• Title/Summary/Keyword: ubiquitous devices

Search Result 586, Processing Time 0.023 seconds

Constructivist Research in Smart Tourism

  • Hunter, William Cannon;Chung, Namho;Gretzel, Ulrike;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.103-118
    • /
    • 2015
  • Smart tourism is a social phenomenon arising from the convergence of information technology with the tourism experience. New ways of doing business, new patterns of experience and new problems concerning tourism destination image management and marketing are emerging due to the ubiquitous presence and influence of the internet and mobile devices. New conceptual tools are also available to enable researchers to further understand the social implications as well as the practical implementation of these new virtual and augmented smart tourism ecosystems. To this effect this paper introduces the constructivist paradigm and associated research methodologies as another toolbox for interpreting how smart tourism works as a form of soft power. The implications revealed by constructivism are that through smart tourism ecosystems, destination commodification and commoditization, experience and image formation are increasingly self-perpetuating, autonomous and organic social constructions. Researchers in information technology can use constructivist research to further explore these dynamic developments in smart tourism.

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.

An Intelligent P2P Mobile Agent for sharing Users' Context and Service Information (사용자 상황 인식 정보 및 서비스 정보의 공유를 위한 지능형 P2P 모바일 에이전트)

  • Yun Hyo-Gun;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.538-544
    • /
    • 2005
  • The service supporting structure for users in ubiquitous computing environment requires technology that divides efficiently resources shared around users according to users context. So, needs research that analyze service items and resources that is offered according to users context information and divide adaptively necessary service and resources. Therefore, in this paper we proposes an intelligent P2P mobile agent that recognizes users context using portable mobile devices and is available for intelligent service by sharing serviced item according to users' context. The proposed structure removes monopoly for specific resources, and supports effective users context-awareness and service.

Data Processing Framework Design by Bluetooth (블루투스를 이용한 데이터 처리 프레임워크 설계)

  • Nam, Yong-su;Kim, Tae Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.455-458
    • /
    • 2009
  • Bluetooth technology has been applied to mobile device, personal computers, peripherals, information and variety of consumer electronics. Not also the original Bluetooth technology must be especially focused in the application of mobile phone but applications such as wireless headsets and dial-up networking may be increased. However Bluetooth is so only focused to wireless headset application that the various software applications are presently ignored. In this paper, we propose the framework design to implement Bluetooth profile for kiosk servers, which can be used in Theater, train station, bank, government and public offices. Then mobile devices capable of processing user's input/output can be remotely accessed in these servers by using Bluetooth module and AP, although Kiosk servers are only processed user input data.

  • PDF

A Design and Implementation of Synchronization System for Mobile u-GIS (모바일 u-GIS를 위한 동기화 시스템 설계 및 구현)

  • Kim, Hong-Ki;Kim, Dong-Hyun;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.588-591
    • /
    • 2009
  • In ubiquitous computing GIS services, it is possible to use the spatio-temporal data anytime through the mobile device. GIS services regularly update use the latest spatio-temporal data to provide the most suitable services. For this situation, update data is distributed to CD or wired networks update services. However, this method has problem to propagate update data to users as taking long time. In this paper, suggests a synchronization system which propagate update data to users for reducing processing time efficiently. This synchronization system collects update data in the field and synchronizes server with collected data to use mobile devices by real time. For this system, I design and materialize synchronization module which updates update data and wireless network module.

  • PDF

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things

  • Yang, Wei;Jing, Xiaojun;Huang, Hai;Zhu, Chunsheng;Jiang, Qiaojie;Xie, Dongliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4203-4223
    • /
    • 2021
  • Accelerated by the Internet of Things (IoT), the need for further technical innovations and developments within wireless communications beyond the fifth generation (B5G) networks is up-and-coming in the past few years. High altitude platform station (HAPS) communication is expected to achieve such high levels that, with high data transfer rates and low latency, millions of devices and applications can work seamlessly. The HAPS has emerged as an indispensable component of next-generations of wireless networks, which will therefore play an important role in promoting massive IoT interconnectivity with 6G. The performance of communication and key technology mainly depend on the characteristic of channel, thus we propose an efficient Markov chain based channel model, then analyze the HAPS communication system's uplink capability and swing effect through experiments. According to the simulation results, the efficacy of the proposed scheme is proven to meet the requirements of ubiquitous connectivity in future IoT enabled by 6G.

An Automation Instructor System using Finite State Machine within Web services

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.233-240
    • /
    • 2021
  • The majority of the Web's success can be related to its productivity and flexibility. Web Services (WSs) have the means to create new patterns for the delivery of software capabilities. The WS easily provides the use of existing components available via the Internet. WSs are a new trend that shares ubiquitous systems with others, so the popularity of the Web is increased day by day with their associated systems. This paper will explore and adopt the possibility of developing a technique that will automate instructors' scheduling of timetables within a Web services environment. This technique has an advantage that facilitates users to reduce the time cost and effort by reducing errors and costs for institutes. Providing dependable tables to avoid mistakes related to instituting schedules is ensured by an automated repetitive manual procedure. Automated systems are increasingly developed based on organizations and their customers. Still, the setting's difficulty of automation systems increases to rise as the system architecture and applications must accomplish various requirements and specifications of ever-demanding project scenarios. The automation system is composed of an operating system, platforms, devices, machines, control system, and information technology. This architecture provides more productivity and optimized services. The main purpose of this paper is to apply an automation system to enhance both quality and productivity. This paper also covers an agile method of proving an automation system by Finite State Machine (FSM) and Attributed Graph Grammar (AGG) tool.

An Efficient TCP Algorithm in Mobile ADHOC Networks (이동망 네트워크에서의 효율적인 TCP 알고리즘)

  • Hong, Sung-Hwa;Kim, Hoon-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.73-81
    • /
    • 2009
  • TCP assumes that packet loss is always happened by congestionlike wired networks because is can not distinguish between congestion loss and transmission error loss,. This assumption results in unnecessary TCP performance degradation in wireless networks by reducing sender's congestion window size and retransmitting the lost packets. Also, repeated retransmissions loed to waste the limited battery power of mobile devices. In this paper, we propose the new congestion control scheme that add the algorithms monitoring networks states and the algorithms preventing congestion to improve TCP throughput performance and energy efficiency in wireless ad-hoc networks. Using NS2, we showd our scheme improved throughput performance and energy efficiency.

An Application-Independent Multimedia Adaptation framework for the Mobile Web (모바일 웹을 지원하는 응용 독립적 멀티미디어 적응 프레임워크)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.139-148
    • /
    • 2005
  • The desired level for multimedia services in the mobile web environment, the next generation web environment, is expected to be of PC level quality. And great efforts have been made in the development of hadware technology, communication technology, various kinds of services and standardization to support these services, In the mobile web environment, multimedia contents adaptation services should be available through supporting various kinds of devices, network abilities and users' preferences. It means that due to the variety of both desired devices' hardware specifications, called destinations, and desired QoSes, the QoSes in the destinations are not fixed or defined. If a new user wants to stream multimedia contents in a server through a new kind of terminal device, it should be considered whether the existing transcoders are able to adapt the multimedia contents. However, the existing libraries for multimedia adaptation have heavy transcoder figures which include all adaptive functions in one library, The challenge of universal access is too complex to be solved with these all in one solutions. Therefore, in this paper we propose an application independent multimedia adaptation framework which meets the QoS of new and varied mobile devices. This framework is composed of a group of unit transcoders having only one transcoding function respectively, Instead of heavy transcoders. Also, It includes the transcoder manager supporting the dynamic connections of the unit transcoders in order to satisfy end to end QoS.

  • PDF

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.