• Title/Summary/Keyword: Access 응용 프로그램

Search Result 187, Processing Time 0.026 seconds

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.

Efficient Authorization Method for XML Document Security (XML 문서 보안을 위한 효율적인 권한부여 방법)

  • Jo, Sun-Moon;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.113-120
    • /
    • 2009
  • XML can supply the standard data type in information exchange format on a lot of data generated in running database or applied programs for a company by using the advantage that it can describe meaningful information directly. Therefore, as it becomes more and more necessary to manage and protect massive XML data in an efficient way, the development of safe XML access control techniques needs a new method. In this study access authorization policies are defined to design access control systems. The findings demonstrated that algorithm suggested in this study improved system performance which was low due to the complex authorization evaluation process in the existing access control techniques. It is consequently proved that the safe XML access control policy presented in this study is in an improved form as compared with the existing access control methods.

Design and Implementation of Network Fault-Tolerant Application Software Streaming (네트워크 고장감내 소프트웨어 스트리밍 기술의 설계 및 구현)

  • Shim, Jeong-Min;Kim, Won-Young;Choi, Wan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.126-133
    • /
    • 2006
  • Application software streaming is a virtualization technology that enables users to use applications without installation on her/his computer. With application streaming service, a client immediately starts and uses the application as if it were installed. The application can be executed while executable codes for the application may still be streamed. Since the software streaming is based on networks, its service is affected by network failures. Network failures may cause the streamed application to stop, and to make it worse, also the system may crash because executable codes for the application can't be streamed from the streaming server. Using the Pareto principle (80 vs. 20 rule), users can be served continuously with the minimum functions that are frequently used, pre-fetched and cached if we provide a more intelligent and fault-tolerant streaming technique. This paper proposes the concept and technique named Evergreen. Using the Evergreen technique, users can continue using the streamed application while a network failure occurs, although user can access only the streamed code. We also discuss the implementation of Evergreen technique in details.

  • PDF

Throughput Analysis in Vehicular Wi-Fi Networks (Wi-Fi 기반 차량 네트워크에서의 인터넷 처리율 분석)

  • Kim, Won-Jung;Kim, Young-Hyun;Youn, Joo-Sang;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.45-50
    • /
    • 2011
  • Due to advances in wireless communications and portable terminals, any-time, any-where, and any-device Internet access is possible. In particular, Internet access in moving vehicles is an emerging and challenging issue. Even though a variety studies have been conduced for vehicular networks, little attention is paid to vehicular Wi-Fi networks where a Wi-Fi access point (AP) is installed at the vehicle and the AP is connected to an external base station (BS). In this paper, we conduct a measurement study on the uplink and downlink throughput for Internet access in vehicular Wi-Fi networks. We consider diverse network environments: high-speed train, car, and subway. Measurement results demonstrate that current Internet access in vehicular Wi-Fi networks are not satisfactory for interactive multimedia applications. Therefore, in-depth study on resource management in vehicular Wi-Fi networks is strongly required.

An Empirical Evaluation Analysis of the Performance of In-memory Bigdata Processing Platform (메모리 기반 빅데이터 처리 프레임워크의 성능개선 연구)

  • Lee, Jae hwan;Choi, Jun;Koo, Dong hun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • Spark, an in-memory big-data processing framework is popular to use for real-time processing workload. Spark can store all intermediate data in the cluster memory so that Spark can minimize I/O access. However, when the resident memory of workload is larger that the physical memory amount of the cluster, the total performance can drop dramatically. In this paper, we analyse the factors of bottleneck on PageRank Application that needs many memory through experiment, and cluster the Spark with Tachyon File System for using memory to solve the factor of bottleneck and then we improve the performance about 18%.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Pipelined Parallel Processing System for Image Processing (영상처리를 위한 Pipelined 병렬처리 시스템)

  • Lee, Hyung;Kim, Jong-Bae;Choi, Sung-Hyk;Park, Jong-Won
    • Journal of IKEEE
    • /
    • v.4 no.2 s.7
    • /
    • pp.212-224
    • /
    • 2000
  • In this paper, a parallel processing system is proposed for improving the processing speed of image related applications. The proposed parallel processing system is fully synchronous SIMD computer with pipelined architecture and consists of processing elements and a multi-access memory system. The multi-access memory system is made up of memory modules and a memory controller, which consists of memory module selection module, data routing module, and address calculating and routing module, to perform parallel memory accesses with the variety of types: block, horizontal, and vertical access way. Morphological filter had been applied to verify the parallel processing system and resulted in faithful processing speed.

  • PDF

Access to Database Using List Comprehension (리스트 컴프리헨션을 이용한 데이터베이스 접근)

  • Park, Kyung-Soon;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.655-658
    • /
    • 2003
  • 기존의 데이터베이스 응용 프로그램을 작성할 경우에 질의 언어와 개발 언어간의 이중 언어 정의 문제(impedance mismatch)가 발생한다. 이를 해결하기 위한 한가지 방법으로 본 논문에서는 Haskell의 리스트 컴프리헨션(list comprehension)을 이용한 데이터베이스 접근을 제안한다. 이 방식을 이용할 경우 문법 체계가 명확해 진다는 장점과 연속적인 집계연산자(aggregate operator)를 사용할 수 있다는 장점이 있다. 또한 앞에서 지적한 이중 언어 정의 문제를 해결할 수 있다.

  • PDF

An Investigation into the Applicability of Node.js as a Platform for implementing Mobile Web Apps. (모바일 웹 어플리케이션을 구현하기 위한 Node.js 파일에 대한 조사)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.286-289
    • /
    • 2016
  • In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing- architecture but also a dedicated web platform called Node.js built-in with the asynchronous, Nonblocking, Event-Driven programming paradigm. Furthermore, the design of the proposed architecture takes document oriented database known as MongoDB to deal with the large amount of data transmit by users of mobile web access application. The Node.js aims to give the programmers the tools needed to solves the large number of concurrent connections problem. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smart phones interface approach that considers the smartphones to acts as a remote users which passes driver inputs and delivers output from external applications.

  • PDF

A Communication Platform for Mobile Group Peer-to-Peer Services (모바일 그룹 P2P 응용 서비스를 위한 통신 플랫폼)

  • Song, Ji-Hwan;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.389-400
    • /
    • 2008
  • As the wireless network technologies and the capability of the mobile terminals are evolving, advanced peer to peer applications for mobile users are attracting interests. In this paper, we propose the mobile P2P communication platform(MPCP) which provides transparency to the wireless network technologies and solutions to the limited resources of the mobile terminals. MPCP classifies the connection into two levels: a virtual channel and a session. A virtual channel is the network layer connection between the terminals whereas a session is the application layer connection. MPCP classifies the sessions into four types and applies different scheduling priority and data processing policies such as segmentation and reassembly. It selects proper wireless network technologies depending on the distance between the communication endpoints. To acquire dynamically changed access address, we harness the Session Initiation Protocol. We implemented MPCP on embedded Linux simulator and utilized the implementation in mobile P2P service development. For the quantitative analysis, we compared the performance of MPCP with that of ftp. Regardless of the number of simultaneous sessions, MPCP maintains the relative performance.