• Title/Summary/Keyword: Software service

Search Result 2,464, Processing Time 0.033 seconds

The Coordinates Computation of the GPS Base Station by Precise Point Positioning (정밀절대측위(PPP)기법에 의한 GPS 기준점 좌표의 산정)

  • 이용창
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.2
    • /
    • pp.145-152
    • /
    • 1999
  • JPL(Jet Propulsion Laboratory) has been routinely produced the precise GPS ephemeris and clock's correction parameter using data collected from globally distributed permanent GPS tracking stations, and has been offering the automated GPS data analysis(Precise Point Positioning: PPP) service by using them. In this study, after investigating the potential capacity of JPL's PPP service, the coordinates computation of the GPS base station by this service were investigated. For this, the dual frequency P codes data of 24 hours were observed from continuously operating four reference stations in USA. sent to the JPL's main computer through E-mail and/or ftp, and then were processed by Gipsy/Oasis-II (GOA-II) software with the precise GPS transmitter parameters. Centimeter-level positioning results were available to obtain in X, Y, Z geocentric rectangular coordinate system.

  • PDF

A Cascade-hybrid Recommendation Algorithm based on Collaborative Deep Learning Technique for Accuracy Improvement and Low Latency

  • Lee, Hyun-ho;Lee, Won-jin;Lee, Jae-dong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.31-42
    • /
    • 2020
  • During the 4th Industrial Revolution, service platforms utilizing diverse contents are emerging, and research on recommended systems that can be customized to users to provide quality service is being conducted. hybrid recommendation systems that provide high accuracy recommendations are being researched in various domains, and various filtering techniques, machine learning, and deep learning are being applied to recommended systems. However, in a recommended service environment where data must be analyzed and processed real time, the accuracy of the recommendation is important, but the computational speed is also very important. Due to high level of model complexity, a hybrid recommendation system or a Deep Learning-based recommendation system takes a long time to calculate. In this paper, a Cascade-hybrid recommended algorithm is proposed that can reduce the computational time while maintaining the accuracy of the recommendation. The proposed algorithm was designed to reduce the complexity of the model and minimize the computational speed while processing sequentially, rather than using existing weights or using a hybrid recommendation technique handled in parallel. Therefore, through the algorithms in this paper, contents can be analyzed and recommended effectively and real time through services such as SNS environments or shared economy platforms.

The Study of Sensor Network for Information Retrieval and Communication protocol High Performance (센서네트워크의 정보검색 및 통신프로토콜 성능향상에 관한 연구)

  • Kang, Jeong-Yong;Kwon, Hyuk-Dae;Roh, Yong-Gi;Kim, Byoung-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.529-532
    • /
    • 2011
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

  • PDF

A design of session management for video conference services (개방형 통신망에서 화상 회의 서비스 세션 관리 설계)

  • 신영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2498-2511
    • /
    • 1997
  • Due to the recent advances in computer technologies and high-speed networks, telecommunication services and provision of multimedia services will be considered a new software architecture adapting networking infrastructure on information networking architecture. In this paper, the video conference services has been selected as a target service example because it is expected to become one of the most important services on the full service network. In fact, it can be viewed as the basis for providing telecommunication services such as video telephony and video conferencing. This paepr presents the prototyping of TINA(Telecommunication Information Networking Architecture) based desktop video conference system using the concepts of session management. The prototyping of deskop video conference system aims at assessing TINA concepts and refinement of the mapping between session graph and connection graph, and provides support of open service platform towards distribution and objected-orientation.

  • PDF

e-Science Technologies in Synchrotron Radiation Beamline - Remote Access and Automation (A Case Study for High Throughput Protein Crystallography)

  • Wang Xiao Dong;Gleaves Michael;Meredith David;Allan Rob;Nave Colin
    • Macromolecular Research
    • /
    • v.14 no.2
    • /
    • pp.140-145
    • /
    • 2006
  • E-science refers to the large-scale science that will increasingly be carried out through distributed global collaborations enabled by the Internet. The Grid is a service-oriented architecture proposed to provide access to very large data collections, very large scale computing resources and remote facilities. Web services, which are server applications, enable online access to service providers. Web portal interfaces can further hide the complexity of accessing facility's services. The main use of synchrotron radiation (SR) facilities by protein crystallographers is to collect the best possible diffraction data for reasonably well defined problems. Significant effort is therefore being made throughout the world to automate SR protein crystallography facilities so scientists can achieve high throughput, even if they are not expert in all the techniques. By applying the above technologies, the e-HTPX project, a distributed computing infrastructure, was designed to help scientists remotely plan, initiate and monitor experiments for protein crystallographic structure determination. A description of both the hardware and control software is given together in this paper.

A Study on the Web Service based ASP e-Business Model for QR(Quick Response) System in Textiles and Clothing Industry (섬유$\cdot$의류산업에서의 QR(Quick Response) 시스템 구현을 위한 웹서비스 기반 ASP e-비즈니스 모델 개발에 대한 연구)

  • Shin, Sang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.127-144
    • /
    • 2006
  • This paper presents Web service based ASP (WS-ASP) model for QR(Quick Response) system, supply chain management system in the textiles and clothing industry. The Korean textiles and clothing industry is mostly composed of medium and small-sized companies, which are not capable of recruiting If specialists and making a large scale investment in IT. ASP model not only let them obtain QR system at relatively low usage cost, but also take higher vendor risk due to high dependency. This paper argue that WS-ASP model is appropriate for QR systems by complimenting ASP model with lower vender risk, which results from re-integrating software-on-demand services distributed to several QR specialized WS-ASP vendors.

  • PDF

Spectrum allocation strategy for heterogeneous wireless service based on bidding game

  • Cao, Jing;Wu, Junsheng;Yang, Wenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1336-1356
    • /
    • 2017
  • The spectrum scarcity crisis has resulted in a shortage of resources for many emerging wireless services, and research on dynamic spectrum management has been used to solve this problem. Game theory can allocate resources to users in an economic way through market competition. In this paper, we propose a bidding game-based spectrum allocation mechanism in cognitive radio network. In our framework, primary networks provide heterogeneous wireless service and different numbers of channels, while secondary users have diverse bandwidth demands for transmission. Considering the features of traffic and QoS demands, we design a weighted interference graph-based grouping algorithm to divide users into several groups and construct the non-interference user-set in the first step. In the second step, we propose the dynamic bidding game-based spectrum allocation strategy; we analyze both buyer's and seller's revenue and determine the best allocation strategy. We also prove that our mechanism can achieve balanced pricing schema in competition. Theoretical and simulation results show that our strategy provides a feasible solution to improve spectrum utilization, can maximize overall utility and guarantee users' individual rationality.

Digital Forensic Model Suitable for Cloud Environment (클라우드 환경에 적합한 디지털 포렌식 수사 모델)

  • Lee, Gymin;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.15-20
    • /
    • 2017
  • Cloud computing is a service that to use IT resources (software, storage, server, network) through various equipment in an Internet-enabled environment. Due to convenience, efficiency, and cost reduction, the utilization rate has increased recently. However, Cloud providers have become targets for attack Also, Abuse of cloud service is considered as the top security threat. The existing digital forensic procedures are suitable for investigations on individual terminals. In this paper, we propose a new investigation model by analyzing the vulnerable points that occur when you investigate the cloud environment with the existing digital forensic investigation procedure. The proposed investigation model adds a way to obtain account information, and can apply public cloud and private cloud together. Cloud services are also easily accessible and are likely to destroy digital evidence. Therefore, the investigation model was reinforced by adding an account access blocking step.

Scientometric Analysis for Internet of Things of Service Concentration and Smart Device of Next-Generation (서비스 중심의 IoT와 차세대 Smart Device에 대한 계량 정보 분석)

  • Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.721-728
    • /
    • 2015
  • IOT has evolved from the internet for human oriented, therefore our life is more advanced growth smartly. IoT is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator or other connected devices. Until now many researches have been studied for centering keyword for detecting emerging technology of future and scientometric analysis among the papers. This paper propose searching method of emerging technology for the IOT (internet of things) and smart device which are recently interesting area via dynamic analysis for keyword mapping.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.