• Title/Summary/Keyword: Next generation Information Technology(IT)

Search Result 447, Processing Time 0.028 seconds

Distributed Contents Delivery Network based on Home gateway for a Sustainable Service (안정적인 서비스를 위한 홈 게이트웨이 기반의 분산 컨텐츠 전송 네트워크)

  • Kim, Myung-Won;Yoon, Young-Hyo;Ko, Joong-Sik;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.15A no.5
    • /
    • pp.249-258
    • /
    • 2008
  • DCDN(Distributed Contents Delivery Network) as known the next generation of CDN is to exploit the resource of client PCs based on P2P technology to provide low cost, high scalability and high speed services when contents are delivered. This DCDN has two problems. One is that DCDN can't provide a sustainable service because client PCs are on/off irregularly and their on times tend to focus on specific time zone, and the other is that client PCs can not be accessed outside in DCDN if they are behind NAT or Firewall. In this paper, we present a distributed contents delivery network based on home gateway for a sustainable service. If home gateway is used in DCDN instead of client PC, it can solve the two existing problems of DCDN. That is, home gateway can provide a sustainable service because it is on during all day and it is not behind NAT and Firewall. The proposed method is implemented with ASUS WL-500GP, a wired/wireless router. Experimental results show the effectiveness of the proposed method compared to the existing method of DCDN.

A Structural Model on Usage Behavior of Ubiquitous Campus Service (유비쿼터스 특성이 U-서비스 이용에 미치는 영향: U-캠퍼스 환경을 중심으로)

  • Park, Cheol;You, Jae-Hyun
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.81-99
    • /
    • 2006
  • Recently, the area of ubiquitous has gained a great attention both in academics and in business organizations as we are entering an ubiquitous society where people can interact at "anytime" and "anywhere". To preoccupy the leading status for the next generation of IT technology, many countries such as Korea, Japan, and US are concerned the ubiquitous. In this tendency, companies want to identify what factors make people use ubiquitous in order to develop the effective ubiquitous service and to supply the higher quality service. However, prior researches on ubiquitous are focused on technical area such as higher data delivery, efficient compression of images, so they do not have given companies beneficial materials for making fascinating ubiquitous services. To offer the service materials for development, from the viewpoint of the customer, important factors to use ubiquitous services are investigated in this study. Moreover, the study was progressed up to the new area of investigation how much these factors influenced ubiquitous service actual usage. To achieve these goals, Ubiquitous service adopting reflected in ubiquitous service characteristics was suggested in this study. The results of this study are as follows. First, contextual offer, ubiquity, invisibility are positively related to perceived value. Second, perceived value is positively related to usage intention but perceived risk is negatively related to usage intention. Third, usage intention is positively related to usage frequency. Based on these results, managerial implications for ubiquitous service vitalization are discussed. Lastly, the limitation of this research and further research issues are suggested.

Design and Implementation of a High-Performance Index Manager in a Main Memory DBMS (주기억장치 DBMS를 위한 고성능 인덱스 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Lee, Kyung-Tae;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.605-619
    • /
    • 2003
  • The main memory DBMS(MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss the index manager of the Tachyon, a next-generation MMDBMS. Recently, the gap between the CPU processing and main memory access times is becoming much wider due to rapid advance of CPU technology. By devising data structures and algorithms that utilize the behavior of the cache in CPU, we are able to enhance the overall performance of MMDBMSs considerably. In this paper, we address the practical implementation issues and our solutions for them obtained in developing the cache-conscious index manager of the Tachyon. The main issues touched are (1) consideration of the cache behavior, (2) compact representation of the index entry and the index node, (3) support of variable-length keys, (4) support of multiple-attribute keys, (5) support of duplicated keys, (6) definition of the system catalog for indexes, (7) definition of external APIs, (8) concurrency control, and (9) backup and recovery. We also show the effectiveness of our approach through extensive experiments.

Segmentation of Seabed Points from Airborne Bathymetric LiDAR Point Clouds Using Cloth Simulation Filtering Algorithm (항공수심라이다 데이터 해저면 포인트 클라우드 분리를 위한 CSF 알고리즘 적용에 관한 연구)

  • Lee, Jae Bin;Jung, Jae Hoon;Kim, Hye Jin
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • ABL (Airborne Bathymetric LiDAR) is an advanced survey technology that uses green lasers to simultaneously measure the water depths and oceanic topography in coastal and river areas. Seabed point cloud extraction is an essential prerequisite to further utilizing the ABL data for various geographic data processing and applications. Conventional seabed detection approaches often use return waveforms. However, their limited accessibility often limits the broad use of the bathymetric LiDAR (Light Detection And Ranging) data. Further, it is often questioned if the waveform-based seabed extraction is reliable enough to extract seabed. Therefore, there is a high demand to extract seabed from the point cloud using other sources of information, such as geometric information. This study aimed to assess the feasibility of a ground filtering method to seabed extraction from geo-referenced point cloud data by using CSF (Cloth Simulation Filtering) method. We conducted a preliminary experiment with the RIGEL VQ 880 bathymetric data, and the results show that the CSF algorithm can be effectively applied to the seabed point segmentation.

A Proxy Mobile IP based Fast Layer-3 Handover scheme for Mobile WiMAX based Wireless Mesh Networks (Mobile WiMAX 기반의 무선 메쉬 네트워크를 위한 Proxy Mobile IP 기반의 고속 3계층 핸드오버 방안)

  • Kim, Min;Kim, Jong-Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1129-1140
    • /
    • 2010
  • Wireless mesh networks have been widely studied as the next generation technology to solve the problems of conventional wireless networks. Particularly, Mobile WiMAX based wireless mesh networks are noticed due to many advantages. Mobile WiMAX standard provides two kinds of layer-3 handover schemes: Mobile IP and Proxy Mobile IP based handover schemes. MIP based handover scheme has a problem in that it incurs the long handover latency because mobile nodes generate a lot of handover messages. On the other hand, PMIP based handover scheme decreases the handover latency by reducing the number of handover messages, because mobile nodes do not participate in handover procedure. Therefore, layer-3 handover for Mobile WiMAX should be designed based on PMIP. However, conventional PMIP based handover still has latency overhead, because of many message exchanges between PBU and PBA after completing the layer-2 handover. Hence, in this paper, we propose a fast layer-3 handover scheme that achieves the lower handover latency for Mobile WiMAX based wireless mesh networks. Proposed scheme has advantages in terms of handover latency. Simulation results show that proposed scheme achieves low handover latency during the layer-3 handover.

Minimizing the Risk of an Open Computing Environment Using the MAD Portfolio Optimization (최적포트폴리오 기법을 이용한 개방형 전산 환경의 안정성 확보에 관한 연구)

  • Kim, Hak-Jin;Park, Ji-Hyoun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.15-31
    • /
    • 2009
  • The next generation IT environment is expected to be an open computing environment based on Grid computing technologies, which allow users to access to any type of computing resources through networks. The open computing environment has benefits in aspects of resource utilization, collaboration, flexibility and cost reduction. Due to the variation in performance of open computing resources, however, resource allocation simply based on users' budget and time constraints often fails to meet the Service Level Agreement(SLA). This paper proposes the Mean-Absolute Deviation(MAD) portfolio optimization approach, in which service brokers consider the uncertainty of performance of resources, and compose resource portfolios that minimize the uncertainty. In order to investigate the effect of this approach, we simulate an open computing environment with varying uncertainty levels, users' constraints, and brokers' optimization strategies. The simulation result concludes threefolds. First, the MAD portfolio optimization improves the success ratio of delivering the required performance to users. Second, the success ratio depends on the accuracy in predicting the variability of performance. Thirdly, the measured variability can also help service brokers expand their service to cost-critical users by discounting the access cost of open computing resources.

  • PDF

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.

A Design of Ultra-low Noise LDO Regulator for Low Voltage MEMS Microphones (저전압 MEMS 마이크로폰용 초저잡음 LDO 레귤레이터 설계)

  • Moon, Jong-il;Nam, Chul;Yoo, Sang-sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.630-633
    • /
    • 2021
  • Microphones can convert received voice signals to electric signals. They have been widely used in various industries such as radios, smart devices and vehicles. Recently, the demands for small size and high sensitive microphones are increased according to the minimization of wireless earphone with the development of smart phone. A MEMS system is a good candidate for an ultra-small size microphone of a next generation and a read out IC for high sensitive MEMS sensor is researched from many industries and academies. Since the microphone system has a high sensitivity from environment noise and electric system noise, the system requires a low noise power supply and some low noise design techniques. In this paper, a low noise LDO is presented for small size MEMS microphone systems. The input supply voltage of the LDO is 1.5-3.6V, and the output voltage is 1.3V. Then, it can support to 5mA in the light load condition. The integrated output noise of proposed LDO form 20Hz to 20kHz is about 1.9uV. These post layout simulation results are performed with TSMC 0.18um CMOS technology and the size of layout is 325㎛ × 165㎛.

  • PDF

A Study of the Establishment of BIM Design Environment based on Virtual Desktop Infrastructure(VDI) of Cloud Computing Technology (클라우드 컴퓨팅 기술을 활용한 데스크탑 가상화 기반의 BIM 설계 환경 구축에 관한 연구)

  • Shin, Joonghwan;Lee, Kyuhyup;Kwon, Soonwook;Choi, Gyuseong;Ko, Hyunglyu
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.4
    • /
    • pp.118-128
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. Due to the high-cost of BIM infrastructure development, lack of regulations, lack of process and so forth, usage of BIM has been delayed than initial expectations. In design phase, especially, collaboration based on BIM system has been a key factor for successful next generation building project. Through the analysis of current research trends about IT technologies, virtualization and BIM service, data exchange such as drawings, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is to enable the cloud computing BIM server to provide several main functions such as editing models, 3D model viewing and checking, mark-up and snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through testing of test-bed server client, developed VDI system's multi-connect control is evaluated. Performance-test result of BIM server VDI effect to development direction of cloud computing BIM service for commercialization.

A Multiple Signature Authentication System Based on BioAPI for WWW (웹상의 BioAPI에 기반한 서명 다중 인증 시스템)

  • Yun Sung Keun;Kim Seong Hoon;Jun Byung Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1226-1232
    • /
    • 2004
  • Biometric authentication is rising technology for the security market of the next generation. But most of biometric systems are developed using only one of various biological features. Recently, there is a vigorous research for the standardization of various biometric systems. In this paper, we propose a web-based authentication system using three other verifiers based on functional, parametric, and structural approaches for one biometrics of handwritten signature, which is conformable to a specification of BioAPI introduced by BioAPI Consortium for a standardization of biometric technology. This system is developed with a client-server structure, and clients and servers consist of three layers according to the BioAPI structure. The proposed neb-based multiple authentication system of one biometrics can be used to highly increase confidence degree of authentication without additional several biological measurements, although rejection rate is a little increased. That is, the false accept rate(FAR) decreases on the scale of about 1:40,000, although false reject rate(FRR) increases about 2.7 times in the case of combining above three signature verifiers. So the proposed approach can be used as an effective identification method on the internet of an open network. Also, it can be easily extended to a security system using multimodal biometrics.