• 제목/요약/키워드: Internet Computing

검색결과 3,534건 처리시간 0.028초

Comparative Analysis of Elementary School Computing Achievement Standards in the U.S. and Korea

  • Kim, Kapsu;Min, Meekyung;Rho, Jungkyu
    • International journal of advanced smart convergence
    • /
    • 제9권2호
    • /
    • pp.147-156
    • /
    • 2020
  • ACM's CSTA has drafted standards for computing curricula and recommended them to schools in the United States. The five core concepts of the US elementary school computing curriculum are computing systems, network and the Internet, data and analysis, algorithms and programming, and impacts of computing. In 2005, Korea prepared ICT education guidelines, including five fields, their subfields, and achievement criteria for each subfield. In the 2015 revised curriculum, software education was introduced and five achievement standards were set. The ACM CSTA has 18 achievement criteria up to K-2 and 21 achievement criteria up to K-5. If we compare the 39 achievement standards of the US to Korea, Korea's 2005 ICT education guidelines include 25 of these, and the 2015 revised curriculum includes 5 of them. In this study, we aim to study the CSTA achievement criteria that second graders should know and the achievement criteria that fifth graders should know. This is compared and analyzed with Korea's 2005 ICT Guidelines and 2015 Software Curriculum. In comparison with the number of achievement standards, the US elementary school's computing achievement standards are much higher than in Korea. Comparing with each standard, there are many areas that are not covered in Korean curriculum, and we can see that the 2015 curriculum has rather receded from 2005.

MediaCloud: A New Paradigm of Multimedia Computing

  • Hui, Wen;Lin, Chuang;Yang, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.1153-1170
    • /
    • 2012
  • Multimedia computing has attracted considerable attention with the rapid growth in the development and application of multimedia technology. Current studies have attempted to support the increasing resource consumption and computational overhead caused by multimedia computing. In this paper, we propose $MediaCloud$, a new multimedia computing paradigm that integrates the concept of cloud computing in handling multimedia applications and services effectively and efficiently. $MediaCloud$ faces the following key challenges: heterogeneity, scalability, and multimedia Quality of Service (QoS) provisioning. To address the challenges above, first, a layered architecture of $MediaCloud$, which can provide scalable multimedia services, is presented. Then, $MediaCloud$ technologies by which users can access multimedia services from different terminals anytime and anywhere with QoS provisioning are introduced. Finally, $MediaCloud$ implementation and applications are presented, and media retrieval and delivery are adopted as case studies to demonstrate the feasibility of the proposed $MediaCloud$ design.

클라우드 컴퓨팅에서 사용자 작업환경의 끊김 없는 연계를 위한 웹 서비스 연결 관리 기법 (Web Service Connection Management Scheme for Seamless Migration of User Workspace in Cloud Computing)

  • 최민
    • 한국IT서비스학회지
    • /
    • 제8권1호
    • /
    • pp.193-202
    • /
    • 2009
  • Cloud computing emerges as a new computing paradigm which targets reliable and customizable services. The term builds on decades of research in virtual machine, distributed and parallel computing, utility computing, and more recently networking, web service, and software as a service. In this paper, we provide a seamless connection migration of web services. This is useful for cloud computing environment in which many client terminals have mobility. With the wireless internet facility, those mobile users can move place to place during internet communication. Therefore, we provide solutions to the two major problems in current virtualization based migration: communication failure problems and connection re-establishment. Communication channel flushing by zero window notification helps to resolve the communication failure problems and TCP port inheritance prevents connection re-establishment errors during socket reconstruction. Thus, our web service migration facility is now able to preserve open network connections, and even for server sockets. This is a highly transparent approach, in that we did not Introduce additional messages for channel flushing and did not make any modification to the TCP protocol stack. Experimental results show that the overhead due to connection migration of web services is almost negligible when compared with time to take the conventional web service migration.

Design and Implementation of Physical Computing Education Content based on Augmented Reality

  • Kim, So-Young;Jung, Eunmi;Kim, Heesun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권4호
    • /
    • pp.198-205
    • /
    • 2022
  • Along with a variety of coding education, physical computing education for controlling various sensors is being actively conducted for elementary, middle, and high school students in line with the era of the fourth industrial revolution. A problem with physical computing education using Arduino is pin connection errors between Arduino and various sensors. Most of the students who come into contact with the Arduino for the first time often do not know the purpose of the Arduino pin and the connection position of the pin. Also, hardware built with incorrect pin connections to the Arduino board often does not work properly. If this case continues, students will lose interest in coding education. Therefore, in this paper, we implemented an augmented reality application that informs the connection process of the Arduino board and the sensor during physical computing coding education using Arduino, and designed and implemented educational content for the Arduino pin position and connection process. First, we explain the role of the Arduino board and the sensor and the location of the pins. After that, the students run the educational augmented reality educational content using their smartphones and check the correct pin connection process between the Arduino and the sensor. In the physical computing education, augmented reality content is used to increase the understanding and immersion of the class. It is expected that the educational effect will also increase by inducing fun and interest in physical computing coding education.

