use. However, there are alternative relatively high-rate radio interfaces being standardized for WLAN (IEEE802.11 and HIPER-LAN/2) which are capable of delivering significantly higher data rates to static or semi-static terminals with much less overhead. Also WPANs(BLUETOOTH, IEEE802.15), which will be present in virtually every mobile handset in the near future, are offering low cast and considerable access data rate and thus are very attractive for interworking scenarios. The prospect of using these interfaces as alternative RANs inthe modular UMTS architecture is very promising. Additionally, the recent inclusion of M-IP in the UMTS R99 standard opens the way for IP-level interfacing to the core network. This article offers an overview into WLAN-Cellular interworking. A brief overview of GPRS, UMTS cellular architectures and relevant WLAN standards is given. Possible interworking architectures are presented.

  • PDF

A Study on the Business Models of B2B eMarketplace (B2B 전자시장에서의 비지니스 모델)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.125-138
    • /
    • 2001
  • A classification was provided of various business models that are currently found in internet electronic commerce(business-to-business as well as business - to consumer). Some of these models are essentially an electronic re-implementation of traditional forms of doing business, such as e-shops. Many others go far beyond traditional business such as value chain integration and seek innovative ways to add value through information management and a rich functionality. Creating these new business models if feasible on]y because of the openness and connectivity of the internet. This study explored independent and industry-backed current and future business models that are emerging in the B2B electronic market industry, as well as value -added service models for the Net market maker industry, The protected rapid growth of B2B electronic market will cause a highly competitive environment. The B2B electronic market that deliver on real lasting value will dominate and ultimately earn for themselves a long-term Place in the landscape of the new economy.

  • PDF

Electricity Cost Minimization for Delay-tolerant Basestation Powered by Heterogeneous Energy Source

  • Deng, Qingyong;Li, Xueming;Li, Zhetao;Liu, Anfeng;Choi, Young-june
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5712-5728
    • /
    • 2017
  • Recently, there are many studies, that considering green wireless cellular networks, have taken the energy consumption of the base station (BS) into consideration. In this work, we first introduce an energy consumption model of multi-mode sharing BS powered by multiple energy sources including renewable energy, local storage and power grid. Then communication load requests of the BS are transformed to energy demand queues, and battery energy level and worst-case delay constraints are considered into the virtual queue to ensure the network QoS when our objective is to minimize the long term electricity cost of BSs. Lyapunov optimization method is applied to work out the optimization objective without knowing the future information of the communication load, real-time electricity market price and renewable energy availability. Finally, linear programming is used, and the corresponding energy efficient scheduling policy is obtained. The performance analysis of our proposed online algorithm based on real-world traces demonstrates that it can greatly reduce one day's electricity cost of individual BS.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

Next Location Prediction with a Graph Convolutional Network Based on a Seq2seq Framework

  • Chen, Jianwei;Li, Jianbo;Ahmed, Manzoor;Pang, Junjie;Lu, Minchao;Sun, Xiufang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1909-1928
    • /
    • 2020
  • Predicting human mobility has always been an important task in Location-based Social Network. Previous efforts fail to capture spatial dependence effectively, mainly reflected in weakening the location topology information. In this paper, we propose a neural network-based method which can capture spatial-temporal dependence to predict the next location of a person. Specifically, we involve a graph convolutional network (GCN) based on a seq2seq framework to capture the location topology information and temporal dependence, respectively. The encoder of the seq2seq framework first generates the hidden state and cell state of the historical trajectories. The GCN is then used to generate graph embeddings of the location topology graph. Finally, we predict future trajectories by aggregated temporal dependence and graph embeddings in the decoder. For evaluation, we leverage two real-world datasets, Foursquare and Gowalla. The experimental results demonstrate that our model has a better performance than the compared models.