• Title/Summary/Keyword: heterogeneous device

Search Result 182, Processing Time 0.026 seconds

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.

Development of Bypass Unit for Ship Area Network Based on Legacy-line Communication (무배선 통신을 위한 선박 네트워크용 바이패스 장치 개발)

  • Jun, Ho-Ik;Kim, Hyun-Sik;Jung, Kyun Sik;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.292-297
    • /
    • 2015
  • In this paper, we reported the bypass unit for ship area networks in order to detour the communication failure regions and poor communication links. The device was composed of three parts of circuits for power cut-off, protection, and coupling transformer. Since the coupling transformer exerts a dominant influence on the performance of the by-pass unit, we have tried to find the optimal magnetic core materials and its dimensions. The prototype was passed through the performance test of insertion loss, temperature, and vibration characteristics. The insertion loss was around -2 dB in the range of 90 kHz ~ 30 MHz and the average communication speed was 59.2 Mbps in the laboratory. A pilot communication test using the developed tool was conducted in the training ship of the Korea Maritime and Ocean University. As a results of experiment, we showed that the wired communication among the heterogeneous-links in the ship area networks are possible by the bypass unit and also a high speed communication services are available in ~ Mbps by using a power-line.

WWCLOCK: Page Replacement Algorithm Considering Asymmetric I/O Cost of Flash Memory (WWCLOCK: 플래시 메모리의 비대칭적 입출력 비용을 고려한 페이지 교체 알고리즘)

  • Park, Jun-Seok;Lee, Eun-Ji;Seo, Hyun-Min;Koh, Kern
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.913-917
    • /
    • 2009
  • Flash memories have asymmetric I/O costs for read and write in terms of latency and energy consumption. However, the ratio of these costs is dependent on the type of storage. Moreover, it is becoming more common to use two flash memories on a system as an internal memory and an external memory card. For this reason, buffer cache replacement algorithms should consider I/O costs of device as well as possibility of reference. This paper presents WWCLOCK(Write-Weighted CLOCK) algorithm which directly uses I/O costs of devices along with recency and frequency of cache blocks to selecting a victim to evict from the buffer cache. WWCLOCK can be used for wide range of storage devices with different I/O cost and for systems that are using two or more memory devices at the same time. In addition to this, it has low time and space complexity comparable to CLOCK algorithm. Trace-driven simulations show that the proposed algorithm reduces the total I/O time compared with LRU by 36.2% on average.

Analyses of Verbal Interaction among Students in Small Group Science Learning Using Smart Devices (스마트 기기를 활용한 소집단 과학 학습에서 학생의 언어적 상호작용 분석)

  • Yun, Jeonghyun;Kang, Sukjin;Ahn, Inyoung;Noh, Taehee
    • Journal of the Korean Chemical Society
    • /
    • v.61 no.3
    • /
    • pp.104-111
    • /
    • 2017
  • In this study, we analyzed verbal interactions in small group science learning using smart devices by the level of prior achievement. Four heterogeneous groups at a coed high school in Seoul participated. Verbal interactions during small group science learning were audio- and video-taped, transcribed, and analyzed. Verbal interactions were analyzed at the levels of a turn and an interaction unit. The results revealed that the frequencies of verbal interactions were high in task category, especially at information explanation, information question, and reflection on standards subcategories. Furthermore, the frequencies of high-level students at direction explanation, reflection on standards and progress subcategories were higher than those of low-level students, and the frequencies of low-level students at direction question and information explanation subcategories were higher than their counterpart. In the analyses of the interaction units, the frequencies in symmetric elaborated interaction were high, especially at cumulative and evaluative subcategories.

EAP-AKA Authentication without UICC for Interworking Authentication in Heterogeneous Wireless Networks (이질적인 무선 네트워크 환경에서 인증 연동을 위한 비 UICC 방식의 EAP-AKA 인증)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.168-177
    • /
    • 2009
  • This paper proposes the EAP-AKA scheme without UICC for extending its usage to existing WLAN/WiBro devices. To apply the current EAP-AKA scheme, the WLAN/WiBro devices require an external Universal Integrated Circuit Card (UICC) reader. If they don't use UICC due to cost overhead and architectural problem of device, the EAP-AKA scheme loses its own advantages in security and portability aspects. The proposed scheme uses the DH key algorithm and a password for non-UICC devices instead of using the long-term key stored in UICC. The main contribution is to maintain the security and portability of the EAP-AKA while being applied to non-3GPP network devices not equipped with UICC. Furthermore, it does not require major modifications of authentication architecture in 3GPP.

