• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.04 seconds

Real-time Intelligent Health and Attention Monitoring System for Car Driver by Measurement of Vital Signal (생체신호 측정에 의한 실시간 지능형 운전자 건강 및 주의 모니터링 시스템)

  • Shin, Heung-Sub;Jung, Sang-Joong;Seo, Yong-Su;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.545-548
    • /
    • 2009
  • Recently, researches related to automative mechanism have been widely studied to increase the driver's safety by continuously monitoring the driver's health condition to prevent driver's drowsiness. This paper describes the design of wearable chest belt for ECG and reflectance pulse oximetry for $SpO_2$ sensors based on wireless sensor network to monitor the driver's healthcare status. ECG, $SpO_2$ and heart rate signals can be transmitted via wireless sensor node to base station connected to the server. Intelligent monitoring system is designed at the server to analyze the $SpO_2$ and ECG signals. HRV(Heart Rate Variability) signals can be obtained by processing the ECG and PPG signals. HRV signals are further analyzed based on time and frequency domain to determine the driver's drowsiness status.

  • PDF

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Chatting-based Commerce Platform Enabling Non-Volatile Social Curation Service (비휘발적 소셜 큐레이션 서비스가 가능한 대화형 상거래 플랫폼 개발)

  • Yoo, Keedong
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.145-157
    • /
    • 2018
  • The social curation service that selectively provides information generated by individuals or groups with the same interests can have a synergistic effect when combined with the recently used SNS-based chatting function. If these kinds of chatting-based curation technologies are applied to the Internet shopping malls, particularly, buyers can obtain more reliable information in real time basis, and sellers can provide them with more differentiated and rich information in a continuous manner. This research suggests a chatting-based commerce platform that provides the social curation service based on chats among sellers, existing buyers, and potential buyers. The proposed commerce platform can organize a chat channel for each store and product not only to immediately respond to new and existing customer inquiries about stores, brands, and detailed products, but also to continuously activate differentiated sales strategies to customers subscribed to the channel. In particular, MongoDB is used to permanently save and archive the information and chatting history of each channel, so that the buyer can search and refer to them recorded in the corresponding channel at any time.

Android App remote database management systems using service in Social Network (소셜 네트워크에서 안드로이드 앱 서비스를 이용한 원격 데이터베이스 관리 시스템)

  • Hwang, Chi-Gon;Moon, Seok-Jae;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.254-256
    • /
    • 2014
  • In this paper, using the Android App to remote database monitoring system is proposed. Existing remote database monitoring scheme CS(Client / Server) based. Conventional CS based systems are space constraints and a plurality of administrator to access the database at that degrade performance disadvantages. The advantage of the proposed system first, because the web -based interface allows the application program, and also the ease of maintenance, through a web browser, if you have Internet access anytime, anywhere environment without restrictions of time and space monitoring. Second, the proposed system because the App -based technology due to an increase in connection session and query execution does not affect the performance of your database. Third, if there is a problem with the remote database through which social networks immediately notify the administrator of the smartphone in real time so that the administrator can identify the problem.

  • PDF

Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks

  • Zeng, Qian;Huangfu, Wei;Liu, Tong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.711-732
    • /
    • 2019
  • Many unmanned aerial vehicle (UAV) applications have been employed for performing data collection in facilitating tasks such as surveillance and monitoring objectives in remote and dangerous environments. In light of the fact that most of the existing UAV relaying applications operate in conventional half-duplex (HD) mode, a full-duplex (FD) based UAV relay aided wireless network is investigated, in which the UAV relay helps forwarding information from the source (S) node to the destination (D). Since the activated UAV relays are always floating and flying in the air, its channel state information (CSI) as well as channel capacity is a time-variant parameter. Considering decode-and-forward (DF) relaying protocol in UAV relays, the cooperative relaying channel capacity is constrained by the relatively weaker one (i.e. in terms of signal-to-noise ratio (SNR) or signal-to-interference-plus-noise ratio (SINR)) between S-to-relay and relay-to-D links. The channel capacity can be optimized by adaptively optimizing the transmit power of S and/or UAV relay. Furthermore, a hybrid HD/FD mode is enabled in the proposed UAV relays for adaptively optimizing the channel utilization subject to the instantaneous CSI and/or remaining self-interference (SI) levels. Numerical results show that the channel capacity of the proposed UAV relay aided wireless networks can be maximized by adaptively responding to the influence of various real-time factors.

