• Title/Summary/Keyword: Sharing Strategy

Search Result 512, Processing Time 0.03 seconds

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

Cooperative Video Streaming and Active Node Buffer Management Technique in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, hybrid CDN/P2P video streaming architecture is specially designed and deployed to achieve the scalability of P2P networks and the desired low delay and high throughput of CDNs. In this paper, we propose a cooperative video streaming and active node buffer management technique in hybrid CDN/P2P architecture. The key idea of this streaming strategy is to minimize network latency such as jitter and packet loss and to maximize the QoS(quality of service) by effectively and efficiently utilizing the information sharing of file location in CDN's proxy server which is an end node located close to a user and P2P network. Through simulation, we show that the proposed cooperative video streaming and active node buffer management technique based on CDN and P2P network improves the performance of realtime video streaming compared to previous methods.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

A mathematics teacher's discursive competence on the basis of mathematical competencies (수학교과역량과 수학교사의 담론적 역량)

  • Choi, Sang-Ho;Kim, Dong-Joong
    • Communications of Mathematical Education
    • /
    • v.33 no.3
    • /
    • pp.377-394
    • /
    • 2019
  • The purpose of this study is to scrutinize the characteristics of a teacher's discursive competence on the basis of mathematical competencies. For this purpose, we observed all semester-long classes of a middle school teacher, who changed her own teaching methods for the last 20 years, collected video clips on them, and analyzed classroom discourse. Data analysis shows that in problem solving competency, she helped students focus on mathematically important components for problem understanding, and in reasoning competency, there was a discursive competence which articulated thinking processes for understanding the needs of mathematical justification. And in creativity and confluence competency, there was a discursive competence which developed class discussions by sharing peers' problem solving methods and encouraging students to apply alternative problem solving methods, whereas in communication competency, there was a discursive competency which explored mathematical relationships through the need for multiple mathematical representations and discussions about their differences. These results can provide concrete directions to developing curricula for future teacher education by suggesting ideas about how to combine practices with PCK needed for mathematics teaching.

A Study on Integrated Operation of School Bus in Suburbs (교외지역 통학버스 통합 운영 방안 연구)

  • Ko, Young Dae;Oh, Yonghui
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.899-910
    • /
    • 2018
  • Purpose: Generally, since the population density is lower in suburban areas, the distance to school is inevitably long. Therefore, schools in suburban areas often operate school buses to improve student welfare. However, since school buses are usually used only during going to and from school, the utilization rates are relatively low. Therefore, this study aims to establish integrated operation plan of public school bus covering all schools. Methods: It is necessary to decide which school buses will serve the specific demand node which want to go to certain school in order to design an integrated operation plan for school buses. Therefore, a mathematical model is developed for minimizing the total number of vehicles and the distance of transportation by reflecting the characteristics of school buses and students as constraints. To solve the proposed mathematical model, CPLEX, a commercial solver, is applied. Results: To validate and to confirm the proposed process, numerical example is designed with the comparison between before and after integrated operations of school buses in terms of total operation cost. The result shows that the integrated operation can lead the reduction of the number of school buses as well as the decreasing of the fuel cost. Conclusion: This study provides the quantitative method to perform the integrated operation of school buses in suburban areas. The optimal operation strategy is required because there are more complex decision-making elements considering the integrated operation. It is expected to apply this research result at real situation to expand this services based on an optimal operation.

Resource Allocation for Heterogeneous Service in Green Mobile Edge Networks Using Deep Reinforcement Learning

  • Sun, Si-yuan;Zheng, Ying;Zhou, Jun-hua;Weng, Jiu-xing;Wei, Yi-fei;Wang, Xiao-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2496-2512
    • /
    • 2021
  • The requirements for powerful computing capability, high capacity, low latency and low energy consumption of emerging services, pose severe challenges to the fifth-generation (5G) network. As a promising paradigm, mobile edge networks can provide services in proximity to users by deploying computing components and cache at the edge, which can effectively decrease service delay. However, the coexistence of heterogeneous services and the sharing of limited resources lead to the competition between various services for multiple resources. This paper considers two typical heterogeneous services: computing services and content delivery services, in order to properly configure resources, it is crucial to develop an effective offloading and caching strategies. Considering the high energy consumption of 5G base stations, this paper considers the hybrid energy supply model of traditional power grid and green energy. Therefore, it is necessary to design a reasonable association mechanism which can allocate more service load to base stations rich in green energy to improve the utilization of green energy. This paper formed the joint optimization problem of computing offloading, caching and resource allocation for heterogeneous services with the objective of minimizing the on-grid power consumption under the constraints of limited resources and QoS guarantee. Since the joint optimization problem is a mixed integer nonlinear programming problem that is impossible to solve, this paper uses deep reinforcement learning method to learn the optimal strategy through a lot of training. Extensive simulation experiments show that compared with other schemes, the proposed scheme can allocate resources to heterogeneous service according to the green energy distribution which can effectively reduce the traditional energy consumption.

