• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.031 seconds

An Efficient Spatial Data Cache Algorithm for a Map Service in Mobile Environment (모바일 환경에서 지도 서비스를 위한 효율적인 공간 데이터 캐시 알고리즘)

  • Moon, Jin-Yong
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.257-262
    • /
    • 2015
  • Recently, the interests of mobile GIS technology is increasing with the spread of wireless network, the improvement of mobile device's performances, and the growth of demands about mobile services. Providing services in a wireless environment with existing wired-based GIS solutions have many limitations such as slow communication, processing rates and screen size. In this paper, we propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

A study of keep the Secret information of Random Sized Images from using Indestructible Security

  • Woo, Seon-mi;Lee, Malrey;Lee, Hyang Ran
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.23-29
    • /
    • 2016
  • The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.

Taint Inference for Cross-Site Scripting in Context of URL Rewriting and HTML Sanitization

  • Pan, Jinkun;Mao, Xiaoguang;Li, Weishi
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.376-386
    • /
    • 2016
  • Currently, web applications are gaining in prevalence. In a web application, an input may not be appropriately validated, making the web application susceptible to cross-site scripting (XSS), which poses serious security problems for Internet users and websites to whom such trusted web pages belong. A taint inference is a type of information flow analysis technique that is useful in detecting XSS on the client side. However, in existing techniques, two current practical issues have yet to be handled properly. One is URL rewriting, which transforms a standard URL into a clearer and more manageable form. Another is HTML sanitization, which filters an input against blacklists or whitelists of HTML tags or attributes. In this paper, we make an analogy between the taint inference problem and the molecule sequence alignment problem in bioinformatics, and transfer two techniques related to the latter over to the former to solve the aforementioned yet-to-be-handled-properly practical issues. In particular, in our method, URL rewriting is addressed using local sequence alignment and HTML sanitization is modeled by introducing a removal gap penalty. Empirical results demonstrate the effectiveness and efficiency of our method.

Construction of Geum'yeok-dang, the Heung'hae Bae Clan House, and its Structural Changes during the Late Joseon Period -On the Architectural Ideology and Issue of Practicality- (흥해배씨 종가 금역당(琴易堂)의 건축과 조선후기의 구조 변화 -건축이념 및 실용성과 관련하여-)

  • Lee, Jong-Seo
    • Journal of architectural history
    • /
    • v.25 no.4
    • /
    • pp.31-44
    • /
    • 2016
  • Geum'yeok-dang house in Andong was originally constructed in 1558. The original floor plan of the upper base featured a 90-degree tilted '日' shape, and had inner court(內庭) on each side of 'Jungdang(中堂, center hall)' building that was placed on the south-north axis. When designing the building, the Neo-Confucian client of Geum'yeok-dang applied his understanding of how Ga'rye("家禮") defined the structure of ritual space. Consequently, 'Daecheong(大廳)', the place where guests were greeted and ancestral rites and coming of age ceremonies for male were held, was built in a protruding fashion. 'Jungdang'[otherwise known as 'Jeongchim(正寢)'], where coming of age ceremonies for females were held, the master of the house faced death, and memorials for close ancestors were held, was placed at the center of the residence on the south-north axis. The Geum'yeok-dang today was greatly renovated in the early and mid 18th century, due to the spread of 'Ondol' heating system. As the Ondol heating system became popular, the pre-existing drawbacks and the inconvenience of the house stood out clearly. As a result, the house was renovated into today's structure consisting of '口' shape 'Anchae' and 'Daecheongchae' in separate building.

Implementation of the Embedded Screen Control System using Image-Based Mobile Network (이미지기반 모바일 네트워크를 이용한 임베디드 전광판의 원격제어 시스템의 구현)

  • Lee Yeon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.970-974
    • /
    • 2006
  • In his paper, a remote screen control system by mobile networks on embedded system is implemented. For this system a server program is ported on the embedded system connected to the internet. And on the side of a mobile phone, a client program is ported using general virtual machine. The embedded system can display the image from the mobile phone on its LCD. In the implemented embedded system, the image data from GVM emulator is sent to the system for display on its LCD. The realization of the proposed embedded system can display the image from a working mobile phone.

RIA based Personalized Search with Widget Implementation (RIA 기반 개인화 검색을 위한 Widget 응용의 구현)

  • Park, Cha-Ra;Lim, Tae-Soo;Lee, Woo-Key
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.402-406
    • /
    • 2007
  • Rich Internet Application(RIA) is one of the Web 2.0 technologies and is expected to be a next generation user interface technique which allows flexible and dynamic manipulation for Web searches. This paper addresses a personalization mechanism for advanced Web search using RIA for abundant user interactions. We devised a dynamic and graphical user interface instead of previous text-based searches and a client side application for storing personal preference information. In this research, we implemented the graphical personalized search manager using Yahoo web search API and widget, and demonstrated its effectiveness by performing some experiments with various query terms and representative predicates.

A Fixed Grid Based Cache Algorithm for Performance Improvement in Internet Geographic Information System (인터넷 지리 정보 시스템에서의 성능 개선을 위한 고정 그리드 기반의 캐쉬 알고리즘)

  • Moon, Jin-Yong;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.27-34
    • /
    • 2000
  • Recently, the use of Geographic Information System in each field of our society is on the increase according to the development of the Internet. But, thereis a problem of the user access latencies, the network traffic, and the server overload in Internet Geographic Information System because spatial data are transferred in large volumes. In this paper, we propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

  • PDF

Design of a Web-based Autonomous Under-water Mobile Robot Controller Using Neuro-Fuzzy in the Dynamic Environment (동적 환경에서 뉴로-퍼지를 이용한 웹 기반 자율 잠수 이동로봇 제어기 설계)

  • 최규종;신상운;안두성
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.39 no.1
    • /
    • pp.77-83
    • /
    • 2003
  • Autonomous mobile robots based on the Web have been already used in public places such as museums. There are many kinds of problems to be solved because of the limitation of Web and the dynamically changing environment. We present a methodology for intelligent mobile robot that demonstrates a certain degree of autonomy in navigation applications. In this paper, we focus on a mobile robot navigator equipped with neuro-fuzzy controller which perceives the environment, make decisions, and take actions. The neuro-fuzzy controller equipped with collision avoidance behavior and target trace behavior enables the mobile robot to navigate in dynamic environment from the start location to goal location. Most telerobotics system workable on the Web have used standard Internet techniques such as HTTP, CGI and Scripting languages. However, for mobile robot navigations, these tools have significant limitations. In our study, C# and ASP.NET are used for both the client and the server side programs because of their interactivity and quick responsibility. Two kinds of simulations are performed to verify our proposed method. Our approach is verified through computer simulations of collision avoidance and target trace.

Privacy Preserving source Based Deuplication Method (프라이버시 보존형 소스기반 중복제거 기술 방법 제안)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.33-38
    • /
    • 2015
  • Cloud storage server do not detect duplication of conventionally encrypted data. To solve this problem, Convergent Encryption has been proposed. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.