• Title/Summary/Keyword: Mobile Events

Search Result 176, Processing Time 0.022 seconds

YOLOv5 based Anomaly Detection for Subway Safety Management Using Dilated Convolution

  • Nusrat Jahan Tahira;Ju-Ryong Park;Seung-Jin Lim;Jang-Sik Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.2_1
    • /
    • pp.217-223
    • /
    • 2023
  • With the rapid advancement of technologies, need for different research fields where this technology can be used is also increasing. One of the most researched topic in computer vision is object detection, which has widely been implemented in various fields which include healthcare, video surveillance and education. The main goal of object detection is to identify and categorize all the objects in a target environment. Specifically, methods of object detection consist of a variety of significant techniq ues, such as image processing and patterns recognition. Anomaly detection is a part of object detection, anomalies can be found various scenarios for example crowded places such as subway stations. An abnormal event can be assumed as a variation from the conventional scene. Since the abnormal event does not occur frequently, the distribution of normal and abnormal events is thoroughly imbalanced. In terms of public safety, abnormal events should be avoided and therefore immediate action need to be taken. When abnormal events occur in certain places, real time detection is required to prevent and protect the safety of the people. To solve the above problems, we propose a modified YOLOv5 object detection algorithm by implementing dilated convolutional layers which achieved 97% mAP50 compared to other five different models of YOLOv5. In addition to this, we also created a simple mobile application to avail the abnormal event detection on mobile phones.

A study on the mobile game user's interaction using social network analysis (소셜네트워크 분석을 통한 모바일 게임 이용자들의 상호작용 연구)

  • Seok, Hwayoon;Yoo, Changsok;Joo, Yeajin;Ju, Jinyoung;Kwon, Hyoungjin;Yang, Seong-Il;Nam, Yoonjae
    • Journal of Korea Game Society
    • /
    • v.21 no.3
    • /
    • pp.53-66
    • /
    • 2021
  • This study explored how the network structure in terms of social interactions among users via a mobile game has changed longitudinally. The main findings are summarized as follows. First, in-game events are likely to increase the social interactions of users. Second, some power users played key roles in the game users' network and tend to make a large sub-group for interacting among users. Third, it is suggested that the analysis of network structure among users can be a useful tool for monitoring which in-game events are effective and how they are mutually interconnected for collaboration.

Context-Aware Mobile Gateway Relocation Scheme for Clustered Wireless Sensor Networks

  • Encarnacion, Nico N.;Yang, Hyunho
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.365-371
    • /
    • 2012
  • In recent years, researchers have been attracted to clustering methods to improve communication and data transmission in a network. Compared with traditional wireless networks, wireless sensor networks are energy constrained and have lower data rates. The concept of implementing a clustering algorithm in an existing project on gateway relocation is being explored here. Low energy adaptive clustering hierarchy (LEACH) is applied to an existing study on relocating a gateway. The study is further improved by moving the gateway to a specific cluster based on the number or significance of the events detected. The protocol is improved so that each cluster head can communicate with a mobile gateway. The cluster heads are the only nodes that can communicate with the mobile gateway when it (the mobile gateway) is out of the cluster nodes' transmission range. Once the gateway is in range, the nodes will begin their transmission of real-time data. This alleviates the load of the nodes that would be located closest to the gateway if it were static.

Route Optimization Scheme for Mobile Content Sources in Content Centric Networking

  • Lee, Jihoon;Rhee, Eugene
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.22-27
    • /
    • 2020
  • Content centric networking (CCN) is regarded as promising internet architecture because it can provide network efficiency in terms of bandwidth consumption by separating contents from a specific network location and decrease network congestion events. However, the application of a CCN does not widely consider the side effects of mobile devices, particularly mobile content sources. For content source mobility, a full routing update is required. Therefore, in this study, a route optimization scheme is proposed for mobile content sources in a CCN environment to provide low communication overhead, short download time, and low resource consumption. The proposed scheme establishes a direct path between content requesters and a mobile content source for the exchange of interest and data packets using interest-piggybacked data packets. Based on the inherent CCN naming characteristics, the content source does not know the name prefix of the content consumer, and thus the proposed optimized CCN scheme utilizes the content router in the home domain of the content source.

A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services

  • Ortega, Juan A.;Fuentes, Daniel;Alvarez, Juan A.;Gonzalez-Abril, Luis;Velasco, Francisco
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1457-1471
    • /
    • 2011
  • A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware.

Interference Reduction Scheme for Mobile WiMAX in an Indoor environment (실내 환경의 Mobile WiMAX 시스템을 위한 간섭 완화 기술에 대한 연구)

  • Oh, Yong-Il;Ha, Kwang-Jun;Koo, Sung-Wan;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.454-458
    • /
    • 2008
  • This article describes an interference reduction scheme for Mobile WiMAX in an indoor environment. The feasibility of user deployed femtocells in the same frequency channel as an existing macro cell network is investigated. One of the important requirements for co-channel operation of femtocells such as auto-configuration and self optimization are discussed. In femtocell deployments, leakage of the pilot signal to the outside of a house can result of the higher number of mobility events caused by passing user of macrocell. This interference effect can be minimized by reducing the pilot power using proper scheme. This paper introduces existing auto-configuration method of power control and proposed interference reduction scheme using power control for Mobile WiMAX in an indoor environment.

  • PDF

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

An Improved Handoff and Resource Reservation Scheme Using Triggers in Wireless Network (이동망에서 트리거를 이용한 향상된 핸드오프 메커니즘 및 자원예약 방안)

  • Lee, Don-Su;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.630-637
    • /
    • 2007
  • In this paper, we propose an effective handoff mechanism using events at the layer 2 and a tunnel-based mechanism that is performed by sharing information of a mobile node and anticipated-based handoff. Also, we propose a novel anticipated-reservation mechanism using the events triggered at layer 2 to make easy a resource reservation procedure. Comparing with the existing mobile IPv6 handoff mechanism, our proposed handoff mechanism can reduce an amount of handoff latency and traffic volume between access routers where handoff is performed. In the anticipated-reservation mechanism, the amount of signaling traffics between an mobile node and the correspondent nodes can be reduced and then the allocation of resource can be accomplished. We present the performance of our proposed handoff mechanism in the wireless network environment by ns-2 simulation. Although the anticipated-reservation mechanism including a proxy agent is explained without performance evaluation, we can validate the operation of our proposed model only by the procedure of message flow.

High Quality Network and Device Aware Multimedia Content Delivery for Mobile Cloud

  • Saleem, Muhammad;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4886-4907
    • /
    • 2019
  • The use of mobile devices is increasing in multimedia applications. The multimedia contents are delivered to mobile users over heterogeneous networks. Due to fluctuation in bandwidth and user mobility, the service providers are facing difficulties in providing Quality of Service (QoS) guaranteed delivery for multimedia applications. Multimedia applications depend on QoS parameters such as delay, bandwidth, and jitter to offer better user experience. The existing schemes use the single source and multisource delivery but are unable to balance between stream quality and network congestion for mobile users. We proposed a Quality Oriented Multimedia Content Delivery Scheme (QOMCDS) for the mobile cloud to deliver better quality multimedia contents for the mobile user. The multimedia contents are delivered to the mobile device based on the device's parameters and network environment. The objective video quality assessment models like Peak Signal-to-Noise Ratio (PSNR), Structural Similarity (SSIM), and Video Quality Measurement (VQM) are used to measure the quality of the video. The client side Quality of Experience metric such as Startup delay, Rebuffering events, and Bitrate switch count was used for evaluation. The proposed scheme is evaluated using dash.js and is compared to existing schemes. The results show significant improvement over existing multimedia content delivery schemes.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.