• Title/Summary/Keyword: Virtual network

Search Result 1,555, Processing Time 0.041 seconds

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Analysis and Suggestions of Digital Heritage Policy

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.71-78
    • /
    • 2019
  • In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.

A Reverse Simulation for Developing Defense Systems based on Simulation Models (시뮬레이션 모델기반 국방체계 설계를 위한 역방향 시뮬레이션)

  • Choi, Seon Han;Kim, Tag Gon;Jin, Ki Byung;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.27-40
    • /
    • 2020
  • When analyzing the effectiveness of a defense system in a virtual battlefield with a simulation model is referred to as forward simulation, reverse simulation is required to design a good defense system with high effectiveness. That is, using the simulation model, it is necessary to find the engineering factors, measures of performance, and operational tactics that are demanded to achieve high effectiveness of the system. However, the efficiency of reverse simulation is still a concern since many replications of forward simulation are required for conducting reverse simulation. In this paper, we introduce various efficient algorithms to reduce the number of replications and a reverse simulation tool for utilizing these algorithms easily. The tool allows practitioners to easily and efficiently conduct reverse simulation for design a good defense system based on simulation models. This is demonstrated with the case studies on the design of warship's defense system and the design of military network system.

Design of Distributed Hadoop Full Stack Platform for Big Data Collection and Processing (빅데이터 수집 처리를 위한 분산 하둡 풀스택 플랫폼의 설계)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.45-51
    • /
    • 2021
  • In accordance with the rapid non-face-to-face environment and mobile first strategy, the explosive increase and creation of many structured/unstructured data every year demands new decision making and services using big data in all fields. However, there have been few reference cases of using the Hadoop Ecosystem, which uses the rapidly increasing big data every year to collect and load big data into a standard platform that can be applied in a practical environment, and then store and process well-established big data in a relational database. Therefore, in this study, after collecting unstructured data searched by keywords from social network services based on Hadoop 2.0 through three virtual machine servers in the Spring Framework environment, the collected unstructured data is loaded into Hadoop Distributed File System and HBase based on the loaded unstructured data, it was designed and implemented to store standardized big data in a relational database using a morpheme analyzer. In the future, research on clustering and classification and analysis using machine learning using Hive or Mahout for deep data analysis should be continued.

Position Tracking Method in Construction field using IT Technology (IT기술을 이용한 건설현장 내 위치관제 기법)

  • Kim, Hyun-soo;Do, Seoung-bok;Choi, Hyun-young;Jang, Young-gu;Jeon, Heung-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.475-478
    • /
    • 2014
  • This paper proposed the position tracking and recognition method of workers and cars in construction field. The reason why the position of workers and cars has to be tracked is to prevent the safety accident, emergency rescue, and theft of building materials by unauthorized people and car, etc. To realize the tracking, it needs to adopt the Information Telecommunication technology to the construction field as an integrated support system. In this paper, we proposed the continuous positioning tracking algorithm for workers and moving cars using the selected wireless communication network. And we proposed the virtual gateway method to detect the entrance status of moving workers and cars. All of these proposed methods are evaluated in real construction field using the prototype of support system made by ourselves.

  • PDF

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

A Study on the Consumer Perception of Metaverse Before and After COVID-19 through Big Data Analysis (빅데이터 분석을 통한 코로나 이전과 이후 메타버스에 대한 소비자의 인식에 관한 연구)

  • Park, Sung-Woo;Park, Jun-Ho;Ryu, Ki-Hwan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.287-294
    • /
    • 2022
  • The purpose of this study is to find out consumers' perceptions of "metaverse," a newly spotlighted technology, through big data analysis as a non-face-to-face society continues after the outbreak of COVID-19. This study conducted a big data analysis using text mining to analyze consumers' perceptions of metaverse before and after COVID-19. The top 30 keywords were extracted through word purification, and visualization was performed through network analysis and concor analysis between each keyword based on this. As a result of the analysis, it was confirmed that the non-face-to-face society continued and metaverse emerged as a trend. Previously, metaverse was focused on textual data such as SNS as a part of life logging, but after that, it began to pay attention to virtual reality space, creating many platforms and expanding industries. The limitation of this study is that since data was collected through the search frequency of portal sites, anonymity was guaranteed, so demographic characteristics were not reflected when data was collected.

Digital Twin Model Design And Implementation Using UBS Process Data (UBS공정 데이터를 활용한 디지털트윈 모델 설계 및 구현)

  • Park, Seon-Hui;Bae, Jong-Hwan;Ko, Ho-Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Due to COVID-19, many paradigm shifts in existing manufacturing facilities and the expansion of non-face-to-face services are accelerating worldwide. A representative technology is digital twin technology. Such digital twin technology, which existed only conceptually in the past, has recently become feasible with the construction of a 5G-based network. Accordingly, this paper designed and implemented a part of the USB process to enable digital twins based on OPC UA communication, which is a standard interlocking structure, between real object objects and virtual reality-based USB process in accordance with this paradigm change. By reflecting the physical characteristics of real objects together, it is possible to simulate real-time synchronization of these with real objects. In the future, this can be applied to various industrial fields, and it is expected that it will be possible to reduce costs for decision-making and prevent dangerous accidents.