• Title/Summary/Keyword: IT 기반의 서비스 환경

Search Result 2,372, Processing Time 0.035 seconds

VDI Performance Optimization with Hybrid Parallel Processing in Thick Client System under Heterogeneous Multi-Core Environment (Heterogeneous 멀티 코어 환경의 Thick Client에서 VDI 성능 최적화를 위한 혼합 병렬 처리 기법 연구)

  • Kim, Myeong-Seob;Huh, Eui-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.163-171
    • /
    • 2013
  • Recently, the requirement of processing High Definition (HD) video or 3D application on low, mobile devices has been expanded and content data has been increased as well. It is becoming a major issue in Cloud computing where a Virtual Desktop Infrastructure (VDI) Service needs efficient data processing ability to provide Quality of Experience (QoE) in Cloud computing. In this paper, we propose three kind of Thick-Thin VDI Service which can share and delegate VDI service based on Thick Client using CPU and GPU. Furthermore, we propose and discuss the VDI Service Optimization Method in mixed CPU and GPU Heterogeneous Environment using CPU Parallel Processing OpenMP and GPU Parallel Processing CUDA.

A Private Key Management Guideline For Secure Blockchain-Based Services (안전한 블록체인 기반 서비스를 위한 개인키 관리 가이드라인)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.899-914
    • /
    • 2022
  • A blockchain-based decentralized service can offer reliable services without the centralized server by operating the system based on the consensus among byzantine participants. Participants can interact with the blockchain network through a digital signature mechanism but the private key management issue remains unresolved. NIST SP800-57 provides a key-management guidance but this guidance is not appropriate for blockchain-based services because it does not consider a decentralized environment. In this paper, we define the core functions of the blockchain wallet application for private key management and present security protections according to NIST SP800-57, as well as related techniques to satisfy them. Finally, we propose the private key management guideline for secure blockchain-based decentralized services.

Development of a RIA-based Dynamic Mashup Service for Ocean Environment (RIA 기반 해양 환경 동적 매쉬업 서비스 개발)

  • Ceong, Hee-Taek;Kim, Hae-Jin;Kim, Hae-Ran
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2292-2298
    • /
    • 2010
  • A mashup is a web page or application that uses and combines information, contents or Open APIs available on the web to create a new service. The mashup developed by the need not combination of simple information can contribute to new added-values with practicality and convenience. Thus, in this paper, we want to develop a RIA-based dynamic mashup service for the users considering weather forecast and marine information importantly. We design and implement the system that it can register a number of information about a domain dynamically through registration process based on the map and present a mark of domain location on the map and the information including internal environment, external environment and weather of related to the domain within a webpage. Implemented service need not require a tedious process visiting other web sites every time to confirm the relevant information because we can see simultaneously related information with a map within a page.

A Design of Ontology-driven U-Service in U-City (U-City에 있어서 온톨로지 기반 U-서비스 설계)

  • Kwon, Chang-Hee
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.179-184
    • /
    • 2012
  • The ultimate purpose of cities is 'the enhancement of quality of life in city'. In order to achieve this, it is required to optimize the Ontology-driven ubiquitous services included in the U-City and UIS of regions and communities and so on. Almost U-Service's contents are related to spatial or temporal extent. So it is important to design Spatio-temporal event schema for efficient access to U-City. There is a rapid change into an urban society in the shape of Ontology-driven ubiquitous services in which a content on a region or an incident is newly reconstructed through various ideas with the influence of the ubiquitous environment.

