http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Peer To Peer Content Sharing On Smart Phones Technology
Maricel Balitanas,Rosslin John Robles 사단법인 인문사회과학기술융합학회 2012 예술인문사회융합멀티미디어논문지 Vol.2 No.2
Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act as a client and as a server at the same time and shares with others its own data. Our contribution consists in designing, implementing and testing a BitTorrent like application adapted to wireless ad-hoc networks of Android Mobile Phones. The employment of P2P protocols and applications in the platform of the ensemble mobile environment is becoming a promising solution which permits a wide number of users to share their own contents (data, audio, video, etc.) and communicate with each other without using costly and centralized network infrastructure. By using a central server, the peers will be able to get the information about the contents of other peers. Even in the absence of the Internet, the mobile devices provide users with the potential opportunity to connect in ad-hoc manner via short range wireless protocol such as Wi-Fi.
A Study on Integrating IDS with Data Mining
Maricel Balitanas,김석수,김태훈,이승 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
This paper presents the application of data mining approaches for an intrusion detection system. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of the resource of a computer system. In this paper, an IDS model is presented as well as its limitation in determining security violations. Furthermore, this paper focuses on several data mining techniques that can aid in the process of intrusion detection.
Application of The Next-Generation Internet Protocol in System Control and Data Aquisition
Maricel O. Balitanas,Jeong-Ah Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
The transition to IPv6 will impact the entire group of Internet users at some time. IPv6 will impact these users at different times and in different ways since the Internet consists of millions of smaller domestic, academic, business, and government users. However IPv6 standards are immature and are some cases still in progress. Within infrastructure control system the advantage of moving to an IPv6 networking protocol is associated with addressing the potentially large increase in the number sensors collecting data from the infrastructure system. However, although there are advantages a pressing issue of security lie beneath. The immaturity of IPv6 presents a lot of security threats which are presented in this paper and post recommendations as countermeasures.
Countermeasures of Defenseless Ubiquitous Computing Environment towards Security Threats
Maricel O. Balitanas,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Ubiquitous computing presents challenges across computer science: in systems design and engineering. In this paper, we analyze security threats of mobile computing devices with an application of ubiquitous computing and we suggest their countermeasures in technical, manageable, and physical aspects.
Children's Auto-Antitoxin Planner for Handheld Device
Maricel O. Balitanas,Kyung Jung Kim 보안공학연구지원센터(JSE) 2011 보안공학연구논문지 Vol.8 No.1
The research depicts an architectural structure using mobile computing which will plot a chart of Antitoxin planner synchronous with the parent’s personal planner so as to set a schedule amenable to both the parties and a notification through will be generated. Diseases can be prevented by proper immunization procedures, however, with most parents working in this generation and not most clinics pay much attention on the individual planning and notifications of their patients, this research will show a solution to such crucial issue.. This will be a tool for parents and assistance to clinics and hospitals catering Antitoxins shots for children.
Resilience on the Security Flimsiness of Critical Infrastructure
Maricel O. Balitanas,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Systems and assets whether physical or virtual are so vital to a nation that the incapacity or destruction of such systems and assets would have enormous impact on the nation’s security, national public health or safety or any combination of those matters. Thus, this study presents the challenges and the protection mechanisms in two major approaches defined towards resiliency.