• Title/Summary/Keyword: Zero Client

Search Result 17, Processing Time 0.02 seconds

An Approach to Control of Dispersed or Centralized Digital Contents (분산 또는 집중화된 디지털콘텐츠의 효과적인 통제방안: 구현사례를 중심으로)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.21-31
    • /
    • 2013
  • It is not easy to control the unstructured digital contents efficiently which are usually created while carrying out the wide scope of managerial activities. Moreover, besides the existing EDMS method, new methodologies including new-type servers and clients like SBC, VDI, thin client, zero client, etc are said to be more efficient for managing digital contents. Usually, digital contents has been created and stored in the dispersed individual computers like laptop or desktop. Today, due to the advent of new technologies and devices for computer systems and network capacity, it's possible to store whole digital contents within centralized storage like EDMS. In this paper, it is shown how digital contents can be controled through selection of which approaches are used for individual users and storage servers. For alternatives, we explained implementation, merits and demerits, selection criteria, etc. And a case of the implementation of digital contents control is shown for the reference of related systems.

Data Visualization Design of Bus Information Terminal using Smart Client Platform (Smart Client 기반 BIT 시각화 설계)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.55-60
    • /
    • 2013
  • Smart client is a term describing an application environment which delivers applications over a web HTTP connection and does not require installation and/or updates. The term "Smart Client" is meant to refer to simultaneously capturing the benefits of a "thin client" (zero-install, auto-update) and a "fat client" (high performance, high productivity). A "Smart Client" application can be created in several very different technologies. Over the past few years, ITS has started to move towards smart clients, also called rich clients. The trend is a move from traditional client/server architecture to a Web-based model. More similar to a fat client vs. a thin client, smart clients are Internet-connected devices that allows a user's local applications to interact with server-based applications through the use of Web services. Smart Client applications in BIT bridge the gap between web applications and desktop applications. They provide the benefits of a web applicationwhile still providing the snappy look and feel inherent to desktop applications.

Cloud storage-based intelligent archiving system applying automatic document summarization (문서 자동요약 기술을 적용한 클라우드 스토리지 기반 지능적 아카이빙 시스템)

  • Yoo, Kee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.59-68
    • /
    • 2012
  • Zero client-based cloud storage technology is gaining much interest as a tool to centralized management of organizational documents nowadays. Besides the well-known cloud storage's defects such as security and privacy protection, users of the zero client-based cloud storage point out the difficulty in browsing and selecting the storage category because of its diversity and complexity. To resolve this problem, this study proposes a method of intelligent document archiving by applying an algorithm-based automatic topic identification technology. Without user's direct definition of category to store the working document, the proposed methodology and prototype enable the working documents to be automatically archived into the predefined categories according to the extracted topic. Based on the proposed ideas, more effective and efficient centralized management of electronic documents can be achieved.

The Design of an Adaptive service that is adoptable in smart CEs embedded thin client module using hybrid home-cloud (경량 스마트 가전에 적용 가능한 하이브리드 홈 클라우드 기반 적응형 서비스 설계)

  • Jung, Jong-Jin;Lim, Tae-Beom;Lee, Suk-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.210-212
    • /
    • 2012
  • 하이브리드 스마트 홈 클라우드 플랫폼/서비스 기술은 가정 내 외 클라우드와 연계하여 실시간으로 수정되는 다양한 콘텐츠, 응용 프로그램, 스마트 가전, 개인 생활 정보들을 융합 관리 함으로써 멀티미디어, 어플리케이션, 스마트 가전 등을 통하여 다양한 스마트 융복합 서비스를 제공해 줄 수 있는 기술이다. 이에 본 논문은 데이터의 프라이버시, 안정성, 보안성, 종속화등 Public Cloud에 대한 거부반응을 해소하기 위해 개인 또는 흠단위로 스마트 콘텐츠를 서로 공유할수 있는 댁내 Private 클라우드와 다양한 스마트 홈 서비스를 제공하는 사업자 및 소셜 그룹간의 공유가 가능한 댁 외 Public 클라우드와 연계하여, 실시간으로 수집되는 다양한 콘텐츠, 용용 프로그램, 스마트 가전, 개인 생활 정보들을 통합 관리하고, 서비스 가상화 기술을 이용하여 다양한 경량화 스마트 가전(Thin/Zero Client)에 동시 적용 가능한 "하이브리드 홈 클라우드 단말 서버 플랫폼 기술을 연구하였다.

  • PDF

A Novel Application-Layer DDoS Attack Detection A1gorithm based on Client Intention (사용자 의도 기반 응용계층 DDoS 공격 탐지 알고리즘)

  • Oh, Jin-Tae;Park, Dong-Gue;Jang, Jong-Soo;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.39-52
    • /
    • 2011
  • An application-layer attack can effectively achieve its objective with a small amount of traffic, and detection is difficult because the traffic type is very similar to that of legitimate users. We have discovered a unique characteristic that is produced by a difference in client intention: Both a legitimate user and DDoS attacker establish a session through a 3-way handshake over the TCP/IP layer. After a connection is established, they request at least one HTTP service by a Get request packet. The legitimate HTTP user waits for the server's response. However, an attacker tries to terminate the existing session right after the Get request. These different actions can be interpreted as a difference in client intention. In this paper, we propose a detection algorithm for application layer DDoS attacks based on this difference. The proposed algorithm was simulated using traffic dump files that were taken from normal user networks and Botnet-based attack tools. The test results showed that the algorithm can detect an HTTP-Get flooding attack with almost zero false alarms.

Tax compliance of newly founded company with framing effect - detection rate, framing effect, client advocacy, risk seeking tendency - (프레이밍효과를 적용한 창업기업의 납세순응 - 적발률, 납세자 옹호성향, 위험선호성향을 중심으로)

  • Kim, Moon Shik
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.53-61
    • /
    • 2013
  • This study investigated the tax compliance applying framing effect, with the influence of detection rates, client advocacy, risk seeking tendency on the amount of income declared. Questionaires were filled in by CFA in Busan. Questionaires involve three cases (newly founded company, loss-expected company, gain-expected company). Respondents declared least in newly founded company, next loss-expected company, to gain-expected company. Respondents declared more as detection rates rose. As client advocacy increases, newly founded company and loss-expected company declare less, while gain-expected company declare more. As risk seeking tendency increases, newly founded company and loss-expected company declare less, but gain-expected company. Finally the interaction effect between client advocacy and risk seeking tendency is supported.

  • PDF

Adaptive Multi-stream Transmission Technique based on SPIHT Video Signal (SPIHT기반 비디오 신호의 적응적 멀티스트림 전송기법)

  • 강경원;정태일;류권열;권기룡;문광석
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.697-703
    • /
    • 2002
  • In this paper, we propose the adaptive multi stream transmission technique based on SPIHT video signal for the highest quality service over the current Internet that does not guarantee QoS. In addition to the reliable transmission of the video stream over the asynchronous packet network, the proposed approach provides the transmission using the adaptive frame pattern control and multi steam over the TCP for continuous replay. The adaptive frame pattern control makes the transmission date scalable in accordance with the client's buffer status. Apart from this, the multi stream transmission improves the efficiency of video stream, and is robust to the network jitter problem, and maximally utilizes the bandwidth of the client's. As a result of the experiment, the DR(delay ratio) in the proposed adaptive multi-stream transmission is more close to zero than in the existing signal stream transmission, which enables the best-efforts service to be implemented.

  • PDF

A Study of Sustainable Architectural Design Elements Based on the Classification of Natural Elements (자연요소 중심으로 분류한 친환경 건축계획 요소에 관한 연구)

  • Yim, Su Hyun;Park, Hyeon Soo
    • KIEAE Journal
    • /
    • v.10 no.5
    • /
    • pp.3-12
    • /
    • 2010
  • Sustainable design is getting to be controversial issue in all industries over the world particularly, in architecture as the amount of energy usage in architecture occupies 40%. Therefore, it is essential to make the standard for the sustainable design. In order to construct the sustainable design, firstly it should be considered that sustainable design elements based on natural resources to increase building energy efficiency is established and classified. The method of sustainable design divides into passive design and active design. Passive design method should be examined with active one simultaneously for more efficient usage of energy. Next, the study is followed how the sustainable design elements is adopted in buildings through the comparison of cases study of domestic and oversea. The result of case study shows similar adoption of sustainable design elements between oversea and domestic. However, the difference is shown in the building orientation and shape and the window size and position in Solar energy as well as high performance structure in Heat energy. These elements are the most significant elements in order to reduce energy load. In oversea, sustainable design is generated by architects, a client, and consultants based on the close cooperation in the beginning of early design phase before deciding building shape and envelope while in the domestic field adoption for sustainable design is conducted after deciding building shape and material. In order to design sustainable architecture more study is necessary in early stage for Zero Carbon and reducing building energy load through relation with specialists, a client and architects.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

ForwardCast : A New VOD Streaming Method in P2P (포워드캐스트(ForwardCast) : P2P에서의 새로운 VoD 스트리밍 방법)

  • Yoon Soo-Mi;Kim Sang-Chul;Kim Joong-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.783-788
    • /
    • 2005
  • Recently researches that apply P2P networks to VOD streaming have been actively published In the previous works on VOD streaming, they aimed at achieving two major goals, which are zero-delay transmission and minimization of service rejection ratio. This paper proposes a new method, called ForwardCast, for VOD streaming based on a P2P-based multicasting tree in order to achieve theses two goals. In this method,- basically a new client selects one of the preceding clients and starts receiving a whole video from the selected one without any delay. In some situation, two preceding clients are selected to transfer the ending part of the video and its the remaining part simultaneously. In our experiment, ForwardCast can reduce the rejection ratio compared to previous works without increasing server stress.