Design of Emergency Notification Smart Farm Service Model based on Data Service for Facility Cultivation Farms Management (시설 재배 농가 관리를 위한 데이터 서비스 기반의 비상 알림 스마트팜 서비스 모델 설계)

  • Bang, Chan-woo;Lee, Byong-kwon
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Since 2015, the government has been making efforts to distribute Korean smart farms. However, the supply is limited to large-scale facility vegetable farms due to the limitations of technology and current cultivation research data. In addition, the efficiency and reliability compared to the introduction cost are low due to the simple application of IT technology that does not consider the crop growth and cultivation environment. Therefore, in this paper, data analysis services was performed based on public and external data. To this end, a data-based target smart farm system was designed that is suitable for the situation of farms growing in facilities. To this end, a farm risk information notification service was developed. In addition, light environment maps were provided for proper fertilization. Finally, a disease prediction model for each cultivation crop was designed using temperature and humidity information of facility farms. Through this, it was possible to implement a smart farm data service by linking and utilizing existing smart farm sensor data. In addition, economic efficiency and data reliability can be secured for data utilization.

Reserved Virtual Resource Management for Cloud Computing (클라우드 컴퓨팅을 위한 예약 기반 가상 자원 관리 기법)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.125-126
    • /
    • 2013
  • 클라우드 컴퓨팅 환경에서, 모든 IT 자원은 가상화된 자원(Virtualized Resource)의 형태로 클라우드 서비스 사용자에게 제공되고 사용자는 자신이 점유한 시간만큼만 자원 사용 비용을 클라우드 서비스 제공자에게 지불하면 된다. 서비스 제공자는 서비스 사용자가 처리하고자 하는 어플리케이션의 특성을 고려하여 온디맨드(On-demand) 및 예약형(Reserved) 가상 자원 가격 정책을 제공한다. 따라서 서비스 사용자는 서비스 제공자의 제안 가격 정책을 기반으로 어플리케이션의 처리 예상 시간 및 지불 비용을 고려하여 효율적인 자원 요청 계획을 수립해야 한다. 본 논문에서는 클라우드 브로커링 시스템(Cloud Brokering System)을 통해 자원 할당 정책을 수행하여 연동된 다중 사용자에게 비용 효율적인 자원을 제공하는 구조 및 프로세스를 소개한다.

NGN Service Convergence Scenarios (NGN환경에서 서비스 융합 시나리오)

  • IN, Min-Kyo;Lee, Kang-Chan;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.732-734
    • /
    • 2005
  • Current Internet services do not consider the service level interoperability because each service is developed with its own interface, which is not compatible with other services. This means that characteristics of Internet services are autonomous and heterogeneous. Moreover each service has its own access method, data representation, and data structure. This will make it difficult for NGN services to be converged. For the convergence scenarios of NGN services, interoperability among different applications shall be supported in service layers in various network environments. In order to realize this, integration function in applications is necessary. And, it is also required that NGN services shall consider to adopt the conventional E-business framework such as ebXML in order to create value added services.

  • PDF

An Exploratory Study on Paradigms, Policies in the Digital Convergence Era (디지털 컨버전스 시대의 특징 : 그 패러다임과 정책 방향)

  • Han, Hak-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.455-461
    • /
    • 2012
  • The paper explores the relationship among paradigms, ecosystem which need to establish broadcasting, information and communications industry as the core of national competitiveness in the digital convergence era, and proposes the future progressing strategies and policies directions that consider environmental factors which all mass media converged on Internet. This paper makes an attempt to contribute innovative & integrated perspectives in the industry.

Improvement of VoIP Service over Mobile Ad-Hoc Network (MANET 기반 VoIP 서비스 성능 개선)

  • Ming, Li;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.795-797
    • /
    • 2009
  • Voice over Internet Protocol(VoIP) service becomes more and more popular nowadays. As such, it is developed over many kinds of network models, especially wireless networks. Mean Opinion Score(MOS) computes the QoS of VoIP service which should be supported by robust network environment. However, MANET is not stable enough to supply high MOS values for VoIP service. In this paper, VoIP service over MANET is simulated using ns-2(Network Simulation 2). In oder to get different MOS values in the results, we differentiate between network environments by adjusting the parameters of MANET.Through comparing the results we can know how to improve the QoS.

  • PDF

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.