• 제목/요약/키워드: Internet phone

Search Result 1,000, Processing Time 0.022 seconds

Development of Intelligent CCTV System Using CNN Technology (CNN 기술을 사용한 지능형 CCTV 개발)

  • Do-Eun Kim;Hee-Jin Kong;Ji-Hu Woo;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.99-105
    • /
    • 2023
  • In this paper, an intelligent CCTV was designed and experimentally developed by using an IOT device, Raspberry Pi, and artificial intelligence technology. Object Detection technology was used to detect the number of people on the CCTV screen, and Action Detection technology provided by OpenPose was used to detect emergency situations. The proposed system has a structure of CCTV, server and client. CCTV uses Raspberry Pi and USB camera, server uses Linux, and client uses iPhone. Communication between each subsystem was implemented using the MQTT protocol. The system developed as a prototype could transmit images at 2.7 frames per second and detect emergencies from images at 0.2 frames per second.

Based on MQTT and Node-RED Implementation of a Smart Farm System that stores MongoDB (MQTT와 Node-RED를 기반한 MongoDB로 저장 하는 스마트 팜 시스템 구현)

  • Hong-Jin Park
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.5
    • /
    • pp.256-264
    • /
    • 2023
  • Smart farm technology using IoT is one of the technologies that can increase productivity and improve the quality of agricultural products in agriculture, which is facing difficulties due to the decline in rural population, lack of rural manpower due to aging, and increase in diseases and pests due to climate change. . Smart farms using existing IoT simply monitor farms, implement smart plant growers, and have automatic greenhouse opening and closing systems. This paper implements a smart farm system based on MQTT, an industry standard protocol for the Internet of Things, and Node-RED, a representative development middleware for the Internet of Things. First, data is extracted from Arduino sensors, and data is collected and transmitted from IoT devices using the MQTT protocol. Then, Node-RED is used to process MQTT messages and store the sensing data in real time in MongoDB, a representative NoSQL, to store the data. Through this smart farm system, farm managers can use a computer or mobile phone to check sensing information on the smart farm in real time, anytime, anywhere, without restrictions on time and space.

Design of Education Service for 1:1 Customized Elderly SmartPhone using Generative AI applicable in Local Governments (지자체에서 활용할 수 있는 생성형 AI를 이용한 1:1 맞춤형 노인 스마트폰 교육 서비스 설계)

  • Min-Young Chu;Yean-Woo Park;Soo-Jin Heo;Seung-Hyeon Noh;Won-Whoi Huh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.133-139
    • /
    • 2024
  • In response to the challenges posed by a super-aged society, local authorities are conducting educational programs on smartphone usage tailored for the elderly. However, obstacles such as the limitations of one-to-many education and suboptimal learning outcomes for the elderly have hindered the efficacy of smartphone education. This study suggests an educational service intended for direct application in offline settings, considering the identified problems. Through the utilization of generative AI, the proposed app identifies specific challenges encountered by users during actual smartphone use, offering personalized exercises to facilitate customized and repetitive learning experiences for individual users. When integrated with existing local government education initiatives, this app is anticipated to enhance the efficiency of smartphone education by providing personalized, one-on-one training that is efficient in terms of time and content.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Forecasting Competition of Telecommunication Company in Full Browsing Service Market Based on First-Mover Advantage Analysis (풀브라우징 서비스 시장에서의 이동통신 3사의 경쟁 동향 분석: 선발자 이익 분석 관점)

  • Park, Jin-Soo;Choi, Young-Seok
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.145-164
    • /
    • 2010
  • Since the third generation (3G) mobile communication service has been launched by most mobile communication operators in Korea, the portion of data service in mobile communication service becomes one of the most important factors in mobile communication service market. In past mobile communication market, most mobile communication operators made their profit mostly from voice communication service. However, the portion of profit from data service has gradually increased based on both video phone call and mobile Internet service. In this situation, LG telecom launched the full browsing mobile Internet service. This service provides a new type of mobile Internet service platform which enables to access the World Wide Web using mobile browsers, so we generally access the Web using web browsers in the desktop computer. Under the open network structure of mobile Internet like situation, it is very important to analyze the factors which can affect the competition between mobile communication service companies. So, in this paper, we first present the current state of full browsing service, followed by the expectation of its growth potentials and barriers. Then, we analyze the advantages and disadvantage of LG telecom as a first-mover and SK telecom/KTF as followers. Finally, based on this analysis, we predict the future competition among these companies and the market.

