• Title/Summary/Keyword: 분실율

Search Result 16, Processing Time 0.029 seconds

The Effect of NIC Buffer Size of Web Server on the Performance of LAN (웹 서버의 NIC 버퍼 사이즈가 LAN 성능에 미치는 영향)

  • Kim, Jin-Hee;Sin, Bum-Suk;Kwon, Kyung-Hee
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.260-264
    • /
    • 2003
  • Among many factors to affect the network performance, this paper analyses how the buffer size of NIC(Network Interface Card) can affect web server and LAN(Local Area Network). We use the ns-2 which is defacto network simulation tool to observe the changes in drop rate, throughput, RTT(Round Trip Time), effective throughput depending on varying buffer sizes. And we analyse the effect of NIC buffer size on the web traffic in Ethernet.

  • PDF

Improving a internal network performance by controlling MSS (MSS 조절을 통한 내부 네트워크의 성능 향상)

  • Oh, Sae-Min;Kwon, Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1371-1374
    • /
    • 2004
  • 본 논문에서는 내부 LAN(Local area network)에서 MSS(Maximum segment size)의 변화가 네트워크 성능에 미치는 영향에 대하여 분석한다. 내부 LAN에 웹 클라이언트와 웹 서버를 두고 이더넷(Ethernet)이 허용하는 사이즈 내에서 MSS 값의 변화가 네트워크의 성능에 미치는 영향을 분석한다. 처리량(Throughput), 이용률(Utilization), 분실율, 수신율, RTT(Round Trip Time)를 사용하여 성능을 평가하였다. 실험은 네트워크 시뮬레이터 중의 사실상 표준 도구인 NS-2로 한다.

  • PDF

Design of Security Protocal for Mobility Memory Secunity Using PUF (이동성 메모리 보안을 위한 PUF을 이용한 보안 시스템 프로토콜 설계)

  • Jung, Young-Min;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.625-628
    • /
    • 2013
  • 기술이 발달함에 따라 USB메모리, 보안 SD카드, 보안인증토큰 등 이동형 저장 매체도 비약적인 발전을 하고 있다. USB의 가격이 저렴해지고 작아지면서 용량의 확장도 증가하여 다양한 이용을 할 수 있게 되었다. 하지만 분실율이 높고 보안성이 낮아 다수의 사용자에게 중요한 회사의 기밀이나 개인의 인적 사항들이 노출 될 수 있다. 이를 위해 PUF를 이용하여 플래시 메모리 마다 고유키를 저장, 생성하여 외부 유출이 없이 사용자 인증을 하기 위한 플래시 드라이버의 구조 및 프로토콜을 제안하고자 한다.

Distributed Archiving Protocol between the Medical Sensor Nodes for the Home Health Service (홈 헬스를 위한 메디컬 센서노드의 분산보관 프로토콜)

  • Lee, Young-Ho;Jang, Hee-Tae;Lee, Byung-Mun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.80-90
    • /
    • 2012
  • Medical data sampled through medical sensor nodes can provide services properly only when the data are not lost even during the fault of a home health gateway. The loss of medical data can be minimized if a sensor node, in which it is expected that there are the most saving spaces, is selected after medical sensor nodes tentatively conduct local save or communicate with each other during a fault when data cannot received. Furthermore, efficient saving techniques are necessary since the cycle for sampling information is different according to the type of medical data and a space for distributed saving is different for each apparatus. So, this research suggests an efficient distributed archiving protocol (DAP) for medical data sensor nodes, each of which has a diverse sampling cycle. In order to confirm the usefulness of DAP, DAP between sensor node and gateway was designed and materialized. An experiment was conducted using the materialized program and earned a high level of recovery rate (99.3%) and of accuracy rate, which confirms that sensor nodes can play their role during a temporary fault.

A Study on a Delivery System for the Effects of Using in the Public Libraries (공공도서관 활성화를 위한 Delivery System에 관한 연구 - 이동문고를 중심으로 -)

  • 이상근
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.9 no.1
    • /
    • pp.153-179
    • /
    • 1998
  • This study attempt to suggest a policy for the effect of using in the public libraries by the verification that are different between groups by their using patterns and types of book collections. by using patterns and system of desired-book for user. by using patterns and system of desired-book for user. The questionnaire is distributed to the delivery lending library's user and librarian in public libraries. The summary of results are as follows 1 The Circulation period of public library is one month per every delivery lending library. 2. The Circulation volume of public library is '100-200' books per every times. 3. There are significant differences by their using patterns and types of book collections. 4. There are significant differences by their using patterns and system of desired-book for user. 5. There are significant differences by their using patterns and placement of book collections. Their results show that library is most effective place of book collection services. 6. Circulation services must carry out only in the sphere of jurisdiction 7. A Lost books must set up treatment basis of natural reduction ratio 8. The Interference factors of delivery lending library are lacks of human power, lost books and negative attitute of user in order 9. The Effects of using a delivery lending library are a positive attitute and specialty of top management, the optimum of budget and the effect of deposit system 10. Natural reduction ratio of lost books appropriates 0.5-0.6% of total loaned books

  • PDF

A Face Recognition System using Geometric Image Processing (기하학적 영상처리를 이용한 얼굴인식 시스템)

  • 이항찬
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1139-1148
    • /
    • 2003
  • Biometric system has been studied as an optimal solution for preventing or reducing the peculation or loss of ID. Nowadays, face recognition has been spot-lighted as a future biometric system because it is not forced to contact the part of human body with the specific input area of the system. However, there is some limitations to get the constant facial features because the size of face area is varied by the capturing distance or tilt of the face. In this paper, we can extract constant facial features within the predefined threshold using the simple geometric processing such as image scaling, transformation, and rotation for frontal face images. This face recognition system identifies faces with 92% of accuracy for the 400 images of 40 different people.

