• Title/Summary/Keyword: network service agent

Search Result 210, Processing Time 0.026 seconds

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

An Optimal System Configuration Using Intelligent Agent on Ubiquitous Environment (유비쿼터스 환경에서 지능 에이전트를 이용한 최적 시스템 구성)

  • Kim Doo-Ywan;Roh Eun-Young;Chung Hwan-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.567-572
    • /
    • 2005
  • Recently, owing to miniaturization of computer and popularization of internet, ubiquitous computing is attracting considerable attention. In ubiquitous environment, user can receive desired information service anywhere, any time. With the advent of ubiquitous age through popularization of internet, it becomes important how to provide user with ubiquitous environment, and what and how to provide to user. In this paper, method to automatically select device most suitable for user in ubiquitous environment is offered. search agents search peripherals, make a list by function, and transmit to serve. Serve learn the transmitted information through intelligent system. If user input information in the form of linguistic according to the list, serve select device suitable for work environment, and compose the system through IP address. This was realize through practical example, experimented and confirmed.

Design of Mobile Agent Management System based on OSGi (OSGi 기반 이동 에이전트 관리 시스템 설계)

  • Lee, Seung-Keun;Kim, In-Tae;Kim, Tae-Gan;Lee, Kyoung-Mo;Rim, Ki-Wook;Lee, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.41-48
    • /
    • 2005
  • OSGi(Open Service Gateway Initiative) offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances, and networked devices. The OSGi framework supports a remote installation of a bundle, which is a unit that installs and deploys services. However, in order for the bundle in execution to migrate, a specific form of bundle such a mobile agent, is needed one which is able to move through a heterogeneous network. This paper proposes a method that can manage bundles like these dynamic agents, in order to ensure the mobility of entities in multiple OSGi framework environments. For our purposes, we have designed the mobile agent management system for managing the lifecycle and mobility of agents in the OSGi framework. The mobile agent management system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage autonomous mobile services. As a result, mobility in a pervasive environment will be supported more efficiently.

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

A Design of P2P Cloud System Using The Super P2P

  • Jung, Yean-Woo;Cho, Seongsoo;Lee, Jong-Yong;Jeong, KyeDong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.42-48
    • /
    • 2015
  • Generally, the current commercial cloud system is hosted by the centralization large datacenter. However, the other clouding forms existed and one of them is the P2P cloud. The P2P Cloud is a distributed systems, is freedom to join and leave and is possible to provide the IaaS. Commonly, P2P Cloud System is based on Pure-P2P System. Since a number of connection paths exist, it has a high reliability and easily scalability of the network. However, there are disadvantages of the slow rate of route because of looking up the all peers in order to search for the peer. In this paper, it proposes the P2P cloud system based on super-peer P2P. Super-peer P2P system has fast routing time, because of searching for cluster unit and it also can has high reliability and high scalability. We designs the super Peer cloud service and proposes the system model and Resource Allocation Algorithm for IaaS in Super peer P2P environment.

Design and Implementation of a Traceback System based on Multi-Agents (다중 에이전트를 이용한 역추적 시스템 설계 및 구현)

  • 정종민;이지율;이구연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.3-11
    • /
    • 2003
  • It is very important to detect and remove original sources of various attacks through networks. One of the effective method to detect the sources is traceback systems. In this paper, we design and implement an agent-based traceback system that does not require the reaction of routers and administrators and does not need numerous log data. In the design, we introduce a traceback server and traceback agents in each network Using sniffing and spoofing, the server transmits a packet with a specific message. The agents detect the packet and provide the information for the server to trace back the original source.

A study on the Success Factors and Strategy of Information Technology Investment Based on Intelligent Economic Simulation Modeling (지능형 시뮬레이션 모형을 기반으로 한 정보기술 투자 성과 요인 및 전략 도출에 관한 연구)

  • Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.35-55
    • /
    • 2013
  • Information technology is a critical resource necessary for any company hoping to support and realize its strategic goals, which contribute to growth promotion and sustainable development. The selection of information technology and its strategic use are imperative for the enhanced performance of every aspect of company management, leading a wide range of companies to have invested continuously in information technology. Despite researchers, managers, and policy makers' keen interest in how information technology contributes to organizational performance, there is uncertainty and debate about the result of information technology investment. In other words, researchers and managers cannot easily identify the independent factors that can impact the investment performance of information technology. This is mainly owing to the fact that many factors, ranging from the internal components of a company, strategies, and external customers, are interconnected with the investment performance of information technology. Using an agent-based simulation technique, this research extracts factors expected to affect investment performance on information technology, simplifies the analyses of their relationship with economic modeling, and examines the performance dependent on changes in the factors. In terms of economic modeling, I expand the model that highlights the way in which product quality moderates the relationship between information technology investments and economic performance (Thatcher and Pingry, 2004) by considering the cost of information technology investment and the demand creation resulting from product quality enhancement. For quality enhancement and its consequences for demand creation, I apply the concept of information quality and decision-maker quality (Raghunathan, 1999). This concept implies that the investment on information technology improves the quality of information, which, in turn, improves decision quality and performance, thus enhancing the level of product or service quality. Additionally, I consider the effect of word of mouth among consumers, which creates new demand for a product or service through the information diffusion effect. This demand creation is analyzed with an agent-based simulation model that is widely used for network analyses. Results show that the investment on information technology enhances the quality of a company's product or service, which indirectly affects the economic performance of that company, particularly with regard to factors such as consumer surplus, company profit, and company productivity. Specifically, when a company makes its initial investment in information technology, the resultant increase in the quality of a company's product or service immediately has a positive effect on consumer surplus, but the investment cost has a negative effect on company productivity and profit. As time goes by, the enhancement of the quality of that company's product or service creates new consumer demand through the information diffusion effect. Finally, the new demand positively affects the company's profit and productivity. In terms of the investment strategy for information technology, this study's results also reveal that the selection of information technology needs to be based on analysis of service and the network effect of customers, and demonstrate that information technology implementation should fit into the company's business strategy. Specifically, if a company seeks the short-term enhancement of company performance, it needs to have a one-shot strategy (making a large investment at one time). On the other hand, if a company seeks a long-term sustainable profit structure, it needs to have a split strategy (making several small investments at different times). The findings from this study make several contributions to the literature. In terms of methodology, the study integrates both economic modeling and simulation technique in order to overcome the limitations of each methodology. It also indicates the mediating effect of product quality on the relationship between information technology and the performance of a company. Finally, it analyzes the effect of information technology investment strategies and information diffusion among consumers on the investment performance of information technology.

Mobile Remote Healthcare in Ubiquitous Computing Environments (유비쿼터스 환경에서 모바일을 이용한 원격 헬스케어)

  • Kang, Eun-Young;Im, Yong-Soon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.55-61
    • /
    • 2008
  • In this paper, we proposed a multi-agent based healthcare system (MAHS) which is the combination of medical sensor module and wireless communication technology. This MAHS provides wide services to mobile telemedicine, patient monitoring, emergency management, doctor's diagnosis and prescription, patients and doctors, information exchange between hospital workers in a long distance. Also, MAHS is connected to Body Area Network (BAN) and a doctor and hospital workers. In addition, we designed and implemented extended JADE based MAHS that reduces hospital server's burden. Agents gather, integrate, and deliver the collected patient's information from sensor, and provide presentation in healthcare environment. Proposed MAHS has advantage that can handle urgent situation in the far away area from hospital like Islands through PDA and mobile device. In addition, by monitoring condition of patient (old man) in a real time base, it shortens time and expense and supports medical service efficiently.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Online Games Traffic Multiplexing: Analysis and Effect in Access Networks

  • Saldana, Jose;Fernandez-Navajas, Julian;Ruiz-Mas, Jose;Casadesus, Luis
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2920-2939
    • /
    • 2012
  • Enterprises that develop online games have to deploy supporting infrastructures, including hardware and bandwidth resources, in order to provide a good service to users. First Person Shooter games generate high rates of small UDP packets from the client to the server, so the overhead is significant. This work analyzes a method that saves bandwidth, by the addition of a local agent which queues packets, compresses headers and uses a tunnel to send a number of packets within a multiplexed packet. The behavior of the system has been studied, showing that significant bandwidth savings can be achieved. For certain titles, up to 38% of the bandwidth can be saved for IPv4. This percentage increases to 54% for IPv6, as this protocol has a bigger overhead. The cost of these bandwidth savings is the addition of a new delay, which has an upper bound that can be modified. So there is a tradeoff: the greater the added delays, the greater the bandwidth savings. Significant reductions in the amounts of packets per second generated can also be obtained. Tests have been deployed in an emulated scenario matching an access network, showing that if the number of players is big enough, the added delays can be acceptable in terms of user experience.