• Title/Summary/Keyword: network computing

Search Result 3,187, Processing Time 0.025 seconds

Adaptive Medium Access Control protocol for low-power wireless sensor network (저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Yoon, Myung-Hyun;Yoo, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF

Online Clustering Algorithms for Semantic-Rich Network Trajectories

  • Roh, Gook-Pil;Hwang, Seung-Won
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.346-353
    • /
    • 2011
  • With the advent of ubiquitous computing, a massive amount of trajectory data has been published and shared in many websites. This type of computing also provides motivation for online mining of trajectory data, to fit user-specific preferences or context (e.g., time of the day). While many trajectory clustering algorithms have been proposed, they have typically focused on offline mining and do not consider the restrictions of the underlying road network and selection conditions representing user contexts. In clear contrast, we study an efficient clustering algorithm for Boolean + Clustering queries using a pre-materialized and summarized data structure. Our experimental results demonstrate the efficiency and effectiveness of our proposed method using real-life trajectory data.

A Security Framework for Ubiquitous Computing Environment

  • Chae, Cheol-Joo;Shin, Hyo-Young;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.330-334
    • /
    • 2009
  • Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.

Distributed Optimal Path Generation Based on Delayed Routing in Smart Camera Networks

  • Zhang, Yaying;Lu, Wangyan;Sun, Yuanhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3100-3116
    • /
    • 2016
  • With the rapid development of urban traffic system and fast increasing of vehicle numbers, the traditional centralized ways to generate the source-destination shortest path in terms of travel time(the optimal path) encounter several problems, such as high server pressure, low query efficiency, roads state without in-time updating. With the widespread use of smart cameras in the urban traffic and surveillance system, this paper maps the optimal path finding problem in the dynamic road network to the shortest routing problem in the smart camera networks. The proposed distributed optimal path generation algorithm employs the delay routing and caching mechanism. Real-time route update is also presented to adapt to the dynamic road network. The test result shows that this algorithm has advantages in both query time and query packet numbers.

Energy efficient Medium Access Control for multi-hop sensor network (멀티-홉 센서 네트워크 저전력 MAC 설계)

  • Gang, Jeong-Hun;Lee, Min-Gu;Park, Byeong-Ha;Yu, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.279-282
    • /
    • 2003
  • This paper proposes a medium-access control(MAC) protocol designed for wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy sayings.

  • PDF

Design and Implementation of an Object Migration System Using the Java Language (Java 언어를 이용한 객체이동시스템의 설계 및 구현)

  • Jeon, Byeong-Guk;Lee, Geun-Sang;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.49-56
    • /
    • 1999
  • Distributed object Computing, owing to the development of distributed computing, has improved the performance of distributed processing conducted between homogeneous and heterogeneous systems in network. However, it has failed to solve fundamental problems such as network overload and enormous requests demands by servers and clients. In this paper, we propose to design and implement an Object Migration system that uses the java language to tackle the mentioned problems. As the first step of the implementation of the system, we justify the characteristics of t도 mobile object model that keeps codes and states of an object. Implemented Object Migration System would accept objects being migrated to a specific node and support the virtual place in which objects could be executed automatically. Therefore, the Object Migration system we suggest could not only solve problems imposed to traditional distributed computing but also offer transparency of object migration between homogeneous and heterogeneous systems.

  • PDF

An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management (유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발)

  • Park, Sang-Hyun;Min, Soo-Young;Ko, Jae-Jin;Ju, Hyun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Advanced Transverse Wave Approach for MM-Wave Analysis of Planar Antennas applied in 5G-Technology

  • Ayari, Mohamed;Touati, Yamen El;Altowaijri, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.295-299
    • /
    • 2022
  • In this paper, a fast numerical electromagnetic (EM) method based on the transverse wave formulation called-up Advanced Transverse Wave Approach (A-TWA) is presented. An appropriate 5G antenna is designed, simulated and investigated in the context of Millimeter-Wave Wireless Communication Systems. The obtained simulation results are found in good agreement with literature. Such a method can provide for the simulators a great library integrating the most complexly and sensitively geometry elements that can have a huge impact on the applications supported by new wireless technologies.