• Title/Summary/Keyword: Access 응용 프로그램

Search Result 187, Processing Time 0.024 seconds

Underwater acoustic communication system using diversity based on ray modeled underwater acoustic channel in Yellow Sea (다이버시티 기법을 이용한 서해에서의 음선 모델기반 수중음향통신 시스템)

  • Kang, Jiwoong;Kim, Hyeonsu;Ahn, Jongmin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.35 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • This paper proposes an adequate UWA (Underwater Acoustic) communication system of underwater communication network in the Yellow Sea. UWA channel is obtained from Bellhop ray tracing method with Yellow Sea environments. Based on this channel, communication parameters for CDMA (Code Division Multiple Access) and SC-FDM (Single Carrier-Frequency Division Multiplexing) using diversity techniques are calculated. In order to prove the proposed methods, BER (Bit Error Rate) and data rate are obtained using computer simulations and the adequate communication system for long rms delay spread and low Eb/No environments is proposed from the simulation.

Design and Implementation of a Network Programming Language (네트워크를 고려한 프로그래밍언어의 설계와 구현)

  • Won, Yu-Hun;Han, Tae-Suk
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1359-1371
    • /
    • 1999
  • 대규모 네트워크 상에서 동작하는 분산 시스템의 구현을 위해 제시된 방법 중의 하나인 이동 코드 개념은 네트워크 공유 자원에 접근할 수 있는 효과적인 방법을 제시하였고 이 개념을 지원하는 많은 언어들의 개발을 가져왔다. 개발된 언어들이 가지고 있는 이동 코드를 지원하기 위한 언어 구문과 적용하려는 문제 영역의 특성을 반영한 언어 구문은 네트워크 프로그래밍을 하는데 있어서 효율과 문제 중심의 프로그램의 두 가지를 모두 가능하게 하고 있다. 본 논문에서는 현재 분산 컴퓨팅 환경에서 가장 많이 사용되고 있는 클라이언트-서버 모델을 확장하여 서버의 자원에 접근할 수 있는 또 다른 방법을 가진 모델을 제시하고, 이 모델을 표현할 수 있는 언어를 설계하였다. 설계된 언어는 이동 코드의 개념을 지원함으로써 대규모 네트워크에서 수행되는 프로그램의 작성을 가능하게 하고, 분산 범위 규칙을 채택함으로써 이동 코드의 기술을 일반 함수를 기술하듯 명확한 관점에서 할 수 있도록 하였다. 또한 네트워크 관련 자원들을 언어 구문으로 채택하여 네트워크 프로그래밍을 언어 수준에서 할 수 있도록 하였다. 언어의 이론적인 설계에 그치지 않고 설계된 언어를 수행할 수 있는 실행 시간 지원 시스템을 구현하였다. 실행 시간 지원 시스템은 언어를 해석하고 실행하는 코드 해석기와 이동 코드를 지원하는 네트워크 감독으로 구성되며 설계된 언어를 사용하여 실제로 네트워크 응용 프로그램을 작성하고 테스트 해 볼 수 있다.Abstract Some studies bring up a concept of code mobility as an innovative way to access network resources in order to develop distributed systems working on a large scale network. After that, many languages are suggested to support this concept. In these languages, language constructors for their particular application domains and mobile codes provide both problem-oriented views to the programmer and reasonable performance to the system. In this thesis, we extend the client-server model that is the most popular model in developing distributed systems these days. We propose a model to have another method to access server's resources and extend the C language to implement the proposed model for the large scale network. The new language has capability to build a software working on a large scale network by supporting mobile code and gives a consistent network programming view to the programmer by adapting distributed semantics. The language also makes network programming easy by providing network primitives at the language level. We implement a prototype of run-time system to support this language. The run-time system is composed of two major parts: code-interpreter that interprets and executes the language and network-daemon that supports mobile codes.

Sorting Cuckoo: Enhancing Lookup Performance of Cuckoo Hashing Using Insertion Sort (Sorting Cuckoo: 삽입 정렬을 이용한 Cuckoo Hashing의 입력 연산의 성능 향상)

  • Min, Dae-hong;Jang, Rhong-ho;Nyang, Dae-hun;Lee, Kyung-hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.566-576
    • /
    • 2017
  • Key-value stores proved its superiority by being applied to various NoSQL databases such as Redis, Memcached. Lookup performance is important because key-value store applications performs more lookup than insert operations in most environments. However, in traditional applications, lookup may be slow because hash tables are constructed out of linked-list. Therefore, cuckoo hashing has been getting attention from the academia for constant lookup time, and bucketized cuckoo hashing (BCH) has been proposed since it can achieve high load factor. In this paper, we introduce Sorting Cuckoo which inserts data using insertion sort in BCH structure. Sorting Cuckoo determines the existence of a key with a relatively small memory access because data are sorted in each buckets. In particular, the higher memory load factor, the better lookup performance than BCH's. Experimental results show that Sorting Cuckoo has smaller memory access than BCH's as many as about 19 million (25%) in 10 million negative lookup operations (key is not in the table), about 4 million times (10%) in 10 million positive lookup operations (where it is) with load factor 95%.

Development and Application of Elementary Information Security Education STEAM Program through Simulation Hacking Play Activities (모의해킹 놀이 활동을 통한 초등 정보보호교육 STEAM 프로그램 개발 및 적용)

  • Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.3
    • /
    • pp.273-282
    • /
    • 2016
  • The new STEAM program suggested in this paper aims at helping students to have interest in information security engineering experts and to design their career creatively through the project on future promising career. The program was designed to help teachers and students understand the jobs and capabilities required for information security experts through direction and execution of the information security expert project. Teaching tools of information security through simulation hacking play activities based on hexagon cell is designed to provide students with the chance to indirectly experience the job of a computer security expert through an unplugged education. Because the content of cyber security is unfamiliar and difficult to understand, the program is designed to allow students to access the key principle of the job, rather than to describe the technical part. Using this program, students will be able to communicate with each other to solve the problems, to have interest in computer security experts, and to design their careers in a creative manner.

Countermeasure for Anti-financial hacking (금융 hacking 방지 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.43-48
    • /
    • 2013
  • With the development of computer technology, and have diversified technical system attacks evolve more. Computer hardware and software has evolved more and more, performance is improved, but the basic principle of operation does not change much, it is a problem. In general, the application is placed in a running state, the program data is placed in memory. Remains in memory for efficiency of operation of the operating system, we analyze memory and memory hacking, these data will have access to data. Since a large damage occurs key, such as certificates personal information, encrypted flows out, measures should be provided by it. In this content, I want to discuss the issues and work around memory hacking.

  • PDF

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Educational Software Development of Bluetooth Protocol for Protocol Monitoring and Emulation (프로토콜 모니터링 및 에뮬레이션 기능을 제공하는 블루투스 프로토콜의 교육용 소프트웨어)

  • 정중수
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2004
  • In addition to wired communication technology, wireless communication technology has been driving communication revolution nowadays. Bluetooth technology carries out data/voice communication making pico-net and the various application services are supported by access network connected to public network. This paper presents educational software development of bluetooth protocol stack including HCI, L2CAP, RFCOMM, SDP and profiles including GAP, SPP, GEOP, FTP. This software which supports programming environment of these protocol monitoring and emulation is implemented basically step by step for education based on H connected to the bluetooth device through RS-232-C, UART or USB cable. Application program coded by Visual C is operated over the firmware loaded on the bluetooth device connected to the PC. Additionally ftp and chatting function are developed to enhance educational efficiency.

  • PDF

Development of a CASE Tool on Relational Databases for Distributed Object Systems (분산객체 시스템을 위한 관계형 데이터베이스 연동도구의 개발)

  • Park, U-Chang;,
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.20-28
    • /
    • 2000
  • In distributed data processing environments, heterogeneous data sources should corporate each other. The CORBA standards proposed by OMG solve this problem by the integration of platform independent applications. In this paper, we design and implement a CASE tool that help linking CORBA applications to relational databases by interface method. This CASE tool manipulates the database schema and generates IDL and $C^{++}$ stubs corresponding to the schema. We explain the code generation process and evaluate the data access performance of the interface method compared to adapter method and various implementation languages. The implemented tool can be used for developing applications that need relational database corporation environments such as distributed information systems or data warehousing. etc.

  • PDF

The Accessibility Improvement of Grid Data I/O based on GASS (GASS 기반 그리드 데이터 I/O의 접근성 개선에 관한 연구)

  • Kwon, Oh-Kyoung;Park, Hyoung-Woo;Lee, Sang-San
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.147-150
    • /
    • 2002
  • 인터넷 기반의 컴퓨팅 환경이 발전함에 따라 자원과 정보의 공유를 위한 그리드 컴퓨팅이 나타나게 되었다. 그리드 컴퓨팅에서는 그리드 응용 수행시 프로그램과 데이터간의 위치가 다르고 분산되어 있는 경우가 많다. 현재 그리드 미들웨어 시장 표준인 글로버스 툴킷(Globus Toolkit$^{TM}$)에서 사용하는 GASS와 같은 그리드 I/O 시스템들이 원격에 있는 관련 데이터들을 로컬 시스템의 데이터에 접근하는 것처럼 처리하는 것을 지원한다. 그러나 GASS(Global Access to Secondary Storage)에서는 원격지의 파일 시스템의 접근시 URL을 이용하는데, 그리드 환경에서의 I/O을 위한 파일 시스템은 복수의 파일 형태로 분산되어있기 때문에 하나의 그리드 응용을 수행할 때 URL 을 동적으로 바꿔저야 하는 문제점을 갖고 있다. 본 논문에서는 URL 보다 상위 개념의 주소 체계인 URI 을 도입하고 이를 RSL과 연계하여 분산 환경의 그리드 I/O에서도 간을 주소 형태로 I/O 처리가 가능하는 등 효율적인 그리드 I/O를 위한 GASS 개선 방안을 제시 한다.

  • PDF

A Design and Implementation of Web-based Test System using Computer-adaptive Test Algorithm (컴퓨터 적응형 알고리즘을 이용한 웹기반 시험 시스템 설계 및 구축)

  • Cho, Sung Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.6
    • /
    • pp.69-76
    • /
    • 2004
  • E-learning is the application of e-business technology and services to teaching and learning. It use of new multimedia technologies and Internet to improved the quality of learning by facilitating access to remote resources and services. In this paper, we show a web-based test system, which is carefully designed and implemented based on the real TOEFL CBT. The system consists of a contents delivery mechanism, computer-adaptive test algorithm, and review engine. In this papepr, we describe design and implementing issues of web-based test systems.

  • PDF