• Title/Summary/Keyword: 네트워크 접근제어시스템

Search Result 266, Processing Time 0.024 seconds

An Educational MBL Platform Development with Remote Access Functionality (원격 제어 교육용 MBL 플랫폼 개발에 관한 연구)

  • Kim, Si-Kyung;Lee, Hee-Bok;Lee, Hee-Man
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1388-1393
    • /
    • 2007
  • The Microprocessor Based Laboratory Systems(MBL) with the remote access functional could put basic science experimental facilities together by providing a modem platform that the students can utilize simultaneously to learn basic physics, chemistry and biology, Our educator target platform combines a highly integrated 8-bit embedded Atmega128 processor and real time embedded OS (operating system), allowing plenty of headroom for follow-on basic science projects for students. The proposed MBL-NUTOS (Microprocessor Based Laboratory-NUT/OS) employed in the lab are available with internet base simulation capabilities, on public servers and students personal PCs, enabling the students to study at home and increasing the opportunity of accessing for the science laboratory facility.

  • PDF

Sound Source Localization Method Based on Deep Neural Network (깊은 신경망 기반 음원 추적 기법)

  • Park, Hee-Mun;Jung, Jong-Dae
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1360-1365
    • /
    • 2019
  • In this paper, we describe a sound source localization(SSL) system which can be applied to mobile robot and automatic control systems. Usually the SSL method finds the Interaural Time Difference, the Interaural Level Difference, and uses the geometrical principle of microphone array. But here we proposed another approach based on the deep neural network to obtain the horizontal directional angle(azimuth) of the sound source. We pick up the sound source signals from the two microphones attached symmetrically on both sides of the robot to imitate the human ears. Here, we use difference of spectral distributions of sounds obtained from two microphones to train the network. We train the network with the data obtained at the multiples of 10 degrees and test with several data obtained at the random degrees. The result shows quite promising validity of our approach.

Collaborative Authoring System using 3D Spatio-Temporal Space (삼차원 시.공간을 이용하는 프레젠테이션 공동저작 시스템)

  • 이도형;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.623-634
    • /
    • 2003
  • In this paper, we propose a collaborative multimedia authoring system. Our authoring system represents a multimedia presentation in a 3D coordinate system. One axis represents the traditional timeline information (T-zone), and the other two axes represent spatial coordinates (XY-zone). Our system represents a visual media objects as a 3D parallelepipeds and audio media objects as cylinders. This interface allows for simultaneous authoring and manipulation of both the temporal and the spatial aspects of a presentation. Using our system, users can design multimedia presentations collaboratively in the unified spatio-temporal space while freely traversing the spatial domain and the temporal domain without changing the context of authoring. In addition, we suggest an efficient mechanism of concurrency control for shared objects generated by our collaborative writing system. The mechanism is mainly based on the user awareness, the multiple versions, and the access permission of shared objects. Our concurrency control mechanism is designed to keep data consistency by minimizing the collision due to the delay or the failure of network communication and to allow maximum responsiveness for users using optimistic concurrency control. Also, the mechanism maximize the responsiveness by refining the locking granularity and applying different concurrency control mechanisms to each.

Implementation of Access Control System Suitable for Meteorological Tasks in Grid Computing Environment (그리드 컴퓨팅 환경에서 기상업무에 적합한 접근 제어 시스템 구현)

  • Na, Seung-kwon;Ju, Jae-han
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.2
    • /
    • pp.206-211
    • /
    • 2017
  • Recently computing devices by connecting to a network, grid computing, the next generation of digital neural networks that provide maximum service will connect all of the computer such as a PC or server, PDA into one giant network makes the virtual machine. Therefore, we propose the grid computing implementation model to be applied to meteorological business field as follows. First, grid computing will be used for tasks such as the development of numerical models below the mid-scale or test operations, and the final backup of the weather supercomputer. Second, the resources that will constitute grid computing are limited to business PCs and Linux servers operated by the central government considering operational efficiency. Third, the network is restricted to the LAN section, which suggests the implementation of high performance computing.

