• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.028 seconds

Knowledge Management Assessment Using PDCA based in Global and Local Standards: in the Case of Technics and Informatics Studies

  • Ruzicic, Vesna S.;Micic, Zivadin M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2022-2042
    • /
    • 2020
  • This research aims to contribute to the discipline of knowledge management (KM) in Higher Education (HE), and is conducted using the case of the study programme (SP) for Integrated Academic Studies (IAS) of Technics and Informatics (TI). A deduction-induction methodology is applied, using a Plan-Do-Check-Act (PDCA) approach to design a suitable KM concept for making improvements to the SP IAS TI on the standardisation platform. Based on the application of the International Classification of Standards (ICS), the research analyses the correlations and competences acquired during the courses within the accredited TI study programme of two-course studies. On the basis of the results of a comparative analysis of the developmental learning process and educational goals, it is shown that knowledge management in correlation with standardisation leads to the improvement of study programmes in the upcoming accreditation cycle on the standardisation platform. Frequent innovations within standardised thematic fields (daily, weekly, monthly, etc.) indicate the need for appropriate changes to the SP. The contribution to KM is through an original analysis of annual samples of more than 90,000 standardised sources in correlation with the TI study programme. Expert System (ES) modelling and the original results enable an analogous contribution to the future KM of other SPs.

Performance for Radio Access Network in mobile backhaul network (이동 백홀 망에서 Radio Access Network의 성능)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.297-302
    • /
    • 2012
  • RAN in mobile backhaul network connects base station to mobile backhaul network. This the interfaces for several generations mobile communication technologies, such as TDM, ATM, and Ethernet in cell site, and then Ethernet in mobile backhaul site. In near future, the mobile communication network will be changed to all IP/Ethernet one, and then ultimately Ethernet and TDM traffics will be transferred through IP network. So these technologies have to be encapsulated for transferring to the mobile backhaul network. The performances are measured for each encapsulation, such as ATM, MPLS, IP/UDP, and MEF8.

A Methodology for Security Vulnerability Assessment Process on Binary Code (실행코드 취약점 분석 프로세스 방법론)

  • Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.237-242
    • /
    • 2012
  • Cyber attacks have rapidly increased by exploiting the underlying vulnerabilities in the target software. However, identifying and correcting these vulnerabilities are extremely difficult and time consuming tasks. To address these problems efficiently, we propose a systematic methodology for security vulnerability assessment process on binary code in the paper. Specifically, we first classified the existing vulnerabilities based on whether the target software run in a Web environment and features of the software. Based on the classification, we determined the list and scope of the vulnerabilities. As our future research direction, we need to further refine and validate our methodology.

Design and Implementation of Mobile Communication System for Hearing- impaired Person (청각 장애인을 위한 모바일 통화 시스템 설계 및 구현)

  • Yun, Dong-Hee;Kim, Young-Ung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.111-116
    • /
    • 2016
  • According to the Ministry of Science, ICT and Future Planning's survey of information gap, smartphone retention rate of disabled people stayed in one-third of non-disabled people, the situation is significantly less access to information for people with disabilities than non-disabled people. In this paper, we develop an application, CallHelper, that helps to be more convenient to use mobile voice calls to the auditory disabled people. CallHelper runs automatically when a call comes in, translates caller's voice to text output on the mobile screen, and displays the emotion reasoning from the caller's voice to visualize emoticons. It also saves voice, translated text, and emotion data that can be played back.

A Study in the Effects of DRAM on The Microprocessor Performance (마이크로프로세서의 성능에 끼치는 DRAM의 영향에 관한 연구)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.219-224
    • /
    • 2017
  • Recently, the importance of DRAM is very significant not only in embedded systems and mobile devices but also in high-end modern microprocessors and multicore processors. To keep up with this, both industry and academia have actively studied various types of future DRAMs. Therefore, accurate DRAM model is requisite when evaluating the microprocessor performance. In this paper, a microprocessor trace-driven simulator which can couple with the cycle-accurate DRAM simulator has been developed. Using SPEC 2000 benchmarks as input, the effect of cycle-accurate DDR3 model on the microprocessor performance has been evaluated.

Design and Implementation of Context-Aware-based Emergency Detection System with Energy Reduction for Elderly Housing (고령자 주거환경을 위한 상황인지 기반 에너지 저감형 위급상황 감지 시스템 설계 및 구현)

  • Mah, Sung-Hoon;Bae, Hong-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.159-165
    • /
    • 2017
  • As increasing the number of the elderly people, various IT-based home systems for the elderly are actively studied. However, while most systems for the elderly focus on systems detecting emergency cases, systems considering energy reduction in the elderly housing are rarely found. In fact, the systems for the elderly housing consumes rather more electric power for their functions. In this paper, a emergency monitoring system including the functions to reduce energy useage is studied and it is implemented. Though the system, we can achieve both of future-oriented functions for the aged and green society, which are emergency monitoring and energy reduction.

The DRAM Effects on The Performance of Multicore Processors (멀티코어 프로세서의 성능에 대한 DRAM의 영향)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.203-208
    • /
    • 2017
  • Recently, the importance of DRAM is very significant in multicore processors which are widely used in computers, laptops, tablet PCs, and mobile devices. To keep up with this, both industry and academia have actively studied various types of future DRAMs. Therefore, accurate DRAM model is requisite when evaluating the multicore processor performance. In this paper, a multicore processor trace-driven simulator which can couple with the cycle-accurate DRAM simulator has been developed. Using SPEC 2000 benchmarks as input, the effect of cycle-accurate DDR3 model on the multicore processor performance has been evaluated.

Influence Factors of Effectively Executing NCW by User's Point of View (사용자 관점에서 본 효과적인 NCW 수행을 위한 영향요인)

  • Ou, Won-Suk;Chae, Myung-Sin;Yeum, Dae-Sung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.109-127
    • /
    • 2010
  • The Network Centric Warfare(NCW) is based on the linkage of forces by network to employ them as they are centralized, even though they are scattered. Also it can be used to overcome spatiotemporal obstacles. Under the concept of NCW, cognitive and social areas are getting more weight than information technology and physical ones. In this study we tried to investigate the affecting factors to execute NCW effectively by user's point of view to place the focus on cognitive and social aspects. We obtained some affirmative results that affect to conduct NCW in Korea. The advanced western NCW can be applicable in theoretically in Korea, however to employ NCW more effectively we need Korean style NCW which portrays the Korean realities and circumstances.

A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks

  • Jiao, Jiping;Chen, Lingyu;Hong, Xuemin;Shi, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3329-3350
    • /
    • 2017
  • Installing caching and computing facilities in mobile edge networks is a promising solution to cope with the challenging capacity and delay requirements imposed on future mobile communication systems. The problem of optimal facility placement in mobile edge networks has not been fully studied in the literature. This is a non-trivial problem because the mobile edge network has a unidirectional topology, making existing solutions inapplicable. This paper considers the problem of optimal placement of a fixed number of facilities in a mobile edge network with an arbitrary tree topology and an arbitrary demand distribution. A low-complexity sequential algorithm is proposed and proved to be convergent and optimal in some cases. The complexity of the algorithm is shown to be $O(H^2{\gamma})$, where H is the height of the tree and ${\gamma}$ is the number of facilities. Simulation results confirm that the proposed algorithm is effective in producing near-optimal solutions.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.