• Title/Summary/Keyword: 인터넷기반 응용프로그램

Search Result 268, Processing Time 0.03 seconds

Design and Implementation of Contents Verification Platform Based on Creative Commons License (Creative Commons License 기반의 컨텐츠 검증 플랫폼의 설계 및 구현)

  • Jung, Gyung-Hun;Eun, Ae-Cheoun;Park, Ji-Hyun;Yoo, Won-young;Ha, Young-Guk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.917-920
    • /
    • 2010
  • Web 2.0 시대를 대표하는 핵심적인 컨텐츠는 단연 UCC이다. 사용자가 직접 만드는 컨텐츠를 의미하는 UCC는 유투브, 아프리카TV 등을 통하여 많은 수익을 거두며 관련 업계의 주목을 받고 있으나 복제와 수정, 전송이 쉬운 인터넷 환경에서 많은 저작권 문제를 내포하고 있다. 최근에는 웹을 중심으로 CCL을 통해 자신의 저작물에 대한 허용조건을 명시하여 다른 사용자에게 명시된 조건하에서 자유롭게 저작물을 이용할 수 있게 하는 방법이 널리 이용되고 있다. 그러나 CCL로 허용된 컨텐츠를 이용함에 있어서 CCL의 누락 및 위변조를 통해 저작물을 불법으로 이용하는 행위가 증가하고 있어 CCL 활성화의 장애물이 되고 있다. 또한 다양한 응용프로그램에 CCL을 적용하고 검증하기 위한 SW 플랫폼이 부재한 상태이다. 이에 본 논문에서는 효과적으로 컨텐츠에 CCL을 적용하고 CCL로 사용허가된 컨텐츠를 검증 할 수 있는 SW 플랫폼을 제안한다.

Proposal and Performance Evaluation of A Scalable Scheduling Algorithm According to the Number of Parallel Processors (병렬 처리장치의 개수에 따른 스케줄링 알고리즘의 제안 및 성능평가)

  • Gyung-Leen Park;Sang Joon Lee;BongKyu Lee
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.19-28
    • /
    • 2000
  • The scheduling problem in parallel processing systems has been a challenging research issue for decades. The problem is defined as finding an optimal schedule which minimizes the parallel execution time of an application on a target multiprocessor system. Duplication Based Scheduling (DBS) is a relatively new approach for solving the problem. The DBS algorithms are capable of reducing communication overhead by duplicating remote parent tasks on local processors. Most of DBS algorithms assume an availability of the unlimited number of processors in the system. Since the assumption may net hold in practice, the paper proposes a new scalable DBS algorithm for a target system with limited number of processors. It Is shown that the proposed algorithm with N available processors generates the same schedule as that obtained by the algorithm with unlimited number of processors, where N is the number of input tasks. Also, the performance evaluation reveals that the proposed algorithm shows a graceful performance degradation as the number of available processors in the system is decreased.

  • PDF

Developing Advanced Location-Based Route-Search Service for Smart-phones (진보된 스마트폰용 위치 기반 경로 검색 서비스 개발)

  • Pak, Woo-Guil;Lim, Sung-Man;Oh, Han-Joon;Yu, Kwang-Hyun;Kwon, Min-Young;Lee, Hee-Seung;Choi, Young-June
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.173-180
    • /
    • 2011
  • Various smart-phone applications for location-based service are enabled through mobile communications such as 3G and WiFi. We have developed MARS, an advanced location-based route-search application based on the Android platform. It provides three functions: route-registration, route-search, and route-evaluation. These functions are dynamically maintained by a web server, a database server, and user mobile terminals. As users can update location information using their smart-phone devices, servers provide the information and allow users to add, modify, and remove their own information as well as adding comments to others, while existing map services do not support direct inputs from users. We show our implementation process and demonstration of its operations. We also show the comparison results with existing services. Through these results, we can confirm that MARS can achieve better performance.

A Policy-driven RFID Device Management Model (정책기반 RFID 장치 관리 모델)

  • Lee, Woo-Sik;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.75-81
    • /
    • 2012
  • Previous RFID systems exclusively manage the tags and readers for each company in individual manner. Thus, RFID system manager should understand and design specifications such as tag events, data format, and etc, based on individual companies. But it is very difficult to know all statements. To resolve theses problems, there has been conceptual research about policy-based RFID service management model that is not restrained from standards of typical RFID systems, including EPCglobal standard, and ISO/IEC standard. However, previous proposed service management model only aimed event management without including device management. Therefore, in this paper, we propose extended device management policy model for giving shape to the proposed policy-based RFID service management model. If the proposing device management policy model is used for device management, we can integrate control management for heterogeneous middleware, diverse RFID devices, and applications for each company. Moreover, we show that the RFID device management policy is translated and processed as an example using the proposing policy model in real-time RFID system.

DavSUDP: A Simple Protocol for Utilizing WebDAV User-defined Properties (DavSUDP: 웹데브 사용자 정의 속성의 활성화를 위한 단순 프로토콜)

  • Jung Hye-Young;Ahn Geon-Tae;Yu Yang-Woo;Park Yang-Soo;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.129-136
    • /
    • 2005
  • WebDAV extends the web communication protocol HTTP/1.1 to provide a distributed authoring and versioning across the Internet. A property management, the principal ability of WebDAV, has many advantages for managing and utilizing additional information of server resources as well as supports a role of storage. Most WebDAV Application systems currently available are using WebDAV for providing simple storage space, not for the functionality of property management. However, to develop an advanced application such as a collaborative system based on WebDAV, it is very important to design and utilize user-defined WebDAV properties. In this paper, we propose DavSUDP(WebDAV Simple User-defined Property Definition Protocol) that describes XML-based configurations representing WebDAV user-defined properties and their processing steps. DavSUDP enables WebDAV servers to effectively manage user-defined properties in developing WebDAV-based applications. To show this, we extended the Apache mod_dav module to support DavSVDP and developed the OpenSpace in the iPlace collaborative system using the extended Apache web server.

