• Title/Summary/Keyword: network computing

Search Result 3,181, Processing Time 0.031 seconds

상황 정보 기반 사용자 요구 서비스 추론 모델 (Context based User Required Services Reasoning Model)

  • 고광은;심귀보
    • 제어로봇시스템학회논문지
    • /
    • 제14권1호
    • /
    • pp.21-26
    • /
    • 2008
  • It was already realized at a current technological level of home network systems that the systems recognizes a user's simple order and carry out the order in the ubiquitous computing environment. However home is not a simple environment consisting into a large number of family members, so various order and situation would be needed accordingly. From now on we need to reach the technological level to infer that how is the user's behavior patterns and what kinds of service is the fittest to user who belong to the ubiquitous computing environment by using the result of the context interpreter. In this regards, active inferred-model needs to be suggested upgrading user's command into one step more higher level than the simple one adapting diversified feature. This study would like to suggest this active model recognizing context, which is user's environmental information applying basic network and inferring Context-based Service that user wants through the recognized result This study proposes a new method that can infer the user's desire in ubiquitous computing environment. First of all, we define a context as user's information of ubiquitous computing environment situation that user belongs to and we classify the context into 4W1H(Where, Who, When, What) formats. We construct Bayesian network and put the factor of context use as Bayesian network nodes. As a result, we can infer the user's behavior pattern and most proper service for user in the intelligent space from the probabilistic result of Bayesian network.

망 분리 가상 컴퓨터 환경 제공 방법 및 시스템 (Method and system for providing virtual computer environment for the network division)

  • 윤태호
    • 한국전자통신학회논문지
    • /
    • 제10권10호
    • /
    • pp.1101-1108
    • /
    • 2015
  • 본 논문은 망 분리 가상 컴퓨터 환경 제공 방법 및 시스템을 제공한다. 본 가상 컴퓨터 환경 제공 방법은 가상 기능 수행을 위해 필요한 가상 자원 요청을 생성하는 단계 및 가상 자원 등록 요청을 네트워크 프로토콜 포맷으로 변환하여 네트워크를 통해 전송하는 단계를 포함한다. 이로 인해, 등록 처리 절차가 조합형 망 분리 가상 컴퓨팅 자원 할당과 임의 시간 동안 가상 컴퓨터를 사용하기 위해서, 서버와 클라이언트 또는 휴대폰 사이에서 가능해졌다. 언제든, 인터넷에 접속해 내 컴퓨터와 동일한 환경에서 업무를 처리 할 수 있게 된다.

Sub-Frame Analysis-based Object Detection for Real-Time Video Surveillance

  • Jang, Bum-Suk;Lee, Sang-Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권4호
    • /
    • pp.76-85
    • /
    • 2019
  • We introduce a vision-based object detection method for real-time video surveillance system in low-end edge computing environments. Recently, the accuracy of object detection has been improved due to the performance of approaches based on deep learning algorithm such as Region Convolutional Neural Network(R-CNN) which has two stage for inferencing. On the other hand, one stage detection algorithms such as single-shot detection (SSD) and you only look once (YOLO) have been developed at the expense of some accuracy and can be used for real-time systems. However, high-performance hardware such as General-Purpose computing on Graphics Processing Unit(GPGPU) is required to still achieve excellent object detection performance and speed. To address hardware requirement that is burdensome to low-end edge computing environments, We propose sub-frame analysis method for the object detection. In specific, We divide a whole image frame into smaller ones then inference them on Convolutional Neural Network (CNN) based image detection network, which is much faster than conventional network designed forfull frame image. We reduced its computationalrequirementsignificantly without losing throughput and object detection accuracy with the proposed method.

확장 가능한 전송 프로토콜의 설계 (The Design of Extensible Transport Protocol)

  • 박기현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.142-146
    • /
    • 2014
  • 최근의 스마트 폰과 이동통신 망의 발전으로 인하여 모바일 컴퓨팅 환경이 더 이상 보조적인 수단이 아니게 되었다. 그리고 데이터 센터의 활성화로 인하여 클라우드 컴퓨팅, 빅 데이터, SDN(Software Defined Network), 그리고 NFV(Network Function Virtualization)과 같은 새로운 서비스 기술들이 나타나고 있다. 이러한 컴퓨팅 환경의 변화와 새로운 서비스 기술들의 도래로 인하여 다양한 요구를 수용할 수 있는 전송 계층 프로토콜이 필요로 하게 되었다. 또한 전송 프로토콜은 추가적인 기술 변화에도 대응할 수 있는 확장 가능한 기능이 요구된다. 본 논문에서는 전송 프로토콜이 확장 가능한 기능을 가지기 위해 기존의 전송 계층을 세 개의 계층으로 나누는 구조를 제안하고, 하위 계층에 해당하는 ETP(Extensible Transport Protocol)를 설계하였다.

  • PDF

클라우드 컴퓨팅에 대한 국내외 동향 분석 (Analysis of Worldwide Review on Cloud Computing)

  • 임영문;황영섭
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2009년도 추계학술대회
    • /
    • pp.411-415
    • /
    • 2009
  • There are some definitions of cloud computing but it can be defined as utilization of personal computers, servers and softwares in one cluster for approaches to the use of shared computing resources. Nowadays the applications of cloud computing are rapidly increasing because of its merits on economic aspect, connectivity convenience, storage space and so on. The main objective of this paper is to find an effective methodology as an initial stage for applications of cloud computing in a real life. Therefore this paper addresses worldwide reviews on cloud computing.

  • PDF

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구 (A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion)

  • 서우석;박대우;전문석
    • 한국전자통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.1041-1051
    • /
    • 2012
  • 최근 공개되어진 네트워크 인프라를 활용한 서비스 집약 솔루션인 Cloud Computing에 대한 공격은 개발 플랫폼과 웹 기반 제공 소프트웨어, 자원 서비스 등을 무력화시키는 침해 사고와 서비스 장애를 발생시키고 있다. 따라서 불법적인 서비스 차단에 대한 공격으로부터 Cloud Computing 시스템이 지원하는 3가지 서비스 (3S' : laaS, PaaS, SaaS)의 운영정보와 생성된 자료에 대한 보안연구가 필요하다. 본 논문은 Cloud Computing 서비스에 대한 공격과 방어 실험을 단계별 4-Stage 기반의 방어기법으로 최적의 서비스가 가능한 시스템 구축에 관한 연구이다. 최초 네트워크에 대한 접근을 관제하고 가상화 서비스 제어와 지원 서비스 분류, 다중화 경로 선정 등의 순차적이며, 단계적인 4-Stage 접근 제어를 실시하는 방어정책으로 공격을 분산시키고 각 Stage별 접근 제어를 위한 모니터링과 분석을 통해 방어정책 구현과 분석을 시행함으로써 공격 유형별 방어를 실험하고 연구 결과는 Cloud Computing 서비스 기반의 방어정책 구현을 위한 실무적인 기초자료를 제공하고자 한다.

Design and Evaluation of Telematics User Interface for Ubiquitous Vehicle

  • Hong, Won-Kee;Kim, Tae-Hwan;Ko, Jaepil
    • 한국산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.9-15
    • /
    • 2014
  • In the ubiquitous computing environment, a ubiquitous vehicle will be a communication node in the vehicular network as well as the means of ground transportation. It will make humans and vehicles seamlessly and remotely connected. Especially, one of the prominent services in the ubiquitous vehicle is the vehicle remote operation. However, mutual-collaboration with the in-vehicle communication network, the vehicle-to-vehicle communication network and the vehicle-to-roadside communication network is required to provide vehicle remote operation services. In this paper, an Internet-based human-vehicle interfaces and a network architecture is presented to provide remote vehicle control and diagnosis services. The performance of the proposed system is evaluated through a design and implementation in terms of the round trip time taken to get a vehicle remote operation service.

Design and Implementation of WPAN Middle-ware for Combination between CDMA and Bluetooth

  • Na Seung-Won;Jeong Gu-Min;Lee Yang-Sun
    • 한국멀티미디어학회논문지
    • /
    • 제8권6호
    • /
    • pp.836-843
    • /
    • 2005
  • The Wireless Internet services widely spread out with the developments of CDMA(Code Division Multiple Access) networks and wireless units. In contrast to the telecommunication network, WPAN (Wireless Personal Area Network) enables to transmit data and voice in personal area. Although WPAN technologies are commercially utilized, the combined services with COMA network are not so poplar up to now. Various services can be provided using the combination between COMA and WPAN. This paper presents the practical and united model between COMA and WPAN. Specially, the main focus of this research lies on the design of the Middle-ware system of a handset which could be managing both COMA and WPAN. This system used Bluethooth by WPAN. For the devices with the proposed WPAN Middle-ware, service areas of the COMA network can be expanded to WPAN, various services can be realized by the transmission of data and voice, and consequently, the user computing environment could be improved.

  • PDF

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF