• Title/Summary/Keyword: Virtual-users

Search Result 1,148, Processing Time 0.029 seconds

Development of a Test Framework for Functional and Non-functional Verification of Distributed Systems (분산 시스템의 기능 및 비기능 검증을 위한 테스트 프레임워크 개발)

  • Yun, Sangpil;Seo, Yongjin;Min, Bup-Ki;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.107-121
    • /
    • 2014
  • Distributed systems are collection of physically distributed computers linked by a network. General use of wired/wireless Internet enables users to make use of distributed service anytime and anywhere. The explosive growth of distributed services strongly requires functional verification of services as well as verification of non-functional elements such as service quality. In order to verify distributed services it is necessary to build a test environment for distributed systems. Because, however, distributed systems are composed of physically distributed nodes, efforts to construct a test environment are required more than those in a test environment for a monolithic system. In this paper we propose a test framework to verify functional and non-functional features of distributed systems. The suggested framework automatically generates test cases through the message sequence charts, and includes a test driver composed of the virtual nodes which can simulate the physically distributed nodes. The test result can be checked easily through the various graphs and the graphical user interface (GUI). The test framework can reduce testing efforts for a distributed system and can enhance the reliability of the system.

Building an SNS Crawling System Using Python (Python을 이용한 SNS 크롤링 시스템 구축)

  • Lee, Jong-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.61-76
    • /
    • 2018
  • Everything is coming into the world of network where modern people are living. The Internet of Things that attach sensors to objects allows real-time data transfer to and from the network. Mobile devices, essential for modern humans, play an important role in keeping all traces of everyday life in real time. Through the social network services, information acquisition activities and communication activities are left in a huge network in real time. From the business point of view, customer needs analysis begins with SNS data. In this research, we want to build an automatic collection system of SNS contents of web environment in real time using Python. We want to help customers' needs analysis through the typical data collection system of Instagram, Twitter, and YouTube, which has a large number of users worldwide. It is stored in database through the exploitation process and NLP process by using the virtual web browser in the Python web server environment. According to the results of this study, we want to conduct service through the site, the desired data is automatically collected by the search function and the netizen's response can be confirmed in real time. Through time series data analysis. Also, since the search was performed within 5 seconds of the execution result, the advantage of the proposed algorithm is confirmed.

Changes of Technologies of the Self by Personal Blog (개인 블로그를 통한 자기기술(自己技術)의 변화)

  • Kim, Jong-Deok;Cho, Na-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.128-146
    • /
    • 2008
  • Cyworld has created a new social phenomenon that relationship between people and communities could be built by committing to digital writing. It has altered the way of people's writing attitudes from self-confessed to self-describing and self-broadcasting ways in which one regards oneself as the center of the cyber world. The purpose of this paper is to identify the shift in one's writing attitudes and how he/she develops technologies of the self in the Cyworld space. Quantitative and qualitative methods support the result; The analysis of 100 Cyworld users' mini-homepages show how the visual images in Cyworld affects their way of digital writing and the analysis of the change of writing habit due to sharing data how virtual 'family' that has been created by Cyworld. I categorize the characteristics of digital writing into three; 1)Visualization of technologies of the self 2)Networked technologies of the self 3)Sharing secretes. The aim of writing in Cyworld is not to keep the secrete but to share and, eventually, texts are circulated in the networked society where one is participated(Cyworld family). Therefore, the usage of images plays a significant role in Cyworld communities because the opened secretes are usually prepared to be presented on the basis of trustworthy toward other members.

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

Application of the Web Design Elements using the Aesthetic Evaluation (감성평가를 이용한 웹 디자인 요소의 활용방안)

  • 김미영;정홍인
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.413-420
    • /
    • 2004
  • New design method has been required for web designers to grasp the proper emotion, impression, and feeling of a web site and reflect these elements in web design. It is certain that such a new methodology can be a useful design tool, although web designers have only relied on their intuition and experience to induce users to perceive specific emotion of web sites. In this study, Kansei Engineering Type Ⅰ (Nagamachi, 2002 and Park, 2000) method was applied to develop the methodology. One hundred thirty six web sites believed to convey emotions effectively were first selected by recommendation of professional web designers and twenty two web sites were finally chosen and evaluated using questionnaire. The web sites were then objectively and quantitatively assessed by measuring the degree of utilization of the design elements, balance, overall density, and homogeneity. We examined the cause-and-effect between the results of emotional and quantitative analysis by multiple regression and introduced the design methodology based on the examination. The research method and procedures applied to this study would be applicable to design studies related to the emotional inducement.

  • PDF

Multisensory based AR System for Education of Cultural Heritage

  • Jeong, Eunsol;Oh, Jeong-eun;Won, Haeyeon;Yu, Jeongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.61-69
    • /
    • 2019
  • In this paper, we propose a multisensory(i.e., visual-auditory-tactile) based AR system for the education of cultural heritage. The proposed system provides a multisensory interaction by designing a user to experience with a 3D printed artifact which is mapped by a virtual 3D content of digital heritage. Compared with the existing systems of cultural heritage education based on augmented reality(AR) technology, this system focused on not only providing learning experience via a sense of visual and auditory, but also a sense of tactile. Furthermore, since this systems mainly provided the direct interactions using a 3D printed model, it gives a higher degree of realism than existing system that use touch or click motions on a 2D display of mobile phones and tablets. According to a result of user testing, we concluded that the proposed system delivered the excellent presence and learning flow to users. Particularly, from the usability evaluation, a 3D printed target artifact which is similar in shape to original heritage artifact, achieved the highest scores among the various tested targets.

Virtual Analysis of District Heating System Using ENetPLAN (EnetPLAN을 이용한 지역난방시스템 가상 운전 분석)

  • Ahn, Jeongjin;Lee, Minkyung;Kim, Laehyun
    • Journal of Energy Engineering
    • /
    • v.28 no.3
    • /
    • pp.18-25
    • /
    • 2019
  • In this study, in order to solve the problem of the program of calculating code input by experienced users in the power generation, the wide area energy network research group developed the local heating operation analysis program EntPLAN, which can be easily used by anyone, including scalability, with domestic technology. Therefore, the Commission intended to compare the heat sources, heat demand, and the results of operation of the combined heat plant (CHP) on the energy network through simulation with the EnetPLAN and the program A on the market. The results showed that the heat and power output on the energy network of the EnetPLAN and A programs were mostly similar in pattern in the simulation results of the heat supply and the operation method of the accumulator. This enabled the application of the simulation for the various operation modes of the cogeneration facilities existing on the energy network. It is expected that EntPLAN, which was developed with domestic technology, will be easily applied in the field in the future and will present efficient operation simulation results.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

Development of Metrics to Measure Reusability of Services of IoT Software

  • Cho, Eun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.151-158
    • /
    • 2021
  • Internet of Things (IoT) technology, which provides services by connecting various objects in the real world and objects in the virtual world based on the Internet, is emerging as a technology that enables a hyper-connected society in the era of the 4th industrial revolution. Since IoT technology is a convergence technology that encompasses devices, networks, platforms, and services, various studies are being conducted. Among these studies, studies on measures that can measure service quality provided by IoT software are still insufficient. IoT software has hardware parts of the Internet of Things, technologies based on them, features of embedded software, and network features. These features are used as elements defining IoT software quality measurement metrics. However, these features are considered in the metrics related to IoT software quality measurement so far. Therefore, this paper presents a metric for reusability measurement among various quality factors of IoT software in consideration of these factors. In particular, since IoT software is used through IoT devices, services in IoT software must be designed to be changed, replaced, or expanded, and metrics that can measure this are very necessary. In this paper, we propose three metrics: changeability, replaceability, and scalability that can measure and evaluate the reusability of IoT software services were presented, and the metrics presented through case studies were verified. It is expected that the service quality verification of IoT software will be carried out through the metrics presented in this paper, thereby contributing to the improvement of users' service satisfaction.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.