• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,433, Processing Time 0.037 seconds

JMoblet : A Jini-based Mobile Agent System (JMoblet:Jini 기반의 이동에이전트 시스템)

  • Kim, Jin-Hong;Koo, Hyeong-Seo;Yun, Hyeong-Seok;An, Geon-Tae;Yu, Yang-U;Lee, Myeong-Jun
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.641-650
    • /
    • 2001
  • Jini architecture's Network Plug and Work provides simple and flexible network environment for distributed applications. Through the Jini technology, facilities for dynamically registering and locating mobile agent services can be easily supported, as well as the services useful for activities of mobile agents can be dynamically supported. In this paper, we describe a Jini-based mobile agent system named JMoblet, which provides the basic functions of a mobile agent system such as creation, control, transfer, location and communication among agents. To increase the reliability of the system, it also provides exception handling and persistence of the mobile agent systems for reliability.

  • PDF

Efficient Schemes for Cache Consistency Maintenance in a Mobile Database System (이동 데이터베이스 시스템에서 효율적인 캐쉬 일관성 유지 기법)

  • Lim, Sang-Min;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.221-232
    • /
    • 2001
  • Due to rapid advance of wireless communication technology, demand on data services in mobile environment is gradually increasing. Caching at a mobile client could reduce bandwidth consumption and query response time, and yet a mobile client must maintain cache consistency. It could be efficient for the server to broadcast a periodic cache invalidation report for cache consistency in a cell. In case that long period of disconnection prevents a mobile client from checking validity of its cache based solely on the invalidation report received, the mobile client could request the server to check cache validity. In doing so, some schemes may be more efficient than others depending on the number of available channels and the mobile clients involved. In this paper, we propose new cache consistency schemes, effects, efficient especially (1) when channel capacity is enough to deal with the mobile clients involved or (2) when that is not the case, and evaluate their performance.

  • PDF

Augmented Reality Logo System Based on Android platform (안드로이드 기반 로고를 이용한 증강현실 시스템)

  • Jung, Eun-Young;Jeong, Un-Kuk;Lim, Sun-Jin;Moon, Chang-Bae;Kim, Byeong-Man
    • The KIPS Transactions:PartB
    • /
    • v.18B no.4
    • /
    • pp.181-192
    • /
    • 2011
  • A mobile phone is becoming no longer a voice communication tool due to smartphones and mobile internet. Also, it now becomes a total entertainment device on which we can play game and get services by variety applications through the Web. As smartphones are getting more popular, their usages are also increased, which makes the interest of advertising industry in mobile advertisement increased but it is bound to be limited by the size of the screen. In this paper, we suggest an augmented reality logo system based on Android platform to maximize the effect of logo advertisement. After developing software and mounting it on a real smartphone, its performances are analyzed in various ways. The results show the possibility of its application to real world but it's not enough to provide real time service because of the low performance of hardware.

CNN Based Real-Time DNS DDoS Attack Detection System (CNN 기반의 실시간 DNS DDoS 공격 탐지 시스템)

  • Seo, In Hyuk;Lee, Ki-Taek;Yu, Jinhyun;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.135-142
    • /
    • 2017
  • DDoS (Distributed Denial of Service) exhausts the target server's resources using the large number of zombie pc, As a result normal users don't access to server. DDoS Attacks steadly increase by many attacker, and almost target of the attack is critical system such as IT Service Provider, Government Agency, Financial Institution. In this paper, We will introduce the CNN (Convolutional Neural Network) of deep learning based real-time detection system for DNS amplification Attack (DNS DDoS Attack). We use the dataset which is mixed with collected data in the real environment in order to overcome existing research limits that use only the data collected in the experiment environment. Also, we build a deep learning model based on Convolutional Neural Network (CNN) that is used in pattern recognition.

Study on DNN Based Android Malware Detection Method for Mobile Environmentt (모바일 환경에 적합한 DNN 기반의 악성 앱 탐지 방법에 관한 연구)

  • Yu, Jinhyun;Seo, In Hyuk;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.159-168
    • /
    • 2017
  • Smartphone malware has increased because Smartphone users has increased and smartphones are widely used in everyday life. Since 2012, Android has been the most mobile operating system. Owing to the open nature of Android, countless malware are in Android markets that seriously threaten Android security. Most of Android malware detection program does not detect malware to which bypass techniques apply and also does not detect unknown malware. In this paper, we propose lightweight method for detection of Android malware using static analysis and deep learning techniques. For experiments we crawl 7,000 apps from the Google Play Store and collect 6,120 malwares. The result show that proposed method can achieve 98.05% detection accuracy. Also, proposed method can detect about unknown malware families with good performance. On smartphones, the method requires 10 seconds for an analysis on average.

Fuzzy Logic-based Grid Job Scheduling Model for omputational Grid (계산 그리드를 위한 퍼지로직 기반의 그리드 작업 스케줄링 모델)

  • Park, Yang-Jae;Jang, Sung-Ho;Cho, Kyu-Cheol;Lee, Jong-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.49-56
    • /
    • 2007
  • This paper deals with grid job allocation and grid resource scheduling to provide a stable and quicker job processing service to grid users. In this paper, we proposed a fuzzy logic-based grid job scheduling model for an effective job scheduling in computational grid environment. The fuzzy logic-based grid job scheduling model measures resource efficiency of all grid resources by a fuzzy logic system based on diverse input parameters like CPU speed and network latency and divides resources into several groups by resource efficiency. And, the model allocates jobs to resources of a group with the highest resource efficiency. For performance evaluation, we implemented the fuzzy logic-based grid job scheduling model on the DEVS modeling and simulation environment and measured reduction rates of turnaround time, job loss, and communication messages in comparison with existing job scheduling models such as the random scheduling model and the MCT(Minimum Completion time) model. Experiment results that the proposed model is useful to improve the QoS of the grid job processing service.

  • PDF

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

An Empirical Study on the Regional Characteristics of Venture Business (벤처기업의 지역적 특성에 관한 연구 - 수도권과 지방의 비교.분석을 중심으로 -)

  • 최홍봉;윤성민
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.7 no.1
    • /
    • pp.29-43
    • /
    • 2004
  • In this paper, we tries to investigate whether there are some differences of the characteristics between venture business in the metropolitan area and in the local area. We set up some hypotheses on the regional characteristics of venture business and test those using the raw data of Small and Medium Business Administration (SMBA) survey on the management of venture business. Our main findings are as follows: First, we analyze the industrial composition of ventures by region and find that in the metropolitan area high-technology venture business which is belong to software, or information, or communication industries is given much weight. But in the provinces, ventures belong to traditional manufacturing industries is given much weight. Second, we compared the characteristics of business network by region and find that the ventures in the metropolitan area are active in technical cooperation among companies and want strategic tie-ups in marketing field, whereas the ventures in the provinces are active in technical cooperation with university and want strategic tie-ups in technical development field. Third, ventures in the metropolitan area are more excellent in technical development and management than ventures in the provinces.

  • PDF

Symmetric Tree Replication Protocol for Efficient Distributed Storage System (효율적인 분산 저장 시스템을 위한 대칭 트리 복제 프로토콜)

  • 최성춘;윤희용;이강신;이호재
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.9
    • /
    • pp.503-513
    • /
    • 2004
  • In large distributed systems, replications of data and service are needed to decrease communication cost, increase availability, and avoid single server bottleneck. Tree Quorum protocol is a representative replication protocol, which exploits a logical structure. Tree quorum protocol is one of the replication protocols allowing low read cost only in the best case, while the number of replicas exponentially increases as the level grows. In this paper, thus, we propose a new replication protocol, called symmetric tree protocol which efficiently solves the problem. The proposed symmetric tree protocol also requires much smaller read cost than previous protocols. We conduct cost and availability analysis of the protocols, and the proposed protocol displays comparable read availability to the tree protocol using much smaller number of nodes. Also, the symmetric tree protocol has much smaller response time than the logarithmic protocol.

Design and Performance Analysis of Cost-Effective and Fast Inter-Domain NEMO Scheme with Multicasting Support (멀티캐스팅 지원의 비용효과적인 도메인간 빠른 NEMO 기법의 설계 및 성능분석)

  • Han, Sunghee;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.87-98
    • /
    • 2012
  • In recent years, there are many data and multimedia services that are supported by WiFi-enabled mobile devices. As a result, the demand for the ability to connect to the Internet anywhere is rapidly increasing and network infrastructure is becoming increasingly important. The design of cost-efficient network mobility (NEMO) protocol is intended to reduce the demand for limited wired/wireless network bandwidth at the signaling of mobility support and packet delivery operations. In this paper, we propose a cost-effective inter-LMA domain mobility management scheme which provides fast handover with multicasting support in NEMO environments. And our Fast PR-NEMO scheme is compared with N-PMIPv6, rNEMO, and PR-NEMO. In conclusion, our proposed scheme shows the best performance in terms of location updating cost, and packet tunneling cost.