• Title/Summary/Keyword: End-user computing

Search Result 132, Processing Time 0.023 seconds

THE ROLE OF USING A TABLET COMPUTER FOR MOBILE COMMUNICATION ON CONSTRUCTION SITES

  • Ruvinde R. Kooragamage;John M. Kelsey;Simon Julier
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.531-538
    • /
    • 2013
  • The coordination and control of construction projects is vital if a project is to be a success. Almost all analysis has shown that these can only be achieved if good quality communication can be maintained on a construction site. This research focuses on the role that tablet computers could play in enhancing this communication. The following points are investigated in this paper: (a) Whether a tablet computer can enable users to monitor project progress more efficiently than traditional methods, (b) How the tablet computer fits within the project management iron triangle in construction, (c) The two different psychological impacts of information transmission for the end user using a tablet computer (i) The expectancy to transmit information frequently and rapidly from tablet computer users to project members whilst working onsite (ii) The mode of information transmission to the cognition of the transmitted information to the tablet computer. Through the use of structured interviews and questionnaires, the opinions of individuals within various disciplines in construction were canvassed. The approach adopted in this paper deals with understanding both the soft and hard issues for deploying such a system. This research enabled the authors to develop a base framework incorporating the key factors which are relevant for implementing a tablet computer based on information flows primarily.

  • PDF

Scalable and Dynamically Reconfigurable Internet Service System Based on Clustered System (확장과 동적재구성 가능한 클러스터기반의 인터넷서비스 시스템)

  • Kim Dong Keun;Park Se Myung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1400-1411
    • /
    • 2004
  • Recently, explosion of internet user requires fundamental changes on the architecture of Web service system, from single server system to clustered server system, in parallel with the effort for improving the scalability of the single internet server system. But current cluster-based server systems are dedicated to the single application, for example, One-IP server system. One-IP server system has a clustered computing node with the same function and tries to distribute each request based on the If to the clustered node evenly. In this paper, we implemented the more useful application service platform. It works on shared clustered server(back-end server) with an application server(front-end server) for a particular service. An application server provides a particular service at a low load by itself, but as the load increases, it reconfigures itself with one or more available server from the shared cluster and distributes the load on selected server evenly We used PVM for an effective management of the clustered server. We found the implemented application service platform provides more stable and scalable operation characteristics and has remarkable performance improvement on the dynamic load changes.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

On the Design of a New Briadband Personalized Multimedia Network for Future Requirements (미래의 환경에 맞는 새로운 개인 휴대 통신 서비스를 위한 광대역 멀티미디어 통신망의 설계)

  • 최진식;은종관
    • Information and Communications Magazine
    • /
    • v.12 no.10
    • /
    • pp.76-86
    • /
    • 1995
  • In this paper, we propose a new network architecture for the future broadband personalized multimedia network. We first consider the service and technical requirements for supporting future advanced services such as personalized and intelligent communication services. In addition, we consider the design and implementation of the future network. Considering these requirements. we propose a new network architecture and its control scheme that can efficiently support the future personalized and intelligent services as well as broadband multimedia services. The network provides only a relatively simple core set of functions such as basic end-to-end connectivity, integrated access, and primitive network intelligence of user location. More intelligent features (e.g., personalized calling, virtual private networking and so on) can be offered through the additional network facilities or computing devices through an intelligent network.

  • PDF

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

A Study on General Network Framework for Service Mobility (서비스 이동성을 위한 일반적인 네트워크프레임워크 연구)

  • You, Tae-Wan;Lee, Seung-Yun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2069-2074
    • /
    • 2006
  • The Next generation network may describe one integrated network by IP (Internet Protocol) convergence and combining various access technologies. The IP version 6 (IPv6) becomes fundamental protocol and the terminal offered various services is having mobility, multihoming, and intelligent as well as smaller. In this convergence network, which integrate mobile network, broad cast network, and Internet as well as PSTN, can provide all of the service. In this context, we will briefly present that the end node should be required ubiquitous computing and networking. That is to say that we must guarantee the end node in any time, my place, my where, and offer continuously services to the node. As like this, Service Mobility is given if a user can obtain subscribed and personalized services consistently even if connected to a foreign network service provider. In other words, Service mobility allows users to maintain access to their services even while moving or changing devices and network service providers. In this paper, we have to refer technical consideration items to make the service mobility framework.

