• 제목/요약/키워드: computer software services

검색결과 492건 처리시간 0.032초

Efficient Route Determination Technique in LBS System

  • Kim, Sung-Soo;Kim, Kwang-Soo;Kim, Jae-Chul;Lee, Jong-Hun
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.843-845
    • /
    • 2003
  • Shortest Path Problems are among the most studied network flow optimization problems, with interesting applications in various fields. One such field is the route determination service, where various kinds of shortest path problems need to be solved in location-based service. Our research aim is to propose a route technique in real-time locationbased service (LBS) environments according to user’s route preferences such as shortest, fastest, easiest and so on. Turn costs modeling and computation are important procedures in route planning. There are major two kinds of cost parameters in route planning. One is static cost parameter which can be pre-computed such as distance and number of traffic-lane. The other is dynamic cost parameter which can be computed in run-time such as number of turns and risk of congestion. In this paper, we propose a new cost modeling method for turn costs which are traditionally attached to edges in a graph. Our proposed route determination technique also has an advantage that can provide service interoperability by implementing XML web service for the OpenLS route determination service specification. In addition to, describing the details of our shortest path algorithms, we present a location-based service system by using proposed routing algorithms.

  • PDF

수집된 경로데이터를 사용하는 내비게이션을 위한 대용량 경로조합 방법 (A Big-Data Trajectory Combination Method for Navigations using Collected Trajectory Data)

  • 구광민;이태호;박희민
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.386-395
    • /
    • 2016
  • In trajectory-based navigation systems, a huge amount of trajectory data is needed for efficient route explorations. However, it would be very hard to collect trajectories from all the possible start and destination combinations. To provide a practical solution to this problem, we suggest a method combining collected GPS trajectories data into additional generated trajectories with new start and destination combinations without road information. We present a trajectory combination algorithm and its implementation with Scala programming language on Spark platform for big data processing. The experimental results proved that the proposed method can effectively populate the collected trajectories into valid trajectory paths more than three hundred times.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

안전하고 효율적인 콘텐츠 서비스 제공을 위한 CAS 적응형 DRM 모델의 설계 및 구현 (Design and Implementation of CAS adaptive DRM Model for Providing to Secure and Efficient Content Services)

  • 박성욱;문종식;이임영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1237-1240
    • /
    • 2010
  • 지금의 IPTV는 IP기반 방송융합 서비스로서 현재 세계 유명 통신 사업자들을 중심으로 빠르게 발전하고 있다. 하지만 'IP+방송' 이라는 그저 단순한 결합과 부가서비스들의 제한으로 인해 기술의 비효율성이 드러나 있으며, 주로 IPTV서비스를 필두로 현재 콘텐츠에 대한 유출사고가 이루어지고 있다. 따라서 변화된 새로운 형태의 차세대 IPTV서비스와 더불어 그 특성에 맞게 보안 서비스에 대한 요구사항이 필요하다. 본 연구에서는 유무선 통합 환경에서 제공되는 IPTV서비스에서의 안전하고 효율적인 콘텐츠 서비스 제공을 위한 'CAS 적응형 DRM 모델'을 제안하였다. 사용자가 다운로드한 DRM이 적용된 콘텐츠를 안전하고 효율적으로 자신이 소유한 디바이스에서 이용할 수 있는 방안을 제시한다.

A SURVEY OF QUALITY OF SERVICE IN MULTI-TIER WEB APPLICATIONS

  • Ghetas, Mohamed;Yong, Chan Huah;Sumari, Putra
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.238-256
    • /
    • 2016
  • Modern web services have been broadly deployed on the Internet. Most of these services use multi-tier architecture for flexible scaling and software reusability. However, managing the performance of multi-tier web services under dynamic and unpredictable workload, and different resource demands in each tier is a critical problem for a service provider. When offering quality of service assurance with least resource usage costs, web service providers should adopt self-adaptive resource provisioning in each tier. Recently, a number of rule- and model-based approaches have been designed for dynamic resource management in virtualized data centers. This survey investigates the challenges of resource provisioning and provides a competing assessment on the existing approaches. After the evaluation of their benefits and drawbacks, the new research direction to improve the efficiency of resource management and recommendations are introduced.

The Study on Correlation of Cognition on Software Education with Improvement of Computational Thinking

  • Han, Oakyoung;Kim, Jaehyoun
    • 인터넷정보학회논문지
    • /
    • 제20권3호
    • /
    • pp.93-100
    • /
    • 2019
  • The interest in the Fourth Industrial Revolution along with the development of ICT makes the software get the attention of the world. This phenomenon naturally leads to the concern for software education. Learning software coding is not easy for students whose major is in humanities or social sciences. This paper is a study of how cognition on software education affects to education of computational thinking. For research method, moderator variables were adopted on the proposed research model to prove that positive cognition can derive good influence on improvement of computational thinking. To find out moderator variables of the research model, we have conducted the questionnaire over three years for total of 928 students who took the software coding courses. As the result of the study, we proved that the positive cognition on software education can make the better improvement of computational thinking within proper moderator variables.

효율적인 중고거래 메타서비스 (An Efficient Second-hand transaction meta-services)

  • 황세웅;임민택;홍현기;황훈태;박성현;최영규;황석형;김수환
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2023년도 제67차 동계학술대회논문집 31권1호
    • /
    • pp.469-471
    • /
    • 2023
  • 본 논문에서는 기존 중고거래 플랫폼들의 불편한 점들을 해소하고 사용자들이 효율적이고 편리한 중고거래를 할 수 있도록 도와주는 플랫폼을 개발했다. 조사를 통해 기존 중고거래 플랫폼은 허위 매물, 시세 파악의 어려움, 사기 피해 등의 문제점이 존재한다는 사실을 인식했다. 문제 해결을 위해 파이썬을 활용하여 주요 중고거래 플랫폼의 상품 데이터를 수집했다. 이에 IQR을 적용하여 가격의 이상치를 판별했다. 가격 비교와 허위 매물 판별이 용이하게 되는 장점이 있다. 또한 이상치를 제거한 상품들의 시세를 계산하여 데이터를 차트로 시각화했다. 플랫폼과 지역마다 상이한 중고 상품의 신뢰성 있는 시세를 파악할 수 있고 중고거래 사기 피해를 방지할 수 있도록 사용자에게 주요 사기 수법, 뉴스 등의 정보를 제공한다.

  • PDF

Adoptability Challenges in Work Environment of Organizations using Agile Software Development Methods

  • M Subhan Dar;Shahra Asif;Saleem Zubair
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.145-152
    • /
    • 2024
  • Agile project management is an ongoing method to project completion that actually took place all across length of the project's life cycle. Because loop allows you to adapt as you go rather than maintaining a linear route, iterative methods are mainly applied in software development to ensure velocity and agility. Many pitfalls abound in agile software development adaptations that organizations fail to sidestep. New competitive challenges, fluctuating market dynamics, technological disruption, and the ever-changing demands of empowered customers confront organizations around the world. Organizations are all under tremendous pressure to adapt to change and deliver good products and services to customers more swiftly. Research measured at the challenges that could be encountered and offered advice for how agile development might flourish as it becomes a component of a company's family. Our paper gives a comprehensive review of the most significant obstacles that companies encounter while adopting agile techniques. Adaptability. The agile approach encompasses a variety of techniques, which each have different usage in various sectors. Because certain other standards existing today clash with agile methodology, the adaptation of any of the agile techniques in work environments posed a problem. In this paper, we will cover some of the challenges that firms face in adopting the agile software development life cycle.

A Development Environment for Embedded Software

  • Kang, Byeong-Do
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.39-44
    • /
    • 2005
  • In recent years, embedded systems have become so complex and the development time to market is required to be shorter than before. As embedded systems include more functions for new services, embedded software gradually grow in size, and development costs and time are increasing. In order to overcome this serious matter, we need a customized design and test technique for embedded software. In this paper, we present a software architecture style for embedded software. It facilitates the composition of reusable functions and helps developers to reduce development time. Because the costs associated with revealing errors of embedded software in applications are rising. we propose a test method and tools for target environments.

  • PDF

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • 루숭구 조쉬 음와싱가;샤이드 무하마드 라자;리덕 타이;김문성;추현승
    • 인터넷정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.