• Title/Summary/Keyword: Local Computing

Search Result 532, Processing Time 0.022 seconds

Ubiquitous-campus recruit service model for members based on mobile computing environments (모바일 컴퓨팅 환경기반의 u-Campus 구성원 중심의 취업 서비스 모델)

  • Ryu, Sang-Ryul;Kim, Hyeock-Jin;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1296-1303
    • /
    • 2008
  • Recently, the university environment has been changed faster than before. It has based on university environment and IT infrastructure. Especially, most of local university has devised development plan such as improving the image and competitive power of campus. Digital, Electronic and Mobile Campus has increased the importance as people realize that the use of technology can improve the learning process. U-Campus of latest IT Technology need a service environment of which the practical use is possible through IT analysis of the members. For example u-campus setup of mobile offers the convenience to the members. We expected thing to use much, even though actual condition investigation about IT environment of the user is insufficient. The inconvenience of mobile could not be activated to the service for proactive use. The importance became the result about u-campus service setup of a company and university center. This service environment cannot offer specific information of center members for which the service implements. In this paper, we studied about members centralized u-campus model through u-recruit, campus information mobile service on university.

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

Improved Broadcast Algorithm in Distributed Heterogeneous Systems (이질적인 분산 시스템에서의 개선된 브로드캐스트 알고리즘)

  • 박재현;김성천
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.11-16
    • /
    • 2004
  • Recently, collaborative works are increased more and more over the distributed heterogeneous computing environments. The availability of high-speed wide-area networks has also enabled collaborative multimedia applications such as video conferencing, distributed interactive simulation and collaborative visualization. Distributed high performance computing and collaborative multimedia applications, it is extremely important to efficiently perform group communication over a heterogeneous network. Typical group communication patterns are broadcast and Multicast. Heuristic algorithms such as FEF, ECEF, look-ahead make up the message transmission tree for the broadcast and multicast over the distributed heterogeneous systems. But, there are some shortcomings because these select the optimal solution at each step, it may not be reached to the global optimum In this paper, we propose a new heuristic algerian that constructs tree for efficiently collective communication over the previous heterogeneous communication model which has heterogenity in both node and network. The previous heuristic algorithms my result in a locally optimal solution, so we present more reasonable and available criterion for choosing edge. Through the performance evaluation over the various communication cost, improved heuristic algorithm we proposed have less completion time than previous algorithms have, especially less time complexity than look-ahead approach.

Resource Sharing System Base on Context-Awareness for Construction of Mobile Ubiquitous Internet (모바일 유비쿼터스 인터넷 구축을 위한 상황인식 기반 자원공유 시스템)

  • Na Seung Won;Oh Se Man
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.419-424
    • /
    • 2004
  • Mobile Internet using mobile devices provides Portability to users and is Spreading throughout out lives. But Practical use of the mobile Internet is insufficient due to it's fundamental limitations. Especially, mobile resources are not sufficient because they are not closely connected under current mobile Internet services which are provided with pre-designed structure. For these reasons it will take a lot more time and effort for mobile Internet to grow as a popular service. In this paper, we are focusing to overcome the local limitation and to enhance the 'Sharing of Mobile Resources' by expanding mutual connectivity between resource objects scattered over the mobile Internet environment. To archive this, we propose the MRSS(Mobile Resources Sharing System). MRSS automatically converts single request from user to multiple instructions based on 'Context-Awareness' to search for proper information. Using MRSS, we can expect 'Mobile Ubiquitous Computing' environment which users can reach to information anywhere, anytime.

The RTP Payload Format for Telepointing (원격지정을 위한 RTP 페이로드 형식)

  • Jeon, Jae-U;Baek, Hui-Suk;O, Sam-Gwon;Im, Gi-Uk
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.29-36
    • /
    • 2002
  • For the efficient collaboration awareness, the CSCW (Computer-Supported Cooperative Work) systems provide functions such as telepointing, snap-shot, and document/project tracking. Among these, telepointing allows an event occurrence on the shared window of a local computing system to be presented in remote computing systems. Although telepointing has been mentioned in the literature, few research papers deal with the functional requirements and protocols for telepointing. This parer describes the functional requirements and payload format for RTP (Real-Time Transport Protocol)-based telepointing. In order to evaluate the performance of the proposed RTP-barred telepointing, we have implemented a whiteboard and compared it with that of the Microsoft Netmeeting. The evaluation results show that the proposed telepointing performs better in terms of CPU usage and the amount of network traffic.

