• 제목/요약/키워드: Internet data center

검색결과 695건 처리시간 0.034초

Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System

  • Wang, Lina;Li, Linlin;Qiu, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.69-85
    • /
    • 2019
  • BeiDou navigation satellite system (BDS) is one of the four main types of global navigation satellite systems. The current system has been widely used by the military and by the aerospace, transportation, and marine fields, among others. However, challenges still remain in the BeiDou system, which requires rapid responses for delay-sensitive devices. A differential positioning algorithm called the data center-based differential positioning (DCDP) method is widely used to avoid the influence of errors. In this method, the positioning information of multiple base stations is uploaded to the data center, and the positioning errors are calculated uniformly by the data center based on the minimum variance or a weighted average algorithm. However, the DCDP method has high delay and overload risk. To solve these problems, this paper introduces edge computing to relieve pressure on the data center. Instead of transmitting the positioning information to the data center, a novel method called edge computing-based differential positioning (ECDP) chooses the nearest reference station to perform edge computing and transmits the difference value to the mobile receiver directly. Simulation results and experiments demonstrate that the performance of the ECDP outperforms that of the DCDP method. The delay of the ECDP method is about 500ms less than that of the DCDP method. Moreover, in the range of allowable burst error, the median of the positioning accuracy of the ECDP method is 0.7923m while that of the DCDP method is 0.8028m.

A Systematic Treat Model for Software-Defined Networking

  • Zhang, Wenbin;Wu, Zehui;Wei, Qiang;Yuan, Huijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.580-599
    • /
    • 2021
  • Software-Defined Networking (SDN) has three key features: separation of control and forwarding, centralized control, and network programmability. While improving network management flexibility, SDN has many security issues. This paper systemizes the security threats of SDN using spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE) model to understand the current security status of SDN. First, we introduce the network architecture and data flow of SDN. Second, we analyze security threats of the six types given in the STRIDE model, aiming to reveal the vulnerability mechanisms and assess the attack surface. Then, we briefly describe the corresponding defense technologies. Finally, we summarize the work of this paper and discuss the trends of SDN security research.

Load Balancing Strategy for P2P VoD Systems

  • Huang, Guimin;Li, Chengsen;Liu, Pingshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4207-4222
    • /
    • 2016
  • In a P2P (Peer-to-Peer) VoD (video-on-Demand) streaming system, the nodes' load is an important factor which affects the system performance. In the system, some nodes may receive too many requests, which leads to overload. On the other hand, some other nodes may receive too few requests, which leads to low utilization. Therefore, designing a reasonable load balancing strategy is important. However, existing related studies cannot handle this problem effectively, because they don't have an efficient dynamic load information management mechanism, and they don't distinguish the difference of requests when transfer the nodes' load. In this paper, to manage the dynamic load information efficiently, we design a load management table for each node. Based on the load information, we propose a load balancing strategy which uses a request migration algorithm (LBRM). Through simulations, our scheme can handle the load imbalance problem effectively and improve the users' playback fluency.

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.

APPLICATION OF IT TO REDUCE FLOOD DAMAGE DURING HEAVY RAINFALL DISASTER IN JAPAN

  • Kang, Sang-Hyeok;Motoyuki ushiyama, Motoyuki-Ushiyama
    • Water Engineering Research
    • /
    • 제4권4호
    • /
    • pp.187-192
    • /
    • 2003
  • The rainfall observation systems have largely been improved in Japan. The Japan Meteorological Agency, prefecture governments, and other administrative bodies have also increased the number of rain gauges thru out the country. The density of observatories is now one per several $\km^2$. Heavy rainfall information systems have been improved. Besides it, the Internet was popularized in the late 1990s, and has been used to transmit data of heavy rainfall. Internet accessible cellular phones have been popular in Japan since 1999. Such phones are expected to be useful in the field of disaster warning announcements, because they can automatically notify users bye-mail of pending disasters. The use of the Internet during natural disasters is groundbreaking in Japan today. However, in order to use disaster information effectively on Internet it is necessary to investigate how to use the information during the rainfall disaster. Therefore in our study we suggest methods on the effective construction and their use of information technology on Internet.

