• Title/Summary/Keyword: Digital Computing Environment

Search Result 285, Processing Time 0.028 seconds

Design of Gateway for In-vehicle Sensor Network

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.73-76
    • /
    • 2005
  • The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.

  • PDF

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

A Scheduling Algorithm for Parsing of MPEG Video on the Heterogeneous Distributed Environment (이질적인 분산 환경에서의 MPEG비디오의 파싱을 위한 스케줄링 알고리즘)

  • Nam Yunyoung;Hwang Eenjun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.12
    • /
    • pp.673-681
    • /
    • 2004
  • As the use of digital videos is getting popular, there is an increasing demand for efficient browsing and retrieval of video. To support such operations, effective video indexing should be incorporated. One of the most fundamental steps in video indexing is to parse video stream into shots and scenes. Generally, it takes long time to parse a video due to the huge amount of computation in a traditional single computing environment. Previous studies had widely used Round Robin scheduling which basically allocates tasks to each slave for a time interval of one quantum. This scheduling is difficult to adapt in a heterogeneous environment. In this paper, we propose two different parallel parsing algorithms which are Size-Adaptive Round Robin and Dynamic Size-Adaptive Round Robin for the heterogeneous distributed computing environments. In order to show their performance, we perform several experiments and show some of the results.

Single Sign-On for Distributed Computing Environment (분산 컴퓨팅 환경을 위한 통합 인증 시스템)

  • 정연식;김인겸
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.439-446
    • /
    • 2003
  • In this paper, a single sign-on system has been designed and implemented. The purpose of the proposed system is that a user logs in once using a single password and gets authenticated access to all the servers that he is authorized to use without sending any passwords over the network. The proposed system involves the use of digital signature and cryptographic authentication protocols. For its implementation, a public-key infrastructure is also designed and implemented. To view the behavior of the proposed system, message sequence charts and state transition diagrams have been

A realtime communication for multi-users in ubiquitous computing environment (Ubiquitous computing에서 실시간 커뮤니케이션을 지원하는 다중사용자 환경)

  • Lee, Jung-Hwan;Kim, Seung-Bin;Shin, Hyun-Pil;Chin, Seong-Ah
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.144-147
    • /
    • 2006
  • 스마트장치(Smart Device)의 등장으로 인해 방송, 통신, 정보가 디지털 컨버전스(Digital Convergence)화 되고 있으며, 이를 활용한 다양한 응용도구들이 등장하고 있다. 무엇보다도 장소나 시간에 제한되지 않는 네트워크 환경의 사용 편의성 때문일 것이다. 본 연구에서는 이러한 스마트장치의 연결성과 활용성을 극대화할 수 있는 다중사용자 실시간 대화형 어플라이언스를 제안한다. PDA의 장점인 휴대성, 터치패드 입력방식과 무선 네트워크를 극대화하여 시간과 장소에 구애받지 않는 커뮤니케이션을 제공한다. 동일 플랫폼 기반으로서 특정기기끼리의 통신이 아닌, 다양한 장치간의 통신이 가능하여 무한한 확장이 가능하다. 이것은 PDA to PDA 뿐만 아니라 PDA to PC, PDA to Cellular Phone, PC to PC 등 다양한 장치 호환성으로, 한 환경에서 다른 환경으로 작업 연장이 가능하다. 또한 앞으로 펼쳐질 유비쿼터스(Ubiquitous)환경에서 새로운 다중사용자 커뮤니케이션을 제안한다.

  • PDF

Breaking the Myths of the IT Productivity Paradox

  • Hwang, Jong-Sung;Kim, SungHyun;Lee, Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.466-482
    • /
    • 2015
  • IT is the key enabler of digital economy. Appropriate usage of IT can provide a strategic competitive advantage to a firm in a dynamic competitive environment. However, there has been a continuing debate on whether IT can actually enhance the productivity of firms. This concept is called IT productivity paradox. In this study, we analyzed the causality among appropriate indicators to demonstrate the real impact of IT on productivity. The 12,100 sample data from 2011 were used for analysis. As expected, the results indicated that mobile device usage, website adoption, e-commerce, open source, cloud computing, and green computing positively influence IT productivity. This unprecedented large-scale analysis can provide clarification regarding the ambiguous causal mechanism between IT usage and productivity.

A Job Scheduling Method for Digital Contents Delivery Service System using a Idle Computing Resources (유휴 컴퓨팅 자원을 이용한 디지털 콘텐츠 전송 서비스 시스템에서의 작업할당기법)

  • Kim, Jin-Il;Song, Jeong-Yeong
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.29-36
    • /
    • 2005
  • In multi-server environment, We have to design a mechanism that selects appropriate servers for processing each service request while maximizing server throughput and minimizing average response of service requests. In this paper, we propose a job scheduling method for courseware delivery system using a idle computing resources on LAN. The proposed scheduling method propose an approach that uses client service request time, server available period and server load of requested service as guidelines of server selection. Comparing the our approach method to conventional one, experiments that the proposed approach provides better performance.

  • PDF

Design of Bio-Information Process based on Digital Composite Sensing (디지털 복합센싱 생체정보 프로세스 설계)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.507-510
    • /
    • 2014
  • The initial process configuration of biometric information system is performed by the same sequences statically and consistently without changing after the system is running. However, this static process configuration appears an inefficient performance to the applications of the mobile biometric information system in the mobile computing environment. This work proposes the dynamic process design and execution method as a way to overcome these inefficient processes.

  • PDF

Cloud-based Full Homomorphic Encryption Algorithm by Gene Matching

  • Pingping Li;Feng Zhang
    • Journal of Information Processing Systems
    • /
    • v.20 no.4
    • /
    • pp.432-441
    • /
    • 2024
  • To improve the security of gene information and the accuracy of matching, this paper designs a homomorphic encryption algorithm for gene matching based on cloud computing environment. Firstly, the gene sequences of cloud files entered by users are collected, which are converted into binary code by binary function, so that the encrypted text is obviously different from the original text. After that, the binary code of genes in the database is compared with the generated code to complete gene matching. Experimental analysis indicates that when the number of fragments in a 1 GB gene file is 65, the minimum encryption time of the algorithm is 80.13 ms. Aside from that, the gene matching time and energy consumption of this algorithm are the least, which are 85.69 ms and 237.89 J, respectively.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF