• Title/Summary/Keyword: 사용자플랫폼

Search Result 2,055, Processing Time 0.036 seconds

A study of Reference Model of Smart Library based on Linked Open Data (링크드오픈데이터 기반 스마트 라이브러리의 참조모델에 관한 연구)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1666-1672
    • /
    • 2016
  • In recent years, smart technology has been applied to various information system fields. Especially, traditional library service area is changing to Smart-Library from Digital-Library. In this environment are need to library service software platform for supporting variety content, library services, users and smart-devices. Due to this, existing library service has a limitation that inhibits semantic interoperability between different heterogeneous library systems. In this paper, we propose Linked-Open-Data based smart library as an archetype of future-library system that provide a variety content and system interaction and integration of services. It is an innovative system of the cutting-edge information intensive. Therefore, we designed system environments according to various integration requirements for smart library based on Linked-Open-Data. And, we describe the functional requirements of smart-library systems by considering the users' demands and the eco-systems of information technology. In addition, we show the reference framework, which can accommodate the functional requirements and provide smart knowledge service to user through a variety of smart-devices.

A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans (클래시 오브 클랜 오토 프로그램의 악성 행위 분석을 통한 모바일 게임 보안 위협에 관한 연구)

  • Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1361-1376
    • /
    • 2015
  • Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.

Vehicle Diagnostic System using Mobile Handset (모바일 핸드셋을 이용한 자동차 진단)

  • Park, Dong-Gyu;Uh, Yoon;Kim, Seong-Yeob;Song, Up-Jo;Kim, Su-Gyu;Lee, Do-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1338-1346
    • /
    • 2007
  • Beyond a simple voice service, the advances in performance and resolution of mobile handsets provides us various features in the field of mobile services. Also, advances in the human-machine interface, electronics and embedded system technologies have created the foundation for a dramatic shift in the way the vehicles are diagnosed and maintained. In this paper, we will show the vehicle diagnostic system using the mobile handset based on the OBD-II (On Board Diagnostics version II) protocol. After 2005, OBD-II standard is obligatory for all vehicles selling in Korea. Our research topics are OBD-II protocol converter for the mobile handset and the vehicle diagnostics system on WIPI(Wireless Internet Platform for Interoperability) mobile platform, which is the standard mobile platform in Korea.

  • PDF

Multicast Group Partitioning Algorithm using Status or Receivers in Content Delivery WDM Network (콘텐츠 전달 WDM망에서 수신기의 상태를 고려한 멀티캐스트 그룹화 알고리즘)

  • Kyohong Jin;Jindeog Kim
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1256-1265
    • /
    • 2003
  • Content Delivery Network(CDN) is a mechanism to deliver multimedia content to end users on behalf of web content providers. Provider's content is distributed from content server to a set of delivery platforms located at Internet Service Providers(ISPs) through the CDN in order to realize better performance and availability than the system of centralized provider's servers. Existing work on CDN has primarily focused on techniques for efficiently multicasting the content from content server to the delivery platforms or to end users. Multimedia contents usually require broader bandwidth and accordingly WDM broadcast network has been highly recommended for the infrastructure network of CDN. In this paper, we propose methods for partitioning a multicast group into smaller subgroups using the previous status of receivers. Through the computer simulation, we show that proposed algorithm are useful to reduce the average receiver's waiting time and the number of transmissions.

  • PDF

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

Dynamic Monitoring for Security Management based on State Transition (상태 전이에 의한 보안 관리 동적 모니터링)

  • Jang, Hui-Jin;Kim, Sang-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1468-1475
    • /
    • 1999
  • 컴퓨터망 보안을 위해서는 취약점의 빠른 발견과 그에 따르는 신속한 조치가 요구된다. 이를 위해 컴퓨터망 여러 곳에서 사용자가 원하는 보안 정보를 수집, 분석하고 수집된 보안 정보들을 효과적으로 보여주는 통합적인 보안 관리를 제공하는 모니터링 방식이 필요하다. 본 논문에서는 보안 관리를 위한 동적 모니터링 형식 모델을 제시한다. 동적 모니터링은 상태 전이에 의한 시스템 상태, 사용자와의 상호작용, 시각 및 모니터링 객체의 동적 활성화를 이용하여 컴퓨터망 통합 보안 관리를 제공한다. 계속적으로 변하는 보안 정보, 컴퓨터망 관리자의 관심점과 모니터링 레벨의 변화를 즉각적으로 반영함으로써 관리자에게 컴퓨터망 관리의 정확성, 효율성 그리고 편의성을 제공한다. 모니터링 시스템을 형식적으로 모델링하여 여러 모니터링 응용프로그램의 개발이 가능한 모니터링 플랫폼으로 발전시킬 수 있다. Abstract It is highly required to quickly detect the vulnerability of a computer network system and an appropriate action toward it should be followed as soon as possible for its security. It leads us to the need of a monitoring schema that can provide an integrated security management with carefully selected and analysed data through the computer network for its users. This paper presents a formal model of dynamic monitoring for security management. It provides the comprehensive security management using continuously changing security information, user interactions and dynamic activation of visual and monitoring objects. It enables system security officers to manage computer systems accurately, efficiently and conveniently by reflecting the state transition and the transformation of concerns and a monitoring level of system security officers immediately. This model can be used as the basis of a monitoring platform.

Water-well Management Data Modeling using UML 2.0 based in u-GIS Environment (u-GIS 환경에서 UML 2.0을 활용한 지하수 관리 데이터 모델링)

  • Jung, Se-Hoon;Kim, Kyung-Jong;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.523-531
    • /
    • 2011
  • Many of the wells which were constructed to use ground water resource are abandoned and not managed efficiently after its use. And a variety of heavy metals and organic compounds are released from the abandoned wells and this can cause ground water pollution. Therefore in this paper implemented to monitor locational information drill holes and underground water sensing information on real time basis using u-GIS environment to combined ubiquitous sensor node and GIS technology to improve these problems. In addition, this system suggests using system by UML 2.0 by analyzing variety requirement of user and between system internal modules interaction and data flow. It provides graphical user interfaces (GUI) to system users to monitor water-well related property information and its managements for each water-well at remote site by variety platform by GIS map and web environment and mobile device based on smart phone.

Web-based Open Distributed HW/SW Codesign Environment (웹에 기반한 개방형 분산 HW/SW 통합설계 환경)

  • 김승권;김종훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.476-489
    • /
    • 1999
  • HW/SW codesign is integrated design of systems implemented using both hardware and software components. Many design tools has been developed to support this new paradigm, so far. Current codesign tools are not widely used as been expected because of variety problems - rapidly evolving technology, platform dependency, absence of standard specification method, inconsistent user interface, varying target system, different functionality In this paper, we propose a web-based distributed HW/SW codesign environment to remedy this kinds of problem. Our codesign environment has object-based 3 tier client/server architecture. It supports collaborative workspace through session service. Fully object-oriented design of user interface(OOUI) enables easy extension without change of user Interface. Furthermore it contains transaction server and security server for efficient and safe transfer of design data. To show a validity of our design, we developed prototype of web-based HW/SW codesign environment called WebCEDA. Our model of HW/SW codesign can be used for web-based generic CAD tools.

  • PDF

Mobile Agents Framework for Adaptability Support based on Meta Level (적응성 지원을 위한 메타 레벨 기반의 이동 에이전트 프레임워크)

  • Ghim, Soo-Joong;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.651-656
    • /
    • 2003
  • Emerging technologies, such as multimedia and mobile computing, require that middleware platforms can support high adaptability in order to provide more flexible services in heterogeneous environments. To support high quality of service in distributed wired/wireless environments, it will be necessary for applications and middleware to be aware of changes in users requirements as well as environmental conditions, also to be able to adapt their behaviour as such changes. According to the needs of adaptability supporting in middleware, we structure a component-based, mobile agents framework in base level and meta level by using reflection. We propose concepts of meta agents and meta-service agents that are able to reflect changes made by mobile agents to the system. At the meta level of our framework, meta agents monitor execution of mobile agents and it is possible to provide dynamic adaptation of users requirements, deployment of application services and service customization with meta agents and meta-service agents.

Design and Implementation of a Cloud Data Management Interface(CDMI) System (클라우드 데이터 관리 인터페이스(CDMI) 시스템 설계 및 구현)

  • Ahn, Minje;Jeon, Inbae;Son, Ingook;Li, He;Park, Yonghun;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.28-35
    • /
    • 2013
  • Recently, cloud data management has been actively studied along with the development of a cloud computing technology that can process large amounts of data at a lower cost. However, the existing cloud computing platforms do not guarantee interoperability according to the construction environments of users because they do not provide technical and political openness. In other words, in order for users to receive the related services, they use services provided by only one vendor. In this paper, we design and implement a storage interface that supports the international standard CDMI in order to retrieve, update, and delete data in could environments. These interfaces provide the functionality required for developers who want to build and use the cloud storage without special restrictions. In addition, we verify the operability and usability of CDMI international standard through the implementation of the proposed system.