• Title/Summary/Keyword: Application Software System

Search Result 1,853, Processing Time 0.027 seconds

Contact Tracking Development Trend Using Bibliometric Analysis

  • Li, Chaoqun;Chen, Zhigang;Yu, Tongrui;Song, Xinxia
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.359-373
    • /
    • 2022
  • The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to most countries and poses a challenge to the healthcare system. Contact tracing technology is an effective way for public health to deal with diseases. Many experts have studied traditional contact tracing and developed digital contact tracking. In order to better understand the field of contact tracking, it is necessary to analyze the development of contact tracking in the field of computer science by bibliometrics. The purpose of this research is to use literature statistics and topic analysis to characterize the research literature of contact tracking in the field of computer science, to gain an in-depth understanding of the literature development status of contact tracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, we conducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Which contains more than 10,000 articles, including more than 2,000 in the field of computer science. For popular trends, we use VOSviewer for visual analysis. The number of contact tracking documents published annually in the computer field is increasing. At present, there are 200 to 300 papers published in the field of computer science each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper, we found that the hot topic of contact tracking has changed from the past "mathematical model," "biological model," and "algorithm" to the current "digital contact tracking," "privacy," and "mobile application" and other topics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can display high-quality literature in contact tracking and characterize the development trend of the entire field through topic analysis. This is useful for students and researchers new to field of contact tracking ai well as for presenting our results to other subjects. Especially when comprehensive research cannot be conducted due to time constraints or lack of precise research questions, our research analysis can provide value for it.

The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset

  • Khalid A. Almarhabi;Adel A. Bahaddad;Ahmed M. Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.203-209
    • /
    • 2023
  • The paper brings across data that is utilized in the Bring Your Own Device (BYOD) status collected between February and April of 2021 across Saudi Arabia. The data set was collected using questionnaires established through online mechanisms for the respondents. In the questionnaire, personal details included five questions while seven questions addressed the working model of personal mobile devices. Six questions addressed the awareness of employees bring your own device awareness for employees comprised seven questions and two questions addressed the benefits of business achievements. In the identification of suitable respondents for the research, two approaches were applied. The research demanded that the respondents be Saudi Arabian nationals and have attained 18 years. Snowball and purposive techniques were applied in the collection of information from a wide area of Saudi Arabia while employing social media approaches that include the use of WhatsApp and emails in the collection of data. The approach ensured the collection of data from 857 respondents used in the identification of the status as well as issues across the BYOD environment and accompanying solutions. The data was also used in the provision of awareness in the community through short-term courses, cyber security training and awareness programs. The results of the research are therefore applicable to the context of the Saudi Arabian country that is currently facing issues in dealing with the application of personal devices in the work environment.

Autoscaling Mechanism based on Execution-times for VNFM in NFV Platforms (NFV 플랫폼에서 VNFM의 실행 시간에 기반한 자동 자원 조정 메커니즘)

  • Mehmood, Asif;Diaz Rivera, Javier;Khan, Talha Ahmed;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • The process to determine the required number of resources depends on the factors being considered. Autoscaling is one such mechanism that uses a wide range of factors to decide and is a critical process in NFV. As the networks are being shifted onto the cloud after the invention of SDN, we require better resource managers in the future. To solve this problem, we propose a solution that allows the VNFMs to autoscale the system resources depending on the factors such as overhead of hyperthreading, number of requests, execution-times for the virtual network functions. It is a known fact that the hyperthreaded virtual-cores are not fully capable of performing like the physical cores. Also, as there are different types of core having different frequencies so the process to calculate the number of cores needs to be measured accurately and precisely. The platform independency is achieved by proposing another solution in the form of a monitoring microservice, which communicates through APIs. Hence, by the use of our autoscaling application and a monitoring microservice, we enhance the resource provisioning process to meet the criteria of future networks.

CoSace: A Windows WebDAV Client Supporting Effective Collaborative Works (CoSpace: 효과적인 협업 작업을 지원하는 윈도우즈 웹데브 클라이언트)

  • Lee, Hong-Chang;Park, Jin-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.79-89
    • /
    • 2009
  • As an IETF standard protocol, WebDAV provides infrastructure for managing and authoring resources and supports asynchronous collaborative authoring on the Web. The CoSlide server is an extension of the Jakarta Slide WebDAV server, providing various workspaces and collaborative services through the WebDAV protocol. The CoSlide server supports workspaces for storing and sharing information of various users, and provides environment for effective collaborative authoring. Actual collaboration activities are performed through a collaboration client software which provides collaboration services along with the CoSlide server. In this paper, we describe the development of the CoSpace client which operates in association with the CoSlide server, presenting effective collaborative environment. The CoSpace client provides user interfaces for accessing and controlling the resources of each workspace on the CoSlide server. In particular, CoSpace provides the facility to launch an authoring application from its workspace view, automatic locking, and downloading the content to be edited, and resource movement using mouse drag & drop.

Piezoelectric Properties of PMN-PNN-PZT Ceramics and the Simulation of Ultrasonic Cleaner

  • Sujin Kang;Ju Hyun Yoo;Sun A Whang;Jae Gyu Lee;Jong Hyeon Lee;Ji Hoon Lee;Dae Yeol Hwang;Sua Kim;Seong Min Lee;Han Byeol Kim
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.36 no.2
    • /
    • pp.191-196
    • /
    • 2023
  • In this paper, for the application of ultrasonic cleaners for cleaning dentures and transparent braces, Pb(Mn1/3Nb2/3)O3-Pb(Ni1/3 Nb2/3)O3-Pb(Zr,Ti)O3 [PMN-PNN-PZT] system ceramics were manufactured and their dielectric and piezoelectric properties were investigated. Overall the best properties suitable for the device applications such as ultrasonic cleaner were obtained from the ceramics sintered at 920℃: bulk density of 7.8 g/cm3, the dielectric constant (εr) of 1,689, piezoelectric charge constant (d33) of 433 pC/N, planar electromechanical coupling factor (kp) of 0.64, mechanical quality factor (Qm) of 835, S11E of 13.37 (10-12 N/m2), and Curie temperature of 315℃ By using the physical properties of this composition, the ultrasonic cleaner was designed and simulated using the commercial ATILA software. For the three-layered ceramics with the dimension of 25 mm × 25 mm × 2.5mm, an excellent displacement of 8.998 10-3 m) and the sound pressure of 147.68 dB were recorded.

Design of Smart Farm Growth Information Management Model Based on Autonomous Sensors

  • Yoon-Su Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.113-120
    • /
    • 2023
  • Smart farms are steadily increasing in research to minimize labor, energy, and quantity put into crops as IoT technology and artificial intelligence technology are combined. However, research on efficiently managing crop growth information in smart farms has been insufficient to date. In this paper, we propose a management technique that can efficiently monitor crop growth information by applying autonomous sensors to smart farms. The proposed technique focuses on collecting crop growth information through autonomous sensors and then recycling the growth information to crop cultivation. In particular, the proposed technique allocates crop growth information to one slot and then weights each crop to perform load balancing, minimizing interference between crop growth information. In addition, when processing crop growth information in four stages (sensing detection stage, sensing transmission stage, application processing stage, data management stage, etc.), the proposed technique computerizes important crop management points in real time, so an immediate warning system works outside of the management criteria. As a result of the performance evaluation, the accuracy of the autonomous sensor was improved by 22.9% on average compared to the existing technique, and the efficiency was improved by 16.4% on average compared to the existing technique.

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.

Conception and Modeling of a Novel Small Cubic Antenna Design for WSN

  • Gahgouh Salem;Ragad Hedi;Gharsallah Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.53-58
    • /
    • 2024
  • This paper presents a novel miniaturized 3-D cubic antenna for use in wireless sensor network (WSN) application. The geometry of this antenna is designed as a cube including a meander dipole antenna. A truly omnidirectional pattern is produced by this antenna in both E-plane and H-plane, which allows for non-intermittent communication that is orientation independent. The operating frequency lies in the ISM band (centered in 2.45 GHz). The dimensions of this ultra-compact cubic antenna are 1.25*1.12*1cm3 which features a length dimension λ/11. The coefficient which presents the overall antenna structure is Ka=0.44. The cubic shape of the antenna is allowing for smart packaging, as sensor equipment may be easily integrated into the cube hallow interior. The major constraint of WSN is the energy consumption. The power consumption of radio communication unit is relatively high. So it is necessary to design an antenna which improves the energy efficiency. The parameters considered in this work are the resonant frequency, return loss, efficiency, bandwidth, radiation pattern, gain and the electromagnetic field of the proposed antenna. The specificity of this geometry is that its size is relatively small with an excellent gain and efficiency compared to previously structures (reported in the literature). All results of the simulations were performed by CST Microwave Studio simulation software and validated with HFSS. We used Advanced Design System (ADS) to validate the equivalent scheme of our conception. Input here the part of summary.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.