• Title/Summary/Keyword: Internet applications

Search Result 2,427, Processing Time 0.029 seconds

Design and Implementation of Automatic Script Generator for Mobile Database Applications (모바일 데이터베이스 응용을 위한 스크립트 자동 생성기의 설계 및 구현)

  • Eum, Doo-Hun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.71-85
    • /
    • 2009
  • The demand for mobile database applications has been rapidly increased with the growth of mobile users and the development of wireless Internet technology. But the productivity of mobile applications is low and it takes much time to manage the versions of applications because the user interface and query processing code of applications is manually written. In this paper, we describe the design and implementation of the MobileGen that is a script generator for mobile database applications. The generated scripts enhance mobile application productivity by providing the code for operating with a database and processing user queries. Each script provides a corresponding deck that is a set of related cards as user interface. The MobileGen supports easy version management of generated applications and the MobileGen itself because it is based on the templates that are frameworks for scripts. Moreover, the MobileGen provides not only the interested entity but also the entities that are related directly and indirectly with the interested entity unlike the most commercial mobile script generators.

  • PDF

Lightweight End-to-End Blockchain for IoT Applications

  • Lee, Seungcheol;Lee, Jaehyun;Hong, Sengphil;Kim, Jae-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3224-3242
    • /
    • 2020
  • Internet of Things (IoT) networks composed of a large number of sensors and actuators generate a huge volume of data and control commands, which should be enforced by strong data reliability. The end-to-end data reliability of IoT networks is an essential industrial enabler. Blockchain technology can provide strong data reliability and integrity within IoT networks. We designed a lightweight end-to-end blockchain network that applies to common IoT applications. Its enhanced modular architecture and lightweight consensus mechanism guarantee its practical applicability for general IoT applications. In addition, the proposed blockchain network is highly software compatible because it adopts the Hyperledger development environment. Directly embedding the proposed blockchain middleware platform in small computing devices proves its practicability.

Reaching Byzantine Agreement underlying VANET

  • Wang, Shu-Ching;Lin, Ya-Jung;Yan, Kuo-Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3351-3368
    • /
    • 2019
  • The Internet of Things (IoT) enables machines and devices in a global network to connect and provide applications. The Vehicular Ad-hoc NETwork (VANET) allows vehicles in the network to communicate with each other as an application of the IoT. The safety and comfort of passengers can be improved through VANET related applications. In order to be able to provide related applications, there must be a reliable VANET topology. As a result of the Byzantine agreement (BA), fault tolerance can be solved in VANET. In order to improve the reliability of the system, even if some components in the system are damaged, a protocol is needed to assist the system to perform normally. Therefore, the BA problem in VANET with multiple impairments is revisited in this research. The proposed protocol allows all normal processing elements (PEs) to reach agreement using the least amount of information exchange. Moreover, the proposed protocol can tolerate the largest number of damaged PEs in VANET.

Multiple-Class Dynamic Threshold algorithm for Multimedia Traffic (멀티미디어 트래픽을 위한 MCDT (Multiple-Class Dynamic Threshold) 알고리즘)

  • Kim, Sang-Yun;Lee, Sung-Chang;Ham, Jin-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.17-24
    • /
    • 2005
  • Traditional Internet applications such as FIP and E-mail are increasingly sharing bandwidth with newer, more demanding applications such as Web browsing, IP telephony, video conference and online games. These new applications require Quality of Service (QoS), in terms of delay, loss and throughput that are different from QoS requirements of traditional applications. Unfortunately, current Active Queue Management (AQM) approaches offer monolithic best-effort service to all Internet applications regardless of the current QoS requirements. This paper proposes and evaluates a new AQM technique, called MCDT that provides dynamic and separated buffer threshold for each Applications, those are FTP and e-mail on TCP traffic, streaming services on tagged UDP traffic, and the other services on untagged UDP traffic. Using a new QoS metric, our simulations demonstrate that MCDT yields higher QoS in terms of the delay variation and a packet loss than RED when there are heavy UDP traffics that include streaming applications and data applications. MCDT fits the current best-effort Internet environment without high complexity.

Feasibility of Societal Model for Securing Internet of Things

  • Tsunoda, Hiroshi;Roman, Rodrigo;Lopez, Javier;Keeni, Glenn Mansfield
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3567-3588
    • /
    • 2018
  • In the Internet of Things (IoT) concept, devices communicate autonomously with applications in the Internet. A significant aspect of IoT that makes it stand apart from present-day networked devices and applications is a) the very large number of devices, produced by diverse makers and used by an even more diverse group of users; b) the applications residing and functioning in what were very private sanctums of life e.g. the car, home, and the people themselves. Since these diverse devices require high-level security, an operational model for an IoT system is required, which has built-in security. We have proposed the societal model as a simple operational model. The basic concept of the model is borrowed from human society - there will be infants, the weak and the handicapped who need to be protected by guardians. This natural security mechanism works very well for IoT networks which seem to have inherently weak security mechanisms. In this paper, we discuss the requirements of the societal model and examine its feasibility by doing a proof-of-concept implementation.

Status and Trend on Applying Web Front-End Frameworks for Developing Network Monitoring Applications in a Web of Things Environment (사물 웹(WoT) 환경에서 네트워크 모니터링 애플리케이션 개발을 위한 웹 프론트엔드 프레임워크의 적용 현황 및 트렌드)

  • Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.47-54
    • /
    • 2022
  • All things connected to the Internet have to ensure interoperability between each other. Web of Things (WoT) is an Internet of Things (IoT) Web standard technology that enables the communication between smart devices and web-based applications. In order for WoT to be possible, monitoring of all devices connected to the Internet have to be possible. To this end, various efforts are being made to develop network monitoring applications using the latest Web front-end frameworks, not traditional web-based monitoring. This paper examines and describes the possibilities of applying Web front-end frameworks such as React, Angular and Svelte to the development of network monitoring applications for WoT. This paper also describes the pros and cons of two major frameworks, React and Angular, in developing monitoring applications that support the cross-platforms and cross-browsers in WoT environments and examines the applicability of them by developing simple network monitoring applications using React.

Performance Evaluation of the Internet Phone based on Resource Reservation Protocol (자원 예약 프로토콜에 기반한 인터넷 폰의 성능분석)

  • 조재만
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.03a
    • /
    • pp.27-31
    • /
    • 1998
  • The growing usage of multimedia communication applications with specific bandwidth and real-time delivery requirements has created the needs for quality of service(QoS). In response to the growing demand for an integrated services, the Reservation Protocol(RSVP) has been designed to exchange resource reservation among routers in the internet. RSVP protocol provides the quality of service for real-time applications but the network efficiency is reduced because of the limited bandwidth. In order to use network resources efficiently. We compare the resource efficiency of traditional reservation methods with that of the proposed method and evaluate the performance of the internet phone.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Cooperation of Time-delay for Internet-based Mobile Robot Using Fuzzy Logic

  • Yoo, Bong-Soo;Lee, Sang-Min;Joh, Joong-Seon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.179-184
    • /
    • 2002
  • Recently, internet-based applications can be found easily in various felds. Internet-based telerobot system becomes one of important applications of internet. Among many important technological issues on the internet-based telerobot, time-delay is inherently critical problem to be solved. Time-delay is classified as micro time-delay and macro time-delay in this paper. Algorithms for compensation of path-error and time-error are proposed for the both types of time-delays using fuzzy logic since fuzzy logic is one of the best tools to represent expert's knowledge. Simulation results show the validity of the proposed algorithms.

Internet of Things: An Overview and its Applications in Aviation (항공 분야에서의 사물인터넷 기술 현황)

  • Hyun, WooSeok
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.3
    • /
    • pp.100-107
    • /
    • 2020
  • Internet of Things (IoT) is a technology that communicates data between devices, which are things, using an embedded sensor connected through network backbone such as the internet. Here, data communication technology, sensor technology, and actuator (interface) technology are fused into IoT and it turns devices into smart things. As a result, vast sized data are being generated and that data is being processed into useful actions that can control the things that are devices to make our lives much fruitful. Nowadays, the IoT, early defined as Machine-to-Machine (M2M) connection, becomes a key technology powered by growing innovation of wireless communication trends in the internet connectivity through mobile networking. This paper gives an overview of Internet of Things and brief information about major technologies and its applications in various fields focusing aviation.