An Evaluation of Effort for Developing the RIA-based Cyber Education System and the non-RIA-based Cyber Education System (RIA 기반 가상교육 시스템과 non-RIA 기반 가상교육 시스템의 개발 노력 비교)

  • Lee Bu-Kwon;Kang Ki-Jun;Seo Yeong-Geon
    • The KIPS Transactions:PartA
    • /
    • v.12A no.1 s.91
    • /
    • pp.71-78
    • /
    • 2005
  • With the growth of the Internet, web-based cyber education is progressing from the text-based to the hyper-based including multimedia, and from one way of simply giving the contents to the learner to another way of providing mutual interaction between the instructor and the learner. For this, there uses the RIA-based dynamic application and multimedia. RIA, which is the new paradigm on the web, provides the learners with more effective and rich contents. For developing a cyber education system, if we use the existing web languages, a large amount of effort is needed. But if we use the RIA-based paradigm, we can remarkably reduce the effort. Also, in developing a new web-based cyber education system the RIA paradigm makes the learners to satisfy their demands, and in developing the system providing the interaction the paradigm gives us the way minimizing the time and effort. In this paper, we compare and evaluate the efforts in developing the RIA based education system with the Non-RIA based education system.

Ontology Knowledge-Driven Context-awere U-Healthcare Service Application Service Framework using Secure Health Information Exchange (보안 헬스 정보 교환을 이용한 온톨로지 지식기반 상황인식 U-헬스케어 어플리케이션 서비스 프레임워크 설계)

  • Kim, Donghyun;Kim, Seoksoo;Choi, E-Jung
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.75-84
    • /
    • 2014
  • The advancement in ubiquitous healthcare specifically in preventive healthcare can lead to longer life expectancy especially for the elderly patients. To aid in preventing premature loss of lives as well as lengthening life span, this research aims to implement the use of mobile and wireless sensor technology to improve the quality of life and lengthen life expectancy. The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. Therefore, we propose Context-aware Service of U-Healthcare Application based Knowledge using Ontology in secure health information exchange. This research also applies ontology in secure information exchange to support knowledge base, context modeling, and context reasoning by applying the general application areas for ontologies to the domain of context in ubiquitous computing environments. This paper also demonstrates how knowledge base, context technologies, and mobile web services can help enhance the quality of services in preventive ubiquitous healthcare to elderly patients.

Web GUI based Smart Factory Working Process Management and Sharing System (웹 GUI 기반 스마트 팩토리 공정 관리 및 공유 시스템)

  • Lee, Sang-Jeong;Hong, Seok-Jun;Jung, Taek-Sung;Han, Geon-Uk;Lee, In-Hye;Jeong, Min-Kyo;Min, Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.262-264
    • /
    • 2019
  • 최근 사물인터넷 분야에서 스마트 팩토리 부분은 많은 주목을 받고 있으며 관련된 연구도 많이 진행되고 있다. 기존의 스마트 팩토리 플랫폼은 제품 생산 효율성을 높여 비용을 줄이는 것을 목표로 센서로부터의 데이터 수집과 클라우드로의 전송, 대규모 데이터 분석을 통한 의사결정 등 자동화 부분에 집중되어 있다. 본 논문에서는 웹 GUI를 활용하여 응용 개발의 편의성을 높여 개발자가 아닌 공정관리자가 직접 공정을 제어할 수 있도록 했으며 유사 환경이 구축된 다른 공장에서 기존에 만들어진 공정 프로그램을 공유하고 재수정할 수 있는 시스템을 설계하였다. 또한, 프로토타입을 구현하여 제안된 웹 GUI기반 스마트 팩토리 공정 관리 및 공유 시스템의 운용 가능성을 검증하였다.

Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme (멀티캐스트 일괄 키 갱신 방법의 서버계산 비용 분석)

  • Park Chang-Seop;Lee Gyu-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.71-80
    • /
    • 2005
  • In the near future, various aplications on the Internet will be based on the multicast group communication, so that the efficient group key management is essential for managing the frequent group join and leave events. In this paper, we propose several batch rekeying schemes extended from conventional individual rekeying schemes, and analyze the efficiencies of them in terms of both the number of encryption and one-way hash function as well as multicast message size. Considering multiple member leaves, a probabilistic approach is need to compute the average computational amounts for rekeying.

NAAL: Software for controlling heterogeneous IoT devices based on neuromorphic architecture abstraction (NAAL: 뉴로모픽 아키텍처 추상화 기반 이기종 IoT 기기 제어용 소프트웨어)

  • Cho, Jinsung;Kim, Bongjae
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.18-25
    • /
    • 2022
  • Neuromorphic computing generally shows significantly better power, area, and speed performance than neural network computation using CPU and GPU. These characteristics are suitable for resource-constrained IoT environments where energy consumption is important. However, there is a problem in that it is necessary to modify the source code for environment setting and application operation according to heterogeneous IoT devices that support neuromorphic computing. To solve these problems, NAAL was proposed and implemented in this paper. NAAL provides functions necessary for IoT device control and neuromorphic architecture abstraction and inference model operation in various heterogeneous IoT device environments based on common APIs of NAAL. NAAL has the advantage of enabling additional support for new heterogeneous IoT devices and neuromorphic architectures and computing devices in the future.