• Title/Summary/Keyword: 네트워크 저장 장치

Search Result 248, Processing Time 0.022 seconds

GPS-based Augmented Reality System for Social Network Environment (소셜 네트워크 환경에서 GPS기반 증강현실 시스템)

  • Yang, Seung-Eui;Jieg, Jiu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.762-767
    • /
    • 2013
  • Recently, researches on augmented reality(AR) are actively being conducted, and on addition of AR in social network system has become a necessity. In this paper, we propose GPS-based AR system for social network. This proposed system adds the recent check-in coordinates by automatically synchronizing a friend list in facebook and represents those added location coordinates in a real-world environment by using AR. Marker-based AR system that was commonly used by existing users consumes too much storage space and processing frequency for driving handle devices. But, location-based AR application can solves the disvantages of the standard marker=based AR system. Therefore, this proposed system allows an user with iOS hand devices to use GPS-based AR system by automatically searching the optimal speed for wifi and 4G. This will improve social network service.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

Policy Core Information Model in Policy-Based Management far Network Security (네트워크 보안을 위한 정책 기반 망 관리에 대한 핵심 정책 정보 모델 적용)

  • 김숙연;김건량;김명은;방효찬;김기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.652-654
    • /
    • 2001
  • 본 논문에서는 네트워크 기반의 침입 탐지 및 대응을 위한 정책 기반 망 관리 (NS-PBNM : Network Security Policy Based Network Management)에 핵심 정책 정보 모델 (PCIM :Policy Core Information Model) 을 적용하는 시스템 구현 방안을 제시한다. 이 시스템은 여러 장치를 유연성 있게 통합적으로 관리판다는 정책 기반 망 관리의 목적뿐만 아니라, 정책을 표현, 관리, 공유 및 재사용 하는데 있어 호환성 및 확장성을 확보한다는 PCIM의 목적을 동시에 달성한다. 먼저 NS-PBNM의 구조를 제시하고 이 구조를 기반으로 PCIM을 적용하는 방안을 제시한다. PCIM은 네트워크 침입 탐지 및 대응이라는 기능을 수행하는데 있어 네트워크 보안 정책 정보 모델로 확장된 후, 정책 서버의 정책 관리 도구와 정책 저장소의 구조를 결정한다.

  • PDF

Design of Compact Data Integration and Convergence Device Using Esp8266 Module (Esp8266모듈을 이용한 소형 데이터 통합 및 융합장치 설계)

  • Lee, Dong-Seok;Lim, Joong-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.15-20
    • /
    • 2017
  • In this paper, Esp8266, Node.js, and TCP / IP socket communication are used to design a compact data integration device. This device is designed to configure server and client using Esp8266 module that supports Wifi connection and to support bidirectional data transmission using TCP / IP socket communication. The server is configured using the Node.js operating system, and the database is integrated using Mysql. The network is designed to have a separate IP address by assigning a private IP address to the router, such as a home network. This device can transmit data bidirectionally, store individual client data on the server side, and can check the flow of data transmitted bidirectionally through wire-shark, so that it can be used as a compact real-time data integration and convergence device.

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

Route Guide Method Using Temporal Passing History (시간대별 통행이력을 고려한 실시간 경로안내)

  • Kim, S.H.;Park, S.H.
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2010.06a
    • /
    • pp.153-154
    • /
    • 2010
  • 최근 GPS를 이용한 위치기반서비스(LBS)는 일상생활의 큰 변화를 가져왔다. 이러한 LBS 중에서도 가장 흔히 접할 수 있는 것이 차량 항법용 장치인 네비게이션이다. 초창기의 네비게이션이 단순히 목적지까지 가기 위한 가장 짧은 도로를 안내해 주는 것이 목적이었다면 최근에는 TPEG과 같은 실시간 교통 상황 안내, 이용자 선호도를 고려한 경로탐색, 에코 드라이빙과 같은 좀 더 높은 수준의 서비스가 개발되고 있다. 하지만 현재의 차량항법 시스템은 교통상황 안내 이외에는 현실적인 도로상황 반영이 어렵고 시간대별 통행량의 차이가 큰 국내 교통상황에 대한 고려가 미흡하다. 또한 교통정보 수집장치가 설치되지 않은 도로는 교통상황 안내마저도 제공되지 않는다. 본 논문에서는 이러한 문제점을 개선하기 위하여 임베디드 DBMS를 이용하여 과거 통행이력정보를 저장하고 활용할 수 있도록 도로망 DB스키마를 정의하였다. 그리고 이를 탐색경로의 소요 시간 산출에 활용하여 실제적인 도로상황을 고려한 경로안내 방법을 제안한다. 실제주행이력은 네트워크 데이터의 링크단위로 관리되며 저장된 주행이력은 경로탐색에 필요한 정보인 진입시각, 진출시각, 요일, 통행횟수로 관리된다. 이렇게 단말기에 저장된 주행이력은 중앙DB를 통해 사용자간 공유가 가능하고 향후에는 실시간 동기화를 통해 더욱 신뢰도 높은 경로탐색에 활용될 수 있다.