A Study on the Internet Broadcasting Image Processing based on Offloading Technique on the Mobile Environments (모바일 환경에서 오프로딩 기술 기반 인터넷 방송 영상 처리에 관한 연구)

  • Kang, Hong-gue
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.63-68
    • /
    • 2018
  • Offloading is a method of communicating, processing, and receiving results from some of the applications performed on local computers to overcome the limitations of computing resources and computational speed.Recently, it has been applied in mobile games, multimedia data, 360-degree video processing, and image processing for Internet broadcasting to speed up processing and reduce battery consumption in the mobile computing sector. This paper implements a viewer that enables users to convert various flat-panel images and view contents in a wireless Internet environment and presents actual results of an experiment so that users can easily understand the images. The 360 degree spherical image is successfully converted to a plane image with Double Panorama, Quad, Single Rectangle, 360 Overview + 3 Rectangle depending on the image acquisition position of the 360 degree camera through the interface. During the experiment, more than 100 360 degree spherical images were successfully converted into plane images through the interface below.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

A Study on the Activation Plan for Regional Industry Ecosystem Using AHP Technique -Focused on the Automobile Industry in Gwangju- (AHP 기법을 활용한 지역 산업생태계 활성화 방안에 관한 연구 -광주 지역 자동차 산업을 중심으로-)

  • Kim, Hyun-Ji;Kim, Han-Gook
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.259-269
    • /
    • 2021
  • Many researchers have discussed on a policy establishment to revitalize a regional industry of a domestic ecosystem. However, it is rare to consider activation measures and priorities that are appropriate for local characteristics. Therefore, this study conducted a qualitative study to gather and analyze the views of expert groups in order to derive measures to revitalize the automobile industry in Gwangju. We examined the current status of the automobile industry in Gwangju based on a literature survey and in-depth interviews and what kind of crisis there is. We then derive strategic candidates for activation measures to address this. In addition, the relative importance and priorities of the methods derived using AHP techniques were identified. This leads to five strategies on which methods should be applied first. This will be used as the basis for future strategy development.

Effect of genotype of growing rabbits on productive performance with special reference to residual feed intake at hot temperature

  • Moataz Fathi;Magdy Abdelsalam;Ibrahim Al-Homidan;Osama Abou-Emera;Gamal Rayan
    • Animal Bioscience
    • /
    • v.36 no.7
    • /
    • pp.1067-1074
    • /
    • 2023
  • Objective: Better feed efficiency can be achieved by selecting rabbit genotypes with lower residual feed intake (RFI) under high ambient temperatures. Methods: Two genotypes of rabbits (Jabali, Saudi local breed and imported, Spanish V-line) were used to derive RFI and to investigate the relationship between RFI and productive traits. In total, 250 animals (125 each) were housed in individual wire mesh cages in a semi-closed rabbitry. Growth performance, feed criteria, carcass evaluation, biochemical blood analysis, and immune responses were determined. Results: Superiority in growth performance, feed efficiency, carcass characteristics, and cellular immunity was recorded in the Jabali breed compared to the V-line genotype. According to regression analysis, a significant effect of daily body weight gain was found, upon computing the expected feed intake in both genotypes. Moreover, mid-body weight0.75 had a significant effect only in the Jabali breed. Positive correlation coefficients between RFI and dry matter feed intake or feed conversion ratio were found. The same trend in this relationship between RFI and productive traits was observed in some cases for both genotypes. An opposite trend in correlations was observed in the studied genotypes for some traits. Conclusion: The results suggest that the relationship between RFI and productive traits must be taken into consideration in rabbit breeding programs under the prevailing environment. However, further studies are required to investigate the effect of rabbit genotype and environmental factors on computing RFI.

Mutual Authentication Mechanism for Secure Group Communications in Sensor Network (센서 네트워크에서의 안전한 그룹통신을 위한 상호 인증 기법)

  • Ko, Hye-Young;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.441-450
    • /
    • 2010
  • Recently, a lot of interest is increased in sensor network which gathers various data through many sensor nodes deployed in wired and wireless network environment. However, because of the limitation in memory, computation, and energy of the sensor nodes, security problem is very important issue. In sensor network, not only the security problem, but also computing power should be seriously considered. In this paper, considering these characteristics, we make the sensor network consist of normal sensor nodes and clusterheaders with enough space and computing power, and propose a group key rekeying scheme adopting PCGR(Predistribution and local Collaborationbased Group Rekeying) for secure group communication. In our proposal, we enhance the security by minimizing the risk to safety of the entire network through verifying the new key value from clusterheader by sensor nodes. That is, to update the group keys, clusterheaders confirm sensor nodes through verifying the information from sensor nodes and send the new group keys back to authentic member nodes. The group keys sent back by the clusterheaders are verified again by sensor nodes. Through this mutual authentication, we can check if clusterheaders are compromised or not. Qualnet simulation result shows that our scheme not only guarantees secure group key rekeying but also decreasesstorage and communication overhead.