• Title/Summary/Keyword: Proactive Computing

Search Result 47, Processing Time 0.023 seconds

Applying Ubiquitous Computing Technology to Proactive and Personalized Decision Support System

  • Kwon, Oh-Byung;Yoo, Ki-Dong;Suh, Eu-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.281-285
    • /
    • 2004
  • This paper aims to describe how the decision making capability and context-aware computing are jointly used to establish ubiquitous applications. An amended DSS paradigm: CKDDM is proposed in this paper. Under the CKDDM paradigm, a framework of ubiquitous decision support systems (ubiDSS) is addressed with the description of the subsystems within.

  • PDF

3-D Hand Motion Recognition Using Data Glove (데이터 글로브를 이용한 3차원 손동작 인식)

  • Kim, Ji-Hwan;Park, Jin-Woo;Thang, Nguyen Duc;Kim, Tae-Seong
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.324-329
    • /
    • 2009
  • Hand Motion Modeling and Recognition (HMR) are a fundamental technology in the field of proactive computing for designing a human computer interaction system. In this paper, we present a 3D HMR system including data glove based on 3-axis accelerometer sensor and 3D Hand Modeling. Data glove as a device is capable of transmitting the motion signal to PC through wireless communication. We have implemented a 3D hand model using kinematic chain theory. We finally utilized the rule based algorithm to recognize hand gestures namely, scissor, rock and papers using the 3-D hand model.

  • PDF

A Proactive Dissemination Protocol using Residual Energy and Signal Strength for WSNs (무선 센서 네트워크에서 에너지 잔량과 신호세기를 이용한 데이터 전송 프로토콜)

  • Park, Soo-Yeon;Kim, Moon-Seong;Jeong, Eui-Hoon;Bang, Young-Cheo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2010
  • In this paper, a data dissemination protocol that transmits data collected for Wireless Sensor Networks (WSNs) is newly proposed, and the proposed proactive protocol takes into account energy consumption minimized and delay time disseminated. The well-known SPMS (Shortest Path Mined SPIN) forms the shortest path-based routing table obtained by Bellman Ford Algorithm (BFA) and disseminates data using a multi-hop path in order to minimize energy consumption. The mentioned properties of SPMS cause memory burden to create and maintain the routing tables. In addition, whenever BFA is executed, it is necessary to suffer from the energy consumption and traffic occurred. In order to overcome this problem, a proactive dissemination protocol using Residual Energy and Signal Strength, called RESS, is proposed in this paper. Simulation results show that RESS outperforms SPMS up to 84% in terms of the number of traffic messages and the transmitted delay time of RESS is similar to that of SPMS using the shortest path.

Context aware Modeling and Services Implementation With Event Driven in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 Event Driven 상황정보 모델링 및 서비스 구현)

  • Kim, Hyoung-Sun;Kim, Hyun;Moon, Ae-Kyung;Cho, Jun-Myun;Hong, Chung-Sung
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.13-24
    • /
    • 2006
  • Context aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology based context aware modeling methodology that transmits low level contexts acquired by directly accessing various sensors in the physical environments to high level contexts. With these high level contexts, context aware application can provides proactive and intelligent services using ECA (Event Condition Action) rules. We implemented a presentation service in smart office environment.

  • PDF

Real-time Recognition of Daily Human Activities Using A Single Tri-axial Accelerometer

  • Rubaiyeat, Husne Ara;Khan, Adil Mehmood;Kim, Tae-Seong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.289-292
    • /
    • 2010
  • Recently human activity recognition using accelerometer has become a prominent research area in proactive computing. In this paper, we present a real-time activity recognition system using a single tri-axial accelerometer. Our system recognizes four primary daily human activities: namely walking, going upstairs, going downstairs, and sitting. The system also computes extra information from the recognized activities such as number of steps, energy expenditure, activity duration, etc. Finally, all generated information is stored in a database as daily log.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Design and Evaluation of a Hierarchical Hybrid Content Delivery Scheme using Bloom Filter in Vehicular Cloud Environments (차량 클라우드 환경에서 블룸 필터를 이용한 계층적 하이브리드 콘텐츠 전송 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1597-1608
    • /
    • 2016
  • Recently, a number of solutions were proposed to address the challenges and issues of vehicular networks. Vehicular Cloud Computing (VCC) is one of the solutions. The vehicular cloud computing is a new hybrid technology that has a remarkable impact on traffic management and road safety by instantly using vehicular resources. In this paper, we study an important vehicular cloud service, content-based delivery, that allows future vehicular cloud applications to store, share and search data totally within the cloud. We design a VCC-based system architecture for efficient sharing of vehicular contents, and propose a Hierarchical Hybrid Content Delivery scheme using Bloom Filter (H2CDBF) for efficient vehicular content delivery in Vehicular Ad-hoc Networks (VANETs). The performance of the proposed H2CDBF is evaluated through an analytical model, and is compared to the proactive content discovery scheme, Bloom-Filter Routing (BFR).

Proactive Mobile Commerce Service using Differentiated Recommendation in Context-Aware Environment (컨텍스트 인식 한경에서 차별화된 권유를 사용한 프호액티브 모바일 커머스 서비스)

  • Kim, Sung-Rim;Kwon, Joon-Hee
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.67-72
    • /
    • 2006
  • According to the growth of wireless networks, and the spread of mobile devices, the provision of recommender services to help consumers find items to purchase with the use of the suited contexts is an important issue in mobile commerce. In this paper, we propose a proactive mobile commerce service that enables a consumer to obtain relevant information efficiently by using differentiated recommendation in context-aware environment. This paper describes the recommendation method and presents grocery shopping application prototype that implement the method. Several experiments are performed and the results verify that the proposed method's recommendation performance is better than other existing methods.

Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack (DDoS 공격에 대한 Pushback 기반 개선된 ICMP Traceback 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.85-97
    • /
    • 2004
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a "advanced ICMP Traceback" mechanism. which is based on the modified push back system. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source.ck source.

  • PDF

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.