  • PDF

Media Use and Political Participation in China: Taking Three National Large-N Surveys as Examples

  • Miao, Hongna
    • Asian Journal for Public Opinion Research
    • /
    • 제7권1호
    • /
    • pp.1-22
    • /
    • 2019
  • In the age of continuous media change and the coexistence of multiple forms of media, the relationship between the public's media use and political participation is an urgent area of study. This paper makes use of large national sample surveys from 2002, 2011, and 2015, summarizes the change of the public's media use by descriptive statistics analysis, and finds that while the Internet has become an important communication channel, the use of Internet for political information and political participation is still overestimated. Compared to the weak impact of different media channels for political information on political participation, the frequency of media exposure and Internet use play a significant role in political participation. Because of the negative effect of the frequency of Internet use on political participation, the democratization function of the Internet needs to be treated with caution. This paper describes media use and its roles in contemporary China, analyzes the impact of media use on political participation, and extends the cross-cultural application of the theory of political communication.

Temporary Access Selection Technology in WIFI Networks

  • Lu, Yang;Tan, Xuezhi;Mo, Yun;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4269-4292
    • /
    • 2014
  • Currently, increasing numbers of access points (AP) are being deployed in enterprise offices, campuses and municipal downtowns for flexible Internet connectivity, but most of these access points are idle or redundant most of the time, which causes significant energy waste. Therefore, with respect to power conservation, applying energy efficient strategies in WIFI networks is strongly advocated. One feasible method is dynamically managing network resources, particularly APs, by powering devices on or off. However, when an AP is powered on, the device is initialized through a long boot time, during which period clients cannot be associated with it; therefore, the network performance would be greatly impacted. In this paper, based on a global view of an entire WLAN, we propose an AP selection technology, known as Temporary Access Selection (TAS). The criterion of TAS is a fusion metric consisting of two evaluation indexes which are based on throughput and battery life, respectively. TAS is both service and clients' preference specific through balancing the data rate, battery life and packet size. TAS also works well independently in traditional WLANs in which no energy efficient strategy is deployed. Moreover, this paper demonstrates the feasibility and performance of TAS through experiments and simulations with Network Simulator version 3 (NS3).

국내 H.323 기반 인터넷 전화 사업자간 연동 기술 (Technique of interoperability between ITSPs based on H.323)

  • 이일진;강신각
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.947-950
    • /
    • 2005
  • VoIP 기술은 인터넷 망 계층 프로토콜인 IP(Internet Protocol) 상에서 데이터 뿐만 아니라 음성 서비스를 동시에 제공할 수 있도록 지원하는 기술을 말한다. 이 기술은 인터넷이 급속하게 확산되고 이용자가 폭발적으로 증가함에 따라 인터넷 서비스에서 부각되는 기술로 자리잡고 있다. 현재 VoIP기술을 위한 표준 기술은 H.323과 SIP가 있다. IP 네트워크를 통해 음성전달을 가능케 하는 VoIP(Voice Over IP)가 소개되고 H.323, SIP와 같은 시그널링 프로토콜들이 제안되면서 텔레포니 서비스에 많은 변화를 가져왔다. 국내 대부분의 인터넷 전화 사업자는 H.323기반 인터넷 전화 서비스를 제공하고 있으며 향후 SIP기반의 인터넷 전화 사업자가 등장할 것으로 예상된다. 본 논문에서는 현재 국내 대부분의 인터넷 전화 사업자가 채택한 H.323기반의 인터넷 전화서비스를 사업자간에 연동하기 위한 연동 기술을 살펴본다.

  • PDF

일부 중학생의 인터넷 사용 수준에 따른 건강증진행위 비교 연구 (A Comparative Study on the Health Promoting Behavior between Average Internet Users and Excessive Internet Users in Middle School Students)

  • 한선희;오복창;장인순
    • 지역사회간호학회지
    • /
    • 제14권1호
    • /
    • pp.66-74
    • /
    • 2003
  • Purpose: This study was conducted to identify the difference of the health promoting behaviors between average Internet users and excessive Internet users. Method: Data were collected from a convenient sample of 465 middle school students from June 7th to 17th, 2002, based on a self reported questionnaire. The instruments included were the Health Promotion Behaviors reconstructed by the author based on the Health Promoting Lifestyle Profile (Walker, Sechrist & Pender, 1987) and Internet addiction test translated by Center for Internet Addiction Prevention and Counseling based on Young's test. Data were analyzed with N, %, x2 test, t-test and Pearson's correlation coefficient. Result : 1. There were no significant differences in general characteristics between average Internet users and excessive Internet users. 2. There were significant differences between two groups in diet behavior(p=.030), even though there were no differences in general health promoting behaviors(p=.109). 3. There were significant negative correlations between Internet use and diet behavior (r=-.193, p=.000). Therefore, average Internet users had more desirable diet behavior than excessive Internet users. Conclusion: Internet addiction prevention program should be conducted as part of a comprehensive school health promotion program. In addition, the results of this study should be considered in developing the school health education curriculum to rear students' responsibility on their health behaviors.

  • PDF

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권1호
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.