• Title/Summary/Keyword: Connection of transfer information

Search Result 142, Processing Time 0.028 seconds

Design and Implementation of a Secure Communication API Using OpenSSL (OpenSSL을 이용한 보안 통신 API의 설계 및 구현)

  • Jung In-sung;Shin Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.87-96
    • /
    • 2003
  • The additional mechanism is required to set up a secure connection among the communication subjects in the internet environment. Each entity should transfer and receive the encrypted and hashed data to guarantee the data integrity. Also, the mutual authentication procedure should be processed using a secure communication protocol. Although the OpenSSL which implements the TLS is using by many developers and its stability and performance are proved, it has a difficulty in using because of its large size. So, this paper designs and implements the secure communication which the users can use easily by modification works of OpenSSL library API. We proved the real application results using the client/server case which supports a secure communication using the implemented API.

  • PDF

Visual Model of Pattern Design Based on Deep Convolutional Neural Network

  • Jingjing Ye;Jun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.311-326
    • /
    • 2024
  • The rapid development of neural network technology promotes the neural network model driven by big data to overcome the texture effect of complex objects. Due to the limitations in complex scenes, it is necessary to establish custom template matching and apply it to the research of many fields of computational vision technology. The dependence on high-quality small label sample database data is not very strong, and the machine learning system of deep feature connection to complete the task of texture effect inference and speculation is relatively poor. The style transfer algorithm based on neural network collects and preserves the data of patterns, extracts and modernizes their features. Through the algorithm model, it is easier to present the texture color of patterns and display them digitally. In this paper, according to the texture effect reasoning of custom template matching, the 3D visualization of the target is transformed into a 3D model. The high similarity between the scene to be inferred and the user-defined template is calculated by the user-defined template of the multi-dimensional external feature label. The convolutional neural network is adopted to optimize the external area of the object to improve the sampling quality and computational performance of the sample pyramid structure. The results indicate that the proposed algorithm can accurately capture the significant target, achieve more ablation noise, and improve the visualization results. The proposed deep convolutional neural network optimization algorithm has good rapidity, data accuracy and robustness. The proposed algorithm can adapt to the calculation of more task scenes, display the redundant vision-related information of image conversion, enhance the powerful computing power, and further improve the computational efficiency and accuracy of convolutional networks, which has a high research significance for the study of image information conversion.

A Maximum Mechanism of Data Transfer Rate using Parallel Transmission Technology on High Performance Network (고성능 네트워크에서 병렬 전송 기술을 이용한 전송률 극대화 메커니즘)

  • Kim, Young-Shin;Huh, Eui-Nam
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.9
    • /
    • pp.425-434
    • /
    • 2007
  • Even though Internet backbone speeds have increased in the last few years due to projects like Internet 2 and NGI, many high performance distributed applications are able to achieve only a small fraction of the available bandwidth. The cause of such problem is due to a character of TCP/IP. The primary goal of this protocol is reliable data transmission. Therefore high speed data transmission didn't be considered when TCP/IP is designed. Hence several researchers have been studied in order to solve the problem of TCP/IP. One of these research results, parallel transfer technique, solves this problem to use parallel TCP connections on application level. Additionally, this technique is compatibility. Recently, these researchers have been studied a mechanism to decide the number of parallel TCP connections. However, some researchers reported the number of parallel TCP connection base on only empirical results. Although hardware performance of host affects transmission rate, the hardware performance didn't be considered in their works. Hence, we collect all data related to transmission rate, such as hardware state information (cpu utilization, interrupt, context switch). Then, we analyzed collected data. And, we suggest a new mechanism determining number of parallel TCP connections for maximization of performance based on our analysis.

Design and implementation of Fault-tolerant CORBA Service for reliability on Real-Time CORBA (실시간 CORBA상에서의 신뢰성 지원을 위한 결함허용 서비스의 설계 및 구현)

  • 김영재;박기용;홍성준;한선영
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.23-31
    • /
    • 2001
  • Current CORBA has been suggested a solution for complexity of software in distributed environment. But it can't provide reliability about data transfer. For instance, CORBA can't provide object to client when the network are unstable or congested. In an existing CORBA, client has to wait when there is congestion between client and object implementation while client get a service from object implementation. So In this paper, we propose Fault-Tolerant CORBA Service (FTS) which has an intelligent redirection about an object that client requests. Moreover, we designed and implemented Fault-Tolerant Service to provide reliability by extending existing CORBA ORB. Therefore it provides reliable connection throughout the proposed Fault-Tolerant Service.

  • PDF

Intranet Based Intelligent Messenger connection research (인트라넷 기반 지능형 메신저 관련연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.5 no.4
    • /
    • pp.283-288
    • /
    • 2004
  • This paper presents research in intelligent massenger technique for Cyber University to support accessing university database. Proposed techniques enables better communication between students and professons by using intelligent messenger. Intranet based massenger support simple message transfer and multimedia chatting service within homogeneous network or members in same group. Using niversity database it provide personalize information for each different user demand needs and through managing technique user could effectively organize members of group. To embody intelligent massenger, JMF(Java Media Frame Work), RMI(Remote Method Invocation), XML techniques were proposed and in result constructing effective community.

  • PDF

Multiple Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network (Ad Hoc 네트워크 라우팅 보안을 위한 다중경로 기반의 MP-SAR 프로토콜)

  • Han, In-Sung;Ryou, Hwang-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.260-267
    • /
    • 2008
  • As pervious the SAR(Security Aware Routing)[10] protocol is an secure Ad Hoc network protocol that finds a secure path, it is the security routing protocol that uses the security level of nodes as the routing information. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV[6], it will cause transmission delay as researching of security routing path. when a node is out of the data transmission range as its battery dying or movement. Although it is possible to connection of nodes because a characteristic of the SAR protocol, the connection is not easy to reconnect when the security level of intermediate node is lower than the level requested by a source node. In this paper, we suggest the MP-SAR based on the SAR to solve the SAR protocol's problem. The MP-SAR seeks multiple secure path for maintenance of data confidentiality using the expanded secure path detection techniques based on the SAR. It can transfer data quickly and reliably by using the shortest efficient path among multiple paths. In the research result, we proved a outstanding performance of MP-SAR than the previous SAR through comparison and analysis.

A Study of Information Systems Development for Marketing Strategy (효율적(效率的)인 마아케팅 정보(情報) 시스템 구축(構築) 방안(方案)에 관한 연구(硏究))

  • Won, Doo-Hi
    • Korean Business Review
    • /
    • v.4
    • /
    • pp.355-383
    • /
    • 1991
  • 1. The Purpose of This study research: The focus of marketing until recently has simply been on sales which means the transfer of goods from the producer to the consumer and on profits therefrom. However, the excess supply of goods due to the expansion of the economy and the resulting fierce competition between companies have changed the nature of marketing. Maximizing consumers' satisfaction and establishing marketing mix strategies for market subdivision and penetration into the target market are now significant roles of the marketing manager. In addition, with regard to company management, information within the company which had been collected, managed and processed sporadically indegrated manner. The purpose of this research on marketing information systems in connection with the above will be to seek ways enabling us to create an efficient and integrated information system for an entire company. 2. The Method and Scop of This Stdudy: Marketing information systems, as a part of management information systems, shall be examined based on relevant theoretical literature. The research process shall be generally developed as follows: 1) The basic structure of the marketing information systems, including its fundamental purpose and necessity, shall be examined. 2) The method for a specific plan shall be presented through fundamental marketing strategy concepts and marketing decision-making. 3) A general model shall be presented based on examinations of various mod els used for marketing information systems and on research of the models' relationship with management information systems. 4) The direction of development shall be presented as the basis for gradual development following examination of the scope, pertinent issues, and means of improvement of the marketing information systems. 3. Summary and Conclusion: As the competition among the enterprises has become keen and thus the management of the contemporary enterprises shows the tendencies of uncertainty as well as complexity, all the managers must make the correct and prompt decision of their mind. Otherwise, the danger which will lead to and failure in the failure in the business may befall to the enterprise. Though computer system and information related techniques have the endless potentiality for the improvement of the enterprise, those are granted only to the enterprise which will be able to manage the computer system and information related techniques. In the contemporary industrial society, the need to a managerial information system has been increasing because all the complicated information can be stored, disposed and managed by the efficient method. And the marketing information system is also the integrated system which has been formed and developed through the efficient mixture of all the constituent elements including the definition of marketing research as the definition of the information system has been enlarged due to the reason shown above. The common point of the two systems is the man machine system functioning to help the efficient decision of the mind by introducing the computer system on the basis of user manager centered thought in order to provide informations to be useful in operation and management of the organization and the function of the mind decision. The purpose for the marketing information system lies in making the utmost use of marketing information available in the course of the mind decision. The reason why the contemporary enterprises necessitate the marketing information system are as follows: 1) The stages of the business operation are expanded wide to the world. 2) As the living standards of the consumers have been on the rise, the enter prise has to satisfy the consumer's "wants" than simple "needs".

  • PDF

A Modular Architecture and Its Procedure of Signalling at the NNI for B-ISDN in korea (국내 B-ISDN 망노드접면에서의 신호방식 모듈러 구조 및 절차)

  • Park, Nam-Hun;Min, Byeong-Do;Lee, Seok-Gi;Cha, Yeong-Uk;Kim, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.531-542
    • /
    • 1997
  • In this paper,we propose applicable methodology using simple scenarios for the architecture and its procedure of sibnalling at the NNI for B-ISDN in Korea.By the recent technologies,the flexible and intergrated networks of the future are designed, and the infrastructure hardware and software of those networks are sdsigned based on the modular concepts.Also the ATM-based B-ISDN must be able to support the broadband transmission function for providing various services with diverse bandwidths such as multimedia serivce and the function for controlling services and bandwidth is necessaty.Currently,the trquirements at the NNI for B-ISDN in korea atr based on the network mode connection type which is connection setup strucuture.They must show the upper/lower layer conformance to have the flexibility in new services and guarantee the interoperability between the network functions.But,network functions and protocol specifications described in this paper are limity to the first stage target system in korea.Therefore,we present the modular architecture which is corresponding to the B-ISUP of HAN/B-ISDN with those characteristics.Currently applicable architecture and procedure for B-ISUP and the functions of expandable modular architecture are also proposed.

  • PDF

Designing of Block-Type Puzzle Assembly Robot Education System without Computer (언플러그드 블록형 퍼즐 조립 로봇교육 시스템 설계)

  • Song, Jeong-Beom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.183-190
    • /
    • 2013
  • Many researchers in the 21st century has found that robot education is effective to develop the learners' creativity and problem-solving ability. However, the robot education can only be applied to the students whose computer skills are high. Also it can be taught in the well-prepared computer classroom. Students have to learn machine language to control their robots, and robots are controlled by different types of software. Therefore this study has constructed command-based programming blocks to do a robot programming without computers. It also presents a prototype of the programming process and a technological method to combine the command and the programming blocks. We used the blocks which are similar with something in flow chart: to support intuition, and to help students transfer what they learned. And types of blocks and details are described for the Robot Programing Education. Combination of command blocks is made by RS-485 connection method and, it is designed to intercommunicate with connected blocks. It also presents a prototypes: of the programming process using designed command blocks, and of the possibility of Unplugged Robot Education System.

Design and Implementation of VoIP Equipment including Telephone Function for Home Gateway Connection (전화기 기능을 포함한 홈 게이트웨이 접속용 VOIP 장비 설계 및 구현)

  • Lee Yong-Soo;Jung Kwang-Wook;Chung Joong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.123-131
    • /
    • 2004
  • Internet is absolutely contributed to information technology revolution nowadays. Internet services such as voice and data, etc. are provided home or small office via home gateway. The development of communication equipment via home gateway is implemented rapidly, and its product various. This paper presents the design and implementation of the VoIP equipment including the telephone function based on the embedded environment and being connected to the home gateway and the PC because of taking 2-ethernet LAN ports. As developing environment, the STLC1502 developed at ST Microelectronics as single chip solution, VxWorks as RTOS, and C language as coding mechanism are used. The verification of the developed systems for the voice test is carried out for the gatekeeper via Internet. The performance parameter is considered as the call processing capacity measuring the time of the call setup and clearing, and the data processing capacity for the file transfer. As a call setup and clearing is about 95ms, the call processing capacity is about 10 calls per second. The data processing capacity is 5.7Mbps in case of file transfer of server and client environment. Therefore the performance result is satisfied in the aspect of the call processing time and the data transfer time in Internet.

  • PDF