• Title/Summary/Keyword: Address of Things

Search Result 126, Processing Time 0.023 seconds

A study on Automatic field Test Equipment with improved maintenance and environmental reliability

  • Lee, Seok-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.9-16
    • /
    • 2018
  • In this paper, I purpose one of the development methods for portable Automatic field Test Equipment(ATE) with VME form factor. Almost portable ATE have not used to standards form factor and they are connected by mechanical non-rigid general connectors and wire harnesses among the components. Furthermore, it is hard to reuse developed board. So, it decreases to reusability of developed board and it is hard to maintenance of ATE. Even those things have weakness for vibration and drop test especially in portable ATE. The XK9A1 ATE using VME form factor has environmental reliability through vibration, drop, temperature test. It consists of 5 developed board called the control board, the wire & wireless communication board, the power supply board, the load board and the mother board. It is connected by two wire harnesses between mother board and extern circular connectors. The control board send the data and address to other board though each 16-bit data and 20-bit address line. You can develop the function board what you want to using those data & address line when it comes to needing other function board.

A Study on the Construction of Educational Database System (교육용 데이터베이스 시스템 구축을 위한 연구)

  • Kho, Dae-Gon;Moon, Gyo-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.35-44
    • /
    • 1997
  • Rapid progresses on computer and Internet technology fortell the changes in learning environments in our classrooms, which requires a timely preparation for the near future. The construction and utilization of databases that can be used in education, among other things, is the crucial subject which we need to address to. This paper discusses the various aspects of the construction of educational databases and proposes a way for effectively maintaining them.

  • PDF

Sub-Surface Station Fire Evacuation Research and Best Practice

  • Dowens, Trevor
    • International Journal of Railway
    • /
    • v.2 no.1
    • /
    • pp.18-21
    • /
    • 2009
  • The basis of modem risk-based safety management is to focus on what might happen and ensure it is designed out of the system by robust hazard identification and risk analysis. However, in the real world things go wrong and it is essential to be prepared for the worst so that the response can minimise harm and loss of property and damage to the environment. Whilst some hazard mitigation measures are aimed at preventing incidents, others are venting escalation. The results of the tests concluded that the most effective means by the control room, both with and without, local station staff assistance using directive public address announcements and CCTV surveillance.

  • PDF

Middleware API Design for CoAP Usage (CoAP 사용을 위한 미들웨어 API 설계)

  • Kwon, Hak;Ra, Younggook;Jo, JaeDeok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2017
  • Developing the TCP/IP standard IBA which is higher organization of IETF decided to attach the TCP/IP protocol stack to small things, such as sensor. This means small object is also considered as on of the communication node, it has symbolic meaning that expand smart object has all five layer. Under this background, IoT/WoT configure the intelligent network between objects based on the internet to communication was introduced. Things has own IP address on IoT environment and are smart object that a lot of people communicate over the internet on Application Layer. In other words, IoT is that smart object are commercialized space. According to the interest of IoT, IETF establish CoAP for use as IoT protocol. CoAP is expected that standard protocols created by things is connected to the Internet protocol that can be used within a constrained environment. Accordingly, in this paper, we proposed Middleware API that can manage and collect the data of objects that connected CoAP network.

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Moustafa Abdelrahman Mahmoud Ahmed;Nur Arzilawati Md Yunus
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

Big IoT Healthcare Data Analytics Framework Based on Fog and Cloud Computing

  • Alshammari, Hamoud;El-Ghany, Sameh Abd;Shehab, Abdulaziz
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1238-1249
    • /
    • 2020
  • Throughout the world, aging populations and doctor shortages have helped drive the increasing demand for smart healthcare systems. Recently, these systems have benefited from the evolution of the Internet of Things (IoT), big data, and machine learning. However, these advances result in the generation of large amounts of data, making healthcare data analysis a major issue. These data have a number of complex properties such as high-dimensionality, irregularity, and sparsity, which makes efficient processing difficult to implement. These challenges are met by big data analytics. In this paper, we propose an innovative analytic framework for big healthcare data that are collected either from IoT wearable devices or from archived patient medical images. The proposed method would efficiently address the data heterogeneity problem using middleware between heterogeneous data sources and MapReduce Hadoop clusters. Furthermore, the proposed framework enables the use of both fog computing and cloud platforms to handle the problems faced through online and offline data processing, data storage, and data classification. Additionally, it guarantees robust and secure knowledge of patient medical data.

UniPy: A Unified Programming Language for MGC-based IoT Systems

  • Kim, Gayoung;Choi, Kwanghoon;Chang, Byeong-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.77-86
    • /
    • 2019
  • The advent of Internet of Things (IoT) makes common nowadays computing environments involving programming not a single computer but several heterogeneous distributed computers together. Developing programs separately, one for each computer, increases programmer burden and testing all the programs become more complex. To address the challenge, this paper proposes an RPC-based unified programming language, UniPy, for development of MGC (eMbedded, Gateway, and Cloud) applications in IoT systems configured with popular computers such as Arduino, Raspberry Pi, and Web-based DB server. UniPy offers programmers a view of classes as locations and a very simple form of remote procedure call mechanism. Our UniPy compiler automatically splits a UniPy program into small pieces of the program at different locations supporting the necessary RPC mechanism. An advantage of UniPy programs is to permit programmers to write local codes the same as for a single computer requiring no extra knowledge due to having unified programming models, which is very different from the existing research works such as Fabryq and Ravel. Also, the structure of UniPy programs allows programmers to test them by directly executing them before splitting, which is a feature that has never been emphasized yet.

A Study of the Internet of Thing Industry and Policy Implications (사물인터넷 산업 현황 및 정책적 대응방향)

  • Chun, Hwang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.724-727
    • /
    • 2014
  • This paper is analyzing the situation of the Internet of Things Industry and draw the policy implications to promote Internet of Things industry. Major IT companies as Apple, Google, IBM, Sony, and Samsung have developed various smart glass and smart watch as a Iot products. In order to promote Iot Industry, we should take the build up of eco system between IT makers and the various contents provider, protection of personal information and data, development of killer applications and business models, and the conversion from IPv4 to IPv6 as a next internet address infra, build up of international standard platform on IoT.

  • PDF

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing

  • Kim, Mihui;Park, Younghee;Dighe, Pankaj Balasaheb
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1036-1054
    • /
    • 2019
  • Recently, concomitant with a surge in numbers of Internet of Things (IoT) devices with various sensors, mobile crowdsensing (MCS) has provided a new business model for IoT. For example, a person can share road traffic pictures taken with their smartphone via a cloud computing system and the MCS data can provide benefits to other consumers. In this service model, to encourage people to actively engage in sensing activities and to voluntarily share their sensing data, providing appropriate incentives is very important. However, the sensing data from personal devices can be sensitive to privacy, and thus the privacy issue can suppress data sharing. Therefore, the development of an appropriate privacy protection system is essential for successful MCS. In this study, we address this problem due to the conflicting objectives of privacy preservation and incentive payment. We propose a privacy-preserving mechanism that protects identity and location privacy of sensing users through an on-demand incentive payment and group signatures methods. Subsequently, we apply the proposed mechanism to one example of MCS-an intelligent parking system-and demonstrate the feasibility and efficiency of our mechanism through emulation.