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.

Factors to Affect the Selection of Machine-to-Machine Household Technology (사물지능통신(M2M) 가사기술의 선택 요인)

  • Park, Hye-Kyung;Yoon, Jeong-Ro
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.4
    • /
    • pp.954-977
    • /
    • 2013
  • This paper investigates the factors to affect the consumer selection of machine-to-machine (M2M) technology in the purchase and utilization of home appliances. M2M technology, based on mobile internet, allows for automatic operation and remote control of home appliances and equipment. The introduction of M2M technology could lead to the saving of domestic housework and of active social participation for women. With a view to focusing on the liberating potential of M2M technology, this paper analyzes the correlation between four independent variables (gender, income, employment status of married woman, and possession of mobile internet devices) and two dependent variables (intention for purchase and utilization of M2M household appliances). The possession of mobile internet devices such as smart phone and tablet PC turns out to be the most significant factor to affect both the purchase and utilization of M2M household appliances. The employment status (employed or not-employed) affects only the intention for purchase. Neither the income level nor gender has significant correlation with the intention for purchase or utilization. The results differ from the conventional wisdom that the consumer selection of household technology is substantially affected by gender, income and employment of housewife.

  • PDF

A Comparative Study of Users' Behavior on Mobile Internet Service Usage according to Lifestyle (라이프스타일 유형별 모바일 인터넷 사용형태 비교 연구)

  • Choi, Hun
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.87-105
    • /
    • 2011
  • Although the rapid spread of mobile device like smart phone has increased, One of the main problems of systems is that they do not meet their quality requirements. Many researchers have tried to improve users' satisfaction and enhance their quality of life. The purpose of the study is to examine the moderating effect of lifestyle on the use of mobile internet service. To achieve our research purpose, we used lifestyle, IS success model and quality of life as the theoretical background. Based on the research model, we conducted survey and empirically analyzed the data. We classified user types according to lifestyle as a moderating variable. The results show that users' lifestyle can classify two group: curiosity-independent group and intelligence-pursuit of advanced fashion type. The impact of information and systems quality factors of mobile internet service on user satisfaction are differentiated from these lifestyle group. This paper ends with strategical implication of the study results.

  • PDF

Intelligent Tutoring System based on Wired and Wireless Internet for the living English 300-certifications Program (생활영어 300 인증제를 대비한 유무선 기반 지능형 교육 시스템)

  • Lee, Young-Seok;Cho, Jung-Won;Kim, Byung-Gyu;Park, Jung-Hwan;Kim, Su-Min;Choi, Byung-Uk
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.3
    • /
    • pp.533-548
    • /
    • 2005
  • According to the increasing of the internet infrastructure and growth of contents technology, the users can access an education service at anytime and anywhere. In a field of English education, especially, internet technology has enabled learners to communicate with their teachers and multimedia contents technology has been able to provide learner not only lots of interests, but also good effect on English learning. In this paper, we propose a method diagnosing learner's level by using some question-items, which consist of item's type and item's function. Futhermore, the proposed system can support three devices which are PC, PDA, and Mobile Phone on wired and wireless internet communication environments. Also, the system provides multimedia contents including flash movies, image, and audio contents. We have applied the system into real classroom, and we verified that the question-items that system provides has no problem, and our method could improve each learner skill on English education. Therefore, we expect that learner who uses the proposed system will get level-based English learning service at anytime and anywhere.

  • PDF

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.