• Title/Summary/Keyword: Smart server

Search Result 821, Processing Time 0.025 seconds

Data Visualization Design of Bus Information Terminal using Smart Client Platform (Smart Client 기반 BIT 시각화 설계)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.55-60
    • /
    • 2013
  • Smart client is a term describing an application environment which delivers applications over a web HTTP connection and does not require installation and/or updates. The term "Smart Client" is meant to refer to simultaneously capturing the benefits of a "thin client" (zero-install, auto-update) and a "fat client" (high performance, high productivity). A "Smart Client" application can be created in several very different technologies. Over the past few years, ITS has started to move towards smart clients, also called rich clients. The trend is a move from traditional client/server architecture to a Web-based model. More similar to a fat client vs. a thin client, smart clients are Internet-connected devices that allows a user's local applications to interact with server-based applications through the use of Web services. Smart Client applications in BIT bridge the gap between web applications and desktop applications. They provide the benefits of a web applicationwhile still providing the snappy look and feel inherent to desktop applications.

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

Implementation of the Realtime Learning Evaluation System and Interaction for Smart Learning (스마트러닝을 위한 실시간 학습평가 및 상호작용 시스템 구현)

  • Lee, Myung-Suk;Son, Yoo-Ek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.245-252
    • /
    • 2013
  • We developed a system which supports the functions of real-time evaluation and feedback for smart learning. The system is consisted of an application for tablet PC and smart phone and the server, and the client exchanges data with the server through wireless communication. Whereby, the proposed system enabled realtime interaction and feedback between learner and teacher or between learners. As a result, the instruction for each learner's level is available using the system, and then it could enhance the level of academic achievement and learning interest.

A Study of System Validity and Development of Evaluation System for Improving Smart Learning (스마트러닝 개선을 위한 평가시스템 개발 및 타당도 연구)

  • Lee, Myung-Suk;Son, Yoo-Ek
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.31-39
    • /
    • 2013
  • We developed a smart learning system by using the 'bring your own device' concept, which means the policy of permitting teacher and learners to bring personally owned mobile devices such as laptops, tablets, smart phones, etc. and applied the system to school classes. In addition, we analyzed the learner's satisfaction related to interfaces, interactions, applications, technical support, and evaluation areas. The evaluation system consists of App program for tablet PC's and smartphones, web program for desktop PC and electronic teaching desk, and server program for evaluation and database. Because all the teaching materials, feedback data and evaluation materials about learners are stored on the server, students can receive the necessary data through real-time feedback using their smartphones and desktop PC's. As a result, it could increase educational achievement with interest in learning.

  • PDF

Study on Smart Office Functionality Utilizing KEPCO Gateway (한전 Gateway를 활용한 Smart Office 기능 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1107-1112
    • /
    • 2016
  • This study is the Smart Office features that take advantage of KEPCO eIoT(: energy Internet of Thing) platform, and it's Network configuration is composed of sensing device, gateway, platform, and the service server. The key features are parts for processing protocol data between the gateway and the device using LoRa(: Long Range) technology, Intelligent applications and public safety data connected to the PS-LTE(: Public Safety-Long-Term Evolution) system. And the resource tree provided Smart Office for the service, which commonly used in the application server and the device.

A Design of Smartphone Meta-Data for SCORM Application in Ubiquitous Environment (유비쿼터스 환경에서의 SCORM 활용을 위한 스마트폰 메타데이터 설계)

  • Byun, Jeong-Woo;Han, Jin-Soo;Jeong, Hwa-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.854-860
    • /
    • 2009
  • Ubiquitous is a new computing environment with IT technology and information communication, and appling various equipments likes PDA and application parts. Recently, user's using environment is changing to smart phone and is expanded learning tools to learner without educational environment. Thus, in this paper, we designed SCORM based meta-data to use smart phone. For this purpose, we made U-learning server and smart phone process server that is to handling with existence LMS and SCORM. To apply smart phones characteristics that have different ones each other, meta-data was able to have some resource information as like CPU, screen size and memory. The meta-data adapter could be process the characteristics.

  • PDF

AI Smart Factory Model for Integrated Management of Packaging Container Production Process

  • Kim, Chigon;Park, Deawoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.148-154
    • /
    • 2021
  • We propose the AI Smart Factory Model for integrated management of production processes in this paper .It is an integrated platform system for the production of food packaging containers, consisting of a platform system for the main producer, one or more production partner platform systems, and one or more raw material partner platform systems while each subsystem of the three systems consists of an integrated storage server platform that can be expanded infinitely with flexible systems that can extend client PCs and main servers according to size and integrated management of overall raw materials and production-related information. The hardware collects production site information in real time by using various equipment such as PLCs, on-site PCs, barcode printers, and wireless APs at the production site. MES and e-SCM data are stored in the cloud database server to ensure security and high availability of data, and accumulated as big data. It was built based on the project focused on dissemination and diffusion of the smart factory construction, advancement, and easy maintenance system promoted by the Ministry of SMEs and Startups to enhance the competitiveness of small and medium-sized enterprises (SMEs) manufacturing sites while we plan to propose this model in the paper to state funding projects for SMEs.

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.

Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card

  • Lee, Sang-Gon;Lim, Meng-Hui;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.340-344
    • /
    • 2009
  • Multi-server password authentication schemes enable remote users to obtain service from multiple servers with single password without separately registering to each server. In 2007, Hu-Niu-Yang proposed an improved efficient password authenticated key agreement scheme for multi-server architecture based on Chang-Lee's scheme proposed in 2004. This scheme is claimed to be more efficient and is able to overcome a few existing deficiencies in Chang-Lee's scheme. However, we find false claim of forward secrecy property and some potential threats such as offline dictionary attack, key-compromise attack, and poor reparability in their scheme. In this paper, we will discuss these issues in depth.

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF