• Title/Summary/Keyword: Remote User

Search Result 994, Processing Time 0.027 seconds

An Efficient Algorithm for Finding the Earliest Available Interval on Connection-Oriented Networks (연결 지향 네트워크에서 최초 가용 구간을 찾는 효율적인 알고리즘)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.73-80
    • /
    • 2010
  • The advancement of communication and networking technologies has enabled e-science and commercial application that often require the transport of large volume of data over wide-area network. Schedulable high-bandwidth low-latency connectivity is required to transport the large volume of data. But the public Internet does not provide predictable service performance. Especially, if data providers and users are far away, dedicated bandwidth channels are needed to support remote process efficiently. Currently several network research projects are in progress to develop dedicated connectionsy sA bandwidth scheduler computes an user requested path based on network topology information and link bandwidth allocationsy In this paper, we have proposed an efficient algorithm for finding the earliest time interval when minimum bandwidth and duration are giveny Our algorithm is experimentally compared with the known algorithm.

Development of a WebDAV-based Smartphone Collaborative Application (웹데브 기반의 스마트폰 협업 어플리케이션 개발)

  • Lee, Hong-Chang;Kim, Bo-Hyeon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.680-690
    • /
    • 2011
  • To support asynchronous collaboration among remote users, collaborative applications provide collaboration services and environment through virtual workspaces. In general, collaborative applications support collaboration based on desktop-based personal computers, using the features such as resource sharing or asynchronous communication among users. Unfortunately, since those applications mainly run on personal computers, they do not easily support collaborative works in various places. In this paper, we describe the development of smartphone collaborative application which provides effective collaboration facilities like resource sharing through various types of workspaces or group communication, communicating with a WebDAV-based collaboration server. The developed application provides users with high accessibility through multi-touch/touch-slide based user-interfaces in mobile environment. To support effective communication with a collaboration server, we also present a WebDAV-based collaboration library using a collaboration protocol designed to analyze easily the responses from the collaboration server.

Real-time monitoring system with Kinect v2 using notifications on mobile devices (Kinect V2를 이용한 모바일 장치 실시간 알림 모니터링 시스템)

  • Eric, Niyonsaba;Jang, Jong Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.277-280
    • /
    • 2016
  • Real-time remote monitoring system has an important value in many surveillance situations. It allows someone to be informed of what is happening in his monitoring locations. Kinect v2 is a new kind of camera which gives computers eyes and can generate different data such as color and depth images, audio input and skeletal data. In this paper, using Kinect v2 sensor with its depth image, we present a monitoring system in a space covered by Kinect. Therefore, based on space covered by Kinect camera, we define a target area to monitor using depth range by setting minimum and maximum distances. With computer vision library (Emgu CV), if there is an object tracked in the target space, kinect camera captures the whole image color and sends it in database and user gets at the same time a notification on his mobile device wherever he is with internet access.

  • PDF

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Design of a Background Image Based Multi-Degree-of-Freedom Pointing Device (배경영상 기반 다자유도 포인팅 디바이스의 설계)

  • Jang, Suk-Yoon;Kho, Jae-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.6
    • /
    • pp.133-141
    • /
    • 2008
  • As interactive multimedia have come into wide use, user interfaces such as remote controllers or classical computer mice have several limitations that cause inconvenience. We propose a vision-based pointing device to resolve this problem. We analyzed the moving image from the camera which is embedded in the pointing device and estimate the movement of the device. The pose of the cursor can be determined from this result. To process in the real time, we used the low resolution of $288{\times}208$ pixel camera and comer points of the screen were tracked using local optical flow method. The distance from screen and device was calculated from the size of screen in the image. The proposed device has simple configurations, low cost, easy use, and intuitive handhold operation like traditional mice. Moreover it shows reliable performance even in the dark condition.

