• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.029 seconds

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

Optimizing Fsync Performance with Dynamic Queue Depth Adaptation

  • Park, Daejun;Kim, Min Ji;Shin, Dongkun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.5
    • /
    • pp.570-576
    • /
    • 2015
  • Existing flash storage devices such as universal flash storage and solid state disk support command queuing to improve storage I/O bandwidth. Command queuing allows multiple read/write requests to be pending in a device queue. Because multi-channel and multi-way architecture of flash storage devices can handle multiple requests simultaneously, command queuing is an indispensable technique for utilizing parallel architecture. However, command queuing can be harmful to the latency of fsync system call, which is critical to application responsiveness. We propose a dynamic queue depth adaptation technique, which reduces the queue depth if user application is expected to send fsync calls. Experiments show that the proposed technique reduces the fsync latency by 79% on average compared to the original scheme.

An Investigation on Organizational Characteristics Influences on Information Systems Issues in the Korean Firms (조직적 특성에 따른 정보시스템 주요관리이슈의 선택에 관한 연구)

  • Han, Jae-Min;Mun, Tae-Su;Park, Hui-Chan
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.51-78
    • /
    • 1995
  • This paper suggests a contingent perspective for analyzing information systems issues of the Korean firms. The contingent perspective includes such corporate characteristics as industry, organizational size, strategy, and value-added application function. This research surveyed 119 corporations in manufacturing, banking, distribution, and construction industries. Among those samples 104 data of corporate IS managers turned out to be statistically valid. As a result, those issues are ranked as the most urgent and important IS issues: strategic IS planning, system integration, application of database, process standardization, and network planning and implementation. Furthermore, factor analysis says that thirty issues to be surveyed are to be grouped into seven factors such as IS planning, user/education, database, applications of IT, system management, distributed computing technology, and network applications. It also found through Pearson correlation and ANOVA that organizational characteristics highly influences the IS issues the corporations face.

  • PDF

A study on User Experience of Scooter-sharing System -Focused on Kickgoing and Lime- (전동킥보드 공유 서비스의 사용자 경험에 관한 고찰 -킥고잉과 라임을 중심으로-)

  • Lee, Ung-Yeol;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.425-431
    • /
    • 2021
  • The purpose of this study is to compare and analyze leading brands of the scooter-sharing system market of Korea, KICKGOING and Lime, in terms of user experience, and to suggest the improvement direction of the applications and scooters of those two services. The assessment was conducted in such a way that the experimental group using scooter-sharing system over a certain frequency would choose the specific service they use most frequently, and complete a questionnaire: based on the reorganized version of the Peter Morville's Honeycomb Model. Based on the results of the experiment, We drew a conclusion that the services need to add navigation features in the application, to provide more simple procedures for reporting breakdown or accident and browsing insurance information, and to improve the user and pedestrian safety levels by gamification, et cetera. We expect this study to help the fast-growing smart mobility market and scooter-sharing systems that represent the market develop into a user-centered way.

Development of Data Collection Application using Smart Phone (스마트 폰을 이용한 데이터 수집 어플리케이션 개발)

  • Jung, Yong-jin;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.664-666
    • /
    • 2014
  • Recently, it is issued that the big data collecting meaningless data, and then extracting meaningful data from analyzed relationship to provide various information for users. However, original data collecting methods have difficulty in collecting information Because they analyze data by using sensors installed at exterior and interior of buildings and information of users. In this paper, we develop a data collection application using smart phone to resolve this problem. Developed application transmits data about Wi-Fi and measured information such as temperature, humidity, acceleration, gyro to server through web. The data transmitted is used as a context inference for users. According to the inference result, it is possible to provide various services on user conditions.

  • PDF

Ontology-based Culture·Tourist Attraction Search Application (온톨로지 기반의 문화·관광지 검색 어플리케이션 구현)

  • Hwang, Tae-won;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.772-774
    • /
    • 2017
  • Currently, there are many simple searches for local culture and tourism, but systematic information retrieval using ontology technology is weak. The keyword-based search, which is an existing search method, derives a search result that is different from a user's wanted intention. On the other hand, semantic search using ontology constructs shows the information related to the search term by creating a relation between words and words. Therefore, when tourists search for cultural and tourist attractions in the area, they provide information that includes meaning relevance in the search results. If the ontology provides information on the culture, sightseeing area, transportation, Can be more easily grasped. In this paper, we propose an ontology-based retrieval system based on culture and tourist sites utilizing public institutions database by using mobile application by extending search system which relied only on existing internal database to provide accurate and reliable information to users. This efficient structure of the ontology makes it possible to provide information suitable for the user quickly and accurately.

  • PDF

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

Danger Situations Alert System based U-Healthcare (유헬스케어 기반의 위험상황 알림 시스템)

  • Park, Byungdon;Yu, Donggyun;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.193-198
    • /
    • 2017
  • Recently, as interest in health increases, various wearable devices such as smart watch and smart band which can measure user's biometric information are being studied. Conventional wearable devices service the measured biometric information in a form that provides simple monitoring, disease prevention, and exercise amount. However, the user is Lack to deal with the dangerous situation. In this paper, we propose a hazard notification system to address these problems. The biometric information measured by the acceleration sensor and the heart rate sensor is transmitted to the application through the Arduino in real time. It identifies the risk situation through sensor priority measurement and risk situation identification algorithm. If a dangerous situation occurs, a notification message is sent to the guardian indicating the current location of the user. Therefore, it can be expected that if a dangerous situation occurs to a user who needs protection, he can respond promptly.

Control Architecture for N-Screen Based Interactive Mutli-Vision System (N-스크린 기반 인터렉티브 멀티 비전 시스템 제어 구조)

  • Sarwar, Ghulam;Ullah, Farman;Yoon, Changwoo;Lee, Sungchang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.72-81
    • /
    • 2013
  • In this paper, we propose the architecture and user interaction mechanism to implement N-Screen services on Multi-Vision System (MVS) that are not supported in existing systems. N-Screen services enable users to control the MVS displays through any of their devices and share contents among MVS displays and user's active-devices with service continuation at any location. We provide N-Screen interactive services on MVS by introducing N-Screen interaction & session management server and agent. Furthermore, we present some examples of the protocols such as application launching, user interaction for service control and visualcasting to support N-Screen services. In addition, we explain the N-Screen service scenarios for providing split sessions on user's active-devices and launching metadata content on any of his devices at any location supported by these protocols. The simulation result demonstrates the feasibility and performance improvement of the proposed visualcasting mechanisms.