• Title/Summary/Keyword: Capacity of server

Search Result 240, Processing Time 0.025 seconds

Development of 3D Mapping System for Web Visualization of Geo-spatial Information Collected from Disaster Field Investigation (재난현장조사 공간정보 웹 가시화를 위한 3차원 맵핑시스템 개발)

  • Kim, Seongsam;Nho, Hyunju;Shin, Dongyoon;Lee, Junwoo;Kim, Hyunju
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_4
    • /
    • pp.1195-1207
    • /
    • 2020
  • With the development of GeoWeb technology, 2D/3D spatial information services through the web are also has been used increasingly in the application of disaster management. This paper is suggested to construct a web-based 3D geo-spatial information mapping platform to visualize various spatial information collected at the disaster site in a web environment. This paper is presented a web-based geo-spatial information mapping service plan for the various types of 2D/3D spatial data and large-volume LiDAR point cloud data collected at the disaster accident site using HTML5/WebGL, web development standard technology and open source. Firstly, the collected disaster site survey 2D data is constructed as a spatial DB using GeoServer's WMS service and PostGIS provided an open source and rendered in a web environment. Secondly, in order to efficiently render large-capacity 3D point cloud data in a web environment, a Potree algorithm is applied to simplifies point cloud data into 2D tiles using a multi-resolution octree structure. Lastly, OpenLayers3 based 3D web mapping pilot system is developed for web visualization of 2D/3D spatial information by implementing basic and application functions for controlling and measuring 3D maps with Graphic User Interface (GUI). For the further research, it is expected that various 2D survey data and various spatial image information of a disaster site can be used for scientific investigation and analysis of disaster accidents by overlaying and visualizing them on a built web-based 3D geo-spatial information system.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

Web-based Data Integration System Implementation for Reliability Improvement of a Product (제품의 신뢰성 향상를 위한 웹 기반 데이터 통합 시스템 구축에 관한 연구)

  • Kyung, Tae-Won;Kim, Sang-Kuk
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.117-128
    • /
    • 2005
  • This study proposes an integrated monitoring system for data reliability improvement in a steel manufacturing industry. The data obtained from existing steel manufacturing process is not micro data which is gathered at the occurring point, but average value (macro data) which is gathered from the occurring point to ending point. This kind of macro data is not only difficult for a detailed analysis for an error causing factor, but it might cause a fatal influence as well on the quality of produced goods even if the error is within an error tolerance. And during the process of steel production, thousands of data is produced in a second, thus requiring database plan to manage abundant amount of data. Therefore, the following proposed system is capable of collecting as well as analyzing all the data generated from the process of product production. And the system was able to raise the efficiency of the database server by planning the database to handle large capacity data. Also, by applying web-based technology, inquiries and analysis of data with no limit on time and space was possible with PC connected to the intranet. Hence, the system was able to work on effective quality improvement of manufactured products, plus able to raise the reliability of the product. Also, accumulated data from long period of time was used for fundamental material for new controlling model, operation technology, and new product development.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Satisfaction with Online Classes of Nursing Students: Focused on Nursing Theoretical Courses

  • Park, Mi-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.127-136
    • /
    • 2022
  • In this paper, I propose the level of satisfaction with online classes of nursing students and its influencing factors. The participants was 175 nursing students who had enrolled in H university located at Chungcheongbuk-do. The data was collected using a questionnaire which consisted of satisfaction with online classes, learner's efforts, instructor's efforts, interpersonal interaction, and university's supports. The mean score for satisfaction with online classes(scores ranged form 1 to 5) was 3.99. The influencing factors of satisfaction with online classes were intention of using online(p<.001), academic achievement(p=.003), instructor's effort(p=.038), and evaluation of class and management(p=.044), and its explanatory power was 50.2%. The most important things to improve online learning were instructor in problem of operation and server capacity and sound in problem of techniques. Based on the theses results, in order to increase satisfaction with online classes, it is needed to develop strategies to improve intention of using online and academic achievement. Also, instructor's efforts and university's active supports were considered to increase satisfaction with online classes among nursing students.

