• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.03 seconds

A near control technology using high frequencies in audible frequency between smart devices

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2015
  • The existing methods for control between smart devices in near used Bluetooth, WiFi-Direct, or socket communication using Wi-Fi. However, those have a problem that can not use when operating system of each smart devices is different or when socket server is not working. In this paper, we proposed a new near control technology using High frequencies in audible frequency between smart devices to supplement the problem of existing methods. High frequencies use micro-phone and speaker of smart device and are a control signals that is combined high frequencies within 18kHz ~ 22kHz among audible frequency range. The proposed technology using High frequencies do not need any extra communication modules or socket servers and can use the most smart devices without operating system of devices. To evaluate the performance of the proposed technology, we developed a music play and music control application applied the proposed technology and tested a control experiment using the developed applications. The control success rate was 97% and recognition rate of surrounding people about using high frequencies was under 5%. Therefore, the proposed technology will be the useful technology to control between smart devices in near.

Design and Implementation of Location and Activity Monitoring System Based on LoRa

  • Lin, Shengwei;Ying, Ziqiang;Zheng, Kan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1812-1824
    • /
    • 2019
  • The location and human activity are usually used as one of the important parameters to monitor the health status in healthcare devices. However, nearly all existing location and monitoring systems have the limitation of short-range communication and high power consumption. In this paper, we propose a new mechanism to collect and transmit monitoring information based on LoRa technology. The monitoring device with sensors can collect the real-time activity and location information and transmit them to the cloud server through LoRa gateway. The user can check all his history and current information through the specific designed mobile applications. Experiment was carried out to verify the communication, power consumption and monitoring performance of the entire system. Experimental results demonstrate that this system can collect monitoring and activity information accurately and provide the long rang coverage with low power consumption.

Design of Browser for The Harbor BIM Service Based on Cloud Computing (클라우드 컴퓨팅 기반 항만 BIM 서비스를 위한 브라우저 설계)

  • Chang, Jae-Yeol;Moon, Hyoun-Seok
    • Journal of KIBIM
    • /
    • v.8 no.4
    • /
    • pp.60-71
    • /
    • 2018
  • The port BIM technology has many problems such as lack of relevant system, high cost of BIM infrastructure construction, and process difference of existing domestic inter-industry. Since the port facilities as national key industries are managed and operated by public organizations, it is necessary to integrate IT resources and have a system that needs collective construction and joint utilization management. In this paper, we proposed the convergence of cloud computing technology and BIM as a way to reduce the infrastructure cost required for port BIM operation and to provide various BIM services for domestic process. To do this, we collected system requirements based on demand surveys of port staff and designed a BIM browser that provides IFC-based BIM server and customized services to reduce infrastructure cost in cloud computing environment. In terms of infrastructure, we designed cloud-based IaaS to support cost reduction, which is an essential component, and designed SaaS to support customized services in terms of services. We will perform performance verification with focus on whether port BIM servers and browsers have reached a level where they can manage four BIM models with different types and capacities.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Designing on Scenario-based Drone Platform to Enhancement Security (보안성 향상을 위한 시나리오 기반 드론 플랫폼 설계 연구)

  • Kim, Yanghoon;Hong, Chan-Ki
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.78-83
    • /
    • 2021
  • The new industry drone research is increasing through convergence between 4th industrial revolution technology. In particular, the government indicates the D.N.A platform as a countermeasure of 4th industrial revolution. So, the research topics are remarkable which are using D.N.A platform. On the other hand, the drone for industrial and research has spatial factor based on sequential because, they performance scenario-based mission through control operation. When the drone flights as a control operation, they have necessity apply multi-dimensional methods to improve the security level. So, this study researched a scenario based drone platform to improve the security level. As a result, the space classified as a ground control system, drone, drone data server and designed the application method based on scenario security technology.

