2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
Classification of Weather Indices on Secured Computational Grid
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Grid promises significant advances in support of e-science application, whilst much of the predicted infrastructure is still under development. Deployment of these applications across the grid continues requiring a high level of expertise and a significant amount of efforts, mainly due to overall complexity of the grid. Large scale parallel scientific applications often require computational and data grids to obtain large compute and data resources necessary for execution regardless of heterogeneity, occurrences of faults and complexity. This research paper reveals the grid enabled computing capabilities for climate impact modeling and change detection facilitating for rainfall prediction. The large dataset utilized in computations are Hamburg Ocean Atmosphere Parameters and Fluxes from Satellite (HOAPS) data. It presents the basic field of air-sea interaction parameters and covers the period July 1987 to December 2005. In order to assess the valuable user friendliness of grid computing to a large community of researchers who need to perform large scale computation, we deployed an application developed for rainfall prediction on NirmaGrid Testbed.
Design of Guaranteeing System of Service Quality Through the Verifying Users of Hash Chain
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.13-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Now a days, Cloud Computing Technique that can use effective service whenever/wherever and get rid of the division of each source is soaring. However, in the Cloud Computing environment which all informations are centered, there is no sufficient method for users to access data safely when accesses. In this paper, guaranteeing technique of service quality which decides to use or not to use on proper data after checking the information about service quality that is evaluated by users themselves who have experienced accessing data before they received the data which the company provided when they access data is proposed. The proposed technique can be guaranteed the data integrity when user accesses data by tieing users who access data as hash chain, and the trust on data access by making users manage the security of data on data access not companies.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.19-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In WPAN environment using the existing ZigBee communication, the determination of transmitting electric power output of sensor is set up at the early stage which composes system. Therefore, the devices which compose WPAN use the way to transmit with the output value that is set as fixed irrelevantly to the distance of other device and it causes excessive electric power for transmitting. As a result, the life-expectancy of battery is reduced and there happens interference among devices. So, in this paper, a transmit-receiving system which can transmit signal using proper electric power for transmit to other device that transmits signal by the receiving intensity of measured signal after measuring intensity of RSSI of each device for solving interruption problem among device and wasting electric power transmitting.
Deal with Reality : How ICT Enables Education to Go Green
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.27-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Within institutional education, the implementation of distance and blended learning is starting to realize the potential of ICT. As e- and m-learning rapidly develop, the Internet, Smartphone, iPad, Apps, App stores and WiFi networking are affording ubiquitous computing. But Earth is suffering from worsening environmental pollution, climate change, and a sixth mass extinction. Educational institutions are seeking to adopt responsible environmental practices as environmental consciousness develops. Blended learning environments are favored, within which online distance components are then implemented. Integrated scheduling allows for student participation in distance online learning for a significant portion of study time, and effects environmental savings from reduced commuting costs and usage of institutional facilities, while providing increased capacity to service students. Learning Management Systems and educational MUVEs may merge, as Open Learning Networks incorporate Personal Learning Environments to provide effective autonomous learning environments to support traditional, blended, and distance learning.
Protecting Computer Network with Encryption Technique: A Study
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.43-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In today’s world the networking plays a very important role in our life. Most of the activities occur through the Internet. For the safe and secured exchange of information, we need to have security. The encryption has very wide applications for securing data. Latest authentication deals with biometric application such as fingerprint and retina scan. The different types of encryptions and their strength and standards are discussed.
Using GIS Tool for Presenting Spatial Data: Case Study Nakorn Pathom Province
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.4 no.2 2011.06 pp.53-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
We propose a tool and library for collecting spatial data based on Google Maps API. The tool is implemented using AJAX and XML technology. Based on Google Earth®, the user can define the interested regions by using our drawing tool. After subregions are defined, the information about the regions can be put. These information can put in the local database. Then the user can view the data by regions or types on their map. We provide library supports for drawing, overlays, graph presentation and comparison. The tool supports the KML and NMA files where the user specification can be export and the offline data in such a form can be imported to the system as well. We demonstrate a case of using the tool to collect the spatial data in agriculture area.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.