• Title, Summary, Keyword: Client

Search Result 3,409, Processing Time 0.056 seconds

Study on Security Framework of Thin-Client Robot (Thin-Client 로봇 보안 프레임워크에 관한 연구)

  • Kim, Geon-Woo;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.720-723
    • /
    • 2008
  • RUPI-based robot service provides a variety of robot services guaranteeing extensibility and flexibility by communications between heterogeneous robots and servers. Unlike rich-client robot of high H/W performance and computing ability, as thin-client robot supports limited capability, it has some difficulty in performing security algorithms requiring relatively high computation power. Therefore, in this paper, we propose security framework of thin-client robot containing security threats, security requirements, and security functions.

  • PDF

MODELLING THE PERFORMANCE OF A CLIENT/SERVER DATABASE SYSTEM

  • Lee, Hui-Seok
    • Proceedings of the Korea Database Society Conference
    • /
    • /
    • pp.49-69
    • /
    • 1994
  • A client/server system has become the computing architecture for the business organization which seeks competitive edges. Technically, a client/server system places application processing close to the user and thus increases performance. This paper's two primary goals are (i) to present a performance model for client/server database systems and (ii) to demonstrate analytically the effectiveness of client/server computing in comparison with other computing architectures via an illustrative example. The model is most likely to be used as a practical performance guide for client/server computing.

  • PDF

HTTP based remote monitoring and control system using JAVA (HTTP 기반의 자바를 이용한 원격 감시 및 제어 시스템)

  • Yi Kyoung-Woong;Choi Han-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.9
    • /
    • pp.847-854
    • /
    • 2004
  • In this paper, It is studied to control and to monitor the remote system state using HTTP(Hyper Text Transfer Protocol) object communication. The remote control system is controlled by using a web browser or a application program. This system is organized by three different part depending on functionality-server part, client part, controller part. The java technology is used to composite the server part and the client part and C language is used for a controller. The server part is waiting for the request of client part and then the request is reached, the server part saves client data to the database and send a command set to the client part. The administrator can control the remote system just using a web browser. Remote part is worked by timer that is activated per 1 second. It gets the measurement data of the controller part, and then send the request to the server part and get a command set in the command repository of server part using the client ID. After interpreting the command set, the client part transfers the command set to the controller part. Controller part can be activated by the client part. If send command is transmitted by the client part, it sends sensor monitoring data to the client part and command set is transmitted then setting up the value of the controlled system.

A Mechanism of CAS Client Personalization through separating CAS Service of Protocol A.1 on TTA.KO-07.0079 XCAS (TTA.KO-07.0079 XCAS 프로토콜 A.1의 CAS 서비스 분리를 통한 CAS Client 개인화 메커니즘)

  • Kim, Young-Mo;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.57-66
    • /
    • 2010
  • CAS Client personalization means to issue CAS ID or Key for CAS service, which is Core Technology for CAS operation. Protocol A.1 on TTA.KR-07.0079 XCAS, stores CAS Client personalization data from CAS server in XCAS server, and transmits the personalization data by request of XCAS HOST for CAS Client personalization. However, this may increase Network Traffic and CAS Client image management in XCAS server. In this thesis, to complement this, CAS Client personalization is executed on CAS Server by separating CAS service field. Therefore this can distribute Image management and Network Traffic of XCAS server.

Application of CRM to Mobile Communication Industry

  • Tian, Liang;Zhang, Xian-Hua
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • /
    • pp.40-46
    • /
    • 2007
  • Established CRM system provides a powerful help for maintaining existing client, attracting new client, making profit from client or mobile communication industry. In the system structure of CRM eye, the mobile communication industry of CRM can be divided into three levels. : channel layer; operation layer, analysis layer. The data mining of CRM in mobile communication industry fall into six stages. Finally article gives some CRM's examples to illustrate how to gain client, enhance client's value, and how to maintain existing client.

  • PDF

A Recovery Technique Using Client-based Logging in Client/Server Environment

  • Park, Yong-Mun;Lee, Chan-Seob;Kim, Dong-Hyuk;Park, Eui-In
    • Proceedings of the IEEK Conference
    • /
    • /
    • pp.429-432
    • /
    • 2002
  • The existing recovery technique using the logging technique in the client/sewer database system only administers the log as a whole in a server. This contains the logging record transmission cost on the transaction that is executed in each client potentially and increases network traffic. In this paper, the logging technique for redo-only log is suggested, which removes the redundant before-image and supports the client-based logging to eliminate the transmission cost of the logging record. Also, in case of a client crash, redo recovery through a backward client analysis log is performed in a self-recovering way. In case of a server crash, the after-image of the pages which needs recovery through simultaneous backward analysis log is only transmitted and redo recovery is done through the received after-image and backward analysis log. Also, we select the comparing model to estimate the performance about the proposed recovery technique. And we analyzed the redo and recovery time about the change of the number of client and the rate of updating operation.

  • PDF

Efficient Three-Party Password Authenticated Key Exchange for Client-to-Client Applications

  • Yang, Yanjiang;Bao, Feng
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.249-257
    • /
    • 2008
  • Nowadays, client-to-client applications such as online chat (e.g. MSN) and SMS (Short Message Services) are becoming increasingly prevalent. These client-to-client applications are revolutionizing the way we communicate. Three-party PAKE (password authenticated key exchange) protocols provide a means for the two communicating parties holding passwords to establishment a secure channel between them with the help of a common server. In this paper, we propose an efficient three-party PAKE protocol for the client-to-client applications, which has much better performance than the existing generic constructions. We also show that the proposed protocol is secure in a formal security model.

PDA-based Text Extraction System using Client/Server Architecture (Client/Server구조를 이용한 PDA기반의 문자 추출 시스템)

  • Park Anjin;Jung Keechul
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.2
    • /
    • pp.85-98
    • /
    • 2005
  • Recently, a lot of researches about mobile vision using Personal Digital Assistant(PDA) has been attempted. Many CPUs for PDA are integer CPUs, which have no floating-computation component. It results in slow computation of the algorithms peformed by vision system or image processing, which have much floating-computation. In this paper, in order to resolve this weakness, we propose the Client(PDA)/server(PC) architecture which is connected to each other with a wireless LAN, and we construct the system with pipelining processing using two CPUs of the Client(PDA) and the Server(PC) in image sequence. The Client(PDA) extracts tentative text regions using Edge Density(ED). The Server(PC) uses both the Multi-1.aver Perceptron(MLP)-based texture classifier and Connected Component(CC)-based filtering for a definite text extraction based on the Client(PDA)'s tentativel99-y extracted results. The proposed method leads to not only efficient text extraction by using both the MLP and the CC, but also fast running time using Client(PDA)/server(PC) architecture with the pipelining processing.

Strategy for Improving Client Satisfaction in Small-medium Sized Hospitals : A MOT Approach (대형 및 중소병원간 고객접점별 만족도 차이 및 증진 전략)

  • Lee, Kyun-Jick
    • Korea Journal of Hospital Management
    • /
    • v.5 no.1
    • /
    • pp.62-83
    • /
    • 2000
  • Client satisfaction(CS) has played an important role in the assessment of health service quality. Thus client satisfaction management(CSM) has been highlighted as one of strategic management. Specifically, the client satisfaction approach by moment of truth(MOT) makes significant contributions to the settlement of bottlenecks on client satisfaction. This research deals with the two issues of client satisfaction in large, small and medium sized hospitals. With regard to CS, one issue is to examine the difference of patient satisfaction through MOT between them and the other derives a strategy for improving client satisfaction from the viewpoint of small and medium sized hospitals. We use the survey data for 4 large and 14 small and medium sized hospitals in 1998. Major findings of this research can be summarized as follows: first, in case of outpatients, small and medium sized hospitals have a comparative advantage on contact-points of preparation and accounts over large ones. Second, while inpatients in small and medium sized hospitals are very satisfied with the contact-point of accounts, they are dissatisfied with the contact-points of facilities and hospital rooms. Under the given budget and time constraints, the settlement of these bottlenecks could be effective strategies for improving their patients' satisfaction.

  • PDF