• Title/Summary/Keyword: Mobile Server

Search Result 1,299, Processing Time 0.028 seconds

An Efficient Spatial Query Processing in Wireless Networks (무선 네트워크 환경에서 효율적인 공간 질의 처리)

  • Song, Doo Hee;Lee, Hye Ri;Park, Kwang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.10
    • /
    • pp.239-244
    • /
    • 2019
  • In recent mobile environments, query processing costs have been rapidly increasing as users request large amounts of queries. In addition, the server's performance is increasing for many users to handle high-capacity queries, but the workload is increasing continuously. To solve these problems, we use the wireless broadcasting environment. However, in a existing wireless broadcasting environment, servers have a problem sending all the objects they manage to their clients. Therefore, we propose a new R-Bcast combining the advantages of demand-based and wireless broadcasting. R-Bcast is a technique that protects query information and reduces query processing time. Experiments have proved that R-Bcast is superior to conventional techniques.

A development of Intelligent Parking Control System Using Sensor-based on Arduino

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • Korean Journal of Artificial Intelligence
    • /
    • v.9 no.2
    • /
    • pp.29-34
    • /
    • 2021
  • In this paper, for efficient parking control, in an Arduino environment, an intelligent parking control prototype was implemented to provide parking control and parking guidance information using HC-SR2O4 and RC522. The main elements of intelligent parking control are vehicle recognition sensors, parking control facilities, and integrated operating software. Whether the vehicle is parked on the parking surface may be confirmed through sensor or intelligent camera image analysis. Parking control equipment products include parking guidance and parking available display devices, vehicle number recognition cameras, and intelligent parking assistance systems. This paper applies and implements ultrasonic sensors and RFID concepts based on Arduino, recognizes registered vehicles, and displays empty spaces. When a vehicle enters a parking space to handle this function, the automatic parking management system distinguishes the registered vehicle from the external vehicle through the RC522 sensor. In addition, after checking whether the parking slot is empty, the HC-SR204 sensor is displayed through the LED so that the driver can visually check it. RFID is designed to check the parking status of the server in real time and provide the driver with optimal route service to the parking slot.

Design and implementation of IoT platform for collecting and managing the SmartFactory environment information

  • Kim, SungJin;Ra, SangYong;Kim, HwanSeog;Choi, JaeHong;Lee, JunDong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.109-115
    • /
    • 2019
  • Smart Factory is a part of and a key point of the 4th industrial revolution. It performs optimization from the whole viewpoint, using comprehensive data of the post-process data by utilizing various sensors, controllers, and mobile devices beyond the existing factory automation level. In this paper, we design and implement an IoT platform that can detect the safety factors of the workers, the environmental factors of the factory, and real time monitoring at the control center, among the fields to implement smart factory. To accomplish this, we construct a monitoring device that provides sensor information control, server transmission of sensor information, and visualization of collected information. By using this system, it is possible to maintain the temperature and humidity for the optimum working environment in the factory. and also, By using the beacon, it is possible to measure the working time of the worker and trace the position.

Design of the Intelligent LBS Service : Using Big Data Distributed Processing System (빅데이터 분산처리 시스템을 활용한 지능형 LBS서비스의 설계)

  • Mun, Chang-Bae;Park, Hyun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2019
  • Today, the location based service(LBS) is globally developing with the advance of smart phones and IOT devices. The main purpose of this research is to provide users with the most efficient route information, analyzing big data of people with a variety of routes. This system will enable users to have a similar feeling of getting a direct guidance from a person who has often used the route. It is possible because the system server analyzes the route information of people in real time, after composing the distributed processing system on the basis of map information. In the future, the system will be able to amazingly develop with the association of various LBS services, providing users with more precise and safer route information.

Design and Implementation of Location and Activity Monitoring System Based on LoRa

  • Lin, Shengwei;Ying, Ziqiang;Zheng, Kan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1812-1824
    • /
    • 2019
  • The location and human activity are usually used as one of the important parameters to monitor the health status in healthcare devices. However, nearly all existing location and monitoring systems have the limitation of short-range communication and high power consumption. In this paper, we propose a new mechanism to collect and transmit monitoring information based on LoRa technology. The monitoring device with sensors can collect the real-time activity and location information and transmit them to the cloud server through LoRa gateway. The user can check all his history and current information through the specific designed mobile applications. Experiment was carried out to verify the communication, power consumption and monitoring performance of the entire system. Experimental results demonstrate that this system can collect monitoring and activity information accurately and provide the long rang coverage with low power consumption.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Energy-Efficient DNN Processor on Embedded Systems for Spontaneous Human-Robot Interaction

  • Kim, Changhyeon;Yoo, Hoi-Jun
    • Journal of Semiconductor Engineering
    • /
    • v.2 no.2
    • /
    • pp.130-135
    • /
    • 2021
  • Recently, deep neural networks (DNNs) are actively used for action control so that an autonomous system, such as the robot, can perform human-like behaviors and operations. Unlike recognition tasks, the real-time operation is essential in action control, and it is too slow to use remote learning on a server communicating through a network. New learning techniques, such as reinforcement learning (RL), are needed to determine and select the correct robot behavior locally. In this paper, we propose an energy-efficient DNN processor with a LUT-based processing engine and near-zero skipper. A CNN-based facial emotion recognition and an RNN-based emotional dialogue generation model is integrated for natural HRI system and tested with the proposed processor. It supports 1b to 16b variable weight bit precision with and 57.6% and 28.5% lower energy consumption than conventional MAC arithmetic units for 1b and 16b weight precision. Also, the near-zero skipper reduces 36% of MAC operation and consumes 28% lower energy consumption for facial emotion recognition tasks. Implemented in 65nm CMOS process, the proposed processor occupies 1784×1784 um2 areas and dissipates 0.28 mW and 34.4 mW at 1fps and 30fps facial emotion recognition tasks.

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks (Ad-hoc 네트워크에서의 효율적인 비정상행위 노드 탐지 및 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.71-80
    • /
    • 2009
  • Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.