Index and Broadcast Data Organization for On-Demand Data Broadcast Systems (주문형 데이타 방송 시스템을 위한 인덱스 및 방송 데이타 구성)

  • Kang, Sun-Hy;Lee, Sang-Don
    • Journal of KIISE:Databases
    • /
    • v.32 no.4
    • /
    • pp.394-404
    • /
    • 2005
  • Battery capacity of mobile clients in wireless mobile computing environments is one of the important resources that determine the availability of mobile clients. So, data broadcast techniques in mobile computing environments need not only rapid delivery of requested data but also efficient data delivery mechanisms which can reduce battery consumption of mobile clients. This paper proposes organization of an index and broadcast data for on-demand data broadcast. It organizes an index containing broadcast time of each data using some of high-priority data in a broadcast server. By sending such index information prior to the corresponding data, the proposed approach reduces tuning time of mobile clients. It also includes when the next index information will be broadcasted in each data broadcast. This can reduce tuning time of mobile clients waiting for an index to be broadcasted. Experiments show that the proposed approach effectively reduces tuning time of mobile clients.

Concurrency Control Method Based on Scalable on Prediction for Multi-platform Games (멀티플랫폼 게임을 위한 예측기반 동시성 제어방식)

  • Lee, Sung-Ug
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1322-1331
    • /
    • 2006
  • Concurrency control is one of the important factors to maintain consistent conditions of a game because most participants of the game should be shared information to play the game through a distributed network system. replay delay times should establish in every event and the received event should be saved and performed simultaneously for Concurrency Control. However, it is not easy to practice the event with same speed in environment having various moving speed. Therefore, expansion have to be provided. In other words, one of the most important factors of a game's efficiency is the process of bandwidth and delay. the process of concurrency control method based on scalable prediction for Multi-platform games would minimize the loss rate of a event and then would improve the interaction capacity of a game. It also might get reliability between clients. This paper analyzes some problems in terms of a layout of a game that integrates a cable and a wireless system. In addition, this paper provides methods to expand bandwidth and delay that might be an obstacle of a On-line game and to ensure reliability between a server and a client.

  • PDF

Mitigating the Side-effect of Starting New Session in Multimedia Streaming using Multi-zoned Disk (구역분할 디스크를 사용하는 멀티미디어 서버에서 새로운 세션 시작에 따른 스케줄링 지연 현상의 최소화)

  • Cho, Kyeong-Sun;Won, You-Jip;Shin, Il-Hoon;Koh, Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.445-452
    • /
    • 2004
  • Zoning technology of disk improved the performance of disk subsystem with increase of storage capacity and average transfer bandwidth. SCAN disk scheduling with double buffering is used to utilize the performance of zoned disk in multimedia system. However, this method has a problem that generates jitter when the number of steams increases. In this article, we propose the novel approach, pre-buffering policy, to overcome this problem. Pre-buffering avoids jitter by buffering the lack of data before starting service, which is estimated from the current cycle length and the maximum cycle length. We can calculate cycle length, data sire needed in each cycle and the possible lack of data caused by the increase of the number of streams using the numerical model of disk subsystem. Pre-buffering can be applied for multimedia systems and contribute to provide clients with high quality service without jitter.

EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT

  • Alghamdi, Anwar;Alzahrani, Ahmed;Thayananthan, Vijey
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.137-142
    • /
    • 2021
  • The Internet of Things (IoT) paradigm is at the forefront of present and future research activities. The huge amount of sensing data from IoT devices needing to be processed is increasing dramatically in volume, variety, and velocity. In response, cloud computing was involved in handling the challenges of collecting, storing, and processing jobs. The fog computing technology is a model that is used to support cloud computing by implementing pre-processing jobs close to the end-user for realizing low latency, less power consumption in the cloud side, and high scalability. However, it may be that some resources in fog computing networks are not suitable for some kind of jobs, or the number of requests increases outside capacity. So, it is more efficient to decrease sending jobs to the cloud. Hence some other fog resources are idle, and it is better to be federated rather than forwarding them to the cloud server. Obviously, this issue affects the performance of the fog environment when dealing with big data applications or applications that are sensitive to time processing. This research aims to build a fog topology job scheduling (FTJS) to schedule the incoming jobs which are generated from the IoT devices and discover all available fog nodes with their capabilities. Also, the fog topology job placement algorithm is introduced to deploy jobs into appropriate resources in the network effectively. Finally, by comparing our result with the state-of-art first come first serve (FCFS) scheduling technique, the overall execution time is reduced significantly by approximately 20%, the energy consumption in the cloud side is reduced by 18%.