• 제목/요약/키워드: network computing

검색결과 3,187건 처리시간 0.028초

저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜 (Adaptive Medium Access Control protocol for low-power wireless sensor network)

  • 강정훈;이민구;윤명현;유준재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF

Online Clustering Algorithms for Semantic-Rich Network Trajectories

  • Roh, Gook-Pil;Hwang, Seung-Won
    • Journal of Computing Science and Engineering
    • /
    • 제5권4호
    • /
    • pp.346-353
    • /
    • 2011
  • With the advent of ubiquitous computing, a massive amount of trajectory data has been published and shared in many websites. This type of computing also provides motivation for online mining of trajectory data, to fit user-specific preferences or context (e.g., time of the day). While many trajectory clustering algorithms have been proposed, they have typically focused on offline mining and do not consider the restrictions of the underlying road network and selection conditions representing user contexts. In clear contrast, we study an efficient clustering algorithm for Boolean + Clustering queries using a pre-materialized and summarized data structure. Our experimental results demonstrate the efficiency and effectiveness of our proposed method using real-life trajectory data.

A Security Framework for Ubiquitous Computing Environment

  • Chae, Cheol-Joo;Shin, Hyo-Young;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • 제7권3호
    • /
    • pp.330-334
    • /
    • 2009
  • Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.

Distributed Optimal Path Generation Based on Delayed Routing in Smart Camera Networks

  • Zhang, Yaying;Lu, Wangyan;Sun, Yuanhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3100-3116
    • /
    • 2016
  • With the rapid development of urban traffic system and fast increasing of vehicle numbers, the traditional centralized ways to generate the source-destination shortest path in terms of travel time(the optimal path) encounter several problems, such as high server pressure, low query efficiency, roads state without in-time updating. With the widespread use of smart cameras in the urban traffic and surveillance system, this paper maps the optimal path finding problem in the dynamic road network to the shortest routing problem in the smart camera networks. The proposed distributed optimal path generation algorithm employs the delay routing and caching mechanism. Real-time route update is also presented to adapt to the dynamic road network. The test result shows that this algorithm has advantages in both query time and query packet numbers.

멀티-홉 센서 네트워크 저전력 MAC 설계 (Energy efficient Medium Access Control for multi-hop sensor network)

  • 강정훈;이민구;박병하;유준재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 A
    • /
    • pp.279-282
    • /
    • 2003
  • This paper proposes a medium-access control(MAC) protocol designed for wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy sayings.

  • PDF

Java 언어를 이용한 객체이동시스템의 설계 및 구현 (Design and Implementation of an Object Migration System Using the Java Language)

  • 전병국;이근상;최영근
    • 한국정보처리학회논문지
    • /
    • 제6권1호
    • /
    • pp.49-56
    • /
    • 1999
  • Distributed object Computing, owing to the development of distributed computing, has improved the performance of distributed processing conducted between homogeneous and heterogeneous systems in network. However, it has failed to solve fundamental problems such as network overload and enormous requests demands by servers and clients. In this paper, we propose to design and implement an Object Migration system that uses the java language to tackle the mentioned problems. As the first step of the implementation of the system, we justify the characteristics of t도 mobile object model that keeps codes and states of an object. Implemented Object Migration System would accept objects being migrated to a specific node and support the virtual place in which objects could be executed automatically. Therefore, the Object Migration system we suggest could not only solve problems imposed to traditional distributed computing but also offer transparency of object migration between homogeneous and heterogeneous systems.

  • PDF

유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발 (An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management)

  • 박상현;민수영;고재진;주현태
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed;Alharthi, Sultan;Aldehaimi, Khalid;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.249-254
    • /
    • 2021
  • Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Advanced Transverse Wave Approach for MM-Wave Analysis of Planar Antennas applied in 5G-Technology

  • Ayari, Mohamed;Touati, Yamen El;Altowaijri, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.295-299
    • /
    • 2022
  • In this paper, a fast numerical electromagnetic (EM) method based on the transverse wave formulation called-up Advanced Transverse Wave Approach (A-TWA) is presented. An appropriate 5G antenna is designed, simulated and investigated in the context of Millimeter-Wave Wireless Communication Systems. The obtained simulation results are found in good agreement with literature. Such a method can provide for the simulators a great library integrating the most complexly and sensitively geometry elements that can have a huge impact on the applications supported by new wireless technologies.