• Title/Summary/Keyword: mobile computing

Search Result 1,907, Processing Time 0.032 seconds

SDN-Based Middlebox Management Framework in Integrated Wired and Wireless Networks (유무선 통합망에서의 SDN 기반 미들박스 관리 프레임워크)

  • Lee, Giwon;Jang, Insun;Kim, Wontae;Joo, Sukjin;Kim, Myungsoo;Pack, Sangheon;Kang, Chul-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.379-386
    • /
    • 2014
  • Recently, middleboxes play a key role in many network settings such as firewalls, VPN gateways, proxies, intrusion detection and prevention systems, and WAN optimizers. However, achieving the performance and security benefits that middleboxes offer is highly complex, and therefore it is essential to manage middleboxes efficiently and dynamically. In this respect, Software-Defined Networking (SDN) offers a promising solution for middlebox policy enforcement by using logically centralized management, decoupling the data and control planes, and providing the ability to programmatically configure forwarding rules. Also, cloud computing and distributed Network Function Virtualization (NFV) can enable to manage middleboxes more easily. We introduce SDN-based middlebox management framework in integrated wired and wireless networks and discuss the further issues.

Real-time Activity and Posture Recognition with Combined Acceleration Sensor Data from Smartphone and Wearable Device (스마트폰과 웨어러블 가속도 센서를 혼합 처리한 실시간 행위 및 자세인지 기법)

  • Lee, Hosung;Lee, Sungyoung
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.586-597
    • /
    • 2014
  • The next generation mobile computing technology is recently attracting attention that smartphone and wearable device imbedded with various sensors are being deployed in the world. Existing activity and posture recognition research can be divided into two different ways considering feature of one's movement. While activity recognition focuses on catching distinct pattern according to continuous movement, posture recognition focuses on sudden change of posture and body orientation. There is a lack of research constructing a system mixing two separate patterns which could be applied in real world. In this paper, we propose a method to use both smartphone and wearable device to recognize activity and posture in the same time. To use smartphone and wearable sensor data together, we designed a pre-processing method and constructed recognition model mixing signal vector magnitude and orientation pattern features of vertical and horizontal. We considered cycling, fast/slow walking and running activities, and postures such as standing, sitting, and laying down. We confirmed the performance and validity by experiment, and proved the feasibility in real world.

Data Dissemination Protocol based on Predictable Mobility of Sinks in Wireless Sensor Networks (무선 센서 네트워크에서 예측 가능한 싱크 이동성을 기반으로 한 데이타 전달 프로토콜)

  • Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Choi, Young-Hwan;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.276-280
    • /
    • 2008
  • Many dissemination protocols on the mobility support in wireless sensor networks have been designed based on the assumption that the movement trace of sinks, such as soldiers and fire fighters, is random. However, the mobility of the sinks in many applications, for example, the movement trace of a soldier on operation in a battle field, can be determined in advance. In this paper, we propose a Predictable Mobility-based Data Dissemination protocol that enables data to directly route from source nodes to moving sinks by taking into consideration predictable movement behavior of the sinks. We also show the superiority of the predictable mobility-based data dissemination protocol through the performance comparison with the random mobility-based data dissemination protocols.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

The SAFE Management System Model Based on Context Automatic Awareness

  • Han, Kook-Hee;Liu, Yiwen;Kwon, Young-Jik;Kang, Byeong-Do
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.87-96
    • /
    • 2007
  • Ubiquitous is a Latin-derived word meaning "to exist at any time and place" like water or air. In computing, the word "ubiquitous" indicates an environment in which users have access to networks without any limitation regarding computer networks or places. Important issues in building Ubiquitous Korea (U-Korea) are the social problems appearing with a rapid increase in the old age population. Nowadays, with the rise of the nuclear family, the increase in the number of elderly people living alone, and the change in the status of women, both wives and husbands are employed outside the home, and the relatives who would be responsible for supporting the elderly sometimes are on long or short business trips, and it happens that old people can't be looked after. Therefore the government developed a wireless paging system for the sick, disabled, old and weak so that when an emergency happens, by just simply dialing 119, an emergency aid center could take prompt action. However, the present wireless paging systems composing the under-layer of the emergency aid information system have some problems, such as, a lack of reliability, problems among terminals, mobile transmitters and receiving terminals, the users' refusal to admit the need for the system and poor operational skills, administrators' perfunctory management and checks, etc. On account of these problems, the system efficiency has degraded and therefore a system upgrade is necessary. In this paper, we attempt to evaluate the newly implemented SAFE119 system, a new wireless paging system seeking to correct the problems of the current system.

  • PDF

Degree of autonomy for education robot (교육 보조 로봇의 자율성 지수)

  • Choi, Okkyung;Jung, Bowon;Gwak, Kwan-Woong;Moon, Seungbin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.67-73
    • /
    • 2016
  • With the rapid development of mobile services and the prevalence of education robots, robots are being developed to become a part of our lives and they can be utilized to assist teachers in giving education or learning to students. This standard has been proposed to define the degree of autonomy for education robot. The autonomy is an ability to perform a given work based on current state and sensor value without human intervention. The degree of autonomy is a scale indicating the extent of autonomy and it is determined in between 1 and 10 by considering the level of work and human intervention. It has been adapted as per standard and education robots can be utilized in teaching the students autonomously. Education robots can be beneficial in education and it is expected to contribute in assisting the teacher's education.

Implementation of 6LoWPAN Testbed: Location Tracking Service Based on Google Map (구글맵을 이용한 위치 추적 서비스를 제공하는 6LoWPAN 테스트베드 구현)

  • Kim, Kye-Won;Seo, Jae-Wan;Hwang, Dae-Joon;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.13-26
    • /
    • 2009
  • Wireless Sensor Networks (WSNs) is one of the key technologies that make it possible to provide u-service in a ubiquitous society, however, it has disadvantages such as difficulty of managing sensor nodes and weaknesses of stability or mobility in large-scale WSNs. In order to solve these problems, 6LoWPAN that integrates with WSNs and IP networks has been studied widely. In this paper, we propose a Location Tracking Service Based on Google Map (LTSGM) system using 6LoWPAN. Since LTSGM system provides visual location information of sensor nodes through Google Map, it is possible to makes it easier than ever to manage sensor nodes in large-scale WSNs. Moreover, LTSGM can be used for various services such as applications for disaster or crime because it can trace the location of mobile nodes. Implementation of LTSGM system will be a test platform for 6LoWPAN.

  • PDF

Finding high utility old itemsets in web-click streams (웹 클릭 스트림에서 고유용 과거 정보 탐색)

  • Chang, Joong-Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.521-528
    • /
    • 2016
  • Web-based services are used widely in many computer application fields due to the increasing use of PCs and mobile devices. Accordingly, topics on the analysis of access logs generated in the application fields have been researched actively to support personalized services in the field, and analyzing techniques based on the weight differentiation of information in access logs have been proposed. This paper outlines an analysis technique for web-click streams, which is useful for finding high utility old item sets in web-click streams, whose data elements are generated at a rapid rate. Using the technique, interesting information can be found, which is difficult to find in conventional techniques for analyzing web-click streams and is used effectively in target marketing. The proposed technique can be adapted widely to analyzing the data generated in a range of computing application fields, such as IoT environments, bio-informatics, etc., which generated data as a form of data streams.

Design and Implementation of a HTMLtoVoiceXML Converter (HTMLtoVoiceXML 변환기의 설계 및 구현)

  • Choi, Hoon-il;Jang, Young-Gun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.559-569
    • /
    • 2001
  • It is possible to access web contents by mobile terminals and telephones due to the evolution of voice and VoiceXML technologies. Nevertheless, because these days most of all the web contents are constructed by HTML, it is impossible to access them by using the new technology. Therefore, to access the contents through voices requires the conversion of the web document from HTML to VoiceXML, but its manual conversion process should be involved additional time and expenditure. In this paper, we design and implement HTMLtoVoiceXML converter, suggest a system structure of it and propose a practical identification algorithm of meaningful fragmented group of contents to solve the problem. To test the performance and validity of the converter, we apply it to more than 400 web pages in Korean web sites, it works well except for web pages which involve invalid HTML codes.

  • PDF

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF