• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.034 seconds

REVIEW ON ENERGY EFFICIENT OPPORTUNISTIC ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS

  • Ismail, Nasarudin;Mohamad, Mohd Murtadha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3064-3094
    • /
    • 2018
  • Currently, the Underwater Sensor Networks (UWSNs) is mainly an interesting area due to its ability to provide a technology to gather many valuable data from underwater environment such as tsunami monitoring sensor, military tactical application, environmental monitoring and many more. However, UWSNs is suffering from limited energy, high packet loss and the use of acoustic communication. In UWSNs most of the energy consumption is used during the forwarding of packet data from the source to the destination. Therefore, many researchers are eager to design energy efficient routing protocol to minimize energy consumption in UWSNs. As the opportunistic routing (OR) is the most promising method to be used in UWSNs, this paper focuses on the existing proposed energy efficient OR protocol in UWSNs. This paper reviews the existing proposed energy efficient OR protocol, classifying them into 3 categories namely sender-side-based, receiver-side-based and hybrid. Furthermore each of the protocols is reviewed in detail, and its advantages and disadvantages are discussed. Finally, we discuss potential future work research directions in UWSNs, especially for energy efficient OR protocol design.

A Study on Environmental Information System for Hazard Identification of Air Pollutants (환경정보 검색 시스템의 활용에 관한 연구 : 대기오염 물질의 위험성 확인을 중심으로)

  • Kim, Sun-Jeong;Shin, Dong-Chun;Chung, Yong;Koo, Ja-Kon
    • Journal of Environmental Impact Assessment
    • /
    • v.5 no.1
    • /
    • pp.107-121
    • /
    • 1996
  • The objective of this study is to establish the application method of environmental information system which is related to hazard identification for Health Risk Assessment. For establishing the environmental information system, fourteen hazardous chemicals were chosen and applicated to the database network such as RTKNET(Right Know Net), MSDS(Material Safety Data Sheets), TRI(Toxic Release Inventory), IRIS, AIRS, etc. The searching method of environmental information is classified to three sections such as the domestic commercial information company, international database agencies, and internet. Recently the importance of environmental information is being emphasized because it is essential 10 use database system in the field of environmental studies. Most of the foreign research organizations are communicating actively for information exchange, and the improvement of the quality of research. It is required to accumulate the data and develop them to database for future research.

  • PDF

A Research on Context-aware Digital Signage using a Kinect (키넥트를 활용한 상황인지형 디지털 사이니지 연구)

  • Ro, Kwanghyun;Lee, Seokkee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.265-273
    • /
    • 2014
  • In this paper, context-aware technologies using a Kinect sensor for a digital signage which is increasingly growing as the 4th screen media is presented. Generalized context-aware functions for a digital signage were studied and a context-aware digital signage platform was developed. It can support a natural user interface for controlling a digital signage and actively provide contents adapted to its context. As a basic context, user's gesture and voice, the number of users, sound direction were considered. In the future, the advanced functions such as age, gender will be studied. The implemented platform could be a good reference model when developing a general context-aware digital signage.

A Study on Construction of Crime Prevention System using Big Data in Korea (한국에서 빅데이터를 활용한 범죄예방시스템 구축을 위한 연구)

  • Kim, SungJun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.217-221
    • /
    • 2017
  • Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.

Design and Implementation of A Multimedia Greeting Assistant System (멀티미디어 인사말 대행 시스템의 설계 및 구현)

  • 서동민;유재수
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.417-422
    • /
    • 2004
  • As wireless internet market grows rapidly, demands of various contents in wireless internet is significantly being increased. The contents that customers are taking advantage of have changed from single media content to multimedia content. As the technology of cellular telephone and broadband grows, the development of multimedia contents that can future represent characteristic of user will be more increased. One example of such content developments is ring-tone content service. Ring tone content service changed from existing simple ring tone to various sound services that depend on characteristic of user. In this paper, we design and implement the multimedia greeting assistant system that firsthand produces multimedia greeting contents using various multimedia contents and provides multimedia greeting service to represent characteristic of user through elevating ring tone content service.

  • PDF

The New Role Models of the Reference Librarians In the University under the Internet Environment (인터넷 환경과 대학참고사서의 새로운 역할모델)

  • 박준식
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.1
    • /
    • pp.379-397
    • /
    • 2003
  • The purpose of this study is to suggest to the reference librarians In the university that how they should perform their roles under the internet environment. For this purpose, first, the environmental factors that the roles of the reference librarians should be changed are examined. Second, such two aspects of the future university library as virtual library and learning resource center are Presupposed. The seven role models for reference librarians based on these are as follows. 1) Contents Analyst, 2) Contents Manager, 3) Learning Resource Supplier, 4) Information Mediators, 5) Virtual Lecture Manager, 6) Instructor for Information Literacy, 7) Reference Resource Developer.

  • PDF

An Adaptation of F(I)MEA Technique for security analysis on Software Defined Network Technology for IoT services (사물인터넷 서비스를 위한 소프트웨어 정의 네트워크 기술의 보안 분석을 위한 F(I)MEA 기법 적용)

  • Kim, Green;Han, Keun-Hee;Kim, Kee-Cheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.17-21
    • /
    • 2016
  • The rapid development of IoT leads new kinds of services which does not existed. And, it requires several changes on existing network. Software Defined Network is one of the future network technology which can deal with problems from these kinds of changes. The strong point of Software Defined Network is flexibility and scalability. However, In some cases, these factors could be the security vulnerabilities. In this paper, we present adaptation of F(I)MEA technique for the security analysis on Software Defined Network Technology for IoT services.

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

Cloud Security Technology and Vulnerability Assessment (클라우드 보안 기술과 취약점 분석)

  • Kim, A-Yong;Lee, Sung-Ock;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.690-692
    • /
    • 2013
  • Cloud computing is an Internet-based technology, one of the Big Data era aspiring technology. Bring on the internet whenever you need to use multiple physical servers into one virtual server, cloud Cloud technology and large companies, such as leading U.S. IT company, Amazon, IBM, Google, Microsoft and the domestic firm Samsung, SK, KT, NHN the cloud market at home and abroad, and commercialization by investing in the future to continue to grow. The main reason for the introduction of the cloud and reduced operating costs, and to see the most problems is the leakage of personal information. In this paper, we propose a method to improve the security and vulnerability analysis of security technologies and cloud.

  • PDF

Implementation of an ASP Upload Component to Comply with RFC 1867 (RFC 1867 규격을 준수하는 ASP 업로드 컴포넌트 설계)

  • Hwang Hyun-Ju;Kang Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.63-74
    • /
    • 2006
  • Recently many ASP applications have been released which enable them to accept, save and manipulate files uploaded with a web browser. The files are uploaded via an HTML POST form using RFC 1867 In particular, the file transfer via the HTTP port is getting more important because of the current Internet security issues. In this paper, we implement a form-based ASP upload component and disclose explicitly most of the main codes. That is, the open source might be helpful to develop the new ASP applications including file upload function in the future. We also show the upload time and CPU usage time of the proposed upload component and compare with the well-known commercial ones, showing the performance metrics of the proposed component are comparable to those of commercial ones.

  • PDF