  • PDF

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

An Implementation of Embedded Speaker Identifier for PDA (PDA를 위한 내장형 화자인증기의 구현)

  • Kim, Dong-Ju;Roh, Yong-Wan;Kim, Dong-Gyu;Chung, Kwang-Woo;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.286-289
    • /
    • 2005
  • 기존의 물리적 인증도구를 이용한 방식이나 패스워드 인증 방식은 분실, 도난, 해킹 등에 취약점을 가지고 있다. 따라서 지문, 서명, 홍채, 음성, 얼굴 등을 이용한 생체 인식기술을 보안 기술로 적용하려는 연구가 진행중이며 일부는 실용화도 되고 있다. 본 논문에서는 최근 널리 보급되어 있는 임베디드 시스템중의 하나인 PDA에 음성 기술을 이용한 내장형 화자 인증기를 구현하였다. 화자 인증기는 음성기술에서 널리 사용되고 있는 벡터 양자화 기술과 은닉 마코프 모델 기술을 사용하였으며, PDA의 하드웨어적인 제약 사항을 고려하여 사용되는 벡터 코드북을 두 가지로 다르게 하여 각각 구현하였다. 처음은 코드북을 화자 등록시에 발성음만을 이용하여 생성하고 화자인증 시에 이용하는 방법이며, 다른 하나는 대용량의 음성 데이터베이스를 이용하여 코드북을 사전에 생성하여 이를 화자 인증시에 이용하는 방법이다. 화자인증기의 성능평가는 5명의 화자가 10번씩 5개의 단어에 대하여 실험하여, 각각 화자종속 코득북을 이용한 인증기는 88.8%, 99.5%, 화자독립 코드북을 이용한 인증기는 85.6%, 95.5%의 인증율과 거절율을 보였으며, 93.5%와 90.0%의 평균 확률을 보였다.. 실험을 통하여 화자독립 인증기의 경우가 화자종속 인증기의 경우보다 낮은 인식율을 보였지만, 화자종속 인증기에서 나타나는 코드북 훈련시에 발생하는 메모리 문제를 해결 할 수 있었다.

  • PDF

Remotely Controllable Smart Door Lock (원격 제어가 가능한 스마트 도어락)

  • Choi, Duk-Kyu;Lee, Sang-Bin;Park, Jin-Sol;Kwon, Yong-Min;Kim, Jun-Bin;Kwon, Min-Ji;Jang, Jae-Min;Jeong, woo-won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.261-262
    • /
    • 2020
  • 현대에 흔히 쓰이는 도어락은 안전과 보안등의 목적과 편리함을 목적에 두고 있다. 실제로 그전에 쓰던 열쇠보다 더 편리하고 분실염려도 없고 복제키 등으로 인한 사건, 사고로 인한 범죄율이 줄어들었다. 도어락은 사용자가 손으로 직접 비밀번호를 입력하여 잠금을 해제하는 방식이고 이 과정에서 도어락에 지문이나 표시가 남으며 비밀번호가 주위에 쉽게 노출될 수 있다. 본 논문은 위의 문제를 해결하기 위해 아두이노로 라즈베리파이와 앱을 무선 통신하여 '원격 제어가 가능한 스마트 도어락'을 고안했다. 아두이노 와이파이 모듈을 통해 스마트폰으로 도어락을 원격으로 제어할 수 있으며 라즈베리파이 카메라 모듈과 초음파 센서를 통해 도어락에 접근하는 사람을 감지하고 확인할 수 있다. 이 기능으로 범죄를 예방할 수 있으며 자녀들의 귀가 여부도 확인할 수 있고 문을 열어줘야 할 상황에 비밀번호 노출없이 문을 열어줄 수 있다.

  • PDF

Recovery of Lost Fishing Gear in Alaska Pollack Fishing Ground of the East Coast in Korea (한국 동해안 명태어장에 분실된 폐어구수법에 관한 연구)

  • 안영일;박진영;조현정
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.37 no.1
    • /
    • pp.9-17
    • /
    • 2001
  • To improve the fishing environment of Alaska pollack fishing ground of the East coast in Korea, lost fishing gear were recovered from June to July 1998, May 1999 and from July to August 1999 in the sea near Goseong, Gangwon province. The lost fishing gear was recovered by grapnel. As the results, the lost fishing gear, which was consist of gill nets and traps, was produced from fishing activities, whereas most of them was the bottom gill nets. The weight of lost fishing gears was gill nets of 1,170 t and traps off 4t. The recovered gill nets decreased 12.02 t per mile from 22.74 t, in 1998 to 10.72 t, in 1999. Recovery rate of lost fishing gear was low as 38% in 1998, 41.9% in 1999 and CPUE was 11.27 t/trial in 1998, 7.48 t/trial in 1999. The recovery of lost fishing gear in fishing ground by using grapnel was considered as a useful method.

  • PDF