• Title/Summary/Keyword: network computing

Search Result 3,181, Processing Time 0.029 seconds

Design of Location and User Status Awareness Service Architecture Based on Opportunistic Computing with Ad-hoc Nodes (Ad-hoc 통신 노드를 이용한 기회 컴퓨팅형 위치인식 및 상황인지 서비스 구조 설계)

  • Kim, Tae-Hyon;Jo, Hyeong-Gon;Jeong, Seol-Young;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1199-1210
    • /
    • 2010
  • In recent years opportunistic computing has gained popularity in Ad-hoc network research area and it is highly required to research for actual services and related requirements. In this paper we summarized a virtual opportunistic service that is named "Children Care System" and proposed an Ad-hoc communication node (uMobile) that is connected with cellular phone and a sensor node (uClo) which is embedding into clothes. uMobile can support cellular phone communication and Ad-hoc communication and uClo can be embedded into clothes and recognize the user status using multiple sensors. In this paper we implemented the location awareness and user status awareness services using uMobile and uClo. We also tested them in indoor situation and showed the result. We expect that our research can play a significant role to inspire another various opportunistic computing services.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

The Study on the Status and Development of International Ubiquitous Computing (유비쿼터스 컴퓨팅의 실태와 발전에 관한 연구)

  • Kim Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.221-231
    • /
    • 2004
  • Ubiquitous computing is not radical as Mark Weiser argues and includes things. The status of each nation is as follows. Project of America or Europe are practice for computing infra. intelligence of things and space and man-computer co-relation study, otherwise Japan centers the studying of network ubiquity utilizing computing competence. In this thesis I analyzed real status on the ubiquitous computing case study of each nation. and I proposed computing development model. factor, structured value system. five type business and technology model.

  • PDF

An Efficient Network Virtualization Model in Cloud Computing Environments (클라우드 컴퓨팅 환경에서의 효율적인 네트워크 가상화 모델)

  • Jung, Byeong-Man;Choi, Min;Lee, Bong-Hwan;Lee, Kyu-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.823-826
    • /
    • 2012
  • In this paper, we propose an efficient network virtualization model in cloud computing environments. Virtualization is a key technology for the implementation of service-oriented architecture. It is a standardized framework that can be reused or integrated with changing business priorities through a IT infrastructure. Network virtualization has emerged as an important technical issues of the future virtualization technology in Internet. The concept of network virtualization and related technologies stay in ambiguous status since network virtualization is in its early stage. Thus, we propose a network virtualization model for cloud environment by analyzing the existing network virtualization technologies.

  • PDF

The Sensor Network based Home Control System: Supporting the Next Generation Home Gateway System for a Ubiquitous Home Environments

  • Park, Young-Choong;Ahn, Yang-Keun;Choi, Kwang-Soon;Jung, Kwang-Mo;Kim, Seong-Dong
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.23-27
    • /
    • 2007
  • Fruition for a diverse uIT(Ubiquitous Information Technology) service is currently required through the convergence of what is known as ubiquitous computing technology. In recent years, with the rapid growth of the need for information services, heavier demands have been made upon the supply of high-quality multimedia services that require a high bandwidth. Today, various home network solutions have been proposed to manage these service smoothly and a system able to deal with various types of network traffic without delays. In addition, in established home network environments that mix wired and wireless networks, along with the steady evolution of wireless network technology and the earnest development of ubiquitous computing technology, sensor-based wireless networks have emerged as a core solution for home networks. In this paper, a sensor network-based home control system supporting the next generation home gateway system for ubiquitous home environments is designed and implemented.

  • PDF

An approximate approach for Computing Fault-tree probabilities (Fault-tree 확률계산을 위한 근사적 방법)

  • Lee, Geun-Hui;Lee, Dong-Hyeong
    • Journal of Korean Society for Quality Management
    • /
    • v.18 no.2
    • /
    • pp.25-32
    • /
    • 1990
  • This paper presents an approximate algorithm for computing Fault-tree probabilities. The method is essentially composed of three steps. In the first step, a Fault-tree is converted into a network form. In the second step, We change the network into a parallelized diagram. In the third step, the approximate fault-tree probability is calculated from the parallelized diagram. In this paper, in order to verify the method two hypothetical Fault-tree is used by examples. The results show that the method is very useful, even though it is an approximate technique, since it needs not to search the minimal cut sets and has the simple computing rontines.

  • PDF

Context-Aware Framework Using Context Ontology for Supporting QoS-based Services (상황 온톨로지를 활용한 QoS 제공 상황인식 프레임워크)

  • Seo, Dong-Woo;Lee, Jae-Yeol
    • IE interfaces
    • /
    • v.21 no.1
    • /
    • pp.65-74
    • /
    • 2008
  • In the future, the ubiquitous computing environment will provide users with context-aware services, intelligently interacting with omnipresent resources and surrounding environments at any location and time. Therefore, the ubiquitous computing environment requires context-aware applications in order to gather and analyze context information in various situations. However, existing context-aware applications have mainly focused on providing services and adapting themselves to users based on user related contexts. But this environment requires not only user related contexts but also Quality-of-Service (QoS) related contexts. In this paper we propose a frame-work for supporting user-oriented QoS in ubiquitous environments. The proposed approach adopts a semantic ontology and a neural network algorithm in order to reason about explicit and uncertain contexts. We also show the possibility of applying the framework to real environments such as collaborative engineering service, automobile maintenance service and ubiquitous home service.

A Development of Home Network based Active Media Storage Platform (홈네트워크 기반의 능동형 미디어 스토리지 개발)

  • Son Jae-Gi;Park Sang-Hyun;Park Chang-Won
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.34-45
    • /
    • 2004
  • 홈네트워크 및 유비쿼터스 환경 도래로 인하여 디지털 기기의 데이터량이 급증하고 있고 이에 따라 가정 내 저장공간이 요구된다. 본 논문은 다양한 디지털 기술의 융합을 통한 홈 네트워크 기반의 능동형 미디어 스토리지 개발에 관한 내용을 고찰한다. 연구/개발된 능동형 미디어 스토리지는 SDP와 연동하여 홈네트워킹에 필요한 정보를 저장하여 SDP가 요구하는 정보를 어플리케이션에 따라 다르게 처리한다. 또한 멀티미디어 데이터를 로컬 네트워크 상에 최적화하여 어플리케이션에 제공한다. 또한 가정 내 디지털 기기의 정보저장 허브 역할을 수행한다.

  • PDF

Adaptive Medium Access Control protocol for low-power wireless sensor network (저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Yoon, Myung-Hyun;Yoo, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF