• Title/Summary/Keyword: Framework connected information

Search Result 132, Processing Time 0.029 seconds

Building GIS Data Model for Integrated Management of The Marine Data of Dokdo (독도 해양자료의 통합적인 관리를 위한 GIS 데이터 모델 수립)

  • Kim, Hyun-Wook;Choi, Hyun-Woo;Oh, Jung-Hee;Park, Chan-Hong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.4
    • /
    • pp.153-167
    • /
    • 2007
  • Dokdo research has been worked in various fields. However, the continuous accumulation and systematic management of Dokdo research data on marine science haven't been made. In particular, a systematic database system hasn't been established for the research data on marine environment and ecosystem in Dokdo and its surrounding sea. Therefore, GIS database construction on a spatial basis is required for the systematic management and efficient use of Dokdo marine research data, and a marine data model on a GIS basis is needed on the design stage to build the database. In this study, we collected previous observed marine data, and classified them as three groups, such as a framework data group on a GIS basis, a research data group and a thematic data group, according to the data types and characteristics. Moreover, the attributes of each research data were designed to be connected to GIS framework data. The result of the study to build an integrated GIS data model may be useful for developing a management system for marine research data observed in other sea as well as Dokdo.

  • PDF

A Framework for Multiple Wireless Services in Heterogeneous Wireless Networks (중첩된 이기종 무선망에서의 다중 무선 서비스 프레임워크)

  • Shin, Choong-Yong;Cho, Jin-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.85-94
    • /
    • 2008
  • As a variety of wireless network services, such as WLAN, WiBro, cdma2000, and HSDPA, are provided and the range of users' choices for the wireless services are broaden, MCoA (Multiple Car-of Address) concepts that enable users to use wireless interfaces simultaneously have been presented in IETF MONAMI6 WG. Through this scheme, users can access several networks simultaneously by using multiple wireless interfaces. Such various wireless connection technologies continue to advance as they are connected and integrated to All-IP-based core network, and at the same time, heterogeneous networks are being managed overlaid according to the coverage of the wireless connection technologies. Under such circumstances, needs for an integrated architecture have arisen, and thus Wireless service framework is required that effectively manages heterogeneous networks which coexist with next generation's networks for 4G. In this paper, a wireless service framework is suggested in the consideration of current wireless service environment, and the framework covers the schemes to minimize the packet loss caused by handover, and also modified Multiple Care-of Address that helps to select most effective network by considering characteristics of various interfaces as well as users' preferences.

  • PDF

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

A Vehicular License Plate Recognition Framework For Skewed Images

  • Arafat, M.Y.;Khairuddin, A.S.M.;Paramesran, R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5522-5540
    • /
    • 2018
  • Vehicular license plate (LP) recognition system has risen as a significant field of research recently because various explorations are currently being conducted by the researchers to cope with the challenges of LPs which include different illumination and angular situations. This research focused on restricted conditions such as using image of only one vehicle, stationary background, no angular adjustment of the skewed images. A real time vehicular LP recognition scheme is proposed for the skewed images for detection, segmentation and recognition of LP. In this research, a polar co-ordinate transformation procedure is implemented to adjust the skewed vehicular images. Besides that, window scanning procedure is utilized for the candidate localization that is based on the texture characteristics of the image. Then, connected component analysis (CCA) is implemented to the binary image for character segmentation where the pixels get connected in an eight-point neighbourhood process. Finally, optical character recognition is implemented for the recognition of the characters. For measuring the performance of this experiment, 300 skewed images of different illumination conditions with various tilt angles have been tested. The results show that proposed method able to achieve accuracy of 96.3% in localizing, 95.4% in segmenting and 94.2% in recognizing the LPs with an average localization time of 0.52s.

SIP Dealing with Location Based Information

  • Requena, Jose-Costa;Haitao Tang;Inmaculada Espigares Del Pozo
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.351-360
    • /
    • 2001
  • This paper introduces an approach for providing Location Based Services (LBS) using Spatial Location (SLO) information within the Session Initiation Protocol (SIP). The aim of the paper is to set up the framework for providing LBS services in devices connected to wire and wireless IP networks. This method uses SIP as transport and the SLO as data formal inserted in the SIP pay-load. It analyses the relationship among the network elements involved in the architecture, and its functionality fur providing access to network services regardless of the user location. In conclusion, this proposal enables SIP to support location-related services such as messaging, location-based commerce, and any location-based computing. Furthermore, it describes the advantage of adding the user location information network resources optimization in mobile environments and future networks.

