• Title/Summary/Keyword: things

Search Result 5,701, Processing Time 0.036 seconds

Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks

  • Zhao, Shasha;Wang, Fei;Ning, Yueqiang;Xiao, Yi;Zhang, Dengying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4611-4624
    • /
    • 2020
  • Future network scenario will be a heterogeneous wireless network environment composed of multiple networks and multimode terminals (MMT). Seamless switching and optimal connectivity for MMT among different networks and different services become extremely important. Here, a vertical handoff algorithm combined an improved entropy weighting method based on grey relational analysis (GRA) is proposed. In which, the improved entropy weight method is used to obtain the objective weights of the network attributes, and GRA is done to rank the candidate networks in order to choose the best network. Through simulation and comparing the results with other vertical handoff decision algorithms, the number of handoffs and reversal phenomenon are reduced with the proposed algorithm, which shows a better performance.

An Analysis on the Changes of Logistics Industry using Internet of Things

  • Lee, Seong-Hoon
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • The Internet of Things is one of the most important technologies that can realize a super connective society. Efforts are being made to use the Internet in most areas of our society. In this flow, one of the interesting things that we see in our lives is the change in the logistics industry. The key to change is that it is likely to evolve continuously as it pursues unmanned activities. In this study, we examined the change of the logistics industry using the Internet of things. It also describes the necessary processes for efficient operation of the unmanned market

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

A Study on Internet of Things in IT Convergence Period (융복합 시대의 사물인터넷에 관한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.267-272
    • /
    • 2014
  • Many people have used a internet at various purposes. Internet have been used the optimal space to share informations by information producer or consumer. But, recently, through the development of networks and devices, The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The Internet of Things will enable forms of collaboration and communication between people and things, and between things themselves, hitherto unknown and unimagined. This paper presents various meanings of IoT, and describe the electronic and car domain of internet of things.

A Study on Purchase Behavior for the School Things of the Middle School Students in the Rural Area (농촌지역 중학생의 학용품 구매 행동에 관한 연구)

  • 신순덕;안영희
    • Journal of Korean Home Economics Education Association
    • /
    • v.9 no.1
    • /
    • pp.161-177
    • /
    • 1997
  • The purpose of this study is to understand middle school students’behavior of purchasing school things at rural area and to provide basic data which is necessary for consumer education to help them with more reasonable purchasing behavior. The results of this study were as follows; 1) The level of purchasing behavior for the school things of middle school students at rural area is 3.15 out of perfect Score 5, and shows medium level. Middle school students’behavior of purchasing school things at rural area showed significant difference in social demographic variables such as sex, grade and keeping a record money spending. 2) 75.5% of middle school student’s consuming experiences was show to be on a midium. According to the results of this study, it was showed the more consuming experience they had, the more reasonable purchasing behavior they did. There was significant positive correlation between consuming experiences and behavior of purchasing school things. 3) Middle school students at rural area were highly realizing the necessity for consuming education both at home(91%) and at school(93.9%). Also, there was a significant positive correlation between the necessity for consumer education and behavior of purchasing school things.

  • PDF

Improved authentication mechanism of the RADIUS protocol in the Internet of Things (사물인터넷 환경에서 RADIUS 프로토콜의 향상된 인증기법)

  • Kim, Young-Se;Han, Keun-hee;Kim, Kee-cheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • The IOT environment, people connected to the network, object, everything such as space (Things) generates data in real time. The information between the object collecting, sharing, are utilized. Currently health care, research in various fields such as smart home has been promoted. Also appeared concepts emphasized all things(IOE) Internet connection between the geographic space and the Internet. Human, while important connections between the objects, such as objects, studies of efficient and secure authentication technologies have been developed. In this paper, we propose a RADIUS (Remote Authentication Dial In User Service) protocol for improved mutual authentication between each object in the IOT environment.

A Study on the Efficiency Improving of Communication Protocols on the Internet of Things. (사물인터넷 통신프로토콜 성능 개선 연구)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Soh, Woo-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.427-430
    • /
    • 2016
  • Internet of Things is one of the technologies that become a hot topic in recent years, is a technology that connects objects with wired or wireless network and share a information between objects. Gartner predicts that spread rapidly devices for end users, also increase revenue from enterprise equipment through the Annual 'Internet of Things' reports. By this trend, Internet of Things is becoming the platform of various kinds, the platform and the protocol for that have been developed a new technique. In this paper, we compared the performance of the communication protocol between devices in the Internet of Things, and propose a way to improve performance efficiency.

  • PDF

OAuth-based User Authentication Framework for Internet of Things (IoT 환경에 적합한 OAuth 기반의 사용자 인증 프레임워크)

  • Yu, Sung-Tae;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.8057-8063
    • /
    • 2015
  • It is expected that internet of things can be used for various fields such as smart home, smart building and smart city as the representative case of ICT that sensor, communication and interface technologies operate organically and the researches of the technologies regarding internet of things are being carried out in each countries worldwide. However, many problems rise against internet of things continuously in respect of security. Among them, the problem of privacy is the one that should be solved definitely regarding internet of things. If user data does not remain during the process of user authentication, such the privacy problem can be solved. In this paper, we propose the framework of user authentication based on OAuth that is suitable for the environment of internet of things that can solve privacy problem and analyze its security.

A Method of Test Coverage Measurement Based on BitTorrent for Internet of Things Environment (사물 인터넷 환경을 위한 BitTorrent 알고리즘 기반의 테스트 커버리지 측정기법)

  • Ryu, Hodong;Lee, Woo Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.365-370
    • /
    • 2014
  • Although Internet of Things already became a new paradigm on service on network, we should pay more effort for studying about its testing method, since humans, things and environments in IoT are connected to each other without any restrictions. Earlier researches based on emulators showed that such virtual devices on emulators had unavoidable gap between them and real things. Furthermore, growth of connection complexity between the devices and loosing of restrictions make the gap wider. Accordingly, in this paper, we suppose a method of test coverage measurement based on BitTorrent for IoT environment. It has cooperation features among homogeneous devices with avoiding the overlapping on each part of whole test process.

HI superprofiles of galaxies from THINGS and LITTLE THINGS

  • Kim, Minsu;Oh, Se-Heon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.68.3-69
    • /
    • 2021
  • We present a novel profile stacking technique based on optimal profile decomposition of a 3D spectral line data cube, and its performance test using the HI data cubes of sample galaxies from HI galaxy surveys, THINGS and LITTLE THINGS. Compared to the previous approach which aligns all the spectra of a cube using their central velocities derived from either moment analysis, single Gaussian or hermite h3 polynomial fitting, the new method makes a profile decomposition of the profiles from which an optimal number of single Gaussian components is derived for each profile. The so-called superprofile which is derived by co-adding all the aligned profiles from which the other Gaussian models are subtracted is found to have weaker wings compared to the ones constructed in a typical manner. This could be due to the reduced number of asymmetric profiles in the new method. A practical test made on the HI data cubes of the THINGS and LITTLE THINGS galaxies shows that our new method can extract more mass of kinematically cold HI components in the galaxies than the previous results. Additionally, we fit a double Gaussian model to the superprofiles whose S/N is boosted, and quantify not only their profile shapes but derive the ratio of the Gaussian model parameters, such as the intensity ratio and velocity dispersion ratio of the narrower and broader Gaussian components. We discuss how the superprofile properties of the sample galaxies are correlated with their other physical properties, including star formation rate, stellar mass, metallicity, and gas mass.

  • PDF