• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.029 seconds

WeWhere:A Multiple User Location Tracking System of Smart Phones (WeWhere:스마트 폰의 다중 사용자 위치 추적 시스템)

  • Park, Chan;Jeong, Ji-Seong;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.18-26
    • /
    • 2011
  • According that smart phones have been widely used, their users can easily access various information around the devices through location information services equipped to the smart phone devices. In this paper, we propose a WeWhere which is a system of client-server model for providing the current location among several smart phone users in real time. A client-side smartphone user send to a server his/her current location obtained by applying location information service provided from smart phones and receive location information of all smartphone users connected to the user from the server. The all location information is displayed on a smartphone of a user in client-side and users can track location of their related users. All most 200,000 persons in the world have used the proposed system, WeWhere, normally without overloading of a server system.

Spatial Data Service Based on RIA for Mobile Environment (모바일 환경을 위한 RIA 기반 공간 데이터 서비스)

  • Lee, Jae-Il;Kim, Ji-Ho;Oh, Byoung-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.56-64
    • /
    • 2009
  • As the Internet has been improved to Web 2.0, it introduces new approaches including Rich Internet Application (RIA) technology such as Flash, AJAX, Silverlight, etc. The RIA which is platform independent technology allows applications to provide rich client-side interfaces, and allows the browser to interact with users without communication to server. In this paper, we propose a method of spatial data service based on RIA technology. Internet map service using spatial data generally requires rich client-side interfaces and various interactions. These features can be provided by the RIA. The proposed method uses Flash developed by Macromedia as RIA technology. It can be applicable on any platform including mobile environment. The spatial data server makes Flash file known as SWF (Shock Wave File) with manipulation code for map and spatial data that is requested by user, and send it to the web browser. Once the web browser receives a SWF, client SWF manipulates user interactions, such as zooming and panning, without communication with server. Experiments that execute the application on various web browsers including mobile web browser and measure time of map interaction are carried out to compare with traditional bitmap based WMS (Web Map Service). As a result of experiments, we have confirmed improvement of interactivity and performance with RIA approach.

  • PDF

A Study of Cyclomatic Complexity for Web Application (웹 어플리케이션의 순환복잡도 메트릭스에 관한 연구)

  • An, Jong-Geun;Yu, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.447-456
    • /
    • 2002
  • Web applications haute different structural characteristics from conventional applications. A web application typically consists of server-side script elements which run on web sowers, client-side script elements which run on the client web-browser, link elements that the user clicks, and event elements that connect user-triggered request to the client script elements. These four elements are combined to form a web application. In such environments, direct application of conventional methods for measuring application complexity may not be possible, because they are primarily designed to measure complexity of modules and classes. In this paper, therefore, we propose metrics of Cyclomatic Complexity for Web Application (CCWA). We developed a tool to measure such metrics and applied it to the real-world examples. We found that the proposed CCWA metrics can be used for measuring complexity of highly complex web applications, which is not possible with conventional module and class based measurement techniques.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

An Empirical Analysis of the Effect of Governance-Peripheral Knowledge Fit on the Performance of IT Project Outsourcing: Focusing on the Perceptual Gap between Client and Vendor (IT 프로젝트 아웃소싱에서 거버넌스-주변지식의 조화가 프로젝트 성과에 미치는 영향에 대한 실증 분석: 고객사-공급사 간 인지차를 중심으로)

  • Seonyoung Shim
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.147-168
    • /
    • 2017
  • We investigated perceptual similarity and the difference between client and vendor in information technology (IT) outsourcing projects. Specifically, we focused on each player's perception of how the fit of governance and peripheral knowledge affects the performance of IT project outsourcing. For 107 IT projects, we surveyed both client and vendor in the same IT projects and compared the responses of each side. Through a dyadic analysis, we first found that both client and vendor put more weight on the vendor's peripheral knowledge than that of the client as a positive influencer of project performance. However, regarding the governance style of an IT project, client and vendor showed completely different perspectives. The client believed that the vendor's peripheral knowledge positively contributes to the performance of IT project under the governance of outcome control. However, the vendor showed that its peripheral knowledge creates synergy effects under the governance of process control. Our interpretation of the perceptual similarity and difference between client and vendor delivers managerial implications for businesses that process IT projects.

A Scheme for Push/Pull Buffer Management in the Multimedia Communication Environments (멀티미디어 통신 환경에서 Push/Pull 버퍼 관리 기법)

  • Jeong, Chan-Gyun;Lee, Seung-Ryong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.721-732
    • /
    • 2000
  • Multimedia communication systems require not only high-performance computer hardwares and high-speed networks, but also a buffer management mechanism to process many data efficiently. Two buffer handling methods, Push and Pull, are commonly used. In the Push method, a server controls the flow of dat to a client, while in the Pull method, a client controls the flow of data from a server. Those buffering schemes can be applied to the data transfer between the packet receiving buffer, which receives media data from a network server, and media playout devices, which play the recived media data. However, the buffer management mechanism in client-sides mainly support either one of the Push or the Pull method. Consequently, they have some limitations to support various media playout devices. Futhermore, even though some of them support both methods, it is difficult to use since they can't provide a unified structure. To resolved these problems, in this paper, we propose an efficient and flexible Push/Pull buffer management mechanism at client-side. The proposed buffer management scheme supports both Push and Pull method to provide various media playout devices and to support buffering function to absorb network jitter. The proposed scheme can support the various media playback devices using a single buffer space which in consequence, saves memory space compared to the case that a client keeps tow types of buffers. Moreover, it facilitates the single buffer as a mechanism for the absorbing network jitter effectively and efficiently. The proposed scheme has been implemented in an existing multimedia communication system, so called ISSA (Integrated Streaming Service Architecture), and it shows a good performance result compared to the conventional buffering methods in multimedia communication environments.

  • PDF

Exploitation of Multi-Versions based on Callback Locking in a Client-Server DBMS Environment (클라이언트-서버 DBMS 환경에서 콜백 잠금 기반 다중 버전의 활용)

  • 강흠근;민준기;전석주;정진완
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.457-467
    • /
    • 2004
  • The efficiency of algorithms managing data caches has a major impact on the performance of systems that utilize client-side data caching. In these systems, two versions of data can be maintained without an additional space overhead of the server by exploiting the replication of data in the server's buffer and clients' caches. In this paper, we present a new cache consistency algorithm employing versions: Two Versions-Callback Locking (2V-CBL). Our experimental results indicate that 2V-CBL provides good performance, particularly outperforms a leading cache consistency algorithm, Asynchronous Avoidance-based Gache Consistency, when some clients run only read-only transactions.

Implementation of a Remote Controlling System between Server/Client based Mobile (모바일 기반의 서버/클라이언트간 원격제어시스템의 구현)

  • Kim, Jae-Saeng;Lee, Jeong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.106-114
    • /
    • 2010
  • Recently, with the development of network technology, the web-based remote control systems and the real time remote control systems that do not have any restrictions at any time and space are many developed in the several industry FA field. In this paper, we developed the graphic editor screen of the client PC (PDA) with wireless network and the real time remote control system that can access the industry's server and can control the transmission of data for the FA of iron and steel industry field. Implementation of this system brought on the several effects of the decrease of the worker's movement, the control of quick equipments, a step-up in production efficiency, and the decrease of maintenance expense and so on in administration side of industry field.

Scheme of P2P and P2P-based Collaborative Machine (P2P 개요 및 P2P-based Collaborative Machine의 Scheme)

  • Kim D. H.;Song J. Y.
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.477-482
    • /
    • 2005
  • Recently, client computing trend has been changed from server oriented information application to network based P2P(Peer to Peer) services. The conventional client/server method has the merit of accessing abundant information, on the other side P2P has the merit of synchronized community support and information exchange. P2P has four meaning of point to point, peer to peer, person to person and path to profitability. In manufacturing system field, the second meaning is interested. P2P is classified to three type such as conventional client/server, hybrid P2P and pure P2P. The third is really peer to peer concept. The related technologies with P2P are P2P searching, XML, cooperation, IPv6, computing sharing and P2P communication. This paper describes the scheme of P2P and related contents. And through the P2P based technology, a P2P-based collaborative machine and a vertical portal machine are introduced in this paper. The scheme of the machines mentioned above is suggested for cooperation in manufacturing system and u-Manufacturing.

  • PDF

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.