• Title/Summary/Keyword: Digital Computing Environment

Search Result 285, Processing Time 0.028 seconds

Method for Remotely Accessing the Home Network in the Mobile Environment (이동환경에서 홈 네트워크와 원격으로 연결하는 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Lee, Youn-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.649-651
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) standard enables easy sharing of multimedia contents in the home network environment. However, with the proliferation of mobile computing devices such as smartphones and tablets, the need for media sharing to expand beyond the boundaries of the home network arose. In this paper, a method for accessing DLNA based home network from the mobile environment is proposed. The proposed method uses mobile Virtual Private Network (VPN), and enables easy access to the resources in the home network from the wireless mobile environment.

  • PDF

Improvement Plan for Cadastral Surveying Fee Calculation Process (지적측량수수료 산정 공정의 개선방안)

  • Hong, Sung-Eon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6639-6645
    • /
    • 2014
  • This study was conducted to deduct the facing problems by analyzing the reflected computing environment of a cadastral surveying fee calculation process for all cadastral surveying items and suggest an improvement plan for the process, corresponding to the cadastral surveying environment. An analysis of the problems showed that the current cadastral surveying fee calculation process was complicated compared to other relevant fee calculation processes. Although work process has been improved due to the changes to current cadastral surveying technology and the digital cadastral management system, it has not been reflected. This article suggests simplifying the current universal nine-step process into a four-step process. In addition, the improvement plan for the improved work process with computer files to be applied before and after field surveys is suggested. The cadastral mapping process is divided into four steps to make it suitable for a computing environment and the corresponding process improvement plan is suggested.

Design and Implementation of Web-based Retrieval System for Massive Image Contents in Green Computing Environment (그린 환경을 위한 웹기반 대용량 이미지 콘텐츠 검색 시스템 설계 및 구현)

  • Na, Moon-Sung;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.113-123
    • /
    • 2009
  • As environmental issues are emerging, many efforts are globally conducted to reduce waste of energies and resources for green growth, as well as low-carbon emitting and replacement of document papers with digital files and images. On the other hand, it may require much time and efforts for users to find the proper image files on the web, where enormous un-standardized digital files are flourishing. Therefore, power and resource consumption may also grow up again in searching and retrieving files. This paper suggests efficient system design and implementation for fast and precise massive image contents retrieval for saving the energies and resources. Eventually it will contribute to green growth in computing environment.

Usability Evaluation Framework for Ubiquitous Computing Device (유비쿼터스 디바이스를 위한 사용성 평가 프레임워크 개발 - 디바이스의 Graphical User Interface 중심으로)

  • Kim, Han-Joon;Choi, Jong-Kyu;Ji, Yong-Gu
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.131-135
    • /
    • 2008
  • Nowadays various information devices using electronic technology has been released. And these digital devices will be continuously developed to make a satisfaction of customer's needs. So digital device will support network service using communication technology, so users will use the internet service anywhere, anytime. Also the networked device which is used in ubiquitous computing environment should be evaluated by new evaluation framework. Therefore previous usability evaluation framework need to reflect the characteristics of ubiquitous computing. However most of pervious research about ubiquitous computing was about conceptual issues like rules and characteristics of ubiquitous computing, so the research of usability testing and evaluation method for ubiquitous computing is rarely conducted. This research's purpose is developing the evaluation framework for ubiquitous computing device and usability model for ubiquitous computing. To develop the evaluation framework, we collect the evaluation indexes which have need used in GUI evaluation And we extract evaluation indexes for ubiquitous computing based on literature review.

  • PDF

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

QoS-aware Data Delivery Infrastructure for IoT Computing Environments (사물인터넷 컴퓨팅 환경에서 QoS를 고려한 데이터 전송 구조)

  • Rhee, Yunseok
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.407-413
    • /
    • 2018
  • In this paper, we present a scalable data delivery infrastructure for such IoT computing environment where we need a common platform where data providers share their diverse sensing data and applications can easily access and receive such data from providers. For efficient data delivery, this paper proposes a new delivery path management technique that take advantage of diverse consumer QoS when building bandwidth-efficient delivery paths. We perform primitive experiments on the path construction and reconstruction which may be major overhead of the scalable infrastructure. The results show that the proposed infrastructure achieves a high level of scalability, and demonstrates that the management overhead is not significant.

A Framework for Design and Evaluation of Robot Industry Business Model based on Cloud Services in an Aging Society (고령화 사회에서 클라우드 서비스 기반 로봇산업 비즈니스 모델의 설계 및 평가를 위한 프레임워크)

  • Jeon, Hangoo;Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.441-446
    • /
    • 2013
  • It is expected to change for convergence robotic services according to emergence new communication technologies and cloud computing, etc. Robot industry is evaluated the biggest filed that is possibility to convergence of new IT technology. This paper presents a design framework for robot industry business model on cloud services through the cloud computing and environment of robot industry, features and provide valuable of cloud-based robot service, analysis of customer needs and value chain in the market in an aging society. In addition, we describe the evolution path of the proposed business model in terms of technology development and market. This study is expected to help that cloud and robot services companies when establishing new service model development and marketing strategy.

Security Management Architecture Design for constructing the integrated computing environment (통합전산환경 구축에 따른 보안 관리 아키텍처 설계)

  • Hong, Ji-Boum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.115-117
    • /
    • 2005
  • 범정부 통합전산센터 추진에 따라 수많은 공공기관의 통합전산환경 구축이 요구되고 있으며 이에 따른 보안 정책과 관리 대책 수립이 진행되고 있다. 일반적인 보안 개념에 유비쿼터스 개념인 언제 어디서나 제공될 수 있는 서비스에 따른 보안의 개념이 도입됨에 따라 보안 관리 대책은 관리적, 기술적, 물리적인 측면에서 검토되어야 한다. 본 논문에서는 통합전산환경의 보안 요구사항을 파악하여 보안 관리 아키텍처를 관리적, 기술적, 물리적인 측면에서 현재 진행되거나 향후 추진들 공공기관의 통합전산환경 구축의 기본적인 보안 관리 아키텍처로 제안한다.

  • PDF

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.