• Title/Summary/Keyword: Mobile Service Network

Search Result 1,666, Processing Time 0.037 seconds

A Design of P2P Cloud System Using The Super P2P

  • Jung, Yean-Woo;Cho, Seongsoo;Lee, Jong-Yong;Jeong, KyeDong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.42-48
    • /
    • 2015
  • Generally, the current commercial cloud system is hosted by the centralization large datacenter. However, the other clouding forms existed and one of them is the P2P cloud. The P2P Cloud is a distributed systems, is freedom to join and leave and is possible to provide the IaaS. Commonly, P2P Cloud System is based on Pure-P2P System. Since a number of connection paths exist, it has a high reliability and easily scalability of the network. However, there are disadvantages of the slow rate of route because of looking up the all peers in order to search for the peer. In this paper, it proposes the P2P cloud system based on super-peer P2P. Super-peer P2P system has fast routing time, because of searching for cluster unit and it also can has high reliability and high scalability. We designs the super Peer cloud service and proposes the system model and Resource Allocation Algorithm for IaaS in Super peer P2P environment.

Web-based Automated Network Service Security Vulnerability Analysts & Management System (웹 기반의 자동화된 네트워크 서비스 보안 취약성 분석 및 관리 시스템)

  • Lim, Mun-Hee;Yang, Jin-Suck;Kim, Hyun-Ku;Chang, Beom-Hwan;Chung, Tai-Myung
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.853-856
    • /
    • 2002
  • 인터넷이라는 거대한 네트워크에 연결되어 있는 시스템의 보안 상태를 주기적으로 점검하여 외부로부터의 공격에 취약한 부분을 보완하여 주는 일은 공격에 대한 방어를 위하여 가장 기본적인 일이다. 그러나 수많은 호스트가 상호 연결된 네트워크 관리 시스템에서 관리자가 각 시스템의 보안상 취약점을 전부 인지하고 이에 대한 보완을 수행하는 것은 상당히 어려운 일이다. 따라서 관리자의 수작업에 의한 취약점 분석 작업보다는 자동화된 관리 도구에 의한 취약점 분석이 효율적이다. 이에 본 논문에서는 네트워크 서비스인 HTTP, SMTP의 취약점을 원격에서 분석하는 시스템을 설계 및 구현하였다. WAVAMS는 에이전트와 독립된 mobile 코드의 이동에 의한 동적 분석 모듈의 추가로 가장 최근의 취약점을 신속하게 분석 할 수 있으며 확장성이 높다. 또한 웹 기반으로 설계되어 관리자가 용이하게 관리할 수 있다.

  • PDF

Performance Analysis of Soft Handoff Region Ratio in CDMA System Considering System Capacity and Traffic Load (CDMA망에서 시스템 용량과 트래픽 부하의 변화를 반영한 핸드오프 영역 비율에 대한 성능분석)

  • Jung, Sung-Hwan;Hong, Jung-Wan;Lee, Sang-Cheon;Lie, Chang-Hoon
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.216-226
    • /
    • 2007
  • In code-division multiple-access (CDMA) systems with soft handoff, mobile station (MS) within soft handoff region can use multiple radio channels and receive their signals from multiple base stations (BSs) simultaneously. In this paper, the effects of soft handoff region ratio (SHRR) on reverse link of a CDMA cellular system are analytically investigated. In order to analyze the network performance and quality of service (QoS) perceived by users more realistically, both the soft capacity increasing factor and the traffic load variation affected by SHRR are jointly considered and a two-dimensional continuous time Markov chain (CTMC) model is built. In the numerical example, it is observed that the optimal guard channel exists according the variations of the traffic load and propagation conditions when the proper value of SHRR is determined.

Encoding Method for Olfactory Information (후각 정보의 부호화 방법)

  • Lee, Keun-Hee;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1275-1282
    • /
    • 2007
  • With the rapid spread of smart mobile products and practical use of wireless network, it became possible to offer the computing environment people can use anytime anywhere and it is predicted that portable computer as the next generation computing is to be put to practical use. This computer will be expected to have the new interface which provides realistic service through human's five senses as well as the interface through the visual and auditory senses. Accordingly, in this study, we are going to talk about the technology that expresses and reproduces what is based on olfactory information - closely related with memory among honan's five senses - in order to embody the lifelike user interface.

Implementation of Fast Infoset Algorithm for Fast Web Services (Fast 웹 서비스를 위한 Fast Infoset 알고리즘 구현)

  • Cho, Tae-Beom;Park, Yeoun-Sik;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.131-138
    • /
    • 2007
  • Plain old Web Services came true a services integration with use the XML that will be able to define a platform-independent document format in basic document format. Hut, the XML document decreases the efficiency of the whole application program with connects frequently in relatively slow communication media like network environment, embedded system or use the resource limited small-sized instrument like mobile. In this paper, we implemented the algorism of Fast Infoset, which can convert XML into Fast XML using the Fast Inoset method and PER encoding rules in ASN.1 and constructs Test Bed. Also, it is compared with the existing pure XML message method in difference of process performance after encoding SOAP messages of XML basis when constructing web service.

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro (와이브로의 초기인증에 적합한 명세기반의 침입탐지시스템)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.

Digital Customized Automation Technology Trends (디지털 커스터마이징 자동화 기술 동향)

  • Song, Eun-young
    • Fashion & Textile Research Journal
    • /
    • v.23 no.6
    • /
    • pp.790-798
    • /
    • 2021
  • With digital technology innovation, increased data access and mobile network use by consumers, products and services are changing toward pursuing differentiated values for personalization, and personalized markets are rapidly emerging in the fashion industry. This study aims to identify trends in digital customized automation technology by deriving types of digital customizing and analyzing cases by type, and to present directions for the development of digital customizing processes and the use of technology in the future. As a research method, a literature study for a theoretical background, a case study for classification and analysis of types was conducted. The results of the study are as follows. The types of digital customizing can be classified into three types: 'cooperative customization', 'selective composition and combination', 'transparent suggestion', and automation technologies shown in each type include 3D printing, 3D virtual clothing, robot mannequin, human automatic measurement program, AR-based fitting service, big data, and AI-based curation function. With the development of digital automation technology, the fashion industry environment is also changing from existing manufacturing-oriented to consumer-oriented, and the production process is rapidly changing with IT and artificial intelligence-based automation technology. The results of this study hope that digital customized automation technology will meet various needs of personalization and customization and present the future direction of digital fashion technology, where fashion brands will expand based on the spread of digital technology.

An Application-Independent Multimedia Adaptation framework for the Mobile Web (모바일 웹을 지원하는 응용 독립적 멀티미디어 적응 프레임워크)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.139-148
    • /
    • 2005
  • The desired level for multimedia services in the mobile web environment, the next generation web environment, is expected to be of PC level quality. And great efforts have been made in the development of hadware technology, communication technology, various kinds of services and standardization to support these services, In the mobile web environment, multimedia contents adaptation services should be available through supporting various kinds of devices, network abilities and users' preferences. It means that due to the variety of both desired devices' hardware specifications, called destinations, and desired QoSes, the QoSes in the destinations are not fixed or defined. If a new user wants to stream multimedia contents in a server through a new kind of terminal device, it should be considered whether the existing transcoders are able to adapt the multimedia contents. However, the existing libraries for multimedia adaptation have heavy transcoder figures which include all adaptive functions in one library, The challenge of universal access is too complex to be solved with these all in one solutions. Therefore, in this paper we propose an application independent multimedia adaptation framework which meets the QoS of new and varied mobile devices. This framework is composed of a group of unit transcoders having only one transcoding function respectively, Instead of heavy transcoders. Also, It includes the transcoder manager supporting the dynamic connections of the unit transcoders in order to satisfy end to end QoS.

  • PDF

Audio Quality Enhancement at a Low-bit Rate Perceptual Audio Coding (저비트율로 압축된 오디오의 음질 개선 방법)

  • 서정일;서진수;홍진우;강경옥
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.6
    • /
    • pp.566-575
    • /
    • 2002
  • Low-titrate audio coding enables a number of Internet and mobile multimedia streaming service more efficiently. For the help of next-generation mobile telephone technologies and digital audio/video compression algorithm, we can enjoy the real-time multimedia contents on our mobile devices (cellular phone, PDA notebook, etc). But the limited available bandwidth of mobile communication network prohibits transmitting high-qualify AV contents. In addition, most bandwidth is assigned to transmit video contents. In this paper, we design a novel and simple method for reproducing high frequency components. The spectrum of high frequency components, which are lost by down-sampling, are modeled by the energy rate with low frequency band in Bark scale, and these values are multiplexed with conventional coded bitstream. At the decoder side, the high frequency components are reconstructed by duplicating with low frequency band spectrum at a rate of decoded energy rates. As a result of segmental SNR and MOS test, we convinced that our proposed method enhances the subjective sound quality only 10%∼20% additional bits. In addition, this proposed method can apply all kinds of frequency domain audio compression algorithms, such as MPEG-1/2, AAC, AC-3, and etc.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.