Markov CAC model in Wireless Mobile Networks Using AMC (AMC를 사용하는 무선 이동 네트워크에서 Markov CAC 모델)

  • Kwon Eun-Hyun;Park Hyo-Soon;Lee Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.270-277
    • /
    • 2006
  • In the wireless adaptive modulation and coding(AMC) systems, the modulation type of user's connection can be changed dynamically. and the ongoing connection might fail due to the change of modulation. In this paper, we approach the AMC-induced CAC problem by focusing on the guaranteed connection. Three kinds of calls, new, handoff, and modulation-changed calls, are considered. We propose a modified guard channel CAC scheme that allows the modulation-changed and handoff calls to use the guard channel. Then we analyze a Markov model for the CAC scheme with long-term AMC in mind. According to the simulation results, the proposed approach reduces the call dropping probability for modulation-changed calls, which suggests the threshold of guard channels can be determined based on the proposed approach.

A Traffic Aware Demand-Wakeup MAC(TADW-MAC) Protocol for Wireless Sensor Networks (무선 센서 네트워크에서 트래픽에 적응적인 Demand-Wakeup MAC 프로토콜)

  • Kim, Hye-Yun;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.180-186
    • /
    • 2017
  • In this paper we propose a traffic aware Demand Wakeup MAC(TADW-MAC) protocol, in which low data delay and high throughput can be achieved, for wireless sensor networks. With the TADW-MAC protocol, the problem of the DW-MAC protocol, which schedules only one packet to deliver during the Sleep period in a multi-hop transmission is resolved. DW-MAC is not adequate for the applications such as object tracking and fire detection, in which busty data should be transmitted in a limited time when an event occurs [6-8]. When an event occurs, duty cycle can be adjusted in the TADW-MAC protocol to get less energy consumption and low latency. The duty cycle mechanism has been widely used to save energy consumption of sensor node due to idle listening in wireless sensor networks. But additional delay in packet transmission may be increased in the mechanism. Our simulation results show that TADW-MAC outperforms RMAC and DW-MAC in terms of energy efficiency while achieving low latency.

Image Processing System based on Deep Learning for Safety of Heat Treatment Equipment (열처리 장비의 Safety를 위한 딥러닝 기반 영상처리 시스템)

  • Lee, Jeong-Hoon;Lee, Ro-Woon;Hong, Seung-Taek;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.77-83
    • /
    • 2020
  • The heat treatment facility is in a situation where the scope of application of the remote IOT system is expanding due to the harsh environment caused by high heat and long working hours among the root industries. In this heat treatment process environment, the IOT middleware is required to play a pivotal role in interpreting, managing and controlling data information of IoT devices (sensors, etc.). Until now, the system controlled by the heat treatment remotely was operated with the command of the operator's batch system without overall monitoring of the site situation. However, for the safety and precise control of the heat treatment facility, it is necessary to control various sensors and recognize the surrounding work environment. As a solution to this, the heat treatment safety support system presented in this paper proposes a support system that can detect the access of the work manpower to the heat treatment furnace through thermal image detection and operate safely when ordering work from a remote location. In addition, an OPEN CV-based deterioration analysis system using DNN deep learning network was constructed for faster and more accurate recognition than general fixed hot spot monitoring-based thermal image analysis. Through this, we would like to propose a system that can be used universally in the heat treatment environment and support the safety management specialized in the heat treatment industry.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

Implementation of an Intelligent Visual Surveillance System Based on Embedded System (임베디드 시스템 기반 지능형 영상 감시 시스템 구현)

  • Song, Jae-Min;Kim, Dong-Jin;Jung, Yong-Bae;Park, Young-Seak;Kim, Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.2
    • /
    • pp.83-90
    • /
    • 2012
  • In this paper, an intelligent visual surveillance system based on a NIOS II embedded platform is implemented. By this time, embedded based visual surveillance systems were restricted for a special purpose because of high dependence upon hardware. In order to improve the restriction, we implement a flexible embedded platform, which is available for various purpose of applications. For high speed processing of software based programming, we improved performance of the system which is integrated the SOPC type of NIOS II embedded processor and image processing algorithms by using software programming and C2H(The Altera NIOS II C-To-Hardware(C2H) Acceleration Compiler) compiler in the core of the hardware platform. Then, we constructed a server system which globally manage some devices by the NIOS II embedded processor platform, and included the control function on networks to increase efficiency for user. We tested and evaluated our system at the designated region for visual surveillance.

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF