• Title/Summary/Keyword: Real Time Server

Search Result 1,138, Processing Time 0.029 seconds

A Study on the Crime Prediction System using Big Data (빅데이터를 이용한 범죄 예측 시스템에 관한 연구)

  • Han, Sang-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1113-1122
    • /
    • 2020
  • Recently, as violent crimes of crime without reason (Korea : Do not ask), women and the elderly are getting serious. In the existing system, many CCTVs are installed, but it is difficult to prevent crime due to only follow-up measures after a crime occurs. This device prevents crime through this device for incidents in shaded areas and closed spaces such as apartments and buildings. To do this, we research this technology to develop products and software. It sends an alarm signal using communication technology to a specific place where you want to receive an event of an alarm or a CCTV device operated using image analysis big data technology and convergence sensor technology for a specific target of the behavior expected to be a crime or movement. Develop the device. This development device researches and develops this device and supplies low-cost devices to consumers, which is used as a device that predicts the occurrence of crime in advance, processes it as an alarm signal in real time, and transmits it, and constitutes a standalone device and a server. Will provide the device to be connected.

Implementation of a Sensor Network in a Welding Workplace Based on IoT for Smart Shipyards (스마트 조선소를 위한 사물인터넷 기반 용접 작업장 센서네트워크 구축)

  • Kim, Hyun Sik;Lee, Gi Seung;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.433-439
    • /
    • 2021
  • In this paper, we propose a method to implement an IoT-based sensor network for each workplace of a shipyard. Here, at the most common welding workplace in shipyards, the shipbuilding blocks are used as a communication medium to transmit information such as the worker's location, welding progress, and working hour to a server using LoRa and powerline communication. To achieve the data communication, inductive couplers and hybrid modems have been manufactured and installed on wire feeders and pin jigs to establish a sensor network. As a result of field test, the proposed system shows a success rate of data transmission and a rate of successful recognition of worker's location of about 98% or more. In addition, the process management system platform can record and display the work process data generated at the field in real time. The proposed system can be a starting point for enhancing the competitiveness of Korean shipbuilding industry through the establishment of a smart shipyard.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

Design of Fine Dust Monitoring System based on the Internet of Things (사물인터넷 기반 미세먼지 모니터링 시스템 설계 및 구현)

  • Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.14-26
    • /
    • 2022
  • Recently, according to the severity of air pollution, interest in air pollution is increasing. The IoT based fine dust monitoring system proposed in this paper allows the measurement and monitoring of fine dust, volatile organic compounds, carbon dioxide, etc., which are the biggest causes affecting the human body among air environmental pollution. The proposed system consisted of a device that measures atmospheric environment information, a server system for storing and analyzing measured information, an integrated monitoring management system for administrators and smart phone applications for users to enable visualization analysis of atmospheric environment information in real time. In addition, the effectiveness of the proposed fine dust monitoring system based on the Internet of Things was verified by using the response speed of the system, the transmission speed of the sensor data, and the measurement error of the sensor. The fine dust monitoring system based on the Internet of Things proposed in this paper is expected to increase user convenience and efficiency of the system by visualizing the air pollution condition after measuring the air environment information with portable fine dust measuring device.

Development of Medical Electric Scooter Sharing Platform for the Transportation Vulnerable (교통 약자를 위한 전동차 공유 플랫폼 개발)

  • Joo, Jong-Yul;Song, Hwa-Jung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1323-1328
    • /
    • 2021
  • In this paper, we present a medical electric scooter sharing platform for the transportation vulnerable who are experiencing difficulties and inconveniences in moving. The proposed medical electric scooter sharing platform for the transportation vulnerable includes basic mobile rental, return, and functions that incorporate the IOT technology of the currently operating personal mobility sharing platform. The safety function has been strengthened. The medical electric scooter sharing platform for the transportation vulnerable stores driving data on the server in real time through GPS, and strengthens the alarm and call function in advance of an accident to enable rapid SOS processing. By making the quick contact and responding to the situation, people with disabilities can drive safely and comfortably.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

IoT Platform System for Electric Fire Prediction and Prevention (전기화재 예측 및 예방을 위한 IoT 플랫폼 시스템)

  • Yang, Seungeui;Lee, Sungock;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.223-229
    • /
    • 2022
  • During the winter season, when the weather gets colder every year, electricity consumption increases rapidly. The occurrence of fires is increasing due to a short circuit in electrical facilities of buildings such as markets, bathrooms, and apartments with high population density while using a lot of electricity. The cause of these short circuit fires is mostly due to the aging of the wires, the usage increases, and the excessive load cannot be endured, and the wire sheath is melted and caused by nearby ignition materials. In this paper, the load and overheat generated in the electric wire are measured through a complex sensor composed of an overload sensor, a VoC sensor, and an overheat sensor. Based on this, big data analysis is carried out to develop a platform capable of predicting, alerting, and blocking electric fires in real time, and a simulator capable of simulated fire experiments.

A Study on the Establishment of Metaverse-based Police Education and Training Model (메타버스 기반 경찰 교육훈련모델 구축 방안에 관한 연구)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.487-494
    • /
    • 2022
  • Purpose: This study proposes a Metaverse-based police education and training model that can efficiently improve the performance of various police activities according to changes in the environment of the times. Method: The structure of this system can generate Avatar Controller expressed using HMD and haptic technology, access the Network Interface, and educate and train individually or on a team basis through the command control module, education and training content module, and analysis module. Result: In the proposed model of this study, the command and control module was incorporated into individual or team-based education and training, enabling organic collaborative training among team members by monitoring the overall situation of terrorism or crime in real time. Conclusion: Metaverses-based individual or team-based police education and training can provide a more efficient and safe education and training environment based on immersion, interaction, and rapid judgment in various situations.

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.