  • PDF

Implementation of Wireless Contents Access PMP using ARM 9 Embedded System (ARM 9 임베디드 시스템에 의한 무선 컨텐츠 액세스 PMP 구현)

  • Han, Kyong-Ho;Kim, Hee-Su
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.2
    • /
    • pp.99-105
    • /
    • 2007
  • In this paper, diskless personal multimedia player(PMP) that can access and decode the remote large multimedia data is implemented via wireless network. To implement this, WLAN based NFS protocol is used to connect PMP to the remote server and text image and movie files are decoded and played using ARM9 cored PXA255 embedded processor and Linux OS. The fuction and performance of the PMP is evaluated and verified using variuos types of contents. Linux kernel elements are configured and built in according to the hardware and software on the target board to install on the target board. The confirming result shows the required functions and performances.

Asymmetric data storage management scheme to ensure the safety of big data in multi-cloud environments based on deep learning (딥러닝 기반의 다중 클라우드 환경에서 빅 데이터의 안전성을 보장하기 위한 비대칭 데이터 저장 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.211-216
    • /
    • 2021
  • Information from various heterogeneous devices is steadily increasing in distributed cloud environments. This is because high-speed network speeds and high-capacity multimedia data are being used. However, research is still underway on how to minimize information errors in big data sent and received by heterogeneous devices. In this paper, we propose a deep learning-based asymmetric storage management technique for minimizing bandwidth and data errors in networks generated by information sent and received in cloud environments. The proposed technique applies deep learning techniques to optimize the load balance after asymmetric hash of the big data information generated by each device. The proposed technique is characterized by allowing errors in big data collected from each device, while also ensuring the connectivity of big data by grouping big data into groups of clusters of dogs. In particular, the proposed technique minimizes information errors when storing and managing big data asymmetrically because it used a loss function that extracted similar values between big data as seeds.

Design and Development of Monitoring System for Subway Station based on USN (USN 기반의 지하역사 모니터링 시스템의 설계 및 개발)

  • Lee, Seok-Cheol;Jeong, Shin-Il;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1629-1639
    • /
    • 2009
  • This paper describes the environmental monitoring system for supporting comfortable subways based on USN. Our development system includes the sensor field based on integrated sensor, monitoring system for supporting the local and remote monitoring and middle-ware performs the collecting, analyzing, and storing the data. In this paper, we installed the temperature, humidity, micro-dust sensor and water-level sensor for supporting the rail-roads and make up the integrated sensor enables to reuse the analog device from 4~20mA output with connection of wireless sensor device. Middleware includes the modules of collecting, analysis, and storing the data and monitoring system supports the local for administrator and remote monitoring for citizen services based on web. The middleware and monitoring in this paper is comprised of some components can reuse and support the change of application and sensors. Our development system supports the mobility of sensor devices and distributes system. Data collection and management function supported by middleware will use assessment.

  • PDF

Monitoring System of File Outflow through Storage Devices and Printers (저장매체와 프린터를 통한 파일유출 모니터링시스템)

  • Choi Joo-ho;Rhew Sung-yul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.51-60
    • /
    • 2005
  • The riles or intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Monitoring System monitors file outflows at server by making the toe when users copy files on client computers into storage devices or print them, The monitoring system filters I/O Request packet by I/O Manager in kernel level if files are flowed out by copying, while it uses Win32 API hooking if printed. As a result, it has exactly made the log and monitored file outflows, which is proved through testing in Windows 2000 and XP.