A Batch Processing Algorithm for Moving k-Nearest Neighbor Queries in Dynamic Spatial Networks

  • Cho, Hyung-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.63-74
    • /
    • 2021
  • Location-based services (LBSs) are expected to process a large number of spatial queries, such as shortest path and k-nearest neighbor queries that arrive simultaneously at peak periods. Deploying more LBS servers to process these simultaneous spatial queries is a potential solution. However, this significantly increases service operating costs. Recently, batch processing solutions have been proposed to process a set of queries using shareable computation. In this study, we investigate the problem of batch processing moving k-nearest neighbor (MkNN) queries in dynamic spatial networks, where the travel time of each road segment changes frequently based on the traffic conditions. LBS servers based on one-query-at-a-time processing often fail to process simultaneous MkNN queries because of the significant number of redundant computations. We aim to improve the efficiency algorithmically by processing MkNN queries in batches and reusing sharable computations. Extensive evaluation using real-world roadmaps shows the superiority of our solution compared with state-of-the-art methods.

Power peaking factor prediction using ANFIS method

  • Ali, Nur Syazwani Mohd;Hamzah, Khaidzir;Idris, Faridah;Basri, Nor Afifah;Sarkawi, Muhammad Syahir;Sazali, Muhammad Arif;Rabir, Hairie;Minhat, Mohamad Sabri;Zainal, Jasman
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.608-616
    • /
    • 2022
  • Power peaking factors (PPF) is an important parameter for safe and efficient reactor operation. There are several methods to calculate the PPF at TRIGA research reactors such as MCNP and TRIGLAV codes. However, these methods are time-consuming and required high specifications of a computer system. To overcome these limitations, artificial intelligence was introduced for parameter prediction. Previous studies applied the neural network method to predict the PPF, but the publications using the ANFIS method are not well developed yet. In this paper, the prediction of PPF using the ANFIS was conducted. Two input variables, control rod position, and neutron flux were collected while the PPF was calculated using TRIGLAV code as the data output. These input-output datasets were used for ANFIS model generation, training, and testing. In this study, four ANFIS model with two types of input space partitioning methods shows good predictive performances with R2 values in the range of 96%-97%, reveals the strong relationship between the predicted and actual PPF values. The RMSE calculated also near zero. From this statistical analysis, it is proven that the ANFIS could predict the PPF accurately and can be used as an alternative method to develop a real-time monitoring system at TRIGA research reactors.

AIoT-based High-risk Industrial Safety Management System of Artificial Intelligence (AIoT 기반 고위험 산업안전관리시스템 인공지능 연구)

  • Yeo, Seong-koo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.168-170
    • /
    • 2022
  • The government enacted and promulgated the 'Severe Accident Punishment Act' in January 2021, and is enforcing the law for workplaces with 50 or more full-time workers. However, the number of industrial accident accidents in 2021 increased by 10.7% compared to the same period of the previous year, and chemical gas Safety accidents due to leaks and explosions also occur frequently. Therefore, in high-risk industrial sites, comprehensive Safety measures are urgently needed. In this study, BLE Mesh networking in industrial sites with poor communication environment apply technology. The complex sensor AIoT device recognizes a dangerous situation as a gas sensing value, voice, and motion value, and transmits it to the server. The server monitors the risk situation in real time through information value analysis and judgment through artificial intelligence LSTM algorithm and CNN algorithm for AIoT transmission information. Through this study, through the development of AIoT devices capable of gas sensing, voice and motion recognition, and AI-applied safety management systems, It will contribute to the expansion of the social safety net by expanding its application.

  • PDF

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF