• Title/Summary/Keyword: Backend

Search Result 65, Processing Time 0.023 seconds

SoFA: A Distributed File System for Search-Oriented Systems (SoFA: 검색 지향 시스템을 위한 분산 파일 시스템)

  • Choi, Eun-Mi;Tran, Doan Thanh;Upadhyaya, Bipin;Azimov, Fahriddin;Luu, Hoang Long;Truong, Phuong;Kim, Sang-Bum;Kim, Pil-Sung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • A Distributed File System (DFS) provides a mechanism in which a file can be stored across several physical computer nodes ensuring replication transparency and failure transparency. Applications that process large volumes of data (such as, search engines, grid computing applications, data mining applications, etc.) require a backend infrastructure for storing data. And the distributed file system is the central component for such storing data infrastructure. There have been many projects focused on network computing that have designed and implemented distributed file systems with a variety of architectures and functionalities. In this paper, we describe a complete distributed file system which can be used in large-scale search-oriented systems.

  • PDF

Manufacture of an Acousto-Optical Spectrometer for Radio Astronomical Observations (우주전파관측용 음향광학 전파분광기의 제작)

  • 임인성;최재현;오승엽
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.1
    • /
    • pp.1-12
    • /
    • 1997
  • The acousto-optical spectrometer as a new type backend of the receiver system for radio astronomical observations is manufactured for radio signal analysis. We studied on the effect of Acousto-Optic and Acousto-Optic devices and designed the optics system. We manufactured the optical mount and the CCD detector for deflected beam and interface card. This acousto-optical spectrometer consisted of a laser, optics, acousto-optic deflector, CCD detector and Interface card. This system use He-Ne laser as a light source and use optics to get parallel beam and to focus the deflected beam. Acousto-optic deflector converts IF signal to ultrasonic wave and deflect the laser beam according to the Bragg deflection. The ultra wide band acousto-optic deflector has 1 GHz bandwidth and a total of 2,048 channel Charge Coupled Device for signal detection. In this study, we discuss the theoretical description on the effect of Acousto-optics, the design of the optics, manufacture of optical mount, CCD detector, interface card and we presented the results of experiment. As a result of measurement, we have 1,000 channels bandwidth from CCD channels.

  • PDF

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

Constructing a Metadata Database to Enhance Internet Retrieval of Educational Materials

  • Oh Sam-Gyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.143-156
    • /
    • 1998
  • This paper reports the GEM (Gateway to Educational Materials) project whose goal is to develop an operational framework to provide the K-12 teachers in the world with 'one-stop/any-stop' access to thousands of lesson plans, curriculum units and other Internet-based educational resources. To the IS-element Dublin Core base package, the GEM project added an 8-element, domain-specific GEM package. The GEM project employed the conceptual data modeling approach to designing the GEM database, used the Sybase relational database management system (RDBMS) to construct the backend database for storing the metadata of educational resources, and also employed the active server page (ASP) technology to provide Web interfaces to that database. The consortium members catalog lesson plans and other Internet-based educational resources using a cataloging module program that produces HTML meta tags. A harvest program collects these meta tags across the Internet and outputs an ASCII file that conforms to the standard agreed by the consortium members. A parser program processes this file to enter meta tags automatically into appropriate relational tables in the Sybase database. The conceptual/logical schemas of Dublin Core and GEM profile are presented. The advantages of conceptual modeling approach to manage metadata are discussed. A prototype system that provides access to the GEM metadata is available at http://lis.skku.ac.kr/gem/.

  • PDF

Ubiquitous healthcare model based on context recognition (상황인식에 기반한 유비쿼터스 헬스케어 모델)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.129-136
    • /
    • 2010
  • With mobile computing, wireless sensor network and sensor technologies, ubiquitous computing services are being realized and could satisfy the feasibility of ubiquitous healthcare to everyone. This u-Healthcare service can improve life quality of human since medical service can be provided to anyone, anytime, and anywhere. To confirm the vision of u-Healthcare service, we've implemented a healthcare system for heart disease patient which is composed of two components. Front-end collects various signals such as temperature, blood pressure, SpO2, and electrocardiogram, etc. As a backend, medical information server accumulates sensing data and performs back-end processing. To simply transfer these sensing values to a medical team may be too trivial. So, we've designed a model based on context awareness for more improved medical service which is based on artificial neural network. Through rigid experiments, we could confirm that the proposed system can provide improved medical service.

Evaluation of LSTM Model for Inflow Prediction of Lake Sapgye (삽교호 유입량 예측을 위한 LSTM 모형의 적용성 평가)

  • Hwang, Byung-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.287-294
    • /
    • 2021
  • A Python-based LSTM model was constructed using a Tensorflow backend to estimate the amount of outflow during floods in the Gokgyo-cheon basin flowing into the Sapgyo Lake. To understand the effects of the length of input data used for learning, i.e., the sequence length, on the performance of the model, the model was implemented by increasing the sequence length to three, five, and seven hours. Consequently, when the sequence length was three hours, the prediction performance was excellent over the entire period. As a result of predicting three extreme rainfall events in the model verification, it was confirmed that an average NSE of 0.96 or higher was obtained for one hour in the leading time, and the accuracy decreased gradually for more than two hours in the leading time. In conclusion, the flood level at the Gangcheong station of Gokgyo-cheon can be predicted with high accuracy if the prediction is performed for one hour of leading time with a sequence length of three hours.

Implementation of Management of Cafe Staying Time (블록체인을 활용한 카페 이용시간 관리 시스템 구현)

  • Park, Jae-hoon;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.946-954
    • /
    • 2021
  • Since COVID19 virus has been occured, variety steps of the quarantine guidelines were enacted. In step 2.5, eating in a cafe was prohibited and only takeout was permitted, but the government has changed several rules. So now people can have a dissert or coffee in the cafe. Though the government adviced available staying time as 1 hour, it is not obeyed often except superstore, and even the management depends on handwriting. In this paper, we implemented a blockchain system to use for this case. This system is implemented with using hyperledger fabric, the blockchain framework which is made by IBM. For a test, 1 organization is in the system and chaincode is installed to the organization to run the system. We expect the certain effect to the quarantine via this system. Moreover, we will develop an application by using this system as a backend.

A Study on Ring Buffer for Efficiency of Mass Data Transmission in Unstable Network Environment (불안정한 네트워크 환경에서 대용량 데이터의 전송 효율화를 위한 링 버퍼에 관한 연구)

  • Song, Min-Gyu;Kim, Hyo-Ryoung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1045-1054
    • /
    • 2020
  • In this paper, we designed a TCP/IP based ring buffer system that can stably transfer bulk data streams in the unstable network environments. In the scheme we proposed, The observation data stream generated and output by each radio observatory's backend system as a UDP frame is stored as a UDP packet in a large capacity ring buffer via a socket buffer in the client system. Thereafter, for stable transmission to the remote destination, the packets are processed in TCP and transmitted to the socket buffer of server system in the correlation center, which packets are stored in a large capacity ring buffer if there is no problem with the packets. In case of errors such as loss, duplication, and out of order delivery, the packets are retransmitted through TCP flow control, and we guaranteed that the reliability of data arriving at the correlation center. When congestion avoidance occurs due to network performance instability, we also suggest that performance degradation can be minimized by applying parallel streams.

A Study on Backend as a Service for the Internet of Things (사물인터넷을 위한 백앤드 서비스에 관한 연구)

  • Choi, Shin-Hyeong
    • Advanced Industrial SCIence
    • /
    • v.1 no.1
    • /
    • pp.23-31
    • /
    • 2022
  • Cloud services, which started in the early 2000s as a method of using idle servers, are more active with the advent of the 4th industrial revolution, and are being used in many fields as an optimal platform that can be used for business by collecting and analyzing data. On the other hand, the Internet of Things is an environment in which all surrounding objects can freely connect to the Internet network anytime and anywhere to transmit sensed data. In the Internet of Things, data is transmitted in real time, so BaaS, that is, a cloud service for data only has been added. In this paper, among BaaS services for the Internet of Things, a back-end service method that manages data based on Parse Server is explained, and a service that helps patients in rehabilitation is presented using this. For this, a Raspberry Pi is used as a hardware environment, and it is connected to the Internet, collects patient movement information in real time, and manages it through the Parse Server.