• Title/Summary/Keyword: computer access

Search Result 3,132, Processing Time 0.029 seconds

Genetic algorithm-based content distribution strategy for F-RAN architectures

  • Li, Xujie;Wang, Ziya;Sun, Ying;Zhou, Siyuan;Xu, Yanli;Tan, Guoping
    • ETRI Journal
    • /
    • v.41 no.3
    • /
    • pp.348-357
    • /
    • 2019
  • Fog radio access network (F-RAN) architectures provide markedly improved performance compared to conventional approaches. In this paper, an efficient genetic algorithm-based content distribution scheme is proposed that improves the throughput and reduces the transmission delay of a F-RAN. First, an F-RAN system model is presented that includes a certain number of randomly distributed fog access points (F-APs) that cache popular content from cloud and other sources. Second, the problem of efficient content distribution in F-RANs is described. Third, the details of the proposed optimal genetic algorithm-based content distribution scheme are presented. Finally, simulation results are presented that show the performance of the proposed algorithm rapidly approaches the optimal throughput. When compared with the performance of existing random and exhaustive algorithms, that of the proposed method is demonstrably superior.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

Design and Implementation of Software Vulnerability Analysis Algorithm through Static Data Access Analysis

  • Lim, Hyun-il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.69-75
    • /
    • 2015
  • Nowadays, software plays various roles in applications in wide areas. However, the security problems caused by software vulnerabilities increase. So, it is necessary to improve software security and safety in software execution. In this paper, we propose an approach to improve the safety of software execution by managing information used in software through static data access analysis. The approach can detect the exposures of secure data in software execution by analyzing information property and flows through static data access analysis. In this paper, we implemented and experimented the proposed approach with a base language, and verify that the proposed approach can effectively detect the exposures of secure information. The proposed approach can be applied in several areas for improving software safety by analysing vulnerabilities from information flows in software execution.

Locally weighted linear regression prefetching method for hybrid memory system (하이브리드 메모리 시스템의 지역 가중 선형회귀 프리페치 방법)

  • Tang, Qian;Kim, Jeong-Geun;Kim, Shin-Dug
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.12-15
    • /
    • 2020
  • Data access characteristics can directly affect the efficiency of the system execution. This research is to design an accurate predictor by using historical memory access information, where highly accessible data can be migrated from low-speed storage (SSD/HHD) to high-speed memory (Memory/CPU Cache) in advance, thereby reducing data access latency and further improving overall performance. For this goal, we design a locally weighted linear regression prefetch scheme to cope with irregular access patterns in large graph processing applications for a DARM-PCM hybrid memory structure. By analyzing the testing result, the appropriate structural parameters can be selected, which greatly improves the cache prefetching performance, resulting in overall performance improvement.

Spatial Clearinghouse Components for OpenGIS Data Providers

  • Oh, Byoung-Woo;Kim, Min-Soo;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.84-88
    • /
    • 1999
  • Recently, the necessity of accessing spatial data from remote computer via network has been increased as distributed spatial data have been increased due to their size and cost. Many methods have been used in recent years for transferring spatial data, such as socket, CORBA, HTTP, RPC, FTP, etc. In this paper, we propose spatial clearinghouse components to access distributed spatial data sources via CORBA and Internet. The spatial clearinghouse components are defined as OLE/COM components that enable users to access spatial data that meet their requests from remote computer. For reusability, we design the spatial clearinghouse with UML and implement it as a set of components. In order to enhance interoperability among different platforms in distributed computing environment, we adopt international standards and open architecture such as CORBA, HTTB, and OpenGIS Simple Features Specifications. There are two kinds of spatial clearinghouse: CORBA-based spatial clearinghouse and Internet-based spatial clearinghouse. The CORBA-based spatial clearinghouse supports COM-CORBA bridge to access spatial data from remote data providers that satisfy the OpenGIS Simple Features Specification for OLE/COM using COM and CORBA interfaces. The Internet-based spatial clearinghouse provides Web-service components to access spatial data from remote data providers using Web-browser.

  • PDF

Enhanced TDMA based MAC Protocol for Adaptive Data Control in Wireless Sensor Networks

  • Alvi, Ahmad Naseem;Bouk, Safdar Hussain;Ahmed, Syed Hassan;Yaqub, Muhammad Azfar;Javaid, Nadeem;Kim, Dongkyun
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.247-255
    • /
    • 2015
  • In this paper, we propose an adaptive time division multiple access based medium access control (MAC) protocol, called bitmap-assisted shortest job first based MAC (BS-MAC), for hierarchical wireless sensor networks (WSNs). The main contribution of BS-MAC is that: (a) It uses small size time slots. (b) The number of those time slots is more than the number of member nodes. (c) Shortest job first (SJF) algorithm to schedule time slots. (d) Short node address (1 byte) to identify members nodes. First two contributions of BS-MAC handle adaptive traffic loads of all members in an efficient manner. The SJF algorithm reduces node's job completion time and to minimize the average packet delay of nodes. The short node address reduces the control overhead and makes the proposed scheme an energy efficient. The simulation results verify that the proposed BS-MAC transmits more data with less delay and energy consumption compared to the existing MAC protocols.

A Case of Implementation of Agricultural Information System and the Role of Extension Educator (농업정보화를 위한 추진 사례와 농촌지도사의 역할)

  • Kim, Yeong- Sig;Chun, Eun-Kyung
    • Journal of Agricultural Extension & Community Development
    • /
    • v.7 no.2
    • /
    • pp.321-325
    • /
    • 2000
  • There are many opportunities for Agricultural Technology Centers and for local communities to benefit from the computer and internet and compete in the information age. However, many rural communities appeared to lack human and financial resources required to enable access to the computer and internet. A case of implementation process of establishing agricultural information system at Asan Agricultural Technology Center during the last 10 years were presented. Extension educators took leadership role in facilitating the educational needs of farmers in terms of related resources for the computer and internet extension. To better prepare communities for the information age, community access was critical for promoting the technology and improving proficiency of local community members in its use, extension educators need to take leadership role in assessing community ability to provide internet access points for people without computers. Extension educators at city/county Agricultural Technology Centers may initiate to attract people with internet needs. computer resources, technological experience, and know-how for setting up internet access points in community locations.

  • PDF

Multiple Access Control of RS232C Serial Communications Interface

  • Kyongho Han;Park, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.639-641
    • /
    • 2002
  • In this paper, we proposed the multiple access control of RS232C Serial Communications protocol using collision sense method. The communications wires of data transmission and reception are tied together through the buffer each to connect to the multiple communication channels. The hardware interface and control program are designed to build the prototype system and the experimental multiple access communications network is built by multiple PC systems and the transfer completion rate results are shown.

  • PDF