• 제목/요약/키워드: decentralized data processing

검색결과 42건 처리시간 0.023초

Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors

  • Kwon, Youngho;Hwang, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권2호
    • /
    • pp.595-609
    • /
    • 2020
  • In this study, we propose a decentralized mathematical model for predictive control of a system of multi-autonomous unmanned aerial vehicles (UAVs), also known as drones. Being decentralized and autonomous implies that all members make their own decisions and fly depending on the dynamic information received from other unmanned aircraft in the area. We consider a variety of realistic characteristics, including time delay and communication locality. For this flocking flight, we do not possess control for central data processing or control over each UAV, as each UAV runs its collision avoidance algorithm by itself. The main contribution of this work is a mathematical model for stable group flight even in adverse weather conditions (e.g., heavy wind, rain, etc.) by adding Gaussian noise. Two of our proposed variance control algorithms are presented in this work. One is based on a simple biological imitation from statistical physical modeling, which mimics animal group behavior; the other is an algorithm for cooperatively tracking an object, which aligns the velocities of neighboring agents corresponding to each other. We demonstrate the stability of the control algorithm and its applicability in autonomous multi-drone systems using numerical simulations.

재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리 (Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP)

  • 조강우;전미현;신상욱
    • 디지털융복합연구
    • /
    • 제19권8호
    • /
    • pp.205-217
    • /
    • 2021
  • 탈중앙형 SSI(Self Sovereign Identity)가 새로운 디지털 신원 식별 기술의 대안으로 등장하였으나 이는 데이터 거래의 고유 알고리즘 특성으로 인해 효율적인 비식별화 기법이 제안되지 않았다. 본 논문에서는 SSI의 탈중앙형 동작을 보장하기 위해 ZKP(Zero Knowledge Proof)의 검증 결과를 검증인 측에서 외부에 제공 가능한 형태로 재구성함으로써 식별자를 제거하지 않는 비식별 기술을 제안한다. 또한, 이는 검증 참여 각 개체에 대한 차등 주권 관리 개념을 제안하는 것으로 재구성된 비식별 데이터를 정보주체의 동의 없이 제공할 수 있다. 결과적으로 제안 모델은 탈중앙형 SSI 환경에서 국내 개인정보보호법을 만족하고, 안전하며 효율적인 비식별 처리 및 주권 관리를 제공한다.

Development Problems and Countermeasures of Rural E-Commerce Logistics in the Context of Big Data and Internet of Things

  • Xianfeng Zhu
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.267-274
    • /
    • 2023
  • As the Internet has expanded and the continuous expansion of online shopping in China, many rural areas also have sales outlets. Due to the impact of economic conditions, rural locations have inadequate e-commerce logistical infrastructure, the number of outlets is small, and each other is in a decentralized state. For various reasons, the advancement of rural e-commerce logistics lags far behind that in urban areas. As the Internet of Things with big data grow in popularity, we can create and enhance the assurance system for the booming ecommerce in rural areas by building the support system of rural online shopping platform, and strengthening the joint distribution of logistics terminals based on data mining, so as to encourage the quick and healthy growth of rural online shopping.

k-path 확산 방법을 이용한 스마트 디바이스 간 멀티비전 디스플레이 기술 (k-path diffusion method for Multi-vision Display Technique among Smart Devices)

  • 런하오;김바울;김상욱
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.1183-1186
    • /
    • 2014
  • Our research is different form traditional to have some large LED screen grouping together to constitute multi-vision technique. In this paper, we purpose a method of using k-path diffusion method to build connect between the devices and find an optimal data transmission path. In second half of this paper, through practical application, we using this technique transmitting data successfully and achieving a simple Multi-vision effect. This technique possess smart devices and Wifi P2P's features, these features improve system's dynamic and decentralized processing ability make our technique has high scalability.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • 제13권3호
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

전표데이터 처리를 위한 SOAP기반 웹서비스의 구현 (Implementation of a soap based web services for slip data process)

  • 황의철;정민영;정선태
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1435-1438
    • /
    • 2003
  • SOAP(Simple Object Access Protocol) that is a late protocol for exchange of information with Web Services that is useful for implementing common functions in especially a large size business area, is a protocol that is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. In this paper, we implement SOAP-based Web Services that can use with a slip database, for common slip processing functions in enterprise accounts in order to enhance the transparency of transactions by slip processing system. The result of this paper will contribute to increasing the productivity of enterprises through enhancing the standardization of slip data, reusability of functions, convenience of access, and efficiency of implementing applications.

