• Title/Summary/Keyword: Remote Computing

Search Result 449, Processing Time 0.029 seconds

Remote Access and Data Acquisition System for High Voltage Electron Microscopy (초고전압 투과전자현미경의 원격제어 및 데이터 획득 시스템)

  • Ahn, Young-Heon;Kang, Ji-Seoun;Jung, Hyun-Joon;Kim, Hyeong-Seog;Jung, Hyung-Soo;Han, Hyuck;Jeong, Jong-Man;Gu, Jung-Eok;Lee, Sang-Dong;Lee, Jy-Soo;Cho, Kum-Won;Kim, Youn-Joong;Yeom, Heon-Young
    • Applied Microscopy
    • /
    • v.36 no.1
    • /
    • pp.7-16
    • /
    • 2006
  • A new remote access system for a 1.3 MV high voltage electron microscope has been developed. Almost all essential functions for HVEM operation, huck as stage control, specimen tilting, TV camera selection and image recording, are successfully embedded into this prototype of the remote system. Particularly, this system permits perfect and precise operation of the goniometer and also controls the high resolution digital camera via simple Web browsers. Transmission of control signals and communication with the microscope is accomplished via the global ring network for advanced applications development (GLORIAD). This fact makes it possible to realize virtual laboratory to carry out practical national and international HVEM collaboration by using the present system

Parallel Computing on Intensity Offset Tracking Using Synthetic Aperture Radar for Retrieval of Glacier Velocity

  • Hong, Sang-Hoon
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.1
    • /
    • pp.29-37
    • /
    • 2019
  • Synthetic Aperture Radar (SAR) observations are powerful tools to monitor surface's displacement very accurately, induced by earthquake, volcano, ground subsidence, glacier movement, etc. Especially, radar interferometry (InSAR) which utilizes phase information related to distance from sensor to target, can generate displacement map in line-of-sight direction with accuracy of a few cm or mm. Due to decorrelation effect, however, degradation of coherence in the InSAR application often prohibit from construction of differential interferogram. Offset tracking method is an alternative approach to make a two-dimensional displacement map using intensity information instead of the phase. However, there is limitation in that the offset tracking requires very intensive computation power and time. In this paper, efficiency of parallel computing has been investigated using high performance computer for estimation of glacier velocity. Two TanDEM-X SAR observations which were acquired on September 15, 2013 and September 26, 2013 over the Narsap Sermia in Southwestern Greenland were collected. Atotal of 56 of 2.4 GHz Intel Xeon processors(28 physical processors with hyperthreading) by operating with linux environment were utilized. The Gamma software was used for application of offset tracking by adjustment of the number of processors for the OpenMP parallel computing. The processing times of the offset tracking at the 256 by 256 pixels of window patch size at single and 56 cores are; 26,344 sec and 2,055 sec, respectively. It is impressive that the processing time could be reduced significantly about thirteen times (12.81) at the 56 cores usage. However, the parallel computing using all the processors prevent other background operations or functions. Except the offset tracking processing, optimum number of processors need to be evaluated for computing efficiency.

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy (순방향 안전성을 제공하는 대칭키 기반의 원격 사용자 인증 방식)

  • Lee, SungYup;Park, KiSung;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.3
    • /
    • pp.585-594
    • /
    • 2016
  • Recently because of development of remote network technology, users are able to access the network freely without constraints of time and space. As users are getting more frequent to access the remote server in a computing environment, they are increasingly being exposed to various risk factors such as forward secrecy and server impersonation attack. Therefore, researches for remote user authentication scheme have been studying actively. This paper overcomes the weaknesses of many authentication schemes proposed recently. This paper suggests an improved authentication scheme that protects user's anonymity with preserving variable more safe and also provides forward secrecy.

An Object-Level Feature Representation Model for the Multi-target Retrieval of Remote Sensing Images

  • Zeng, Zhi;Du, Zhenhong;Liu, Renyi
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.2
    • /
    • pp.65-77
    • /
    • 2014
  • To address the problem of multi-target retrieval (MTR) of remote sensing images, this study proposes a new object-level feature representation model. The model provides an enhanced application image representation that improves the efficiency of MTR. Generating the model in our scheme includes processes, such as object-oriented image segmentation, feature parameter calculation, and symbolic image database construction. The proposed model uses the spatial representation method of the extended nine-direction lower-triangular (9DLT) matrix to combine spatial relationships among objects, and organizes the image features according to MPEG-7 standards. A similarity metric method is proposed that improves the precision of similarity retrieval. Our method provides a trade-off strategy that supports flexible matching on the target features, or the spatial relationship between the query target and the image database. We implement this retrieval framework on a dataset of remote sensing images. Experimental results show that the proposed model achieves competitive and high-retrieval precision.

Analysis of Intermediary Roles and Technical Components for Smartglass-Assisted Interactive Remote Collaboration

  • Yoon, Hyoseok;Kim, Siyeon;Oh, Haneol;Lim, Hong Ji
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.295-300
    • /
    • 2021
  • Recent advances in Internet-of-Things and wearable computing have established computationally sufficient infrastructure to remove the barriers of physical locations. The recent COVID-19 pandemic has accelerated the use of remote collaboration, work-from-home, teleconferencing, online education, digital twin, and metaverse enriched with various configurations of augmented reality, virtual reality, mixed reality, and extended reality. Beyond specialized niche wearable applications in the medical and entertainment domains, we aim to identify the underlying characteristics of smartglass-enabled killer applications for everyday use. In this paper, we analyze intermediary roles in remote collaboration consisting of authoritative supervisors, synergetic collaborators, and speculative explorers. We also propose technical components for smartglass-assisted interactive remote collaboration composed of personal tracking, teleconference, and interaction components. More specifically, the application tasks of each intermediary role and objectives of three functional components are defined and elaborated.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Implementation of Remote Physical Security Systems Using Smart Phone (스마트폰을 이용한 원격 물리적 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.217-224
    • /
    • 2011
  • Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

Implementation of Distributed Computing System using ActiveX Technology (ActiveX 기술을 이용한 분산 컴퓨팅 시스템 구현)

  • Song, Min-Gyu;Byun, Do-Young;Je, Do-Heung;Kim, Kwang-Dong;Roh, Duk-Gyoo;Oh, Se-Jin;Lee, Bo-Ahn
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.462-464
    • /
    • 2004
  • ActiveX is the general name for a set of Microsoft Technologies that allows users to re-use code and link individual programs together to suit their computing needs. In addition ActiveX technology Provides a standard model for interapplication communication that different programming language. ActiveX is based on COM(Component Object Model), the COM standard allow developer to create code and application from a multitude of different languages and build a defined interface to that code, making it easily accessible by other application. By using ActiveX, user can access the functionality of other applications running remote computer distributed through the network and communicate over the network to build distributed applications. LabVIEW provides access to other Windows applications using ActiveX technologies. So in this paper we implement distributed application using ActiveX technology for remote control and monitoring.

  • PDF

A Study on the Remote Method Connection using RMI in the Distributed Computing System (분산 환경 시스템에서 RMI를 이용한 원격 메소드 연결에 관한 연구)

  • 소경영;최유순;박종구
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.3
    • /
    • pp.483-491
    • /
    • 2001
  • In this paper, we design and implement of the remote method connection system using Java RMI in the distributed computing system. In pursuing this goal, we implement the dynamic method connection interface and API. And then we describe the dynamic memory management routine.

  • PDF