Dynamic Power Management for Webpage Loading on Mobile Devices (모바일 웹 페이지 로딩에서 동적 관리 기법)

  • Park, Hyunjae;Choi, Youngjune
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1623-1628
    • /
    • 2015
  • As the performance of mobile devices has increased, high-end multicore CPUs have become the norm in smartphones. However, such high performance devices are exposed to the problem of battery depletion due to the energy consumption caused by software performance, and despite increases in battery capacity. The required resources are dynamic and varied, and further user interaction is highly random; thus, Linux-based power management such as DVFS is needed to fulfill requirements. In order to reduce power consumption, we propose a method to restrict the CPU frequency of data download while maintaining user reactivity. This can supplement the weakness of existing Linux-based power management techniques like DVFS in relation to webpage loading. Through the implementation of our method at the application level, we confirm that energy consumption from webpage loading is reduced.

An Empirical Study on the Intention to Reuse Computational Science and Engineering Platforms: A Case Study of EDISON

  • On, Noori;Ryu, Gi-Myeong;Koh, Myoung-Ju;Lee, Jongsuk Ruth;Kim, Nam-Gyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3437-3456
    • /
    • 2020
  • The computational science and engineering field, which combines basic science and computing technology, has emerged as a third scientific methodology, following theories and experiments. This study aimed to identify factors and relationships that affect the continued use of the computational science and engineering (CSE) platform for its successful operation, utilization, and diffusion. To that end, the quality factors of the platform were derived by combining the information system success model and the technology acceptance model. These factors affected user satisfaction and intention to reuse through users' perceived usefulness and perceived ease of use of the platform. An empirical analysis was conducted through a questionnaire survey of 373 users of the EDISON platform, a representative CSE platform in Korea. The results revealed that all quality factors have a positive influence on perceived usefulness and perceived ease of use. Specifically, information quality has a significant influence on perceived ease of use, and system quality has a significant influence on perceived usefulness. Perceived ease of use has a greater impact on user satisfaction than perceived usefulness, and satisfaction affects intention to reuse. The results can contribute to the development of CSE platforms and the development strategy to expand the number of users.

The development of a web-based database system for managing program learning outcomes in a nursing school (일개 간호대학 학생의 학습성과 평가관리를 위한 웹 기반 학습성과 관리시스템)

  • Moon, Mikyung;Lee, Soo-Kyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2665-2673
    • /
    • 2015
  • The purpose of this study is to develop a web-based database system to manage effectively data collected to evaluate program learning outcomes (PO) in a nursing school. The database management system (DBMS) was developed using a software development life cycle method: Analysis, Design, Implementation, and Evaluation. The demands for the content and system of users were collected. The system structure, database using an entity-relationship modeling, and user interface were designed based on the demands. The designed DBMS was created using GWT, Java and Apache HTTP server. The expert group and users evaluated the implemented DBMS. Problems derived from them were modified. The average of end-user computing satisfaction evaluated by 8 nursing faculty and 5 teaching assistants was 4.14 (SD =.44). The web-based PO DBMS makes it possible for nursing faculty members to access and use much of the information needed for analysis and decision-making.

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform

  • Song, Wei;Feng, Ning;Tian, Yifei;Fong, Simon;Cho, Kyungeun
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.162-175
    • /
    • 2018
  • Currently, electricity consumption and feedback mechanisms are being widely researched in Internet of Things (IoT) areas to realise power consumption monitoring and management through the remote control of appliances. This paper aims to develop a smart electricity utilisation IoT platform with a deep belief network for electricity utilisation feature modelling. In the end node of electricity utilisation, a smart monitoring and control module is developed for automatically operating air conditioners with a gateway, which connects and controls the appliances through an embedded ZigBee solution. To collect electricity consumption data, a programmable smart IoT gateway is developed to connect an IoT cloud server of smart electricity utilisation via the Internet and report the operational parameters and working states. The cloud platform manages the behaviour planning functions of the energy-saving strategies based on the power consumption features analysed by a deep belief network algorithm, which enables the automatic classification of the electricity utilisation situation. Besides increasing the user's comfort and improving the user's experience, the established feature models provide reliable information and effective control suggestions for power reduction by refining the air conditioner operation habits of each house. In addition, several data visualisation technologies are utilised to present the power consumption datasets intuitively.