  • PDF

Fault Tolerant Routing Algorithm Based On Dynamic Source Routing

  • Ummi, Masruroh Siti;Park, Yoon-Young;Um, Ik-Jung;Bae, Ji-Hye
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2009년도 추계학술발표대회
    • /
    • pp.223-224
    • /
    • 2009
  • A wireless ad hoc network is a decentralized wireless network. The network is ad hoc because each node is willing to forward data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In this paper, we proposed new route maintenance algorithm to improve the efficiency and effective in order to reach destination node. In this algorithm we improve existing route maintenance in Dynamic Source Routing protocol, to improve the algorithm we make a new message we call Emergency Message (EMM). The emergency message used by the node moved to provide information of fault detection.

DRM-FL: Cross-Silo Federated Learning 접근법의 프라이버시 보호를 위한 분산형 랜덤화 메커니즘 (DRM-FL: A Decentralized and Randomized Mechanism for Privacy Protection in Cross-Silo Federated Learning Approach)

  • 무함마드 필다우스;초느에진랏;마리즈아길랄;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2022년도 춘계학술발표대회
    • /
    • pp.264-267
    • /
    • 2022
  • Recently, federated learning (FL) has increased prominence as a viable approach for enhancing user privacy and data security by allowing collaborative multi-party model learning without exchanging sensitive data. Despite this, most present FL systems still depend on a centralized aggregator to generate a global model by gathering all submitted models from users, which could expose user privacy and the risk of various threats from malicious users. To solve these issues, we suggested a safe FL framework that employs differential privacy to counter membership inference attacks during the collaborative FL model training process and empowers blockchain to replace the centralized aggregator server.

저전력 고속 사물 인터넷을 위한 효율적인 믹스넷 기술에 대한 연구 (A Study on Efficient Mixnet Techniques for Low Power High Throughput Internet of Things)

  • 전가혜;황혜정;이일구
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.246-248
    • /
    • 2021
  • 최근 데이터가 모든 산업의 발전과 새로운 가치를 창출하는 촉매 역할을 하는 데이터 경제 사회로 전환되고 있으며, 코로나19로 인해 디지털 전환이 가속화되고 있다. 다가오는 지능형 사물인터넷 시대에 안전하고 효율적으로 데이터를 활용하기 어려운 중앙 집중형 시스템의 보안 문제점을 해결하기 위해 블록체인 및 믹스넷과 같은 분산형 시스템 이용 가능성이 크게 대두되고 있다. 블록체인은 데이터를 투명하고 분산된 형태로 관리하며 참여자들 간의 합의를 통해 데이터에 대한 신뢰성과 무결성을 보장하지만 데이터 투명성으로 인해 사용자의 프라이버시가 위협받는다. 한편, 프라이버시를 보호하기 위한 믹스넷 기술은 분산 네트워크에서 프라이버시를 보호하지만 비효율적인 전력 소비 효율과 처리속도 문제로 저가, 경량, 저전력 사물인터넷에 활용되기 어렵다. 본 논문에서는 종래의 믹스넷 기술의 한계점을 분석하고 저전력 고속 사물인터넷을 위한 믹스넷 기술 방식을 제안한다.

  • PDF

상호 작용 중심 시스템의 품질 확보를 위한 LTL 분산 명세 (Decentralized LTL Specifications for Ensuring Quality of Interaction-centralized System)

  • 권령구;권기현
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제3권5호
    • /
    • pp.169-178
    • /
    • 2014
  • 본 논문에서는 상호 작용 중심 시스템의 품질을 확보하기 위하여 LTL 분산 명세를 활용하는 연구를 소개한다. 이러한 시스템의 품질확보를 위해서는 모듈 간의 상호 작용을 확인하여 기대하는 요구 사항을 달성하고 있는지를 검사해야 한다. 이 작업은 어렵고 노동 집약적이며 전문가를 필요로 한다. 따라서 본 논문에서는 이 검사에 도움을 주기 위한 방법을 제안한다. 먼저, 시스템의 기대하는 요구 사항은 각 모듈별로 분리해서 명세한다. 그리고 모듈 사이의 상호 작용은 다른 모듈이 수행하는 행위가 특정 모듈의 행위와 관련 있음을 의미한다. 여기서는 GR(1) 합성을 이용하여 명세를 만족하는 오토마타 모델이 생성되고 이것들은 소프트웨어 에이전트 기반의 시뮬레이터를 통해 모델의 행위를 확인하여 시스템이 요구 사항을 달성하고 있는지를 검사한다.