• Title/Summary/Keyword: Middle Server

Search Result 71, Processing Time 0.026 seconds

A Study on the Development Fluid Mechanics Principles by WBI Learning Program (유체역학의 원리 학습을 위한 WBI 프로그램 개발 연구)

  • Son, Young-Bae;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.369-373
    • /
    • 2010
  • In middle and high school to learn engineering principles to Experiments in space and time constraints and difficulties for the study of engineering principles to the problem is superficial. In this paper, Pascal's principles etc. learning about fluid mechanics and implemented in Web Browser, In connection with flash and HTML, and simulation and virtual experiments is to implement interesting. Of fluid mechanics education through engineering design and web design through the actual web server is implemented on the Internet over broadband. Department of Education, this study fluid dynamics and the Internet will contribute to the development of distance education.

  • PDF

Implementation of CAI Program using Client/Server (클라이언트/서버를 이용한 CAI 프로그램의 구현)

  • 이순애;박덕원
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.53-59
    • /
    • 1999
  • The CAI has not been developed with the non-structural form of interactive courseware under classroom network. This study suggests the direction of enhancement for students' achievement through interaction between learner and learner. and teacher and learner applied the effective multi-presentation and 4he introduction of the concept of chatting client/server to class with the use of multimedia package. For the continuous development of courseware and the effectiveness of keeping and repairing materials. this study consists of development of the teaching materials by Powerpoint which is one of the multimedia package presentation tools, and teaching method through discussion by chatting client/server under the classroom network. This new CAI showed the possibility of the open education through discussion and the enhancement of learners' effective achievement in the result of the data got from the classrooms of elementary, middle and high schools.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

A Study on the Shipbuilding Yard Information System Based on Wireless LAN (Wireless LAN 기반의 조선소 현장 정보시스템에 관한 연구)

  • SEO K. H.;KIM H. M.;KIM S. Y.
    • Journal of Ocean Engineering and Technology
    • /
    • v.19 no.6 s.67
    • /
    • pp.86-91
    • /
    • 2005
  • Regarding some of tire important works in tire shipyard, like tire production process, quality control, and material handling, there are many elements that disturb tire work-flaw. For example, there are mistakes in manufacturing, delay of production, and poor quality. These kinds of disturbances are from tire delay of communication time between tire production field and tire management. Therefore, it would be possible to strengthen tire competitiveness of shipbuilding industries by applying tire information technology based on Wireless Local Area Network (Wireless LAN), in order to establish tire multi-possession of real time production information in limited large shipbuilding yard. In this study, tire construction concept of tire information system, based on Wireless LAN, is proposed to build communication infrastructures in shipyards. The various information regarding shipbuilding inspection, process management, and material flaw are analyzed and constructed to databases in tire middle ware system, as tire platform for using Personal Display Agent (PDA). At last, tire middle ware system, which delivers tire information, is developed by tire C$\sharp$ and Microsoft.net; also, tire PDA application system is structured in WinCE O/S, and is tested and evaluated under tire server linked condition.

High Availability Web Server Cluster for Middle Web Sites (중소형 사이트를 위한 고가용성 웹 서버 클러스터)

  • 문종배;김명호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.634-636
    • /
    • 2002
  • 최근에 리눅스 가상 서버 프로젝트를 이용한 클러스터를 많이 구축하고 있다. 리눅스 가상 서버는 확장성이 뛰어날 뿐만 아니라 성능도 뛰어나다. 그러나 하나의 전면 서버가 사용자 요청을 받아서 후면 서버가 처리를 하여 사용자에게 응답을 보내는 구조이므로 하나의 전면 서버는 사용자 요청의 급격한 증가로 병목현상을 일으킬 수 있고, 이 때문에 다수의 후면 서버가 있음에도 불구하고 서비스를 할수 없는 상황이 발생하게 된다. 따라서 본 논문에서는 다수의 전면 서버를 두어 병목현상을 근본적으로 없애는 방법을 제안하였다. 모든 클러스터 노드들은 전면 서버와 후면 서버의 역할을 모두 할 수 있도록 하였고 부하량이 많지 않으면 자기 노드에서 직접 처리를 하여 사용자에게 웅답할 수 있도록 하고, 부하량이 많을 때에만 클러스터의 다른 노드들 중 부하가 가장 작은 노드를 선택하여 사용자 요청을 처리할 수 있도록 하였다. 그리고 클러스터 노드들의 부하량을 고려한 스케줄링 알고리즘을 개발하여 좀 더 효율적인 부하 분배방식을 제안하였다.

  • PDF

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

Implementation of Virtual Architectural Engineering and Design of Real-time State Server for Internet Virtual Collaboration (가상건축엔지니어링의 구현과 인터넷 가상협동작업을 위한 실시간 상태서버의 설계)

  • 고동일;이범렬;김종성;오원근
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.169-172
    • /
    • 2000
  • Recently, the advent of World-Wide-Web(WWW) and the explosive popularity of the Internet gave birth to collaborative applications which were enabled by computers and networks as their primary media. And the progress of 3D computer graphics enabled collaborative application with 3D virtual environments or distributed virtual environments. In this paper, we explain our implementation of Share collaboration engine and Virtual Architectural Engineering 2000 (VAE2000) system which is our pilot application implemented with Share collaboration engine. And we explain problems presented by our experiments with VAE2000 system. For those problems, we design our new middle-ware system, SHINE(SHared INternet Environment). The SHINE proposes new concepts and approaches for collaboration with 3D objects in a virtual world.

  • PDF

A Terminal Service Method for Effectiveness of PC maintenance for School Environment (학교 현장에서 PC 유지보수를 효율적으로 하기 위한 터미널 서비스 방법)

  • Kim, Kap-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.7 no.3
    • /
    • pp.353-361
    • /
    • 2003
  • All elementary, middle, and high schools have many Personal Computers(PC) by educational information policy, and their computers have been applied to the school education. However, it is difficult to manage the PCs, and it cost to maintain the PCs and PCs must be upgaded and replaced each four years. In order to solve these problem, I propose the method of using the terminal server. This method can make the software and PC hardware maintain easily, and reduce the maintenance fee, need not upgrade and replace the new PCs.

  • PDF