• Title/Summary/Keyword: multi server

Search Result 638, Processing Time 0.026 seconds

Fast Hologram Generating of 3D Object with Super Multi-Light Source using Parallel Distributed Computing (병렬 분산 컴퓨팅을 이용한 초다광원 3차원 물체의 홀로그램 고속 생성)

  • Song, Joongseok;Kim, Changseob;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.20 no.5
    • /
    • pp.706-717
    • /
    • 2015
  • The computer generated hologram (CGH) method is the technology which can generate a hologram by using only a personal computer (PC) commonly used. However, the CGH method requires a huge amount of calculational time for the 3D object with a super multi-light source or a high-definition hologram. Hence, some solutions are obviously necessary for reducing the computational complexity of a CGH algorithm or increasing the computing performance of hardware. In this paper, we propose a method which can generate a digital hologram of the 3D object with a super multi-light source using parallel distributed computing. The traditional methods has the limitation of improving CGH performance by using a single PC. However, the proposed method where a server PC efficiently uses the computing power of client PCs can quickly calculate the CGH method for 3D object with super multi-light source. In the experimental result, we verified that the proposed method can generate the digital hologram with 1,5361,536 resolution size of 3D object with 157,771 light source in 121 ms. In addition, in the proposed method, we verify that the proposed method can reduce generation time of a digital hologram in proportion to the number of client PCs.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center (트랩도어 센터로부터 보호받는 순위 검색 가능한 암호화 다중 지원 클라우드 컴퓨팅 보안 모델)

  • YeEun Kim;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1077-1086
    • /
    • 2023
  • The searchable encryption model allows to selectively search for encrypted data stored on a remote server. In a real-world scenarios, the model must be able to support multiple search keywords, multiple data owners/users. In this paper, these models are referred to as Multi Ranked Searchable Encryption model. However, at the time this paper was written, the proposed models use fully-trusted trapdoor centers, some of which assume that the connection between the user and the trapdoor center is secure, which is unlikely that such assumptions will be kept in real life. In order to improve the practicality and security of these searchable encryption models, this paper proposes a new Multi Ranked Searchable Encryption model which uses random keywords to protect search words requested by the data downloader from an honest-but-curious trapdoor center with an external attacker without the assumptions. The attacker cannot distinguish whether two different search requests contain the same search keywords. In addition, experiments demonstrate that the proposed model achieves reasonable performance, even considering the overhead caused by adding this protection process.

A Cell Phone-based ECG, Blood Pressure Monitoring System for Personal Healthcare Applications using Wireless Sensor Network Technology

  • Toh, Sing-Hui;Lee, Seung-Chul;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.505-508
    • /
    • 2008
  • Electrocardiogram (ECG) and blood pressure (BP) are main vital signs which are the standards in most medical settings in assessing the most basic body functions. Multi parameters are desired in providing more information for health professionals in order to detect or monitor medical problems of patients more precisely. This study urges us to develop a robust wireless healthcare monitoring system which has multiple physiological signs measurements on real time that applicable to various environments which integrates wireless sensor network technology and code division multiple access (CDMA) network with extended feature of locally standalone diagnosis algorithms that implemented in tell phone. ECG signal and BP parameter of the patients are routinely be monitored, processed and analyzed in details at cell phone locally to produce useful medical information to ease patients for tracking and future reference purposes. Any suspected or unknown patterns of signals will be immediately forwarded to hospital server using cell phone for doctors' evaluation. This feature enables the patients always recognize the importance of self-health checking so that the preventive actions can be taken earlier through this analytic information provided by this monitoring system because "Prevention is better than Cure".

  • PDF

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.

Performance Analysis for Call Processing in NGN Voice Services (NGN에서 음성서비스의 호 처리 성능해석)

  • 정문조;황찬식
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.11
    • /
    • pp.42-50
    • /
    • 2003
  • In this paper we propose a method of evaluating the performance of a Softswitch that provides call control to voice services in NGN (next generation network). First, we describe the architecture for voice services in NGN and anatomize the call control processes such as call initiation, call re-initiation and call release of a voice connection. kiter that we propose a method of estimating appropriate server capacity of the Softswitch using approximate queuing model. Via numerical experiments we illustrate the implication of the work

스마트 진공펌프용 상태변수 측정모듈의 주요 성능과 확장성

  • Jeong, Wan-Seop;Baek, Gyeong-Min
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.110.1-110.1
    • /
    • 2016
  • 국내외 최첨단 반도체 및 평판 디스플레이 공정에서 필요한 개별 건식 진공펌프들의 자기진단을 통한 예지보수의 실시간 구현 장치 개발과제의 2차년 전반기 수행된 연구결과의 일부를 본 논문에서 소개한다. 본 연구에서 최종 목표로 설정하고 있는 "smart" 진공펌프란 운전상태에 관련된 변수들의 측정치를 기반으로 한 자기진단 (self-diagnostics) 기능을 내장한 차세대 공정용 진공펌프를 의미한다. 1차년에 선정된 상태진단용 진공펌프의 상태변수(state variable)들의 효과적인 수집을 구현하기 위한 연구가 진행되었다. 기존의 반도체 공정용 진공펌프들에서 측정하고 있는 상태변수로는 온도, 유량, 배기관 압력, 모터 소비전류 등과 같은 정적인 변수들뿐 아니라, 회전기계류의 상태진단에 필수적인 진동신호를 추가한 상태 변수 수집 장치를 개발하였다. 본 연구팀은 진공펌프의 회전진동을 유발하는 대표적인 부품은 회전체, 베어링, 그리고 치차로 이들 3 종의 회전진동성분들을 효과적으로 측정할 수 있는 신호처리 기법을 개발하였다. 금번 연구에서 채택한 진동신호 처리기법은 초고속 FFT 변환 기반의 주파수 대역 별 진동 레벨 환산과 더불어 다단계로 구성된 디지털 필터 (multi-staged decimation filter) 기법을 개발 적용하였다. 이러한 신호처리 기법을 통하여 측정된 진동 신호로부터 회전체, 베어링, 그리고 치차의 회전 진동성분을 효과적으로 측정하는 방법을 금번 학술대회에서 소개한다. 그리고, 진공펌프 상태진단에 필요한 상태변수의 실시간 backup 방법, 그리고 공정관리 server와 통신기능, 그리고 펌프 현장 관리자용 PC와 통신 기법 등 상태변수 측정 모듈의 확장성에 대한 기술적 내용을 소개한다.

  • PDF

Deterministic Private Matching with Perfect Correctness (정확성을 보장하는 결정적 Private Matching)

  • Hong, Jeong-Dae;Kim, Jin-Il;Cheon, Jung-Hee;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.502-510
    • /
    • 2007
  • Private Matching is a problem of computing the intersection of private datasets of two parties. One could envision the usage of private matching for Insurance fraud detection system, Do-not-fly list, medical databases, and many other applications. In 2004, Freedman et at. [1] introduced a probabilistic solution for this problem, and they extended it to malicious adversary model and multi-party computation. In this paper, we propose a new deterministic protocol for private matching with perfect correctness. We apply this technique to adversary models, achieving more reliable and higher speed computation.

Implementation of Virtual Laboratory Based on the Internet (인터넷 기반 가상실험실의 구현)

  • Joo, Young-Hoon;Kim, Moon-Hwan;Lee, Ho-Jae;Park, Jin-Bae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.448-454
    • /
    • 2003
  • This paper concerns the establishment of the Internet-based virtual laboratory (VL). In control engineering, it is required to evaluate the feasibility of a newly developed controller design technique by applying to a physical system. However, it is inefficient to make or build such a experimental apparatus in all research activities. A possible remedy is to share such a apparatus spatially via the Internet. We set up techniques for the remote -control of various experimental apparatuses based on the Internet. The proposed VL forms a server-client structure and is implemented in multi-control interfaces.

Development of Video Transmission Device for Monitoring of a Cable-Based Retractable Roof (케이블-기반 개폐식 지붕의 모니터링을 위한 영상 전송 장치 개발)

  • Ahn, Soohong;Shon, Sudeok;Lee, Seungjae;Kang, Joo-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.4
    • /
    • pp.103-110
    • /
    • 2019
  • The cable-based retractable membrane roof makes it impossible to maintain its shape and stiffness during driving process, unlike the hard-type retractable roof. Consequently, monitoring using a relatively simple wireless video transmission device is required. However, since video data has a bigger transmission rating than other monitoring data in terms of the structure velocity or acceleration, there is a need to develop transmission device that is easy to install and entails low maintenance cost. This paper studies on a real-time video transmission system for monitoring the cable-based retractable membrane roof while driving. A video transfer software, using the mobile network, is designed and the embedded system is constructed. Ultimately, the data transmission server is tested. Connecting a trolley to the system allows testing of the validity and efficiency of the developed system through the video data transmitted in the driving process. Result of the test shows that the developed system enables multi-device data transfer with monitoring via the mobile network.