• Title/Summary/Keyword: Client/server Environment

Search Result 569, Processing Time 0.036 seconds

Real-time Collaborative Design System in Distributed Environment (분산 환경을 고려한 실시간 협업 설계 시스템)

  • Cha J.H.;Lee S.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.718-723
    • /
    • 2005
  • In this paper, we propose the collaborative design system with which we can simultaneously modify the actual 3D CAD model by the remote control and have interaction on it. It enables instantaneous decision making among the multiple disciplines in distributed locations using the function of simultaneous access and video conference. It also provides the method of managing the consistency between design entities. This system consists of Collaborative Management Server, File Server, Solid Modeler Client, Remote Control Module and Client Module.

  • PDF

Conference System for CAD Based on Product Data Standard (제품 데이터 표준에 기반한 원격회의 지원 시스템)

  • Choi, Young;Yang, Sang-Wook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.3
    • /
    • pp.200-209
    • /
    • 1999
  • This paper presents a 3D-conferencing system as a prototype implementation of concurrent and distributed engineering environment using CORBA-Java and SDAI-Java. The system consists of some client and server objects that communicate with each other via ORB. The server objects use lightweight version of current working draft of SDAI-Java to access STEP product data models, and the client objects provide user-friendly graphical interface. The proposed system can be used for communicating with 3D CAD data between remote designers, manufactures and customers regardless of he H/W or S/W platforms they use.

  • PDF

Implementation of an Open Artificial Intelligence Platform Based on Web and Tensorflow

  • Park, Hyun-Jun;Lee, Kyounghee
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.3
    • /
    • pp.176-182
    • /
    • 2020
  • In this paper, we propose a web-based open artificial intelligence (AI) platform which provides high convenience in input data pre-processing, artificial neural network training, and the configuration of subsequent operations according to inference results. The proposed platform has the advantages of the GUI-based environment which can be easily utilized by a user without complex installation. It consists of a web server implemented with the JavaScript Node.js library and a client running the tensorflow.js library. Using the platform, many users can simultaneously create, modify and run their projects to apply AI functionality into various smart services through an open web interface. With our implementation, we show the operability of the proposed platform. By loading a web page from the server, the client can perform GUI-based operations and display the results performed by three modules: the Input Module, the Learning Module and the Output Module. We also implement two application systems using our platform, called smart cashier and smart door, which demonstrate the platform's practicality.

A Study of Design and Implementation for Remote Monitoring and Control System based on Environment of Real-Time Prototyping development (실시간 프로토타이핑 개발 환경 기반의 원격 감시 및 제어 시스템 설계 및 구현에 관한 연구)

  • 김종일;이정배;박병관;이영란
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.187-190
    • /
    • 2003
  • This thesis is dealing with conveyer remote monitoring and control system for shoes process formed by client/server, which is based on Web. Modules for watching and controlling images in a remote by client is manufactured under JAVA, and conveyer server for real-time controlling is founded on RTLinux. And device driver and APIs are developed based on it. Through both manufacturing these software and LEGO-based prototyping, it would present the real-time conveyer controlling system founded on Web to be applied to industrial spots.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-server Model under Security Conditions

  • Jeong, Ki-Moon;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.977-981
    • /
    • 2000
  • The traditional client-server model RPC and mobile agents have been used for interprocess communication between processes in different hosts. The performances of two mechanisme were analyzed in the literature [4, 6, 9]. But the security services which extensively affect the performance of systems because of low speed have not been considered. We propose two performance models considering the security services for the RPC and the mobile agent Through the analysis of the models, we show that the execution time of the mobile agent takes less than the RPC In the environment considering security services.

  • PDF

Patch Integrity Verification Method Using Dual Electronic Signatures

  • Kim, JunHee;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1516-1526
    • /
    • 2017
  • Many organizations today use patch management systems to uniformly manage software vulnerabilities. However, the patch management system does not guarantee the integrity of the patch in the process of providing the patch to the client. In this paper, we propose a method to guarantee patch integrity through dual electronic signatures. The dual electronic signatures are performed by the primary distribution server with the first digital signature and the secondary distribution server with the second digital signature. The dual electronic signature ensures ensure that there is no forgery or falsification in the patch transmission process, so that the client can verify that the patch provided is a normal patch. The dual electronic signatures can enhance the security of the patch management system, providing a secure environment for clients.

Implementing of Security System using Shell Script in UNIX (UNIX상에서 Shell 스크립트를 이용한 보안 시스템 구현)

  • Lee, Min-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.868-870
    • /
    • 2003
  • In this paper, I have implemented the security system using shell script that periodically checking the security elements of unix system for security it transmit to a monitoring server and monitoring many clients. Agent of client executing by crontab scheduler, Environment of server to receive data use restricted TFTP in SunOS. And then, Because of using shell script, apply shell to system with flexible, control performance, and can meet on a sudden situation.

  • PDF

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

An Efficient Peer-to-Peer Based Replication Strategy for Data Grid (데이터 그리드를 위한 효율적인 Peer-to-Peer 기반 복제 정책)

  • Oh, Sang-Won;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.10-17
    • /
    • 2008
  • In this paper, we propose an efficient data replication strategy based on Peer-to-Peer which improves the performance of Data Grid system. The key idea of this replication strategy is to add the Peer-to-Peer concept for reducing data transmission restriction caused by hierarchical topology. And, it makes the nodes can store data replica to set a critical section at the storage of client level nodes. Therefore, it is possible to transmit the data replica between client level nodes and from client level nodes to upper data replication server. It is more effective to transmit data replica between client level nodes than transmitting data replica 1mm data server or data replication server with respect to minimize the transmission time. This results in improving the performance of Data Grid system. Through simulation, we show that the proposed data replication strategy based on Peer-to-Peer improves the performance of entire Data Grid environment compared to previous strategies.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.