Platform of ICT-based environmental monitoring sensor data for verifying the reliability (ICT 기반 환경 모니터링 센서 데이터의 신뢰성 검증을 위한 플랫폼)

  • Chae, Minah;Cho, Jae Hyuk
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.23-31
    • /
    • 2021
  • In recent years, in the domestic industry, personal damage has occurred due to sensor malfunction and the emission of harmful gases. But there is a limit to the reliability verification of sensor data because the evaluation of environmental sensors is focused on durability and risk tests. This platform designed a sensor board that measures 10 major substances and a performance verification system for each sensor. In addition, the data collected by the sensor board was transferred to the server for data reliability evaluation and verification using LoRa communication, and a prototype of the sensor data platform was produced to monitor the transferred data. And the collected data is analyzed and predicted by using machine learning techniques.

Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness

  • Ryu, Yeongil;Ryu, Eun-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2531-2546
    • /
    • 2021
  • For several years, virtual reality (VR) and augmented reality (AR) technologies have been improving. However, some hurdles remain that slow down the distribution of VR and AR devices, such as head-mounted display (HMD), and related consumer content. One issue is VR motion sickness, which has been experienced by users using 360 degree VR content via HMD. This paper discusses the related international standardization work that classifies the factors causing VR sickness, and proposes the process for VR sickness level evaluation. Among the factors causing VR sickness, many research institutes regard minimizing MTP (Motion-to-Photon) latency as the key enabler to mitigate VR sickness. Thus, this paper introduces research trends of MTP latency measurement and MTP latency mitigation. This paper categorizes the research on MTP latency measurement into 2 categories of hardware-based approach and software code-level approach. The 2 approaches have different pros and cons depending on use-case, purpose, and architecture of each multimedia system. The pros and cons are addressed in this paper. Additionally, the research on mitigating MTP latency with diverse strategies such as proactive computing, caching, and edge server technology is explained, and compared to conventional technologies, shows improved performance.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

MEMS Embedded System Design (MEMS 임베디드 시스템 설계)

  • Hong, Seon Hack
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.47-54
    • /
    • 2022
  • In this paper, MEMS embedded system design implemented the sensor events via analyzing the characteristics that dynamically happened to an abnormal status in power IoT environments in order to guarantee a maintainable operation. We used three kinds of tools in this paper, at first Bluetooth Low Energy (BLE) technology which is a suitable protocol that provides a low data rate, low power consumption, and low-cost sensor applications. Secondly LSM6DSOX, a system-in-module containing a 3-axis digital accelerometer and gyroscope with low-power features for optimal motion. Thirdly BM1422AGMV Digital Magnetometer IC, a 3-axis magnetic sensor with an I2C interface and a magnetic measurable range of ±120 uT, which incorporates magneto-impedance elements to detect the magnetic field when the current flowed in the power devices. The proposed MEMS system was developed based on an nRF5340 System on Chip (SoC), previously compared to the standalone embedded system without bluetooth technology via mobile App. And also, MEMS embedded system with BLE 5.0 technology broadcasted the MEMS system status to Android mobile server. The experiment results enhanced the performance of MEMS system design by combination of sensors, BLE technology and mobile application.

A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems

  • Su, Haoru;Yuan, Xiaoming;Tang, Yujie;Tian, Rui;Sun, Enchang;Yan, Hairong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4385-4399
    • /
    • 2021
  • The Internet of Things (IoT) eHealth systems composed by Wireless Body Area Network (WBAN) has emerged recently. Sensor nodes are placed around or in the human body to collect physiological data. WBAN has many different applications, for instance health monitoring. Since the limitation of the size of the battery, besides speed, reliability, and accuracy; design of WBAN protocols should consider the energy efficiency and time delay. To solve these problems, this paper adopt the end-edge-cloud orchestrated network architecture and propose a transmission based on reinforcement algorithm. The priority of sensing data is classified according to certain application. System utility function is modeled according to the channel factors, the energy utility, and successful transmission conditions. The optimization problem is mapped to Q-learning model. Following this online power control protocol, the energy level of both the senor to coordinator, and coordinator to edge server can be modified according to the current channel condition. The network performance is evaluated by simulation. The results show that the proposed power control protocol has higher system energy efficiency, delivery ratio, and throughput.