Design and Implementation of JQuery-based Handwritten Signature System for Cross-Browsing (크로스 웹 브라우징을 위한 JQuery기반 자필 서명 시스템의 설계 및 구현)

  • Lee, Ki-Myoung;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.1-11
    • /
    • 2017
  • Recently that require digital signatures handwritten for personal use customer information and agree to the Terms of Service agreement or a general sign up. Signature system including an existing handwritten signature are a problem, which may be a platform-dependent, as well as the environment in which to perform the signature vary according to device Status of presence because it is being utilized is implemented on the service platform itself within each company. In this paper, we designed and implemented an integrated system handwritten signature as possible using a cross-browser way to store the handwritten two-dimensional coordinates based on the jQuery it is interspecific directly integrated browser environment. iOS, Android, was tested in an integrated web browser in heterogeneous environments, including PC, it was confirmed that all handwritten signature function is working properly.

An Integrated RFID Service Management Policy Infromation Model (통합 RFID 서비스 관리 정책 모델)

  • Ahn, Hyung-Jin;Bang, Hyo-Chan;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.177-187
    • /
    • 2009
  • Typical RFID-device applications have provided users to each vendor-specific interface for supporting control and management of RF-tags and readers within their managed domain. Also, typical RFID-business applications have been implemented by using each event-data structure of RF-readers or RFID middlewares. RFID infrastructure managers, thus, are difficult to handle individual control and management specifications for managed RF-tags, devices and systems. Most RFID application services, also, are attached to providing visibility and traceability of an RF-tag item. To solve these problems, this paper proposes an RFID service management policy information model which supports to define unified control and management for heterogeneous RFID devices, middlewares and applications. This paper describes an example procedure that an RFID service management policy definition based on the proposed model is adaptively transformed and executed on a specific RFID sub-infrastructure.

  • PDF

Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet

  • Lee, Tsung-Han;Chang, Lin-Huang;Cheng, Wei-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1070-1088
    • /
    • 2017
  • Recently, the applications of Internet of Things (IoTs) are growing rapidly. Wireless Sensor Network (WSN) becomes an emerging technology to provide the low power wireless connectivity for IoTs. The IPv6 over low-power wireless personal area networks (6LoWPAN) has been proposed by IETF, which gives each WSN device an IPv6 address to connect with the Internet. The transmission congestion in IoTs could be a problem when a large numbers of sensors are deployed in the field. Therefore, it is important to consider whether the WSN devices have be completely integrated into the Internet with proper quality of service (QoS) requirements. The Software Defined Network (SDN) is a new architecture of network decoupling the data and control planes, and using the logical centralized control to manage the forwarding issues in large-scale networks. In this research, the SDN-based 6LoWPAN Border Router (6LBR) is proposed to integrate the transmission from WSNs to Internet. The proposed SDN-based 6LBR communicating between WSNs and the Internet will bring forward the requirements of end-to-end QoS with bandwidth guarantee. Based on our experimental results, we have observed that the selected 6LoWPAN traffic flows achieve lower packet loss rate in the Internet. Therefore, the 6LoWPAN traffic flows classified by SDN-based 6LBR can be reserved for the required bandwidth in the Internet to meet the QoS requirements.

A Path Prediction-Based Sensor Registry System for Stable Use of Sensor Information (센서 정보의 안정적인 이용을 위한 경로 예측 기반 센서 레지스트리 시스템)

  • Jeong, Dongwon;Doo, Migyeong
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.255-263
    • /
    • 2015
  • The sensor registry system has been developed for instant use and seamless interpretation of sensor data in a heterogeneous sensor network environment. However, the existing sensor registry system cannot provide information for interpretation of the sensor data in situations in which the network is unstable. This limitation causes several problems such as sensor data loss, inaccuracy of processed results, and low service quality. A method to resolve such problems in the aspect of software is presented herein. In other words, an extended sensor registry system is proposed to enable the stable use of sensor information, even under conditions of unstable network connection, by providing sensor information with a mobile device in advance through the user path prediction. The results of experiments and evaluation are also presented. The extended sensor registry system proposed in this paper enhances the stable usability of sensor information as well as improves the quality of sensor-based services.

The Study of Sensor Data Integration for Medical Information Processing in a Cloud Computing (클라우드 컴퓨팅에서 의료 정보 처리를 위한 센서 데이터 통합에 대한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.285-287
    • /
    • 2015
  • Recently, the development of sensors and the mobile communication device offers a number of possibilities in the medical and related fields. However, this data is generated, it is difficult to match the metadata and standard units. The data integration is required to use the data generated by the different specifications of the sensor efficiently. Accordingly, in this paper we propose a method using an ontology as a method to integrate the data generated by the existing sensors and the new sensor. The ontology is mapping to the standard item and sensors, also include a type and structural difference. The mapping is comprised of two : data mapping, and metadata mapping. There are standard items that are created in this way, type of data exchange between services. This can solve the heterogeneous problem generated by sensors.

  • PDF