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

Complete Genome Sequencing and Infectious cDNA Clone Construction of Soybean Mosaic Virus Isolated from Shanxi

  • Wang, Defu;Cui, Liyan;Zhang, Li;Ma, Zhennan;Niu, Yanbing
    • The Plant Pathology Journal
    • /
    • v.37 no.2
    • /
    • pp.162-172
    • /
    • 2021
  • Soybean mosaic virus (SMV) is the predominant viral pathogen that affects the yield and quality of soybean. The natural host range for SMV is very narrow, and generally limited to Leguminosae. However, we found that SMV can naturally infect Pinellia ternata and Atractylodes macrocephala. In order to clarify the molecular mechanisms underlying the cross-family infection of SMV, we used double-stranded RNA extraction, rapid amplification of cDNA ends polymerase chain reaction and Gibson assembly techniques to carry out SMV full-length genome amplification from susceptible soybeans and constructed an infectious cDNA clone for SMV. The genome of the SMV Shanxi isolate (SMV-SX) consists of 9,587 nt and encodes a polyprotein consisting of 3,067 aa. SMV-SX and SMV-XFQ008 had the highest nucleotide and amino acid sequence identities of 97.03% and 98.50%, respectively. A phylogenetic tree indicated that SMV-SX and SMV-XFQ018 were clustered together, sharing the closest relationship. We then constructed a pSMV-SX infectious cDNA clone by Gibson assembly technology and used this clone to inoculate soybean and Ailanthus altissima; the symptoms of these hosts were similar to those caused by the virus isolated from natural infected plant tissue. This method of construction not only makes up for the time-consuming and laborious defect of traditional methods used to construct infectious cDNA clones, but also avoids the toxicity of the Potyvirus special sequence to Escherichia coli, thus providing a useful cloning strategy for the construction of infectious cDNA clones for other viruses and laying down a foundation for the further investigation of SMV cross-family infection mechanisms.

A Study on the Development of Higher Education Internationalization Advocating One Belt One Road (일대일로를 옹호하는 고등 교육 국제화 발전 연구)

  • Wang, Guanen
    • Journal of the International Relations & Interdisciplinary Education
    • /
    • v.1 no.1
    • /
    • pp.80-94
    • /
    • 2021
  • The "Belt and Road" economic development strategy provides new ideas for the transformation of my country's higher education. Under the guidance of the new development concept and relying on a good competitive platform, my country's higher education will have more possibilities for internationalization. The analysis of the connotation of the development concept of my country's higher education internationalization is mainly reflected in the development and tolerance of my country's higher education, and the innovation and sharing of development concepts. With this as the direction, my country's higher education institutions can combine the school's own school-running philosophy to formulate new teaching standards that are in line with international rules. Do a good job in the penetration of our country's excellent traditional culture, and handle the relationship between cultures of various countries. Actively learn from international advanced teaching concepts to build a scientific and perfect talent training mechanism.

Comparison of the effectiveness of SW-based maker education in online environment: From the perspective of self-efficacy, learning motivation, and interest (비대면 온라인 환경에서 SW기반 메이커교육의 효과성 비교: 자기효능감, 학습동기, 흥미도의 관점에서)

  • Kim, Tae-ryeong;Han, Sun-gwan
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.3
    • /
    • pp.571-578
    • /
    • 2021
  • This study compares Online SW-based maker education in terms of self-efficacy, learning motivation, and interest after applying differently according to blended learning strategies. First, a SW maker program for blended learning was developed and applied as a live seminar-type class including real-time interactive and a support-providing class consisting of online content and Q&A. As a result of comparing the differences between students according to the two strategies divided into pre- and post- survey, in the self-efficacy part, there was a significant difference in the positive efficacy and the overall part, and in the learning motivation part, the live seminar form was significantly higher in the confidence part. In the interest part, the support-providing form showed a significantly higher average in the instrumental interest and nervous part. In order to maintain the effect of maker activities like existing face-to-face situations in Online learning, it is necessary to increase sharing time between students, an integrated learning environment, and sufficient provision of exploration time and learning materials.