• Title/Summary/Keyword: 능동 네트워크

Search Result 502, Processing Time 0.032 seconds

RFID Applications from 2005 to 2010 (2005년부터 2010년 사이의 RFID 기술 적용 현황)

  • Sheen, Dong-Mok;Choi, Sung-Hee;Lee, Gong-Seop
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.4
    • /
    • pp.86-93
    • /
    • 2010
  • RFID has been used as an identification tool that substitutes for bar codes. Its areas of application are increasing due to its suitability in ubiquitous environment. In this paper, first, we review various aspects of RFID, including standards, characteristics, and relationships with wireless sensor networks. Then, we review the technical aspects of RFID and its areas of application, e.g., supply chain management (SCM) and manufacturing since 2005. SCM, in which RFIDs can shorten lead time and ensure the quality of products, is one of the most active application areas. Manufacturing is a relatively new area for RFID applications, but it is believed that it can enhance the productivity and the reliability of the products. Also, the authors suggest research issues and limitations of RFID, as well as possible application areas related to marine engineering.

A Study on Environment for Web Applications Design (웹 어플리케이션 설계 환경 개발)

  • 이미경;강병도
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.417-422
    • /
    • 2002
  • In recent years, the progress of Network and Web technology is made more demanding and pervasive of Web-based information systems. At the same time, the complexity of web applications has grown significantly. As a result, developers, users, and other stake-holders have become increasingly concerned about the manner in which complex Web-based systems are created as well as the level of system performance quality, and integrity. In this paper, we propose an efficient developing process and modeling environment of the web applications. Also, after modeling web application using the diagrams, web pages are extracted automatically. It is aimed at facilitating the desist implementation and maintenance of large, complex web applications and the reuse of previously gathered design experience.

  • PDF

Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack (DDoS 공격에 대한 Pushback 기반 개선된 ICMP Traceback 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.85-97
    • /
    • 2004
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a "advanced ICMP Traceback" mechanism. which is based on the modified push back system. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source.ck source.

  • PDF

Construction Business Informatization Overview and Development Direction (Construction CALS) (건설CALS 기반의 건설정보화 현황 및 향후 발전방향)

  • Seo, Myoung-Bae;Kim, Jin-Uk;Kim, Nam-Gon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.23-24
    • /
    • 2012
  • 국내의 건설산업은 '11년 기준 580억불 수주를 달성하는 등 비약적인 양적성장을 이루어왔다. 하지만 이러한 외형적인 성장에도 불구하고 고부가가치 창출을 위한 질적성장의 발전속도는 매우 더딘 상황이다. 이에 국토해양부에서는 건설사업 전 단계에 발생하는 각종 건설정보들을 체계적으로 관리하고 건설사업비 진행의 효율성을 높이기 위해 건설정보화사업(건설CALS)을 추진중에 있다. CALS는 제조업의 모든 상품, 즉 주요장비 또는 다양한 상품 등을 획득하기 위한 설계, 생산과정, 또는 보급, 조달 및 이를 운영하는 운용지원과정을 연결시키고, 이들 과정에서 사용되는 각종 정보를 표준이라는 공통 창구를 통해 디지털화하여 컴퓨터상으로 정보를 통합하여 자동화시키는 개념이다. 이는 컴퓨터 네트워크를 이용해 상호 교환이 이루어지는 자동화되고 통합된 환경으로 변환시키는 정부와 기업간의 경영전략이라고 볼 수 있다. 이에 국내에서 진행중인 건설CALS사업현황을 고찰하고 급변하는 건설정보화 환경에 맞춰 능동적으로 대응하여 건설CALS가 건설산업의 신성장동력이 될수 있는 향후 발전방향을 도출하고자 한다.

Design and Implementation of Web-based 3-D Management System for Underground Utilities (웹 기반 3차원 지하시설물 관리 시스템의 설계 및 구현)

  • Oh, Seung;Lee, Yun;Kim, In-Hyun
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2000.06a
    • /
    • pp.125-136
    • /
    • 2000
  • 최근 웹 기반 GIS는 자료의 공유가 폐쇄적인 로컬 GIS 시스템에서 벗어나 대용량의 자료를 손쉽게 인터넷을 통하여 서로 주고 받을 수 있어서 이용속도가 아주 빠르게 확산되고 있다. 그러나, 현재 웹 상에서 작동되는 GIS 시스템은 2차원 매핑(mapping)이나, 위치정보 안내서비스 위주의 시스템으로, 실제 업무에 적용하기 위한 자료의 전송 및 분석에 제약이 많다. 특히, 본 연구에서 대상으로 하는 지하시설물은 지하공간의 불가시성으로 인해 기존의 2차원적인 관리로는 효과적인 관리가 어렵기 때문에, 지하시설물을 3차원으로 시각화하고, 분석, 관리해주는 도구가 절실히 필요한 실정이다. 따라서 본 연구는 현재까지의 인터넷 GIS기술과 지하시설물의 관리에 대한 현황 및 문제점을 먼저 기술하고, 기존의 상용 GIS 시스템에 구축된 지하시설물 데이터를 웹 상에서 3차원으로 시각화 및 분석 정보를 제공하기 위한 3차원 데이터 구조를 설계하고, 네트워크 상에서 3차원 데이터 및 공간 분석 결과를 효율적으로 전송하기 위한 3차원 공간 데이터 서버를 설계 및 구현하였다. 또한 JAVA와 VRML 등의 인터넷 기술을 응용하여 웹 상에서 지하시설물 데이터의 3차원 시각화 및 능동적인 조작 및 관리, 분석이 가능한 3차원 지하시설물 관리시스템을 설계 및 구현하였다.

