• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.034 seconds

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Design and Implement of TIP in tour (TIP(Travel Interesting Plan in tour)의 설계 및 구현)

  • Wee, Chan-hyuk;Choi, Younggil;Cho, Wijae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.605-607
    • /
    • 2016
  • The trend is growing domestic and international travelers. Research before making plans to travel people, Leave the tour you do not know the way, there are people who can not find a better destination. In this paper, to solve this problem and provide a mobile-to efficiency in traveling through a smart-phone application. At the same time to improve the convenience and satisfaction, etc. Select the destination country and traveling through the guidance system and the destination in the shortest path from the current location of the user to select multiple destinations shorten the travel route and save time. Also implemented to provide a convenience to guide the position of the additional facilities.

  • PDF

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

A Novel Framework for Resource Orchestration in OpenStack Cloud Platform

  • Muhammad, Afaq;Song, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5404-5424
    • /
    • 2018
  • This work is mainly focused on two major topics in cloud platforms by using OpenStack as a case study: management and provisioning of resources to meet the requirements of a service demanded by remote end-user and relocation of virtual machines (VMs) requests to offload the encumbered compute nodes. The general framework architecture contains two subsystems: 1) An orchestrator that allows to systematize provisioning and resource management in OpenStack, and 2) A resource utilization based subsystem for vibrant VM relocation in OpenStack. The suggested orchestrator provisions and manages resources by: 1) manipulating application program interfaces (APIs) delivered by the cloud supplier in order to allocate/control/manage storage and compute resources; 2) interrelating with software-defined networking (SDN) controller to acquire the details of the accessible resources, and training the variations/rules to manage the network based on the requirements of cloud service. For resource provisioning, an algorithm is suggested, which provisions resources on the basis of unused resources in a pool of VMs. A sub-system is suggested for VM relocation in a cloud computing platform. The framework decides the proposed overload recognition, VM allocation algorithms for VM relocation in clouds and VM selection.

Pseudo Complex Correlation Coefficient: with Application to Correlated Information Sources for NOMA in 5G systems

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.42-51
    • /
    • 2020
  • In this paper, the authors propose the pseudo complex correlation coefficient (PCCC) of the two complex random variables (RV), because the four real correlation coefficients (RCC) of the corresponding four real RVs cannot be obtained only from the complex correlation coefficient (CCC) of given two complex RV. Such observation is motivated by the general statement; "The complex jointly-Gaussian random M-vector cannot be completely described by the complex covariance matrix, even though the real Gaussian random 2M-vector can be completely descried by the real covariance matrix. Therefore, in order to describe completely the complex jointly-Gaussian random M-vector, we need an additional matrix, namely the complex pseudo-covariance matrix, along with the complex covariance matrix." Then, we apply PCCC to correlated information sources (CIS) for non-orthogonal multiple access (NOMA) in 5G system, and investigate impact of the proposed PCCC on the achievable data rate of the stronger channel user in the conventional successive interference cancellation (SIC) NOMA with CIS. It is shown that for the given same CCC, the achievable data rates with the different PCCC are different, because the corresponding RCC are different. We also show that as the absolute value of the same CCC increases, the impact of the different PCCC becomes more significant.

The Study for Improvement Method of Landscape Simulation Program (경관시뮬레이션 프로그램 개선방안에 관한 연구)

  • Lee, Dong-Hwa;Kim, Jae-Myeong
    • Journal of KIBIM
    • /
    • v.10 no.4
    • /
    • pp.89-97
    • /
    • 2020
  • The purpose of this study is to identify the problems of the currently used 3D spatial information utilization system to realize a more accurate landscape and to establish a user-oriented environment to improve the utilization plan for future landscape evaluation. As citizens' interest in urban landscapes with strong public characteristics increases and the speed of urban development also increases, more suitable simulation methods for landscape management are required. Nevertheless, there are many cases of inconvenient correction according to development changes along with many errors in various steps for creating landscape simulation. Therefore, in performing landscape deliberation according to development, it is necessary to create more accurate and efficient landscape simulation, and if changes occur after the initial deliberation, a process that can quickly and conveniently correct and supplement data is needed. In addition, it is necessary to create landscape simulation so that the created modeling source can be used by being compatible with other application programs. In this study, a method of constructing a more accurate and efficient simulation at the time of initial deliberation and a method of creating a landscape simulation model for rapid response to a plan that is changed at the time of re-deliberation are described.

Development on the Operating Technique for Delta CRL (델타 CRL 운영 기술 개발)

  • 김락현;엄희정;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.15-27
    • /
    • 2002
  • The purpose of this paper is to present both the specification of delta-CRL and the polices for delta CRL in order to solve the problem involved in issuing and maintaining the certificate revocation lists for the mobile communication network. If the user request to revoke the certificate issued by certification authority, the certification should be revoked and listed up in the certificate revocation list. In general, the certificate revocation list is issued regularly. Therefore PKI application should download the CRL and prove the validity of CRL. The traffic size of the exchanged traffic should be reduced for the mobile communication environment. The result if this paper can be used for the mobile communication various environments to reduce the size of CRL.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.

Anomaly Detection Method Based on The False-Positive Control (과탐지를 제어하는 이상행위 탐지 방법)

  • 조혁현;정희택;김민수;노봉남
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.151-159
    • /
    • 2003
  • Internet as being generalized, intrusion detection system is needed to protect computer system from intrusions synthetically. We propose an intrusion detection method to identify and control the contradiction on self-explanation that happen at profiling process of anomaly detection methodology. Because many patterns can be created on profiling process with association method, we present effective application plan through clustering for rules. Finally, we propose similarity function to decide whether anomaly action or not for user pattern using clustered pattern database.

A Case Study on Using Robot at the Library: Focusing on the case of National Library of Korea (도서관에서 로봇 활용에 대한 사례 연구: 국립중앙도서관을 중심으로)

  • Kim, Kyung Cheol
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.61-80
    • /
    • 2020
  • This study attempted to propose various application and function improvement plans by analyzing robots operated in the libraries. Thus, the types and functions of robots operated by 16 domestic and foreign libraries were examined. Most of them were used for Librarian Assistance (Book Inventory, Book Delivery, Etc.) and User Service (Facility Guide, Search Aids, Etc.). Besides, the introduction of robots in the National Library of Korea (NLK) and their functional limitations were analyzed. As a result, this study presented the need to develop additional functions for the robot, develop quarantine and security robots, the need for a national-level policy for robot diffusion, and build a robot ecosystem.