• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,433, Processing Time 0.038 seconds

Design and Implementation of Event Based Message Exchange Architecture between Servers for Server Push (서버 푸시를 위한 이벤트 기반 서버간 메시지 교환 아키텍처의 설계 및 구현)

  • Cho, Dong-Il;Rhew, Sung-Yul
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.181-194
    • /
    • 2011
  • Server push which is technology of sending contents from servers to browsers in real time using long polling requests enables real time bidirectional communications between servers and browsers in HTTP environment. Recently, thanks to the rapid supply of mobile devices having ability of full browsing, server push is being applied to various applications. However, because servers providing services should offer distributed contents to a large number of users simultaneously in various user environments, they have a burden that offers contents quickly distinguishing much more concurrent users than before. The method of message exchange so far achieved in distributed server environment has difficulties in the performance of simultaneous user request process, the identification of users and the contents delivery. In this paper, We proposed message exchange architecture between servers for offering server push in the distributed server environment. The proposed architecture enables message exchange in the method of push between servers based on event driven architecture. In addition, the proposed architecture enables flexible identification of a event agent and event processing under the connected environment of a lot of users. In this paper, we designed and implemented the proposed architecture and compared performance with the previous way through a performance test. In addition, function is confirmed through the case realization. As a result of the performance test, the proposed architecture can lessen the use of server Thread and response time of users and increase simultaneous throughput.

Enhanced Reputation-based Fusion Mechanism for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘)

  • Kim, Mi-Hui;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.61-72
    • /
    • 2010
  • Spectrum scarcity problem and increasing spectrum demand for new wireless applications have embossed the importance of cognitive radio technology; the technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel. To enhance the accuracy of sensing, distributed spectrum sensing is proposed. However, it is necessary to provide the robustness against the compromised sensing nodes in the distributed spectrum sensing. RDSS, a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test), was proposed. However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose an enhanced fusion mechanism to input the sensing values in reputation order and exclude the sensing values with the high possibility to be compromised, using the trend of reputation variation. We evaluate our mechanism through simulation. The results show that our mechanism improves the robustness against attack with the smaller number of sensing values and more accurate detection ratio than RDSS.

An Organization Framework for Role-based Adaptive Distributed Systems (역할기반 적응형 분산 시스템을 위한 조직 프레임워크)

  • Hwang, Seong-Yun;Jung, Jong-Yun;Lee, Jung-Tae;Ryu, Ki-Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.369-380
    • /
    • 2013
  • Recently, role-based distributed system models have been proposed to support adaptive interactions in ubiquitous application environment. A Role-based distributed model regards an application as an organization composed of roles, and separate players running role processes from the roles. When an application is running, it binds a role with a player, and the player runs dynamically assigned role processes provided by an application for supporting adaptability. However, there has not been much attention on researches about development and runtime environment for role-based distributed systems. In this paper we suggest an application framework as an environment for developing and executing role-base distributed systems. The application framework is divided into two parts: an organization framework to manage and construct an organization composed of roles necessary in the application, and a player framework to provide running environment for players. In this paper, we focus on the organization framework which supports the creation and management of organizations, directory service for players and allocation of players to roles, and message brokering between roles and players. The proposed framework makes developers to be able to develop highly adaptive distributed systems in the ubiquitous environment.

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.

Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking (공인인증서 기반 인터넷 뱅킹의 구현, 보안성, 그리고 편의성 분석)

  • Park, Hye-Seung;Lee, Jae-Hyup;Park, Seung-Chul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • We expect that the accredited certificate-based open banking, which is actively deployed in recent times, will solve the Galapagosization problem of the existing accredited certificate-based closed banking by supporting standard communication protocol and web compatibility. However, it is questionable how much the open banking will answer the security and usability problems of the existing closed banking. This paper is focused on analyzing the differences between the existing closed banking and the open banking, and then evaluates how much the security and usability problems of the existing closed banking are resolved by the open banking. The study firstly analyzes the security vulnerabilities raised in the process of providing closed banking services for the past 15 years or more, the countermeasures applied to enhance security, and the convenience impact of countermeasures. And then, the security and convenience of the open banking is inferred by analyzing the implementation difference between the closed banking and the open banking. The paper also briefly discusses how to improve the open banking to resolve the remaining problems of the open banking.

A Comparative Analysis of CRM Strategies and Establishment Examples of the National Media Corporations in Korea (국내 미디어기업의 CRM 구축 및 적용 전략 비교 연구 - 신문사, 유료방송사, 통신 기업을 중심으로)

  • Kim, Hee-Kyung;Park, Joo-Yeun
    • Korean journal of communication and information
    • /
    • v.45
    • /
    • pp.341-383
    • /
    • 2009
  • Customer Relationship Management (CRM) in the media field is a specialcustomer-centered management method based on the information technology in order to build a long-term relationship with customers, users or subscripted people of media services. The purpose of this study is to examine and compare the various strategies and the characteristics of customer relationship managements of domestic media corporations in the era of the digital convergence. The data is analyzed by in-depth interviews with the CRM managements of newspapers, cable & satellite broadcasters and telecommunication corporations. The result of the study shows that the practicing CRM in the media field has an influence on the management performance and the management's support influences the practice of CRM. CRM is practiced differently according to the scale of the media corporations and revenue. Also the study presents that media corporations which wanted to improve CRM are going through trials and errors caused by the lack of experience of the CRM market in Korea. Therefore this study would provide CRM strategy for CRM marketers in Korea. Furthermore, this study presents concepts to media corporations which do not apply to CRM yet, and theoretical backgrounds which do. Finally, the implication of the study, limitations and problems are explained and discussed.

  • PDF

전기공학과의 교과과정에 대한 시안

  • 고명삼;박영문;임달호;박상희
    • 전기의세계
    • /
    • v.24 no.4
    • /
    • pp.42-51
    • /
    • 1975
  • 전기공학은 그 분야가 광범위하면서 세분된 여러 소분야로 구성되어 있기 때문에 이를 간단한 몇마디로 표현하기는 불가능하다. 그러나 전기기술자는 전하를 위시하여 전하간의 힘 및 전하간의 에너지 교환에 관하여 주로 관여하게 된다. 즉 전기기술자는 전기적 에너지 및 정보의 발생, 전송, 기억 및 제어를 최적화할 책임이 있고, 그 분야는 부단히 팽창일로에 있으며 변해가고 있다. 즉 학문적인 기초이론 뿐만아니라 실제 응용분야인 산업분야에서도 눈부신 발전과 변화를 가져왔다. 현대산업 및 기술구조의 질적개선은 기술 반감기의 감소, 막대한 양의 정보처리, 시스템의 대형화, 복잡화 현상을 가져왔으며 기술자체가 사회경제활동에 미치는 영향을 극대화시켰다. 그러므로 오늘날의 모든 전기기술자들은 신뢰성을 고려한 보다 넓은 의미에서의 책임을 느껴야 한다. 조국의 근대화와 방위산업육성 과정에서 중추적 역할을 담당할 이러한 전기공학분야의 중견연구원 및 기술자를 양성하는 공과대학전기공학과의 교과과정 역시 부단히 변하는 각종 환경에 적응될 수 있는 dynamic한 것이 되어야 한다. 즉 공과대학 전기공학과이 교과과정은 어떤 특정되고 고정된 기술 또는 설계에 대한 교과목으로 치우치는 것보다 수명이 길고 강력한 응용력과 창의력을 발휘하여 우리의 기술을 토착화하여 이를 우리의 것으로 만들 수 있는 것이 되어야 한다. 이러한 국내외적인 현실을 고려하여 당학회에서는 1974년도 조사연구사업의 일환으로 교과과정조사회를 구성하여 국내의 여러대학의 전기공학과 교과과정편성에 다소의 도움을 주고저 일차적인 시안으로서 다음과 같은 특징을 갖는 교과과정을 작성하였다.{3}$N$_{4}$등의 산화물 및 질화물로 대표되는 분자성 비정질 물질로서 금지대는 2eV보다 큰 세종류로 크게 분류할 수 있다. 분류할 수 있다. 한다. 단 개개의 문제에 관한 구체적인 해석 또는 검토에 관하여는 다음 기회에 미루기로하고, 우선 여기서는 당면문제로서 대처하지 않으면 안될 자동주파수제어문제및 계통의 경제운용문제만에 한정하여, 이것을 우리나라의 현상과 관련시켜 개설하고, 이들의 자동화에 관한 기본적인 문제를 간단히 적어 보겠다. 가능하다. 제작완료된 ASIC은 기능시험을 완료했으며 실제 line-of-sight(LOS) 시스템 구현에 적용중이다. 시대를 살아 갈 회원들이다. '컨텐츠의 시대'가 개막되는 것이며, 신세기통신과 SK텔레콤은 선의의 경쟁 과 협력을 통해 이동인터넷 서비스의 컨텐츠를 개발해 나가게 될 것이다. 3배가 높았다. 효소 활성에 필수적인 물의 양에 따른 DIAION WA30의 라세미화 효율에 관하여 실험한 결과, 물의 양이 증가할수록 그 효율은 감소하였다. DIAION WA30을 라세미화 촉매로 사용하여 아이소옥탄 내에서 라세믹 나프록센 2,2,2-트리플로로에틸 씨오에스터의 효소적 DKR 반응을 수행해 보았다. 그 결과 DIAION WA30을 사용하지 않은 경우에 비해 반응 전환율과 생성물의 광학 순도는 급격히 향상되었다. 전통적 광학분할 반응의 최대 50%라는 전환율의 제한이 본 연구에서 찾은 DIAION WA30을 첨가함으로써 성공적으로 극복되었다. 또한 고체 염기촉매인 DIAION WA30의 사용은 라세미화 촉매의 회수 및 재사용이 가능하게 해준다.해준다

  • PDF

Bicycle Riding-State Recognition Using 3-Axis Accelerometer (3축 가속도센서를 이용한 자전거의 주행 상황 인식 기술 개발)

  • Choi, Jung-Hwan;Yang, Yoon-Seok;Ru, Mun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.63-70
    • /
    • 2011
  • A bicycle is different from vehicles in the structure that a rider is fully exposed to the surrounding environment. Therefore, it needs to make use of prior information about local weather, air quality, trail road condition. Moreover, since it depends on human power for moving, it should acquire route property such as hill slope, winding, and road surface to improve its efficiency in everyday use. Recent mobile applications which are to be used during bicycle riding let us aware of the necessity of development of intelligent bicycles. This study aims to develop a riding state (up-hill, down-hill, accelerating, braking) recognition algorithm using a low-power wrist watch type embedded system which has 3-axis accelerometer and wireless communication capability. The developed algorithm was applied to 19 experimental riding data and showed more than 95% of correct recognition over 83.3% of the total dataset. The altitude and temperature sensor also in the embedded system mounted on the bicycle is being used to improve the accuracy of the algorithm. The developed riding state recognition algorithm is expected to be a platform technology for intelligent bicycle interface system.

The Core Elements and Implementation Strategy for Adopting Smart Work (효과적 스마트워크 도입을 위한 핵심요소 및 구현 전략)

  • Lee, Un-Kon;Choi, Jeawon
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.65-92
    • /
    • 2012
  • Smart work, which is defined as work performed at home, satellite offices or with the smart devices to continually collaborate with the co-workers in anytime, anywhere using IT, is attracting much attention as an alternative work way to cope with the demographical changes of the low fertility and aging. Whereas some implementation cases of smart work have been considered as the success, the other cases have been reported as the failure to implement smart work practices. Nevertheless, there are few researches to identify the reasons of successful ways to adopting smart work. This study integrated the IT-based changes with the smart work practices to identify the critical success factors of smart work in individual, organization and industry levels. As the results, we found out the expected values of introduction, core elements of implementation, and industry characteristics to efficient adoption for smart work. Also, this study compared these evidences with the incumbent smart work policies. The contributions of this study is to develop the guideline to adopting smart work, the smart work implementation strategy and the improvement on the business process.

  • PDF