• Title/Summary/Keyword: internet infrastructure

Search Result 902, Processing Time 0.035 seconds

DTN Routing for Improving Transmission Efficiency in a Destroyed Environment of Communication Infrastructure (통신 인프라가 파괴된 환경에서 전송 효율 향상을 위한 DTN 라우팅)

  • Jang, Sung-Jin;Lee, Won-Hui
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.37-41
    • /
    • 2020
  • In this paper, we propose a routing method to improve the message transmission efficiency between DTN nodes in an environment where communication infrastructure in the city is destroyed. In the situation where a certain size of communication infrastructure can not function, the message transmission process between the nodes is explained. An effective routing method for improving reliability between nodes was proposed and evaluated using DTN simulator. The routing algorithm with improved reliability in urban areas was confirmed by simulation considering the message transmission relationship between nodes on uncertain path due to the destruction of communication infrastructure. We used a routing algorithm that includes all the contact information the node has experienced in the past. In the simulation of delivering messages in a situation where the communication infrastructure was destroyed, relatively better results were obtained than the existing routing algorithm.

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

A study on the evolution of post-smartphone technologies in the 5G technology environment

  • Kwak, Jeong Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1757-1772
    • /
    • 2020
  • As the smartphone market becomes saturated, an innovative device equipped with new features is expected to appear soon in mobile communications. In particular, various possibilities were raised regarding the alternative technologies that can develop post-smartphones, which are differentiated from the current smartphones, as Korea commercialized the 5G infrastructure for the first time in the world. Under these circumstances, the Korean government announced the "5G+ Strategy for Realizing Innovative Growth" in April 2019, vowing to build an innovative industrial ecosystem quickly while creating various convergence services based on the 5G infrastructure. As described above, the policy importance of the alternative technologies that will develop post-smartphones is increasing, but the theoretical study on the technology evolution of post-smartphones has not been systematically conducted until now. This study reviewed the alternative technologies that can develop post-smartphones through documentary research, and data mining analysis was performed on the research result using actual data. The policy priority was also set quantitatively for the alternative technologies of post-smartphones in order to determine the alternative post-smartphone technology that the government should focus on given the constraint of limited resources. As a results, autonomous vehicle(43.68%) was found to be most important, followed by artificial intelligence(17.4%) and Internet of Things(13.1%), among alternative technologies that could develop into the post-smartphone.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.

Internet Information Service using Telephony and Fax, ITC-CSCC’2000

  • Jang, Young-Gun;Cho, Kyoung-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.691-694
    • /
    • 2000
  • This paper is addressed to Internet telephony based service implementation. It describes an implementation method which uses ARS as a gateway which combines Internet and traditional public switched telephone network for Internet information service using telephony and fax, is different to traditional Internet telephony which provide enhanced speech quality and low cost functionality. This method allows telephony and/or fax user to get Internet information without additional Internet bill, Internet infrastructure and low connection quality from low signal bandwidth connected him. Implemented system is useful to a special kind information service such as climate information of Korea etc and simpler than WAP based service as for wireless mobile telephony user. We implement job opportunity information and advertisement service supported by Home page of Choong Book Small & Medium Business Administration and e-mail service supported by Korean Society for Rehabilitation of persons with Disabilities to demonstrate the system ability. As a result of test implementation, this service system works good fur blind persons and graduated persons without job, is expected to apply for special Internet information provider via Voice and Fax.

  • PDF

Impact Analysis of Internet Addiction on Students' Academic Performance

  • Seong-Hoon Lee;Dong-Woo Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.248-253
    • /
    • 2023
  • Nowadays, with the spread of the Internet and the emergence of high-performance computers and various peripheral devices, our society is undergoing great changes. In the field of education, various types of education using smart education infrastructure are being conducted. The spread of the Internet and the development of various devices have problems that can lead to addiction due to excessive Internet use. Most of the problems that appear in adolescence are immersed in games, which can affect academic achievement. Therefore, in this study, the effect of excessive Internet use on students' academic achievement was studied. The survey for the study was conducted through a questionnaire survey, and the subjects of the survey were high school students majoring in humanities. As a result, the relationship between academic achievement and Internet addiction was low in the middle, upper, and lower groups in the general user group. Also, in the highrisk user group, it appeared high in the order of middle, low, and high.

Result of the 1st Worldwide Internet Voting System

  • Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.219-224
    • /
    • 2002
  • In this paper, after designing an efficient and secure Internet voting protocol (called as “votopia”) based on modified Ohkubo et. al.'s scheme [8] under Public Key Infrastructure (PKI), we have implemented this system and served via the Internet to select the Most Valuable Players and Best Goal Keepers of 2002 FIFA World Cup Korea/Japan$\^$TM/. The sketch of voting protocol, practical implementation and voting result arc described.

  • PDF

Routing and Forwarding with Flexible Addressing

  • Poutievski, Leonid B.;Calvert, Kenneth L.;Griffioen, James N.
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.383-393
    • /
    • 2007
  • We present a new network-layer architecture that provides generalized addressing. The forwarding infrastructure is independent of the addressing architecture, so multiple addressing architectures can be used simultaneously. We compare our solution with the existing Internet protocols for unicast and multicast services, given the address assignment used in the Internet. By means of an extensive simulation study, we determine the range of parameters for which the overhead costs(delay, state, and network load) of our service are comparable to those of the Internet.

A Study on Proper Internet Bandwidth Estimation for Elementary & Secondary Schools (초·중등학교를 위한 적정 인터넷 대역폭 산정 방안 연구)

  • Park, Hyeong Yong;Kim, Sung Jo
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.5
    • /
    • pp.47-55
    • /
    • 2008
  • The Internet is one of the most infrastructure for information technology in school education. Providing the Internet with a proper bandwidth is an important element for efficient school education for information technology, especially because several instructional models based on new Internet technologies are under development. To support these instructional models, it is important for the schools to provide the proper Internet bandwidth wherever necessary. In this paper, the amount and pattern of internet usage in school were analyzed. Based on this analysis, we propose how to figure out a proper bandwidth for a different ladder of schools.

  • PDF