• Title/Summary/Keyword: 위치요청

Search Result 299, Processing Time 0.024 seconds

A Batch Processing Algorithm for Moving k-Nearest Neighbor Queries in Dynamic Spatial Networks

  • Cho, Hyung-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.63-74
    • /
    • 2021
  • Location-based services (LBSs) are expected to process a large number of spatial queries, such as shortest path and k-nearest neighbor queries that arrive simultaneously at peak periods. Deploying more LBS servers to process these simultaneous spatial queries is a potential solution. However, this significantly increases service operating costs. Recently, batch processing solutions have been proposed to process a set of queries using shareable computation. In this study, we investigate the problem of batch processing moving k-nearest neighbor (MkNN) queries in dynamic spatial networks, where the travel time of each road segment changes frequently based on the traffic conditions. LBS servers based on one-query-at-a-time processing often fail to process simultaneous MkNN queries because of the significant number of redundant computations. We aim to improve the efficiency algorithmically by processing MkNN queries in batches and reusing sharable computations. Extensive evaluation using real-world roadmaps shows the superiority of our solution compared with state-of-the-art methods.

A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP (OTP를 활용한 UICC(Universal IC Card) 기반의 인증 메커니즘에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.21-31
    • /
    • 2008
  • Ubiquitous environment is constructed by development of an IT technology, offer environment of many service changed to mobile environment. Also, existed service offered at fixed position like home or company, but according to development of mobile device. user require service as moving. Wibro can offer as user moving using mobile device. As requirement should be included authentication, in case of authentication between UICC and AAA authentication server is offered in Wibro, service is available. However, when UICC requires initial authentication to AAA authentication server, identification information of UICC expose as plaintext, so privacy infringement of mobile device occurs. Therefore, identification information of terminal generate randomly using OTP(One-Time Password) that generated in mobile terminal, and we proposed mechanism of privacy protection. Also, we proposed mechanism that offer secure service to user as offer authentication from OTP framework, and offer OTP combination authentication detailedly.

Tracking Data through Tracking Data Server in Edge Computing (엣지 컴퓨팅 환경에서 추적 데이터 서버를 통한 데이터 추적)

  • Lim, Han-wool;Byoun, Won-jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.443-452
    • /
    • 2021
  • One of the key technologies in edge computing is that it always provides services close to the user by moving data between edge servers according to the user's movements. As such, the movement of data between edge servers is frequent. As IoT technology advances and usage areas expand, the data generated also increases, requiring technology to accurately track and process each data to properly manage the data present in the edge computing environment. Currently, cloud systems do not have data disposal technology based on tracking technology for data movement and distribution in their environment, so users cannot see where it is now, whether it is properly removed or not left in the cloud system if users request it to be deleted. In this paper, we propose a tracking data server to create and manage the movement and distribution of data for each edge server and data stored in the central cloud in an edge computing environment.

Machine Learning-based Optimal VNF Deployment Prediction (기계학습 기반 VNF 최적 배치 예측 기술연구)

  • Park, Suhyun;Kim, Hee-Gon;Hong, Jibum;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.34-42
    • /
    • 2020
  • Network Function Virtualization (NFV) environment can deal with dynamic changes in traffic status with appropriate deployment and scaling of Virtualized Network Function (VNF). However, determining and applying the optimal VNF deployment is a complicated and difficult task. In particular, it is necessary to predict the situation at a future point because it takes for the process to be applied and the deployment decision to the actual NFV environment. In this paper, we randomly generate service requests in Multiaccess Edge Computing (MEC) topology, then obtain training data for machine learning model from an Integer Linear Programming (ILP) solution. We use the simulation data to train the machine learning model which predicts the optimal VNF deployment in a predefined future point. The prediction model shows the accuracy over 90% compared to the ILP solution in a 5-minute future time point.

