• Title/Summary/Keyword: Networking

Search Result 3,278, Processing Time 0.033 seconds

Construction and Service of User rights based Challenge System in EDISON platform (사용자 권한 기반 EDISON 플랫폼 경진대회 시스템 구축 및 서비스에 관한 연구)

  • Kwon, Ye-Jin;Jeon, In-ho;Ma, Jin;Lee, Jong-Suk Ruth;Seo, Jerry H.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.194-197
    • /
    • 2018
  • EDISON 웹 포털을 기준으로 경진대회 시스템을 구축하기 위해서는 다양한 전문분야의 역할의 분담이 필요하다. 또한 사용자의 팀 구성, 평가 반영 결과의 가시화 등의 구체적인 서비스 분할과 사용자에게 부여된 권한에 따른 서비스 차별화가 필요하다. 따라서 본 논문에서는 경진대회를 진행함에 있어 다양한 사용자의 권한에 기반하여 경진대회 서비스를 구축하였다. 또한 현재 서비스를 구축하고 경진대회를 진행하였으며, 그 결과 각 사용자의 권한에 따른 서비스를 분할하여 제공하였다.

Modeling, Discovering, and Visualizing Workflow Performer-Role Affiliation Networking Knowledge

  • Kim, Haksung;Ahn, Hyun;Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.691-708
    • /
    • 2014
  • This paper formalizes a special type of social networking knowledge, which is called "workflow performer-role affiliation networking knowledge." A workflow model specifies execution sequences of the associated activities and their affiliated relationships with roles, performers, invoked-applications, and relevant data. In Particular, these affiliated relationships exhibit a stream of organizational work-sharing knowledge and utilize business process intelligence to explore resources allotting and planning knowledge concealed in the corresponding workflow model. In this paper, we particularly focus on the performer-role affiliation relationships and their implications as organizational and business process intelligence in workflow-driven organizations. We elaborate a series of theoretical formalisms and practical implementation for modeling, discovering, and visualizing workflow performer-role affiliation networking knowledge, and practical details as workflow performer-role affiliation knowledge representation, discovery, and visualization techniques. These theoretical concepts and practical algorithms are based upon information control net methodology for formally describing workflow models, and the affiliated knowledge eventually represents the various degrees of involvements and participations between a group of performers and a group of roles in a corresponding workflow model. Finally, we summarily describe the implications of the proposed affiliation networking knowledge as business process intelligence, and how worthwhile it is in discovering and visualizing the knowledge in workflow-driven organizations and enterprises that produce massively parallel interactions and large-scaled operational data collections through deploying and enacting massively parallel and large-scale workflow models.

Implementation of FlexRay Network System using Node-based Scheduling Method (노드 기반 스케줄링 방법을 이용한 FlexRay 네트워크 시스템의 구현)

  • Kim, Man-Ho;Ha, Kyoung-Nam;Lee, Suk;Lee, Kyung-Chang
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.18 no.2
    • /
    • pp.39-47
    • /
    • 2010
  • As vehicles become intelligent for convenience and safety of drivers, in-vehicle networking (IVN) systems are essential components of intelligent vehicles. Recently, the chassis networking system which require increased network capacity and real-time capability is being developed to expand the application area of IVN systems. Also, FlexRay has been developed for the chassis networking system. However, FlexRay needs a complex scheduling method of static segment, which is a barrier for implementing the chassis networking system. Especially, if we want to migrate from CAN network to FlexRay network using CAN message database that was well constructed for the chassis networking system by automotive vendors, a novel scheduling method is necessary to be able to reduce design complexity. This paper presents a node-based scheduling method for FlexRay network system. And, in order to demonstrate the method's feasibility, its performance is evaluated through an experimental testbed.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

A Study of Multipath Routing based on Software-Defined Networking for Data Center Networking in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 데이터 센터 네트워킹을 위한 소프트웨어 정의 네트워킹 기반 다중 경로 라우팅 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.563-564
    • /
    • 2017
  • The core of the cloud computing technology is the data center in that the networking technology is important. Cloud data centers are comprised of tens or even hundreds of thousands of physical servers, so networking technology is required for high-speed data transfer. These networking technologies also require scalability, fault tolerance, and agility. For these requirements, many multi-path based schemes have been proposed. However, it was mainly used for load balancing of traffic and select a path randomly. In this paper, a scheme that can construct a multipath using software defined networking technology and transmit the traffic in parallel by using the multipath to achieve a fast transmission speed, solve the scalability problem and fault tolerance is proposed.

  • PDF

A Study On The Development Of a Home Networking System Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 네트워킹 시스템 구현에 관한 연구)

  • Lee, Heon-Joo;Lee, Jong-Su;Choi, Kyung-Sam
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.592-595
    • /
    • 2003
  • In this paper, we have designed a Home Networking System using an embedded linux board. The system based on the World-Wide-Web is composed of three parts - a Server, a Client and a Simulator. The Home Networking Server is built in an embedded board using an embedded linux kernel. A web-server and Home Networking Server Seryice Demon programming with a Jaya-Language is included in the board. Clients can connect to the server board using a web-browser in the desktop computer, PDA or any other machines which include a web-browser. For this purpose, we made the client program using a Java-Applet. So, the clients who connect to the server for the control of the applications, download the class-file and execute the client-program in the web-browser. So, the clients don't need any other programs to control the applications from a remote place. The size of server board is very small (86.3$\times$74mm), which makes it very useful not only for the Home-Networking-System but also in many other fields, e.g., embedded robot control system, etc. Using an embedded board instead of a desktop computer is good for a simple network environment and it occupies only a small space to make the system.

  • PDF

Relationship between High School Students' Mental·Social Health and Tendency toward Social Networking Addiction (고등학생의 정신·사회건강과 SNS 중독경향성)

  • Byun, Jong Hee;Choi, Yeon Hee;Na, Yoon Joo
    • Journal of the Korean Society of School Health
    • /
    • v.28 no.3
    • /
    • pp.248-255
    • /
    • 2015
  • Purpose: This study was conducted to explore the relationship between high school students' mental social health and their tendency toward social networking addiction. Methods: The subjects were 543 high school boys and girls living in D city. The data were collected from the 3rd to 21st of March in 2014. Data were analyzed using t-test, ANOVA, Duncan's post-hoc test, Pearson's correlation analysis, and hierarchical regression with SPSS/ Win 21.0. Results: Social networking addiction showed significant differences depending on gender (t=-7.03, p<.001), academic achievement (t=4.571, p=.011), and the level of maternal education (t=3.344, p=.019). Social health was correlated with the tendency toward social networking addiction. Multiple regression analysis found that gender, academic achievement and social health were associated with the level of social networking addiction (F=8.750, p<.001, Adj. $R^2=.201$). Conclusion: The results suggest that it is necessary to take into account gender characteristics, academic achievement and social health in order to develop effective management programs for social networking addiction among high school students.

URL Phishing Detection System Utilizing Catboost Machine Learning Approach

  • Fang, Lim Chian;Ayop, Zakiah;Anawar, Syarulnaziah;Othman, Nur Fadzilah;Harum, Norharyati;Abdullah, Raihana Syahirah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.297-302
    • /
    • 2021
  • The development of various phishing websites enables hackers to access confidential personal or financial data, thus, decreasing the trust in e-business. This paper compared the detection techniques utilizing URL-based features. To analyze and compare the performance of supervised machine learning classifiers, the machine learning classifiers were trained by using more than 11,005 phishing and legitimate URLs. 30 features were extracted from the URLs to detect a phishing or legitimate URL. Logistic Regression, Random Forest, and CatBoost classifiers were then analyzed and their performances were evaluated. The results yielded that CatBoost was much better classifier than Random Forest and Logistic Regression with up to 96% of detection accuracy.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

An Exploratory Study on the Effects of Behavioral Characteristics and Networking Activity of Entrepreneurs of Venture Businesses upon Entrepreneurial Performance (신생벤처 창업가의 행동 특성과 네트워크 활동이 기업성과에 미치는 영향에 관한 탐색적 연구)

  • Chung, Dae-Yong;Roh, Kyoung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3354-3362
    • /
    • 2009
  • Recently, the potential of advanced studies is being highlighted that the networking activity of entrepreneurs of venture businesses influences successful foundation. Given this background, this study intends to make an exploratory study on the influence of self-efficacy of the entrepreneur's cognitive characteristic and patience with ambiguity of the psychological characteristic upon networking activity, and the components of networking activity upon entrepreneurial performance. It was tested with sample of responses to the questionnaires for 156 entrepreneurs of venture businesses which are under 3 years since they were founded. Findings of this study are as follows: First, the entrepreneur's self-efficacy was shown to have a significant effect on networking and entrepreneurial performance. Second, patience with ambiguity was shown not to have a significant effect on networking and entrepreneurial performance. Third, networking was shown to have an effect on entrepreneurial performance, and among the components of networking activity, network frequency and reliability were shown to significantly influence entrepreneurial performance, while network range was shown not to have a significant effect on it. Therefore, for performance improvement of start-up enterprises, rather self-efficacy of the entrepreneur's cognitive characteristic than the psychological characteristic seems more important. Also, with a practical suggestion that for the networking activity of entrepreneurs of venture businesses, network frequency and reliability may have a more critical effect rather on entrepreneurial performance than network range, the limitation and direction of this study are presented.