Agent-based Service Composition in Multi-party Collaboration Environments (다자간 협업 환경에서 에이전트 기반 서비스 합성)

  • Han, Sang-Woo;Kim, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.74-84
    • /
    • 2008
  • To support advanced collaboration among knowledge workers distributed geographically, there have been extensive researches under the scope of ubiquitous computing environments. Especially, to cope with several known problems in traditional room-based collaboration environments such as uncomfortable sharing of visuals and documents and difficult operation of collaboration tools, several conceptual frameworks are designed and prototyped. Focusing on practical and interactive collaboration with remote nodes, in this paper, we conceptually design an agent-based service composition model for multi-party collaboration environments. The proposed model is designed to automatically discover and combine services to achieve given tasks in a collaboration environment by using high-level user commands (without the knowledge of internal architecture). Based on the service composition model, we develop a multi-agent-based management toolkit for multi-party collaboration environments. It provides easy-to-use GUI to operate various services in an environment and perform service composition algorithm to discover appropriate services and combine them. To explore the possibility of the toolkit we implement collaboration services to support video conference by using the toolkit.

Cryptanalysis and Improvement of RSA-based Authentication Scheme for Telecare Medical Information Systems

  • Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.93-103
    • /
    • 2020
  • The telecare medical information system (TMIS) supports convenient and rapid health-care services. A secure and efficient authentication and key agreement scheme for TMIS provides safeguarding electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Giri et al. proposed an RSA-based remote user authentication scheme using smart cards for TMIS and claimed that their scheme could resist various malicious attacks. In this paper, we point out that their scheme is still vulnerable to lost smart card attacks and replay attacks and propose an improved scheme to prevent the shortcomings. As compared with the previous authentication schemes for TMIS, the proposed scheme is more secure and practical.

A Study on Smart Medical Treatment System and Security (스마트 진료시스템과 보안에 관한 연구)

  • Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.107-113
    • /
    • 2012
  • Due to the development of communications technology, it is now possible to be offered online from remote places. This kind of communications technology can be applied to the medical field. The medical treatment appointments in hospitals can be its typical example. But still, in most of hospitals, patient or guardian have to physically visit or call to the hospital to set up an appointment for the medical treatment. In addition, they have to wait in line in order to pay after receiving the medical treatment. The patient or guardian, after paying, receive a paper prescription and they go to a nearby pharmacy to take the medicines. They must wait in line again there in order to receive the medicine from the pharmacy. In this paper, we would like to suggest a smart medical treatment system in order to solve the problems discussed above. With this proposed system, the user will be able to make an appointment, make payments and receive medication quickly and easily without spending extra time. Also, there will be no need for paper prescriptions with this system. We discuss about the security of medical information for this proposed smart medical treatment system proposed.

A Study on the Green Mapping and Its Application in the Case of Seocho-Gu (그린 맵 작성 및 활용에 관한 연구 -서초구의 사례-)

  • 황기원;황윤혜
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.1
    • /
    • pp.113-123
    • /
    • 2001
  • The purpose of this study is to help out the settlement of the Green Map in Korea, and to suggest how to map, and help community people and environmental planner systematically take care of their own towns. This study is also to introduce the green mapping and its usefulness, based on the Green Map Movement, which originated from Net York City and has been expanding through the World. Environmental elements shown on the Green map vary between countries and for the Seocho-Gu Green Map, we have decided to indicate the places that we are proud of, and dishonored of. Especially, this paper is focused on finding the hidden environmental resources in our daily lives. Seocho-Gu, one of 25 self-governmental resources. Since the citizens and government officials are open-minded in their environments, it is a suitable area to start the first Green Map in Korea. As a method of locating the environmental resources, the "Foot Sensing Method" by which residents directly research, is the main difference from typical maps by the "Remote Sensing" which focused on the variety participation of the residents such as questionnaires, investigation with youth volunteers, users interviews which may be more meaningful than the Green Map itself. The purpose of application plan is to preserve the environmental resources through the smooth feedback with the residents. Thus, it must be acted as a opening window linking them with the local circumstances. In line with this, this study proposed the trial-version Web Green Map and Green tour plan. Recently, a need for an environmental map has been reflected in the environmental policies of Seoul Metropolitan City, and it is in place now. If environmental experts of different disciplines use the Green Map for landscape architecture, design, and city planning, it will help them make a better understanding of the needs of the community and to practice the user-centered design. Eventually, the Seocho-Gu Green Map will help its residents, tourists, government, and environmental planners continue establishing the healthy city environments. It is expected that the green map will be employed as a useful method for establishing healthy city and town through right way of use and contents.of use and contents.

  • PDF