정책학의 학문적 정체성에 관한 시론적 연구 - 한국정책학회와 한국정책학회보를 중심으로 -

  • Heo, Man-Yong;Lee, Hae-Yeong
    • 한국정책학회보
    • /
    • v.21 no.2
    • /
    • pp.1-31
    • /
    • 2012
  • 본 연구는 정책학의 학문적 정체성을 정의·분류하고, 학문적 정체성의 하위차원에서 도출된 연구 질문과 기존 연구에서 제기된 논쟁점에 대해 학문공동체와 기존 연구들이 어떻게 논의하고 있는지를 정리하였다. 이러한 논의를 통하여 정책학의 정체성이 무엇이고 어떤 상태에 있는지, 연구 노력과 활동이 정체성 정립에 기여했는지, 학문적 정체성 구축을 위한 연구 함의는 무엇인지를 파악하고자 한다. 본 연구의 학문적 정체성은 '독자적이고 고유한 이론체계와 방법론 및 연구 대상과 범위를 가지고 있으면서(과학적 정체성) 경계에 따라 차이가 있고 구별되는 독특한 특징을 고민하면서(경계정체성) 공동체를 구성하여 학문의 영역과 미래를 회고·전망하는 것(집단정체성)'으로 규정하였다. 즉 정책학의 학문적 정체성은 세 가지 하위 차원과 각각의 구성요소(패러다임, 한국화, 공동체 활동 등)로 이루어져 있다. 정책학의 학문적 정체성을 종합적으로 판단하면 다음과 같다. 정책의 개념 정립과 이론 구축 등의 멀고 성가신 길을 회피하는 경향이 있는 것으로 판단하여 과학적 정체성 수준은 매우 낮고 그 구축은 요원하다고 하겠다. 빈약한 또는 잘못된 정책 개념을 극복하고 정당한 과정을 거친 개념 규정이 우선적으로 필요할 것이다. 정책학의 한국화에 대한 연구 요청 대(對) 무용론이나 연구 축적은 거의 없다는 비판 등이 대치하고 있는 것으로 판단하여 경계 정체성에 대한 위기를 인식하고 있지만 지속적인 관심과 연구 축적이 필요하다고 하겠다. 학문공동체를 구성하여 (한국)정책학의 위치와 미래에 대해 회고·전망의 장을 열고 있지만 공동체의 목적인 근본적 문제 등에 관한 자극은 부족한 것으로 판단하였다. 구성원들의 응집력은 한국화 등에 대한 공동 노력이 시도되고 있는 반면, 개념 구성 등에 대한 그것은 알려진 것이 드물다. 따라서 집단정체성은 과학적 정체성의 공유(자극, 공동노력, 응집력)는 상대적으로 부족하고 경계정체성의 공유는 시도 단계에 있다고 볼 수 있다. 개념 정립, 이론 구축 등과 같은 과학적 정체성에 대한 연구는 위험이 따르기 때문에 개인적 시도보다는 학문공동체의 관심과 자극이 수반된 공동 노력으로 연구될 필요가 있다고 하겠다.

Introduction to Master Plan and Pilot Project with ICT-Based Integrated Water Resources Management System in Uzbekistan (우즈베키스탄 내 ICT기반의 수자원정보화 마스터플랜 수립 및 시설기반강화 시범사업 사업수행용역 소개)

  • Lee, Sung Soo;PI, Wan Seop;Choi, Jong Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.382-382
    • /
    • 2022
  • 우즈베키스탄은 수자원의 의존도가 매우 큰 국가이다. 과거로부터 농업이 발달하였으며 하천에서 용수를 취수하여 농업용수로 이용하지만 연간 강수량이 적어 수자원의 대부분은 중앙아시아 공유 하천인 Amudarya강과 Syrdarya강에서 취수하여 사용한다. 이들 하천의 수자원은 하천의 상류에 위치한 키르기스탄과 타지기스탄에서 주로 기원하고 있어 우즈베키스탄은 물안보에 매우 취약한 실정이다. 우즈베키스탄은 물사용량 중 약 90%가 농업용수로 이용되고 있으나 수자원의 양이 부족하고 관개시설의 노후화 및 비효율적인 용수공급으로 농업생산성이 낮다. 우즈베키스탄은 수자원의 관리를 위하여 주요 하천 및 수로지점에 유량관측소를 설치하여 운영하고 있지만 시설의 노후화로 인하여 관측자료의 정확도가 낮으며 수기로 일단위로 측정하여 보고하는 방식으로 인하여 적기에 합리적인 용수배분 의사결정이 어려운 실정이다. 이러한 문제를 해결하기 위한 하나의 방법으로 우즈베키스탄 수자원부는 우즈베키스탄에 수자원 관리 정보화사업을 소개하고 적용하는 것이 필요하다고 판단하였으며, 수자원정보화사업을 우즈베키스탄에 적용하기 위하여 수자원정보화에 있어서 선진국이라 할 수 있는 한국의 기술을 우즈베키스탄에 활용하도록 요청하였다. 이에 따라 2016년부터 "우즈베키스탄 ICT기반의 물관리 마스터 플랜 수립 및 시설기반강화 시범사업"을 수행되게 되었다. 본 사업의 목적은 "수자원정보시스템의 개발 및 역량강화로 수자원정보화 기반을 구축"하는 것으로 우즈베키스탄 전국에 ICT 기반의 수문계측 및 수자원관리 시스템 구축 등 선진화된 수자원 정보 시스템을 개발하고, 향후 지속가능한 유지·보수·관리를 위한 현지 전문가 대상의 역량 강화 사업(수문계측기기, 시스템운영 및 유지보수 등)을 통해 본 사업의 현지정착을 도모하고자 하는 것이다.

  • PDF

Efficient Intermediate Node mobility Management Technique in CCN Real-time Streaming Environment (CCN 실시간 스트리밍 환경에서 효율적인 중간노드 이동성 관리 기법)

  • Yoon-Young Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1073-1080
    • /
    • 2023
  • The development and speed improvement of the Internet network, and the development of many platforms based on it, have brought about a rapid expansion of production and consumption of various contents. However, the existing IP-based Internet system cannot efficiently cope with such an urgent increase in data. Accordingly, an alternative called the CCN(Contents Centric Network) has emerged, enabling more efficient data transmission and reception centered on content rather than host. In this paper, we will deal with the mobility of intermediate nodes in CCN real-time streaming service, which is one of the major research fields of CCN, and minimize network overload through more efficient path switching through RSSI detection. In other words, by improving the method of selecting and switching a spare path when an intermediate node located between the requester(consumer) and the provider moves, a mechanism for managing data transmission is not interrupted and unnecessary load due to route switching does not occur in the network.

Energy-Efficient Mobility Management Schemes in HMIPv6 (HMIPv6환경에서 에너지 효율적인 이동성 관리 기법)

  • Yang Sun Ok;Kim SungSuk;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.615-624
    • /
    • 2005
  • In Mobile IP, several types of messages - binding update, binding request and binding acknowledgement - are used to support user mobility. It is necessary to exchange those messages frequently for seamless mobility but it incurs both the increase of network overhead and poor usage of mobile node battery power Thus, we need a mechanism that the server detects users location and also copes with the problems effectively, which is our main concern in this paper Each user records all moving logs locally and periodically makes out profile based on them in HMIPv6. By using profile, estimated resident time can be computed whenever he enters an area and the time is set up as the binding update message lifetime. Of course, the more correct lifetime nay be obtained IP arrival time as well as average resident time Is considered in profile. Through extensive experiments, we measure the bandwidth usage for binding update messages by comparing the proposed schemes with that in HMIPv6. From the results, Gain gets over $80\%$ when mobile node stays more than 13 minutes in a subnet. Namely, we come to know that our schemes improve network usage and energy usage in mobile node by decreasing the number of messages while they also manage users locations like that in HMIPv6.

A Development of Maritime Search and Rescue Supporting System using Smartphone Application (스마트폰 어플리케이션을 활용한 해상 구조 지원 시스템 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Yun-Tae;Shin, Il-Sik;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.804-810
    • /
    • 2017
  • Distress accidents occur annually by and failure of sea rescue and time delay lead to fatal accident. In the event of maritime distress, most of the equipments used for search and rescue are in responsible for the position of ships. An MOB equipment is a representative equipment for lifesaving and uses AIS communication method. However, the MOB equipment has problems of interference with existing vessel traffic process and it is difficult to apply because there is no proper certification standard. Therefore, this paper proposes a maritime search and rescue supporting system using smartphone. Utilizing the widely constructed IT infrastructure, it collects position information of the fishing boat and leisure ship using GPS embedded in the smartphone. Also the developed system supports to participate in the rescue by sending the information about the occurrence of the survivor in a certain area to the ship operator.

A Study on Cost Estimation of Spatial Query Processing for Multiple Spatial Query Optimization in GeoSensor Networks (지오센서 네트워크의 다중 공간질의 최적화를 위한 공간질의처리비용 예측 알고리즘 연구)

  • Kim, Min Soo;Jang, In Sung;Li, Ki Joune
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.23-33
    • /
    • 2013
  • W ith the recent advancement of IoT (Internet of Things) technology, there has been much interest in the spatial query processing which energy-efficiently acquires sensor readings from sensor nodes inside specified geographical area of interests. Therefore, various kinds of spatial query processing algorithms and distributed spatial indexing methods have been proposed. They can minimize energy consumption of sensor nodes by reducing wireless communication among them using in-network spatial filtering technology. However, they cannot optimize multiple spatial queries which w ill be w idely used in IoT, because most of them have focused on a single spatial query optimization. Therefore, we propose a new multiple spatial query optimization algorithm which can energy-efficiently process multiple spatial queries in a sensor network. The algorithm uses a concept of 'query merging' that performs the merged set after merging multiple spatial queries located at adjacent area. Here, our algorithm makes a decision on which is better between the merged and the separate execution of queries. For such the decision making, we additionally propose the cost estimation method on the spatial query execution. Finally, we analyze and clarify our algorithm's distinguished features using the spatial indexing methods of GR-tree, SPIX, CPS.