  • PDF

Development of web-based collaborative framework for the simulation of embedded systems

  • Yang, Woong;Lee, Soo-Hong;Jin, Yong Zhu;Hwang, Hyun-Tae
    • Journal of Computational Design and Engineering
    • /
    • v.3 no.4
    • /
    • pp.363-369
    • /
    • 2016
  • Cyber Physical System (CPS) and Internet of Things (IoT) are hot objects of interest as an extension of the embedded system. These interactive products and systems contain Mobile Devices which are most popular and used most frequently. Also these have been widely used from the control of the Nuclear Power Control System (NPCS) to IoT Home Service. Information & Communication Technology (ICT) topics of trend fused-complex current Information Technology (IT) and Communication Technology (CT) are closely linked to real space and virtual space. This immediately means the arrival of the ultra-connected society. It refers to a society in which various objects surrounding the human innovation and change in the social sector are expected through the connection between the data which are to be generated. In addition, studies of Tool-kit for the design of such systems are also actively pursued. However, only increased cooperation and information sharing between the physical object consists of a variety of machinery and equipment. We have taken into consideration a number of design variables of the high barriers to entry about the product. In this study, It has been developed a Web-based collaboration framework which can be a flexible connection between macroscopically virtual environment and the physical environment. This framework is able to verifiy and manage physical environments. Also it can resolve the bottlenecks encountered during the base expansion and development process of IoT (Internet of Things) environment.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

The Establishment of an Activity-Based EVM - PMIS Integration Model (액티비티 기반의 EVM - PMIS 통합모델 구축)

  • Na, Kwang-Tae;Kang, Byeung-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.1
    • /
    • pp.199-212
    • /
    • 2010
  • To establish an infrastructure for technology and information in the domestic construction industry, several construction regulations pertaining to construction information have been institutionalized. However, there are major problems with the domestic information classification system, earned value management (EVM) and project management information system (PMIS). In particular, the functions of the current PMIS have consisted of a builder-oriented system, and as EVM is not applied to PMIS, the functions of reporting, analysis and forecast for owners are lacking. Moreover, owners cannot confirm information on construction schedule and cost in real time due to the differences between the EVM and PMIS operation systems. The purpose of this study is to provide a framework that is capable of operating PMIS efficiently under an e-business environment, by providing a proposal on how to establish a work breakdown structure (WBS) and an EVM - PMIS integration model, so that PMIS may provide the function of EVM, and stakeholders may have all information in common. At the core of EVM - PMIS integration is the idea that EVM and PMIS have the same operation system, in order to be an activity-based system. The principle of the integration is data integration, in which the information field of an activity is connected with the field of a relational database table consisting of sub-modules for the schedule and cost management function of PMIS using a relational database management system. Therefore, the planned value (PV), cost value (CV), actual cost (AC), schedule variance (SV), schedule performance index (SPI), cost variance (CV) and cost performance index (CPI) of an activity are connected with the field of the relational database table for the schedule and cost sub-modules of PMIS.

Issues and Challenges in the Extraction and Mapping of Linked Open Data Resources with Recommender Systems Datasets

  • Nawi, Rosmamalmi Mat;Noah, Shahrul Azman Mohd;Zakaria, Lailatul Qadri
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.2
    • /
    • pp.66-82
    • /
    • 2021
  • Recommender Systems have gained immense popularity due to their capability of dealing with a massive amount of information in various domains. They are considered information filtering systems that make predictions or recommendations to users based on their interests and preferences. The more recent technology, Linked Open Data (LOD), has been introduced, and a vast amount of Resource Description Framework data have been published in freely accessible datasets. These datasets are connected to form the so-called LOD cloud. The need for semantic data representation has been identified as one of the next challenges in Recommender Systems. In a LOD-enabled recommendation framework where domain awareness plays a key role, the semantic information provided in the LOD can be exploited. However, dealing with a big chunk of the data from the LOD cloud and its integration with any domain datasets remains a challenge due to various issues, such as resource constraints and broken links. This paper presents the challenges of interconnecting and extracting the DBpedia data with the MovieLens 1 Million dataset. This study demonstrates how LOD can be a vital yet rich source of content knowledge that helps recommender systems address the issues of data sparsity and insufficient content analysis. Based on the challenges, we proposed a few alternatives and solutions to some of the challenges.

Researches on Trust in IoT and Implications: Focusing on EU Framework Programme 7 (FP7) (사물인터넷 신뢰 연구와 시사점: EU FP7을 중심으로)

  • Yoon, Young Seog;Jo, Seng-Kyoun;Lee, Hyun-Woo
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.56-73
    • /
    • 2016
  • The Internet of Things (IoT) is expected to provide new business opportunities by connecting devices, persons, and their data. However, the value proposed by IoT cannot be realized without trust. As IoT premises on the seamless connections, it should guarantee trust among the connected persons and things. However, there is lack of relevant discussion on how to achieve trustworthy connections and interactions because most of academic studies have mainly focused on the development of IoT platforms and applications. To fill the gaps, recent EU-funded projects such as uTRUSTit, ABC4Trust, Inter-Trust, COMPOSE, and SMARTIE have been conducted under the FP7-ICT Framework Programme. This paper presents and discusses each project's purpose and approach. Although their approaches are somewhat different from each other, all of them dedicate to achieving both privacy and security by providing the trustworthy connections. It seems to be clear that Korea also needs more academic and practical contribution in terms of researches, to implement "trust"among connected things, which will eventually satisfy what really IoT is expected for.