모바일 컴퓨팅 환경에서 확장 가능한 ID 연동 시스템 설계 및 구현 (Design and Implementation of Scalable ID Federation System in Mobile Computing Environments)

  • 유인태;김배현;문영준;조영섭;진승헌
    • 인터넷정보학회논문지
    • /
    • 제6권5호
    • /
    • pp.155-166
    • /
    • 2005
  • 현재의 네트워크 환경에서는 사용자들이 인터넷상의 여러 서버에 대하여 각각의 독립된 ID(Identity)를 사용하고 있기 때문에 사용자들이 많은 수의 ID와 패스워드를 관리해야하는 불편함이 있다. 이러한 문제를 해결하기 위해 ID 관리 시스템을 사용하지만, 앞으로 도래할 유비쿼터스 컴퓨팅 환경에서는 유무선 네트워크상의 수많은 컴퓨터들이 유기적으로 연결되기 때문에 사용자 ID 및 패스워드 관리가 더욱 복잡해지고, 기존의 단일 신뢰영역(COT: Circle of Trust)의 ID 관리 시스템으로는 이러한 어려움을 해결하기에 충분하지 않다. 본 논문에서는 이러한 문제를 해결하기 위해 다중 신뢰영역 간의 ID 연동(ID Federation)을 유선 컴퓨팅 환경에서뿐만 아니라 모바일 컴퓨팅 환경으로 확장하기 위한 ID 연동 모델을 도출하고 시스템을 구현하였다. 제안한 ID 연동 모델은 ID 확장성 실험을 통해 서로 다른 신뢰 영역에 있는 시스템간에 ID 연동이 가능함을 검증하였다.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구 (Research on Convergence of Internet-of-Things and Cloud Computing)

  • 최경;김미희
    • 한국콘텐츠학회논문지
    • /
    • 제16권5호
    • /
    • pp.1-12
    • /
    • 2016
  • 사물인터넷 기술은 다양한 사물 및 인간에게서 생성되는 정보를 전산화하여 인터넷을 통해 연결함으로써 다양한 분야에 적용되고 있다. 사물인터넷의 스마트 기기들은 저전력, 저용량, 제한된 처리 능력 등의 한계적 특성들을 보완하기 위해 클라우드 컴퓨팅 기술과 접목되며 이제 하나의 패러다임으로 자리매김하고 있다. 본 논문에서는 사물인터넷과 클라우드 컴퓨팅 기술의 정의, 특징, 및 서비스들을 살펴보고, 사물인터넷과 클라우드 컴퓨팅 융합의 필요성과 기존 융합 패러다임 및 융합 사례, 플랫폼들을 조사, 분석하였다. 그 결과, 사물인터넷의 여러 제약점들을 클라우드의 특징으로 보완하여 확장성, 상호운용성, 신뢰성, 효율성, 가용성, 보안성, 접근 용이성, 사용 용이성, 배치 비용 감소 등의 다양한 장점들이 제공됨에도 불구하고 해결해야 할 과제들이 존재하였다. 이러한 융합 패러다임의 새로운 이슈들을 분석하고, 융합을 위해 해결해야 할 연구 과제를 제언한다.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.

Isolation Schemes of Virtual Network Platform for Cloud Computing

  • Ahn, SungWon;Lee, ShinHyoung;Yoo, SeeHwan;Park, DaeYoung;Kim, Dojung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2764-2783
    • /
    • 2012
  • Network virtualization supports future Internet environments and cloud computing. Virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable cloud services. Owing to several advantages such as low cost, high flexibility, and better manageability, virtualization has been widely adopted for use in network virtualization platforms. Among the many issues related to cloud computing, to achieve a suitable cloud service quality we specifically focus on network and performance isolation schemes, which ensure the integrity and QoS of each virtual cloud network. In this study, we suggest a virtual network platform that uses Xen-based virtualization, and implement multiple virtualized networks to provide variable cloud services on a physical network. In addition, we describe the isolation of virtual networks by assigning a different virtualized network ID (VLAN ID) to each network to ensure the integrity of the service contents. We also provide a method for efficiently isolating the performance of each virtual network in terms of network bandwidth. Our performance isolation method supports multiple virtual networks with different levels of service quality.