• Title/Summary/Keyword: internet computing

Search Result 3,580, Processing Time 0.028 seconds

Comparative Analysis of Elementary School Computing Achievement Standards in the U.S. and Korea

  • Kim, Kapsu;Min, Meekyung;Rho, Jungkyu
    • International journal of advanced smart convergence
    • /
    • v.9 no.2
    • /
    • pp.147-156
    • /
    • 2020
  • ACM's CSTA has drafted standards for computing curricula and recommended them to schools in the United States. The five core concepts of the US elementary school computing curriculum are computing systems, network and the Internet, data and analysis, algorithms and programming, and impacts of computing. In 2005, Korea prepared ICT education guidelines, including five fields, their subfields, and achievement criteria for each subfield. In the 2015 revised curriculum, software education was introduced and five achievement standards were set. The ACM CSTA has 18 achievement criteria up to K-2 and 21 achievement criteria up to K-5. If we compare the 39 achievement standards of the US to Korea, Korea's 2005 ICT education guidelines include 25 of these, and the 2015 revised curriculum includes 5 of them. In this study, we aim to study the CSTA achievement criteria that second graders should know and the achievement criteria that fifth graders should know. This is compared and analyzed with Korea's 2005 ICT Guidelines and 2015 Software Curriculum. In comparison with the number of achievement standards, the US elementary school's computing achievement standards are much higher than in Korea. Comparing with each standard, there are many areas that are not covered in Korean curriculum, and we can see that the 2015 curriculum has rather receded from 2005.

MediaCloud: A New Paradigm of Multimedia Computing

  • Hui, Wen;Lin, Chuang;Yang, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1153-1170
    • /
    • 2012
  • Multimedia computing has attracted considerable attention with the rapid growth in the development and application of multimedia technology. Current studies have attempted to support the increasing resource consumption and computational overhead caused by multimedia computing. In this paper, we propose $MediaCloud$, a new multimedia computing paradigm that integrates the concept of cloud computing in handling multimedia applications and services effectively and efficiently. $MediaCloud$ faces the following key challenges: heterogeneity, scalability, and multimedia Quality of Service (QoS) provisioning. To address the challenges above, first, a layered architecture of $MediaCloud$, which can provide scalable multimedia services, is presented. Then, $MediaCloud$ technologies by which users can access multimedia services from different terminals anytime and anywhere with QoS provisioning are introduced. Finally, $MediaCloud$ implementation and applications are presented, and media retrieval and delivery are adopted as case studies to demonstrate the feasibility of the proposed $MediaCloud$ design.

Web Service Connection Management Scheme for Seamless Migration of User Workspace in Cloud Computing (클라우드 컴퓨팅에서 사용자 작업환경의 끊김 없는 연계를 위한 웹 서비스 연결 관리 기법)

  • Choi, Min
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.193-202
    • /
    • 2009
  • Cloud computing emerges as a new computing paradigm which targets reliable and customizable services. The term builds on decades of research in virtual machine, distributed and parallel computing, utility computing, and more recently networking, web service, and software as a service. In this paper, we provide a seamless connection migration of web services. This is useful for cloud computing environment in which many client terminals have mobility. With the wireless internet facility, those mobile users can move place to place during internet communication. Therefore, we provide solutions to the two major problems in current virtualization based migration: communication failure problems and connection re-establishment. Communication channel flushing by zero window notification helps to resolve the communication failure problems and TCP port inheritance prevents connection re-establishment errors during socket reconstruction. Thus, our web service migration facility is now able to preserve open network connections, and even for server sockets. This is a highly transparent approach, in that we did not Introduce additional messages for channel flushing and did not make any modification to the TCP protocol stack. Experimental results show that the overhead due to connection migration of web services is almost negligible when compared with time to take the conventional web service migration.

Design and Implementation of Physical Computing Education Content based on Augmented Reality

  • Kim, So-Young;Jung, Eunmi;Kim, Heesun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.198-205
    • /
    • 2022
  • Along with a variety of coding education, physical computing education for controlling various sensors is being actively conducted for elementary, middle, and high school students in line with the era of the fourth industrial revolution. A problem with physical computing education using Arduino is pin connection errors between Arduino and various sensors. Most of the students who come into contact with the Arduino for the first time often do not know the purpose of the Arduino pin and the connection position of the pin. Also, hardware built with incorrect pin connections to the Arduino board often does not work properly. If this case continues, students will lose interest in coding education. Therefore, in this paper, we implemented an augmented reality application that informs the connection process of the Arduino board and the sensor during physical computing coding education using Arduino, and designed and implemented educational content for the Arduino pin position and connection process. First, we explain the role of the Arduino board and the sensor and the location of the pins. After that, the students run the educational augmented reality educational content using their smartphones and check the correct pin connection process between the Arduino and the sensor. In the physical computing education, augmented reality content is used to increase the understanding and immersion of the class. It is expected that the educational effect will also increase by inducing fun and interest in physical computing coding education.

Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing

  • Xiangyu Shi;Zhixia Zhang;Zhihua Cui;Xingjuan Cai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1238-1259
    • /
    • 2024
  • Previous studies on joint optimization of computation offloading and service caching policies in Mobile Edge Computing (MEC) have often neglected the impact of dependency-aware subtasks, edge server resource constraints, and multiple users on policy formulation. To remedy this deficiency, this paper proposes a many-objective joint optimization dependency-aware task offloading and service caching model (MaJDTOSC). MaJDTOSC considers the impact of dependencies between subtasks on the joint optimization problem of task offloading and service caching in multi-user, resource-constrained MEC scenarios, and takes the task completion time, energy consumption, subtask hit rate, load variability, and storage resource utilization as optimization objectives. Meanwhile, in order to better solve MaJDTOSC, a many-objective evolutionary algorithm TSMSNSGAIII based on a three-stage mating selection strategy is proposed. Simulation results show that TSMSNSGAIII exhibits an excellent and stable performance in solving MaJDTOSC with different number of users setting and can converge faster. Therefore, it is believed that TSMSNSGAIII can provide appropriate sub-task offloading and service caching strategies in multi-user and resource-constrained MEC scenarios, which can greatly improve the system offloading efficiency and enhance the user experience.

Design and Implementation of Scalable ID Federation System in Mobile Computing Environments (모바일 컴퓨팅 환경에서 확장 가능한 ID 연동 시스템 설계 및 구현)

  • Ryoo, In-Tae;Kim, Bae-Hyun;Moon, Young-Jun;Cho, Yeong-Sub;Jin, Seung-Hun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.155-166
    • /
    • 2005
  • Currently, almost of all the Internet users have as many IDs as the number of sites they have subscribed for, The users should memorize and input every independent ID and password whenever they want to login to the system. Although ID management system is used to solve this problem, 10 and password management will become more complicated in the forthcoming ubiquitous computing environments because so many computers will be interconnected on various kinds of wired and wireless networks, Furthermore, it is not enough to use the existing single Circle of Trust (COT) ID management system for the forthcoming computing environments. To solve this problem, the paper proposes ID federation models in multiple COT domain and implements an ID federation system that can be scaled to mobile computing environment as well as wired computing environment. The proposed ID federation models has been verified to operate with no problem between the systems in different trust domains by doing the ID scaability test.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Research on Convergence of Internet-of-Things and Cloud Computing (사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구)

  • Choi, Kyung;Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.1-12
    • /
    • 2016
  • Internet of Things (IoTs) technologies have been computerized information generated from a variety of objects and humans, and have been applied to various fields by connecting via the Internet. In order to compensate for the marginal characteristics of IoT smart devices, such as low-power, limited processing and capacities, combining IoT and cloud computing technologies is now established itself as one of the paradigms. In this paper, we look at the definition, features and services of IoT and cloud computing technology, and we investigate and analyze the conversing needs of IoT and could computing, existing conversion paradigms, convergence cases, and platforms. In results, there are challenges to be solved, even though the cloud technologies complement a number of restrictions of IoT and offer various advantages such as scalability, interoperability, reliability, efficiency, availability, security, ease of access, ease of use, and reduced cost of deployment. We analyze the new research issues of convergence paradigm, and finally suggest a research challenges for convergence.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.