  • PDF

A Study on Environment for Web Applications Design (웹 어플리케이션 설계 환경 개발)

  • 이미경;강병도
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.417-422
    • /
    • 2002
  • In recent years, the progress of Network and Web technology is made more demanding and Pervasive of Web-based information systems. At the same time, the complexity of web applications has grown significantly. As a result, developers, users, and other stake-holders have become increasingly concerned about the manner in which complex Web-based systems are created as well as the level of system performance, quality, and integrity. In this paper, we propose an efficient developing process and modeling environment of the web applications. Also, after modeling web application using the diagrams, web pages are extracted automatically. It is aimed at facilitating the design, implementation and maintenance of large, complex web applications and the reuse of previously gathered design experience.

  • PDF

A Study on the Construction of Ground Logistics Base Information System Based on RFID (RFID 기반 육송물류거점정보 시스템 구축에 관한 연구)

  • Kang, Min-Soo;Son, Young-Il;Lee, Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.3
    • /
    • pp.286-293
    • /
    • 2008
  • In this paper, u-FOS system is applied to field test in order to design the code structure based on standards and both 900MHz passive and 2.45GHz active RFID devices were used to test identification capacity in the field tests. For the stable RFID data obtainments, optimum speed of trucks and rail cars and most suitable tagging locations on them were resulted from field tests. The data obtained from ground logistics base and identified through the system is sent to u-FOS. Because the code structure is designed in the form of KKR code structure, this system can be implemented on RFID ODS network without difficulty. Therefore, we suggested the result as a guideline for corporations and government agencies to easily adopt the system.

Active Networking Approach for Multimedia Service framework (멀티미디어 서비스 프레임워크에서의 Active Networking 기술 적용 방안)

  • 이종화;함진호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.367-377
    • /
    • 1998
  • In this paper, we propose a framework (named Multimedia Service Framework) that provides the development and operation of different kind of multimedia applications. This framework defines the architectures and its functionalities for supporting multimedia services, in 3 layers of: Application, Distributed Support System and Network. Firstly, we analyzed general characteristics of multimedia applications, and defined a set of horizontal and vertical services in the Application Architecture. Also, we determined functionalities and services required to support all application services in the Distributed Support System Architecture which must provide functions for the distribution transparencies, resource sharing, interoperability and portabiliy. Finally, in the Network Architecture we proposed the network infrastructure and services to increase the efficiency in resource management and processing capacity of network components such as router and switch, adopting the active networking approach.

  • PDF

A Study on Comic Expression of Social Network Game (소셜네트워크게임의 만화적 표현연구)

  • Lee, Hyun-Woo;Kim, Sung-Nam;Kim, Byung-Ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.527-530
    • /
    • 2011
  • This Paper studied out prototype and the structure of comic expression on Social Network Game and started with issues based on SNS(Social Network Service) in Culture Communication. Interaction with the platform have the information that aims to develop relationships with SNG. In a world where the paradigm is changing the game People of all ages, transcending national borders in the mediator role of interaction could have been important. Today SNG is a major topic in Game Contents and this issue has influenced the game design and Story Telling. Under this Situation, this study has a significant meaning because it proves that the factors Comic Expression in game is analyzed by SNG.

  • PDF

Security Analysis of Diffie-Hellman based Standard Key Agreement Protocols (이산대수 기반 Diffie-Hellman형 표준 키 분배 프로토콜의 안전성 분석에 관한 연구)

  • Kim, Kyung-Jin;Kim, Sung-Duk;Shim, Kyung-Ah;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.799-808
    • /
    • 2002
  • According to the wide-spread of information transmission system over network, the use of cryptographic system to provide the integrity of transmitted message over network is increasing and the importance of that is emphasized. Because the security of the cryptographic system totally relies on the key, key management is a essential part of cryptographic system. A number of key agreement protocols have been proposed to far, but their rigorous security analysis is still open. In this paper, we analyze the features of Diffie-Hellman based standard key agreement protocols and provide the security analysis of those protocols against several kinds of active attacks.