• Title/Summary/Keyword: Wireless Internet Device

Search Result 334, Processing Time 0.024 seconds

Development of a Framework for Improvement of Sensor Data Quality from Weather Buoys (해양기상부표의 센서 데이터 품질 향상을 위한 프레임워크 개발)

  • Ju-Yong Lee;Jae-Young Lee;Jiwoo Lee;Sangmun Shin;Jun-hyuk Jang;Jun-Hee Han
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.186-197
    • /
    • 2023
  • In this study, we focus on the improvement of data quality transmitted from a weather buoy that guides a route of ships. The buoy has an Internet-of-Thing (IoT) including sensors to collect meteorological data and the buoy's status, and it also has a wireless communication device to send them to the central database in a ground control center and ships nearby. The time interval of data collected by the sensor is irregular, and fault data is often detected. Therefore, this study provides a framework to improve data quality using machine learning models. The normal data pattern is trained by machine learning models, and the trained models detect the fault data from the collected data set of the sensor and adjust them. For determining fault data, interquartile range (IQR) removes the value outside the outlier, and an NGBoost algorithm removes the data above the upper bound and below the lower bound. The removed data is interpolated using NGBoost or long-short term memory (LSTM) algorithm. The performance of the suggested process is evaluated by actual weather buoy data from Korea to improve the quality of 'AIR_TEMPERATURE' data by using other data from the same buoy. The performance of our proposed framework has been validated through computational experiments based on real-world data, confirming its suitability for practical applications in real-world scenarios.

Service Differentiation in Ad Hoc Networks by a Modified Backoff Algorithm (애드혹 네트워크 상에서 backoff 알고리즘 수정에 의한 서비스 차별화)

  • Seoung-Seok Kang;Jin Kim
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.414-428
    • /
    • 2004
  • Many portable devices are coming to be commercially successful and provide useful services to mobile users. Mobile devices may request a variety of data types, including text and multimedia data, thanks to the rich content of the Internet. Different types of data and/or different classes of users may need to be treated with different qualities of service. The implementation of service differentiation in wireless networks is very difficult because of device mobility and wireless channel contention when the backoff algorithm is used to resolve contention. Modification of the t)mary exponential backoff algorithm is one possibility to allow the design of several classes of data traffic flows. We present a study of modifications to the backoff algorithm to support three classes of flows: sold, silver, and bronze. For example, the gold c]ass flows are the highest priority and should satisfy their required target bandwidth, whereas the silver class flows should receive reasonably high bandwidth compared to the bronze class flows. The mixture of the two different transport protocols, UDP and TCP, in ad hoc networks raises significant challenges when defining backoff algorithm modifications. Due to the different characteristics of UDP and TCP, different backoff algorithm modifications are applied to each class of packets from the two transport protocols. Nevertheless, we show by means of simulation that our approach of backoff algorithm modification clearly differentiates service between different flows of classes regardless of the type of transport protocol.

Research on WINC expansion numbers to improve the accessibility of mobile web service (모바일 웹 서비스 접근성 향상을 위한 WINC 확장 번호에 대한 연구)

  • Sim, Keun-Ho;Ko, He-Eae;Kim, Jong-Keun;Zhao, Meihua;Lim, Young-Hwan
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.23-32
    • /
    • 2011
  • For the past few years, unlike wireless widespread United States and Japan, expensive cost and platform of the mobile web carrier underground and self-centered made achievement of domestic mobile web market sluggish. Nowadays, more and more people pay attention to the mobile web service because of the increased quality of wireless internet, development of mobile device and variety of the flat-rate payment system. However, another big problem is that mobile web is too hard to use. Also, the poor content of mobile web service is an extremely serious problem. In this paper, we put forward a new method for easy to access mobile web service which is use WINC expansion numbers and users can use these numbers to shit their own website. Along with the benefits of purchase WINC number general users are able to make website and control their website at less time and energy.

An Efficient Spatial Index Technique based on Flash-Memory (플래시 메모리 기반의 효율적인 공간 인덱스 기법)

  • Kim, Joung-Joon;Sim, Hee-Joung;Kang, Hong-Koo;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.133-142
    • /
    • 2009
  • Recently, with the advance of wireless internet and the frequent use of mobile devices, demand for LBS(Location Based Service) is increasing, and research is required on spatial indexes for the storage and maintenance of spatial data to provide efficient LBS in mobile device environments. In addition, the use of flash memory as an auxiliary storage device is increasing in order to store large spatial data in a mobile terminal with small storage space. However, the application of existing spatial indexes to flash-memory lowers index performance due to the frequent updates of nodes. To solve this problem, research is being conducted on flash-memory based spatial indexes, but the efficiency of such spatial indexes is lowered by low utilization of buffer and flash-memory space. Accordingly, in order to solve problems in existing flash-memory based spatial indexes, this paper proposed FR-Tree (Flash-Memory based R-Tree) that uses the node compression technique and the delayed write operation technique. The node compression technique of FR-Tree increased the utilization of flash-memory space by compressing MBR(Minimum Bounding Rectangle) of spatial data using relative coordinates and MBR size. And, the delayed write operation technique reduced the number of write operations in flash memory by storing spatial data in the buffer temporarily and reflecting them in flash memory at once instead of reflecting the insert, update and delete of spatial data in flash-memory for each operation. Especially, the utilization of buffer space was enhanced by preventing the redundant storage of the same spatial data in the buffer. Finally, we perform ed various performance evaluations and proved the superiority of FR-Tree to the existing spatial indexes.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

