• Title/Summary/Keyword: mobile server

Search Result 1,303, Processing Time 0.024 seconds

GIS-based Web-Service Architecture

  • Niaraki, Abolghasem Sadeghi;Kim, Kye-Hyun;Lee, Chol-Young;Kim, Tae-Hoon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.113-118
    • /
    • 2008
  • The present research addresses the system design for building a geospatially-based web services application for mobile users. In recent years, geospatial information(GI) and Geographic Information Systems(GIS) are significant resources in decision-making analyses at various levels of society and activities. Recently, the integration of GIS and web services, called GIS web services, provides the wider implementation of GIS. At the present time, accessing, presenting, and manipulating updatedgeospatial information to locate geo-related facility services are real challenges related to application developers to implement for foot-travelers properly. The present paper investigates how the web services work in a GIS for discovering geo-related facility services such as a restaurant and post office in the user's vicinity. Thus, a prototype, with an architecture consisting of a windows application on the client side as well as facility services and geo-engineon the server side, were designed and implemented with the proposed GIS web services platform. On both the client and server sides, visual studio .Net technology was used. A geo-engine on the server side was also built with ESRI's MapObjects. Following successful implementation of the prototype presented in this study, the mobile user is able to invoke remote web services to assess the location of various facilities such as restaurants. Moreover, the present research demonstratesthat web services are not restricted only to web-based use, but can also be utilized by any web-connected application.

  • PDF

Game Design of Online Sutda using 3-Tier Structure

  • An, Syungog;An, Sung-Ho;Jung, Jinyoung;Kim, Soo-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.55-60
    • /
    • 2015
  • This paper introduces a program structure that minimizes the client's business logic by reducing the client's specifications as a way of minimizing the limitations of online game platforms. The objective of this thesis is to design an online game that is based on a 3-tier client/server structure, and thus using this 3-tier structure to ultimately create an online Sutda game that anyone can enjoy. The progression of newly released games is highly based on the mobile market and the number of online games being launched is decreasing. As the mobile game market grows, more and more multi-platform games are being developed and target platforms within online games are greatly diversifying. Through these situations, this thesis minimizes the client's business logic through a 3-tier structure of application-middleware-database, and also proposes an online game client/server that allows three or more users to participate simultaneously through the server.

A Study on the Blue-green algae Monitoring System using HSV Color Model (HSV 색상 모델을 활용한 녹조 모니터링 시스템에 관한 연구)

  • Kim, Tae-hyeon;Choi, Jun-seok;Kim, Kyung-min;Kim, Dong-ju;Kim, Kyung-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.553-555
    • /
    • 2015
  • In this paper, we proposed the blue-green algae monitoring system using the HSV(Hue Saturation Value) color model. The proposed system is to extract the image data from the camera of raspberry pie server by an wireless network, and it is analyzed through the HSV color model. We implemented a web server to provide the information of the XML data which was analyzed from the raspberry pie server. Also, the mobile app was developed to view the XML data on smart devices.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2772-2786
    • /
    • 2022
  • We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.

Increasing a Mobile Client's Cache Reusability in Wireless Client - Server Environments (무선 클라이언트-서버 환경에서 이동 클라이언트의 캐시 데이타 재사용율 향상기법)

  • Yi Song-Yi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.5
    • /
    • pp.282-296
    • /
    • 2006
  • In a wireless client server environment, data broadcasting is an efficient data dissemination method; a server broadcasts data, and some of broadcasted data are cached in a mobile client's cache to save the narrow communication bandwidth, limited resources, and data access time. A server also broadcasts invalidation reports to maintain the consistency between server data and a client's cached data. Most of existing works on the cache consistency problems simply purge the entire cache when the disconnection time is long enough to miss the certain amount(window size) of IRs. This paper presents a cache invalidation method to increase mobile clients' cache reusability in case of a long disconnection. Instead of simply dropping the entire cache regardless of its consistency, a client estimates the cost of purging all the data with the cost of selective purge. If the cost of dropping entire cache is higher, a client maintains the cache and selectively purge inconsistent data using uplink bandwidth for validation request. The simulation results show that this scheme increases the cache reusability since it effectively considers the update rates and the broadcast frequencies of cached data in estimating the cost of cache maintenance.

Transmission of Image Information in Wireless System (무선 환경에서의 영상 정보의 전송)

  • Jeonh, Sang-Hoon;Lim, Joon-Hong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.268-270
    • /
    • 2004
  • There are various researches on MPEG techniques. MPEG technique is used to digital TV(DTV) and internet image communication. Connection method between server and client is usually using wire. Applications may be expanded, if wireless technology is used between server and client system. In this paper, Bluetooth is used for connection method between server and client. Bluetooth offers fast and reliable transmissions of both voice and data over the globally available 2.4GHz ISM (Industrial, Scientific and Medical) band. One of the major application purposes of Bluetooth is the cable replacement for mobile and peripheral devices. Bluetooth has the advantage of small size, low power and low cost. It has the disadvantage of limited bandwidth and limited range. In order to transfer effectively image Information between server and client using Bluetooth, we apply MPEG-2 and MPEG-4 image compression techniques and the results are compared with each other.

  • PDF

The Contents Server for Telematics Services

  • Kim Mi-Jeong;Kim Minsoo;Jang Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.268-271
    • /
    • 2004
  • Today, the vehicle is used the mean of transportation as well as the mobile office with the third digital life space. So telematics is an emerging industry that has tremendous future potential. It is necessary the essential contents for telematics services : navigation map for navigation, POI, real-time traffic information etc. In this paper, we proposed the telematics contents server to manage the telematics contents with efficient performance in distributed environment. The telematics contents server transforms and stores the essential contents and provide it to user through standard interface. The telematics contents server is middleware to offer a rapid essential telematics contents management, client connectivity, and communications. It is useful for the telematics service provider to build telematics system under distributed environment.

  • PDF

Implementation of Remote Control System of Robot using Web Browser (웹 브라우져를 이용한 원거리 로봇 조작 시스템 구현)

  • 선상준;이동옥;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.05a
    • /
    • pp.288-291
    • /
    • 2000
  • In this paper we implement a robot system consisted of mobile tole robot to be controlled by client through web browser Newly Internet is connected to all network of the whole world. If client uses the network like this, client can control direction of a robot that is selected in free place. In this study, system is embodied in using robot that can move freely in plan place and cod camera that can grab robot image. System transmit image data of cod camera to java server that is placed in web server of internet that is used by client. Java server display incoming data in home page using java applet. Then web browser offer robot image to client and client send remote control signal to robot. Control signal is transmitted to robot by java server and robot receiving signal moves toward direction wanted by client.

  • PDF

A User Authentication Method between Domains Using Privilege Certificates (권한인증서를 이용한 도메인간의 사용자 인증방안)

  • Gi, Jun-Woong;Kim, Ji-Hong;Kim, Chang-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.75-83
    • /
    • 2008
  • In this paper, we design a user authentication method between domains when mobile node moves in AAA server based MIPv6 environment. Several papers proposed the user authentication method executing at AAA server in home domain via AAA server in visiting domain. In this paper we proposed the user authentication method using privilege certificates between domains.