• Title/Summary/Keyword: Smart On-Device

Search Result 1,691, Processing Time 0.032 seconds

Design and Implementation of Navigation Operating System APIs for Set-based POI Search Algorithm (집합 기반 POI 검색을 지원하는 내비게이션 운영체제 기능 설계 및 구현)

  • Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.269-274
    • /
    • 2015
  • As smart device companies such as Google or Apple develop competitive mobile-based automotive operating systems and navigation systems, the range of choice for users in such markets is expanding. Navigation systems equipped with mobile operating systems have increased convenience for users. However, since an API for the POI databases used in navigation systems doesn't exist, the number of applications using POI data is insufficient. In this paper, we designed and implemented system calls for navigation operating systems with a focus on POI search, in order to resolve such limitations. The system calls support set-based POI search functions, and therefore provides solutions to search performance degradation problems caused by false inputs. As a result of performance evaluation, not only did the search performance improve, but there was also no problem in applying APIs in applications.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

Situation-specific Task Control System based on Real-time Data Classification (실시간 데이터 분류 기반 상황별 작업 제어 시스템)

  • Song, Hyunok;Kim, Hakjin;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1771-1776
    • /
    • 2017
  • Recently, IoT(Internet of Things) has been utilized in various fields provide a service to users by configuring a smart environment in a particular place. However, since the existing system does not change the operation and the task of the device according to the change of the surrounding environment, the user must operate passively every time the environment and the situation change. In this paper, we propose Situation-specific Task Control System based on real-time data classification. Sensor data is sent to the server and classified into real-time and non-real-time data, and then inserted into the decision tree to identify tasks according to the situation. In addition, the danger situation is divided into two stages, such as gas leakage and fire, and a warning message is sent. Therefore, it is possible to reduce the waste of electric power and the occurrence of malfunction, and it can be expected that the service with increased work efficiency will be provided.

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

The traffic performance evaluation between remote server and mobile for applying to encryption protocol in the Wellness environment (웰니스 환경에서 암호화 프로토콜 적용을 위한 모바일과 원격 서버간 트래픽 성능 평가)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lee, Jae-Kwang
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.415-420
    • /
    • 2013
  • U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in order to look into the influence that the encryption module influences on the communication evaluation in the biometric information transmission gone to the smart mobile device and Hospital Information System.In the case of the U-WHS model, the client used the Objective-c programming language for software development of iOS Xcode environment and SEED and HIGHT encryption module was applied. In the case of HIS, the MySQL which is the Websocket API of the HTML5 and relational database management system for the client and inter-server communication was applied. Therefore, in WIFI communication environment, by using wireshark, data transfer rate of the biometric information, delay and loss rate was checked for the evaluation.

Are Lighter Smartphones Ergonomically Better?

  • Yoon, Jangwhon;Kim, Kisong;Yoon, Taelim
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.1
    • /
    • pp.11-18
    • /
    • 2015
  • Objective: The aim of this study was to understand the effects of phone weight on the typing performance and muscle recruitment in the neck and upper extremity while typing a text message with dominant hand. The iPhone4 and iPhone5 were compared due to their 28-gram differences in weight. Background: Too much use of a cellular phone can lead the musculoskeletal disorders in the upper extremity. Phone makers tend to make their new models bigger, lighter, faster and smarter. Method: Fourteen healthy volunteers without any history of neuromuscular disorders or ongoing pain who used their smartphone more than one year were recruited. A 112g phone (iPhone5) and a 142g phone (iPhone4) were used for typing the lyric of the Korean national anthem with their dominant hand. Typing duration, the typing error, the perceived fatigue, and preference was investigated. Muscle recruitment and the resting gap of neck (middle trapezius and levator scapula), shoulder (infraspinatus and mid deltoid), elbow (biceps brachii and brachioradialis), thumb (extensor and abductor policis brevis) were collected using surface electromyography. Typing error was counted and typing speed was calculated in characters per min. The data were analyzed using a paired t-test and chi-square (${\chi}^2$) analysis for the effects of phone weight on the typing performance parameters and muscle recruitment. Results: Typing text message with iPhone5 took longer but had less muscle recruitment in brachioradialis, and extensor policis brevis muscles. Lighter weight of iPhone5 made biceps brachii to rest less without increasing the mean %EMG. Conclusion/Application: Findings of this study can be valuable information for phone designers to develop more productive device and for smartphone users to prevent the musculoskeletal disorders in the upper extremities.

A Wireless ECG Measurement System based on the Zigbee USN (Zigbee USN 기반의 무선 ECG 측정 시스템)

  • Chang, Yun-Seok;Kim, Bo-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.195-198
    • /
    • 2011
  • Recent expansion of the ubiquitous environment and improvement of the USN give lots of U-healthcare systems. In this paper, we design and implement a wireless ECG measurement system that can send ECG signals among the sensors and collector. It can also give almost the same precision as a hospital ECG system with mobility. The most important fact of the mobile ECG system is the signal data connectivity among the sensors and device such as signal cables or wires. we can eliminate the signal cable through the Zigbee sender and collector via implementing Zigbee-SD communication system that can receive the ECG signal data. We also implement ECG app software on the smart phone that can analyze and show the data results directly. It can give lots of mobility and usability under ubiquitous environment and would be a very efficient wireless ECG system for U-healthcare service.

Hazard Identification and Risk Assessment for the Use of Passenger Portable Electronic Devices (승객 휴대 전자기기 사용에 대한 위해요인 식별 및 리스크 평가)

  • Lim, In-Kyu;Kim, Mu-Geun;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.4
    • /
    • pp.288-294
    • /
    • 2018
  • The entertainment system of the aircraft has changed its paradigm in the form of using passenger electronic devices instead of using a fixed monitor. This has simplified the on-board equipment while the risk of safety has increased with the electric charging of portable electronic devices. Unlike personal portable electronic devices that do not have a transmission function, the use of Wi-Fi enabled electronic devices(T-PED) is allowed and the battery is required to be charged in the cabin. In this study, we used the NASA Aviation Safety Reporting System to investigate the effects of changes in wireless environment and entertainment service. Based on this, we analyzed the risks of personal electronic devices by sharing event occurrence cases caused by in-flight electronic equipment or passenger portable electronic devices(especially smart phones) from the viewpoint of aircraft safety management. This analysis includes identification of potential hazards and risk assessment, and finally the strategies for risk mitigation for safe use of portable electronic devices are suggested.

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices (스마트 IoT 디바이스를 위한 경량 암호기반 종단간 메시지 보안 프로토콜)

  • Kim, Hee-jeong;Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1309-1317
    • /
    • 2018
  • Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.