5An Empirical Study on effect between Mobile Device Property and Customer Satisfaction (이동전화단말기 속성이 고객만족에 미치는 영향에 관한 실증적 연구)

  • Choi, Seung-Il;Kim, Dong-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1856-1862
    • /
    • 2010
  • Last rapidly changing mobile handset market in many industries, as well as market conditions affect the prevalence of various content types of consumer spending in general is affecting. Changes in mobile handset market by separating the various consumer-tier analysis, or differentiated in consumers' purchasing behavior are being reflected in the property analysis and overview of customer satisfaction can be assessed by measuring. These mobile devices and the purchase of the devices to investigate the tendency to analyze and weigh the various content industries, you can see how important one can be considered. The development of mobile communication systems and wireless internet and multimedia applications can lead the industry accelerated. In this study, tried to investigate that the mobile communication systems in consideration of the special form of mobile handsets, and customer satisfaction of mobile phone handsets, and the relationship between customer loyalty. Outcome of this study, the mobile properties and the mobile handset brand, price, design and related details to be statistically significant variables were analyzed. In this study, the characteristics of future mobile handset market with a wide range of content-based guidelines for the development of the industry is expected to be able to provide.

Channel assignment for 802.11p-based multi-radio multi-channel networks considering beacon message dissemination using Nash bargaining solution (802.11p 기반 다중 라디오 다중채널 네트워크 환경에서 안전 메시지 전송을 위한 내쉬 협상 해법을 이용한 채널할당)

  • Kwon, Yong-Ho;Rhee, Byung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.63-69
    • /
    • 2014
  • For the safety messages in IEEE 802.11p vehicles network environment(WAVE), strict periodic beacon broadcasting requires status advertisement to assist the driver for safety. WAVE standards apply multiple radios and multiple channels to provide open public road safety services and improve the comfort and efficiency of driving. Although WAVE standards have been proposed multi-channel multi-radio, the standards neither consider the WAVE multi-radio environment nor its effect on the beacon broadcasting. Most of beacon broadcasting is designed to be delivered on only one physical device and one control channel by the WAVE standard. also conflict-free channel assignment of the fewest channels to a given set of radio nodes without causing collision is NP-hard, even with the knowledge of the network topology and all nodes have the same transmission radio. Based on the latest standard IEEE 802.11p and IEEE 1609.4, this paper proposes an interference aware-based channel assignment algorithm with Nash bargaining solution that minimizes interference and increases throughput with wireless mesh network, which is deigned for multi-radio multi-cahnnel structure of WAVE. The proposed algorithm is validated against numerical simulation results and results show that our proposed algorithm is improvements on 8 channels with 3 radios compared to Tabu and random channel allocation algorithm.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Developing of VOC sensor Signal Processing System using Embedded System on the Web Environment (웹 환경에서 임베디드 시스템을 이용한 VOC센서 원격 신호 모니터링 시스템 개발)

  • Park, Jin-Kwan;Lim, Hae-Jin;Nam, Si-Byung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.375-383
    • /
    • 2011
  • Recent advances in digital technology and diversified internet services have resulted in a rapid growth of research on monitering systems using embedded web servers in USN systems. In designing USN systems equipped with wireless sensor modules requiring extra power for heating sensors for their appropriate operations, excessive power consumption introduces inefficiency to the entire system. In this paper, using embedded systems in web environment, we develop a remote-monitoring system with VOC (Volatile Organic Compounds) sensor signal, and propose a real time method of processing sensor-data streams by way of the serial bus from the sensor module in the USN system. The proposed system has an advantage of monitering the harmful gases on real-time basis and can be used semi-permanently by providing the sensor module with power through the serial bus. The harmful gas to be detected by the VOC sensor module is Toluene and the sensor module is composed of TGS-2602 VOC(Volatile Organic Compounds) sensors of FIGARO. The detected signal is transferred to the embedded web server using the RS-485 serial communication device. The proposed remote VOC monitering system is designed to coordinate in such a way that the VOC sensor module and embedded web server (EMPOS-II) work together effectively for real time monitering of harmful gases on the web at any places where the internet is connected.

A Study on the Relationship between Digital Informatization Level and Policy Activity Satisfaction Level of Disabled Persons (장애인들의 디지털정보화 수준과 정책활동 만족도 수준과의 관계에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.23-28
    • /
    • 2018
  • In recent years, activities have become more important in political activities and participation in policies. Therefore, the level of digital informatization can affect the participation in policy in the online environment. In this study, we examined how the policy activities of the disabled have a relationship with the informatization level. To this end, we analyzed the relationship between the level of digital informatization and the level of satisfaction with policy activities based on the results of the digital divide survey of 2017. The results of this study are as follows: First, it shows that the disabled people have a positive relationship with the digital access and policy activity satisfaction levels such as the possession of wired / wireless information devices and Internet accessibility. Second, it is found that digital information capacity level and income level such as PC utilization ability and mobile digital device utilization ability have a positive (+) relationship. Third, as the level of digital information utilization such as wired and mobile Internet usage increased, the level of satisfaction with policy activities also increased positively. This suggests that the government needs various information policy to increase the level of digital informatization of the disabled.