• Title/Summary/Keyword: 가상문서

Search Result 151, Processing Time 0.026 seconds

Overlay Multicast for File Distribution using Virtual Sources (파일전송의 성능향상을 위한 다중 가상소스 응용계층 멀티캐스트)

  • Lee Soo-Jeon;Lee Dong-Man;Kang Kyung-Ran
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.289-298
    • /
    • 2006
  • Algorithms for application-level multicast often use trees to deliver data from the source to the multiple receivers. With the tree structure, the throughput experienced by the descendant nodes will be determined by the performance of the slowest ancestor node. Furthermore, the failure of an ancestor node results in the suspension of the session of all the descendant nodes. This paper focuses on the transmission of data using multiple virtual forwarders, and suggests a scheme to overcome the drawbacks of the plain tree-based application layer multicast schemes. The proposed scheme elects multiple forwarders other than the parent node of the delivery tree. A receiver receives data from the multiple forwarders as well as the parent node and it can increase the amount of receiving data per time unit. The multiple forwarder helps a receiver to reduce the impact of the failure of an ancestor node. The proposed scheme suggests the forwarder selection algorithm to avoid the receipt of duplicate packets. We implemented the proposed scheme using MACEDON which provides a development environment for application layer multicast. We compared the proposed scheme with Bullet by applying the implementation in PlanetLab which is a global overlay network. The evaluation results show that the proposed scheme enhanced the throughput by 20 % and reduced the control overhead over 90 % compared with Bullet.

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF

The connective method for efficient e-marketplace of cyber shipping trade (사이버 해운 거래의 효율화를 위한 e-Marketplace의 연계 방안)

  • 한계섭;최형림;박남규;김현수;박민선
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.149-166
    • /
    • 2002
  • 국내·외 사회 전 분야의 급속한 전자상거래 발전에 따라 해운·항만 분야에도 인터넷 사업의 진출기회가 확대되고 전략적 활동이 증가하고 있다. 그 중에서도 인터넷을 기반으로 세계가 하나의 시장으로 통합되는 경향을 보이고 있어 기업의 활동 범위가 광역화되고 있으며, 시간과 장소의 통합이 기업간 거래에서 중요시 되고 있다. 지금 세계 각 국은 해상연계 물류, 무역 등 물품의 중개 관련 사이트 및 선박 운송에 따른 각종 해운관련 서비스를 가상 공간에서 제공하는 사이버 해운 시장의 선점 및 구축에 모든 힘을 쏟고 있다. 해상 운송에 따른 각종 수송서비스를 생산, 공급하는 경제활동을 해운 활동이라 한다. 해운 시장의 불확실성, 다변성, 국제성, 개방성을 특성으로 하는 해운 거래는 전자상거래를 통해 효율적으로 처리될 수 있다. 즉, 해운 거래의 비용 감소와 양질의 서비스로 선주, 화주 등 거래 당사자들의 만족도를 높일 수가 있다. 이에 따라 국내에서도 오프라인상의 해운 거래소가 사이버 해운거래소로 옮겨질 예정이다. 가상 공간을 통한 해운 거래의 구체적인 장점은 다음과 같다. 구매업체는 기존 공급업체에 대한 접근 및 새로운 공급업체의 확보가 용이하며, 경쟁 입찰 등을 통해 저렴한 비용으로 물품을 구입할 수 있다. 판매 업체의 경우 채널 확장이 가능하며 판매비를 절감할 수 있다. 또한 e-Marketplace의 입장에서 보면 해운 산업 전체를 위한 새로운 시장을 형성할 수 있으며, 이를 통해 지속적인 수익 창출도 가능하다. 이러한 해운 거래의 B2B e-Marketplace의 출현은 향후 해운 거래의 새로운 패러다임으로 자리 잡을 것이다. 사이버 해운 거래소는 선박 매매와 용선, 화물 거래를 위한 선·화주의 연결, 표준화된 카탈로그 구축, 각종 전자문서 생성, 전자 결제, 온라인 보험 가입, 해운 선용품 판매 및 관련 정보 제공 등 해운 거래를 위한 종합적인 서비스가 제공되어야 한다. 이를 위해, 본문에서는 e-Marketplace의 효율적인 연계 방안에 대해 해운 관련 업종별로 제시하고 있다. 리스트 제공형, 중개형, 협력형, 보완형, 정보 연계형 등이 있는데, 이는 해운 분야에서 사이버 해운 거래가 가지는 문제점들을 보완하고 업종간 협업체제를 이루어 원활한 거래를 유도할 것이다. 그리하여 우리나라가 동북아 지역뿐만 아니라 세계적인 해운 국가 및 물류 ·정보 중심지로 성장할 수 있는 여건을 구축하는데 기여할 것이다.

  • PDF

Design And Implementation of WebDAV Virtual Storage System based on Android (안드로이드 기반의 WebDAV 가상 스토리지 시스템의 설계 및 구현)

  • Kim, Sang-Geon;Byun, Sung-Jun;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.669-671
    • /
    • 2010
  • IStorage is a technology, which can use resources of server PC by using Android Phone supporting wireless internet access. IStorage utilizes resources of server PC through WebDAV protocol. And with GUI interface, Users upload their resources to the server PC and They can perform various kinds of works like Opening, Searching, Deleting and Downloading files. Since it is possible for them to use resources of server PC as if they are originally stored in their mobile devices, there is no limit on using the functions such as watching movies, listening musics and opening document files in real time. We expect this study can to overcome the limitation of storage space and also be a useful technology in the smart phone market.

  • PDF

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

Interactive Interface Design Through VR Hand Tracking (VR 핸드트레킹을 통한 상호작용 인터페이스 설계)

  • Ju-Sang Lee;Hyo-Seung Lee;Woo-Jun Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.213-218
    • /
    • 2023
  • In order to use the VR HMD, operation through separate controllers in both hands is required. Methods for text input in VR include a method of selecting virtual keyboard keys on the screen one by one using a controller, a method of inputting through a keyboard that is a resource of a computer by connecting a computer and VR, or a method of inputting through a keyboard that is a resource of a computer by purchasing a wireless keyboard in VR and wireless keyboard connection method. As such, the text input method in current VR equipment causes inconvenience and additional costs to users. For these reasons, most of the VR-related contents are limited to simple functions such as games or viewers, and there is a risk that VR equipment will be recognized as a simple game machine. Therefore, in this study, a multi-input interface using hand tracking provided by the Oculus Quest2 device is designed and partially implemented. Through this, it is expected that various tasks such as document work and business processing as well as games can be conveniently used using VR equipment.

Simulation Study on E-commerce Recommender System by Use of LSI Method (LSI 기법을 이용한 전자상거래 추천자 시스템의 시뮬레이션 분석)

  • Kwon, Chi-Myung
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.23-30
    • /
    • 2006
  • A recommender system for E-commerce site receives information from customers about which products they are interested in, and recommends products that are likely to fit their needs. In this paper, we investigate several methods for large-scale product purchase data for the purpose of producing useful recommendations to customers. We apply the traditional data mining techniques of cluster analysis and collaborative filtering(CF), and CF with reduction of product-dimensionality by use of latent semantic indexing(LSI). If reduced product-dimensionality obtained from LSI shows a similar latent trend of customers for buying products to that based on original customer-product purchase data, we expect less computational effort for obtaining the nearest-neighbor for target customer may improve the efficiency of recommendation performance. From simulation experiments on synthetic customer-product purchase data, CF-based method with reduction of product-dimensionality presents a better performance than the traditional CF methods with respect to the recall, precision and F1 measure. In general, the recommendation quality increases as the size of the neighborhood increases. However, our simulation results shows that, after a certain point, the improvement gain diminish. Also we find, as a number of products of recommendation increases, the precision becomes worse, but the improvement gain of recall is relatively small after a certain point. We consider these informations may be useful in applying recommender system.

  • PDF

Development of CITIS prototype in distributed environment (이질 분산환경을 고려한 CITIS 프로토타입의 구현)

  • 한태창;서범수;정석찬
    • Proceedings of the CALSEC Conference
    • /
    • 1998.10a
    • /
    • pp.95-104
    • /
    • 1998
  • Nowadays, document management system is used to share the information using intranet in some enterprises. But for enterprise that is to share information with other enterprises, a simple information sharing environment like homepage or email is used. The goal of CALS is to increase productivity through rapid exchange of shared information between enterprises. CITIS is a software infrastructure in CALS and service standard to share the CALS data among business organizations. CITIS can be used as a software infrastructure for constructing virtual enterprise in the internet. In this paper, we design and implement CITIS prototype on the internet. Java is selected as an implementation language fer its portability and web-based characteristics. CORBA is an communication middleware for distributed objects.

  • PDF

The Design and Implementation of Intranet Administrator and User Application (인트라넷 관리자 및 사용자 응용의 설계 및 구현)

  • Shin, Myung-Ki;Hahm, Jin-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.1005-1013
    • /
    • 1998
  • In this paper, we describe technologies of Intranet administrator and user application used in the PEC(Protocol Engineering Center) Office Intranet system which provides platform independent application framework using Internet/Intranet standard technologies for distribution of Web documents and real-time multimedia information. The PEC Office is composed of administrator applications to support environments for administration of all applications including group/user add, update, and delete facilities and construction of user directory and user applications to support schedule sharing, virtual library, job report, output management, budget management, and real-time audio/video broadcasting services. These applications allow differentiation and customization services according to department and title employed per users.

  • PDF