• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.037 seconds

Privacy Preserving Source Based Deduplicaton Method (프라이버시 보존형 소스기반 중복제거 방법)

  • Nam, Seung-Soo;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.175-181
    • /
    • 2016
  • Cloud storage servers do not detect duplication of conventionally encrypted data. To solve this problem, convergent encryption has been proposed. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.

An Efficient Caching Scheme to Enhance the Response Time of Geospatial Web Services (지리공간 웹 기반 서비스에서 응답시간을 향상시키기 위한 효율적인 캐싱 기법)

  • Moon, Jin-Yong
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2009
  • The wide spread of the Internet service has brought in web GIS development. But, there are problems of the user access latencies, the network traffic, and the server overload in Internet Geographic Information System because spatial data are transferred in large volumes. In this paper, I propose a cache algorithm on client side to solve the above problems. The proposed algorithm demonstrates the performance improvement over known studies by utilizing unit time and spatial proximity. In addition, this paper conducts a performance evaluation to measure the improvement in algorithm efficiency and analyzes the results of the performance evaluation. When spatial data queries are conducted, according to our performance evaluation, hit rate has been improved over the existing algorithms.

  • PDF

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal (자원제약적인 모바일 단말기에서 효율적인 질의처리를 위한 접근제어)

  • An, Dong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.19-27
    • /
    • 2011
  • Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.

A Secure Strategy of e-Logistics Integration Using A Pattern of Technical Acquisition (기술획득 전략에 따른 e-로지스틱스 통합화 안전전략)

  • 김종기;서장훈;박명규
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.05a
    • /
    • pp.177-182
    • /
    • 2005
  • This paper examines to focus on General Strategy of e-logistics activity for SCM(Supply Chain Management) Build-up, especially the field service logistics integration. And this research analyzes the case study(Business of Strategy Group Unit) Survey involving effective logistics management that leads customer satisfaction, seeking to find out the key elements of competitive policy. Because problems arise from the differences between their goals and structures, which cause each side to feel vulnerable to opportunism or shirking of responsibilities by the other. The goal of a logistics system is to ensure that every family planning client always receives the contraceptives partner wants, and that they are in good condition and have not expired. In order to select, procure, and distribute the right quantities of the right contraceptives, managers of the logistics system must keep informed of the rates of use of each contraceptive and of the quantity of available supplies. As a result, We propose that a firm's e-logistics safe strategy is an important locus innovation and a crucial source of value creation for the firm its suppliers, partners, and customers.

  • PDF

A Study of Cheater Detection in FPS Game by using User Log Analysis (사용자 로그 분석을 통한 FPS 게임에서의 치팅 사용자 탐지 연구: 인공 신경망 알고리즘을 중심으로)

  • Park, Jung Kyu;Han, Mee Lan;Kim, Huy Kang
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.177-188
    • /
    • 2015
  • In-game cheating by the use of unauthorized software programs has always been a big problem that they can damage in First Person Shooting games, although companies operate a variety of client security solutions in order to prevent games from the cheating attempts. This paper proposes a method for detecting cheaters in FPS games by using game log analysis in a server-side. To accomplish this, we did a comparative analysis of characteristics between cheaters and general users focused on commonly loaded logs in the game. We proposed a cheating detection model by using artificial neural network algorithm. In addition, we did the performance evaluation of the proposed model by using the real dataset used in business.

Clinical and Clinicopathological Findings of Naturally Occurring Hyperadrenocorticism in Dogs: A Retrospective Study of 17 Cases

  • Kang, Sang-Gil;Yoo, Jong-Hyun;Park, Chul;Park, Hee-Myung
    • Journal of Veterinary Clinics
    • /
    • v.25 no.6
    • /
    • pp.476-481
    • /
    • 2008
  • A retrospective study of 17 dogs with hyperadrenocorticism (HAC) was performed to evaluate the clinical and clinicopathological outcomes in dogs with pituitary-dependent HAC or adrenal gland-dependent HAC. Sixteen dogs were monitored at day 10, 30 and 90 then every 3 month after first presentation. In each examination, physical examination and ACTH stimulation test and client questionnaire were performed. In 17 cases, eight dogs were successfully treated with mitotane therapy (median dose 16.7 mg/kg; range 5.3 to 50 mg/kg, SID); another one dog showed favorable response, but the clients declined to further treatment before the full control of the disease had been achieved; four dogs showed poor response to treatment. One dog was euthanized due to septicemia. These results showed canine HAC can be medically managed successfully without side effects at the doses used in this study.

Treatment of Calcinosis Cutis with Minocycline in Five Dogs

  • Cho, Dae-Hee;Lee, Wang-Hui;Park, Seong-Jun
    • Journal of Veterinary Clinics
    • /
    • v.34 no.2
    • /
    • pp.119-122
    • /
    • 2017
  • Calcinosis cutis is a chronic condition characterized by insoluble calcified deposits in the skin and subcutaneous tissue. Although there is no uniformly effective treatment for calcinosis cutis, minocycline therapy has demonstrated varying degrees of benefit in humans. Five client-owned dogs with calcinosis cutis were included. Minocycline was administered orally in a dose of 10 mg/kg bodyweight twice a day. Treatment was repeated every day until complete remission. The efficacy of minocycline was evaluated within this period. The side effects of minocycline were monitored and reported by the owners and veterinarians. Of the 5 dogs with calcinosis cutis, which was classified as the dystrophic form, four dogs had a complete remission of calcinosis cutis and one dog had a partial response. The major improvement was a reduction in the size of the calcified deposits and reduction in inflammation associated with them. The duration of remission was $9.1{\pm}2.2$ weeks. The adverse effects, observed in one dog, were anorexia and vomiting. Minocycline may be effective in the control of calcinosis cutis in dogs.

A Case of Meningoencephalitis Managed with Imatinib Mesylate in a Maltese Dog; Clinical and Serial Magnetic Resonance Imaging Findings (말티즈 견에서 발생한 뇌수막염에서 이마티닙을 적용한 증례; 임상적 그리고 연속적인 자기공명영상 결과)

  • Jung, Dong-In;An, Su-Jin;Hwang, Tae-Sung;Lee, Hee-Chun;Song, Joong-Hyun;Cho, Kyu-Woan
    • Journal of Veterinary Clinics
    • /
    • v.34 no.2
    • /
    • pp.152-155
    • /
    • 2017
  • A 5-year-old intact female Maltese dog was referred to us with a history of left side head tilt and ataxia. Based on magnetic resonance imaging (MRI) and cerebrospinal fluid analysis results, the patient was tentatively diagnosed to meningoencephalitis of unknown etiology (MUE). Clinical signs were gradually improved and diminished after imatinib mesylate plus prednisolone therapy. At 90 days after treatment, we performed MRI recheck and brain inflammatory lesions were significantly improved compared with initial MRI results. However, the present patient showed head turn and tetraparesis after anesthesia and euthanized according to client's request. This report describes the clinical findings, serial magnetic resonance imaging characteristics under imatinib mesylate treatment in a MUE case.

Implementation Method for DASH-based Free-viewpoint Video Streaming System (DASH 기반 자유시점 비디오 스트리밍 시스템 구현)

  • Seo, Minjae;Paik, Jong-ho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Free-viewpoint video (FVV) service provides multi viewpoints of contents and synthesizes intermediate video files which are not captured on some view angles so that enables users to watch as they choose wherever they want. Synthesizing video is necessary technique to provide FVV video service, because every video of the FVV contents for different view angles cannot be stored to the content server physically. For the reason, fast view synthesis can improve the quality of video service and increase user's satisfaction. One of the studies for FVV service, a method was proposed to transmit FVV service based on DASH (Dynamic Adaptive Streaming over HTTP). There is big advantage on using DASH that it is commonly used to transport video service. However, the method was only a conceptual proposal, so it is difficult to implement the system using the proposal. In this paper, we propose an implementation method to provide real-time FVV service smoothly. We suggest a system structure and operation method on the server and client side in detail, which is to be applicable to synthesize video quickly. Also, we suggest generating FVV service map additionally which controls a FVV service overall. We manage real-time information of the whole service through the service map. The service can be controlled by reducing the possible delay from network situation.

Construction of Incremental Federated Learning System using Flower (Flower을 사용한 점진적 연합학습시스템 구성)

  • Yun-Hee Kang;Myungju Kang
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.80-88
    • /
    • 2023
  • To construct a learning model in the field of artificial intelligence, a dataset should be collected and be delivered to the central server where the learning model is constructed. Federated learning is a machine learning method building a global learning model without transmitting data located in a client side in a collaborative manner. It can be used to protect privacy, and after constructing a local trained model on individual clients, the parameters of the local model are aggregated centrally to update the global model. In this paper, we reuse the existing learning parameter to improve federated learning, describe incremental federated learning. For this work, we do experiments using the federated learning framework named Flower, and evaluate the experiment results with regard to elapsed time and precision when executing optimization algorithms.

  • PDF