• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.024 seconds

IMA based Platform Architecture for Improving Portability of Flight Software (비행 소프트웨어의 이식성 향상을 위한 IMA 기반 플랫폼 아키텍처)

  • Seo, Yongjin;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.1-17
    • /
    • 2014
  • Flight software operated on the on-board computers in the satellite has requirements such as real-time, high reliability. These requirements make dependency between the flight software and operating environments. Further, whenever a new system is built, such problem drives that all flight software are redeveloped. Thus, the dependency problem between them should be solved. And the problem can be resolved by improving the portability of the flight software. In order to improve the portability it is required to minimize the porting cost. In this paper, we classify the portability with the portability achieving methods. Using the classified portability, we propose a platform architecture that is based on the IMA concept and provides various portability capabilities. The proposed architecture enables us to solve the problem about the development of the flight software.

A Reliable Study on the Accident Reconstruction using Accident Data Recorder (사고기록장치를 이용한 교통사고재현에 관한 신뢰성 연구)

  • Baek, Se-Ryong;Cho, Joeng-Kwon;Park, Jong-Jin;Lim, Jong-Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.179-187
    • /
    • 2014
  • As an Accident data recorder (ADR) is a system to record a vehicle's status and dynamics information on the before and after of accident, Traffic accident investigation agencies and parts developers have a lot of interest to analyze an accident objectively and develop automotive safety devices by using real accident data, This study is to analyze an accident objectively and scientifically on the basis of traffic accident reconstruction with the use of output data of an event data recorder. This study is conducted double lane change test six times and slalom test one time as a field driving test and simulation. Based on the vehicle speed, the longitudinal and transverse acceleration, steering angle, driving path, and other kinds of information obtained from the field driving test, this study performed a simulation with PC-Crash program of reenacting and analyzing a traffic accident. The simulation was performed twice in the acceleration-steering angle input method and in the acceleration-driving path input method. By comparing the result of the field driving test with the results of the two simulations, we drew an analysis method with the optimal path reconstruction.

TCP Buffer Tuning based on MBT for High-Speed Transmissions in Wireless LAN (무선 랜 고속전송을 위한 최대버퍼한계 기반 TCP 버퍼튜닝)

  • Mun, Sung-Gon;Lee, Hong-Seok;Choo, Hyun-Seung;Kong, Won-Young
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.15-23
    • /
    • 2007
  • Wireless LAN (IEEE 802.11) uses traditional TCP for reliable data transmission, But it brings the unintentional packet loss which is not congestion loss caused by handoff, interference, and fading in wireless LAN. In wireless LAN, TCP experiences performance degradation because it consumes that the cause of packet loss is congestion, and it decrease the sending rate by activating congestion control algorithm. This paper analyzes that correlation of throughput and buffer size for wireless buffer tuning. We find MBT (Maximum Buffer Threshold) which does not increase the throughput through the analysis, For calculation of MBT, we experiment the throughput by using high volume music data which is creased by real-time performance of piano. The experiment results is shown that buffer tuing based on MBT shows 20.3%, 21.4%, and 45.4% throughput improvement under 5ms RTT, 10ms RTT, and 20ms RTT, respectively, comparing with the throughput of operation system default buffer size, In addition, we describe that The setting of TCP buffer size by exceeding MBT does not have an effect on the performance of TCP.

  • PDF

Lightweight Framework For Supporting Mobile Web Development (초고속 모바일 웹 개발을 위한 경량화 프레임워크)

  • Shin, Seung-Woo;Kim, Haeng-Kon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.127-138
    • /
    • 2009
  • Mobile web applications are being used and changed rapidly due to the growth of mobile device performance. But, cost of development environment and standards make the high development cost and low productivity. It is main reason that the design and implementation of the applications are more time consuming than general computing environments. In this paper, we propose MWeb(MobileWeb)-Framework based on the agile methodology and Ruby on Rails that is a kind of framework for supporting mobile web application development using mobile web standards. This work consists of the mobile web development architecture and agile process model. MWeb-Framework will support the same user experience to the different devices. We validates the framework by implementing the case studies through suggested mobile web development framework. As a result, we can develop the mobile web applications with productivity and quality. In the future, we will suggest how to make the MWeb-Framework standardization and practically apply the frameworks the various case studies to improve framework potentially problems.

  • PDF

Design and Implementation of the Interoperability method for the Remote OSGi services (원격 OSGi 서비스의 상호운용 기술 설계 및 구현)

  • Kim, Eun-Hoe;Yun, Ki-Hyun;Choi, Jae-Young
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.11-25
    • /
    • 2011
  • In ubiquitous computing environment, OSGi has applied to many areas such as digital mobile phones, vehicles, telematics, embedded appliances, residential gateways, industrial computers, desktop PCs, and high-end servers including mainframes. Therefore, interoperability is required for remote OSGi services which are built on various devices. In this paper, we proposed a method which was able to interoperate remote OSGi services using RMI paradigm. RMI is a representative middleware technology in distributed computing environment. The suggested method is based on the standard OSGi technology. It is possible to provide remote OSGi service registration, finding, and binding methods which were suitable for the OSGi service-oriented architecture. We also provided reliability of the dynamic remote OSGi services by maintaining consistent properties of them, and we could provide location transparency of the remote OSGi services by generating proxy bundles and proxy services dynamically.

TCP CAE : Improving Wireless TCP under Reverse Background Congestion through Comparative ACK-based Estimator (TCP CAE: ACK기반 역방향 네트워크의 혼잡 감지기법)

  • Kim, Jae-Hyun;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2008
  • TCP receivers deliver ACK packets to senders for reliable end-to-end transfer. When ACK packets are not transferred properly because of network congestion, the performance of TCP degrades. This paper proposes a reverse congestion warning mechanism and a congestion handling mechanism in heterogeneous networks with heavy background traffic in the backward direction. Help from TCP receivers or hardware such as routers and gateways other than the ACK packets themselves is not necessary. TCP senders compare the arrival intervals of ACK data passed from receivers and the difference in t imestamp values echoed by receivers. According to the simulation results using the NS-2 network simulator, the proposed scheme shows a performance elevation of 20% greater than Reno, 150% greater than New Reno, and 450% greater than Westwood, respectively, under heterogeneous networks and that the error rate of the radio link is 1% when the backward network is congested.

  • PDF

An Automatic Testing Method for EJB Components based on In-Container Testing Strategy (컨테이너 내부 테스팅 전략 기반의 EJB 컴포넌트 테스트 자동화 방법)

  • Kuk, Seung-Hak;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.85-98
    • /
    • 2015
  • Component technologies which enable quickly and effectively to develop software have begun to come into the spotlight since early 1990s. Currently, a number of software development works are performed on the J2EE/EJB environment. However component testing is a very complicated task, in addition it requires more efforts than the previous Java class testing. Thus many developers do not perform sufficiently testing works. In this paper we propose an automatic testing method for EJB components based on the in-container testing strategy and implement a testing tool. Since our method builds automatically the test environment for EJB components, it is possible for developers or testers to save their time and efforts at the test preparation phase. Therefore we are convinced that the reliability of EJB components can be increased through sufficient testings with our method.

On Relocation of Hopping Sensors for High Reliability Wireless Sensor Networks (고신뢰도 무선센서네트워크를 위한 홉핑 센서 재배치에 대한 연구)

  • Kim, Moon-Seong;Park, Kwang-Jin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.47-53
    • /
    • 2011
  • When some sensors under Wireless Sensor Networks fail or become energy-exhausted, redundant mobile sensors might be moved to recover the sensing holes. Within rugged terrain where wheeled sensors are unsuitable, other type of mobile sensors, such as hopping sensors, are needed. In this paper, we address the problem of relocating hopping sensors to the detected sensing holes. Recent study for this work considered the relocation using the shortest path between clusters; however, the shortest path might be used repeatedly and create other sensing holes. In order to overcome the mentioned problem, we propose relocation schemes using the most disjointed paths or multi-paths. Simulation results show that the proposed schemes guarantee more balanced migration distributions of efficient sensors and higher movement success ratios of required sensors than those of the shortest path-based scheme.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

A Study on the Application of Data-Mining Techniques into Effective CRM (Customer Relationship Management) for Internet Businesses (인터넷 비즈니스에서 효과적인 소비자 관계관리(Customer Relationship Management)를 위한 데이터 마이닝 기법의 응용에 대한 연구)

  • Kim, Choong-Young;Chang, Nam-Sik;Kim, Sang-Uk
    • Korean Business Review
    • /
    • v.15
    • /
    • pp.79-97
    • /
    • 2002
  • In this study, an analytical CRM for customer segmentation is exercised by integrating and analyzing the customer profile data and the access data to a particular web site. We believe that effective customer segmentation will be possible with a basis of the understanding of customer characteristics as well as behavior on the web. One of the critical tasks in the web data-mining is concerned with both 'how to collect the data from the web in an efficient manner?' and 'how to integrate the data(mostly in a variety of types) effectively for the analysis?' This study proposes a panel approach as an efficient data collection method in the web. For the customer data analysis, OLAF and a tree-structured algorithm are applied in this study. The results of the analysis with both techniques are compared, confirming the previous work which the two techniques are inter-complementary.

  • PDF