• Title/Summary/Keyword: 연동 방안

Search Result 833, Processing Time 0.026 seconds

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

A Study on the Automation in Construction using and RFID System (RFID 시스템을 이용한 건설 자동화 방안 도출을 위한 기초 연구)

  • Yoo, Jae-Min;Park, Eun-Soo;Jun, Young-Joon;Lee, Tai-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.729-732
    • /
    • 2008
  • Complexity and Massive is the modem trend of construction project. The lack of timely and accurate construction data is the main cause for the lack productivity increases seen in other industries. Because information is essential in the construction production process, the lack of it will cause workers to stay idle, build the wrong thing that has to be redone, become involved in an accident or simply waste their time doing non-productive work. To aid construction automation and improve its productivity, RFID technology system should be developed. As a result of that, this study analyzes the status of RFID technologies in construction project and suggest advanced construction method. USN and RTLS system is analyzed in this study RFID system also can be used in construction management, material management, quality control, safety management and human resource management.

  • PDF

Management Plan of Urban Object IDentification through Status-Analysis of Existing Object Management Code (기존 공간정보 관리코드 현황분석을 통한 도시공간정보 객체식별자 관리 방향)

  • Jang, Yong-Gu;Lee, Woo-Sik;Kim, Hyung-Su
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.51-64
    • /
    • 2008
  • Recently, development and research of u-City established the ubiquitous environment which can be anytime, anywhere computing or network, has been much highlighted. Thus, current urban facilities should be managed by ubiquitous concept, and monitored location and status information in a real-time manner, and controled if necessary. In order to be establish in the purpose of management, indirect mapping through id-tag is better than facility management directly. For instance, RFID, UCODE, UFID. In this paper, we propose that represent facility object through UOID(Unique Object IDentification). UOID comprises three parts; 1) sensing object, 2) facility object, 3) cell object consists of facilities. and Life cycle management system in UOID, and network system connected with internet is proposed. We wish that proposed UOID and network system mange u-City facilities effectively, and also provide ubiquitous service to the citizen, one of the integrate service of u-City platform.

  • PDF

Enhancing the Efficiency and Reliability for M&S based Test and Evaluation System Development (M&S 기반 시험평가 장비 개발의 효율성 및 신뢰성 강화 방안)

  • Cho, Kyu-Tae;Lee, Seung-Young;Lee, Han-Min;Kim, Sae-Hwan;Jeong, Ha-Min
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.89-96
    • /
    • 2012
  • Recent modeling and simulation technologies are being used in various fields, especially in the field of military simulation-based acquisition (Simulation Based Acquisition) is recognized as an essential policy. In test and evaluation phase of the SBA process, to build a simulation-based T&E(test and evaluation) environment is needed when T&E cannot be carried by real weapon system. To improve efficiency and reliability for T&E, interoperability, reusability and reliability for T&E equipments and systems are important. In this study, we propose applying simulation framework for efficienct test and applying VV&A process for reliable evaluation. We describes the characteristics of the development process, the actual test cases and the results of evaluation. Finally utilization plan and the future direction of research is described.

A Resource Allocation Method for Supporting Multiple Sessions in a Mobile Terminal during Handover (핸드오버 시 이동 단말기에서 다중 세션 지원을 위한 자원 할당 방안)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.57-66
    • /
    • 2012
  • LTE-Advanced network will form the high-speed IP backbone in collaboration with heterogeneous radio access networks for dynamic optimized resource utilization. In order to implement more innovative and attractive services such as U-Cloud streaming, LBS and mobile smart TV, a mobile terminal needs to support multiple sessions simultaneously. Efficient resource allocation schemes are necessary to maintain QoS of multiple sessions because service continuity may be defected by delay and information loss during handover. This paper proposes a resource allocation scheme to accommodate multiple sessions in a mobile terminal on handover period based on session priority mechanism. Simulation is focused on the forced termination probability of handover sessions. Simulation results show that our proposed method provides a better performance than the conventional method.

A Study On BI Module Implementation Based Hybrid App For Smart Mobile Office (중소기업 SMO를 위한 하이브리드 앱 기반의 BI 모듈 구축 및 활용방안)

  • Kim, Yeong-Real;Park, Geon-Wan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.103-115
    • /
    • 2014
  • Mobile-Office is the IT office that enables people handle their business anywhere and anytime without going to head office. It has propagated rapidly in domestic and foreign companies as the users who use mobile terminal such as smartphone have increased sharply. Mobile-Office is emerging as a new way of conducting business. It requires business environment to be changed to improve business efficiency, as fast-growing mobile-based economies emerges. Small and medium-sized companies's utilization ability for advanced IT technology is insufficient, and limitations exist on capacity of building and investment. They need different development methodologies and utilization methods. The purpose of this study is not only to consider the previous business environment problem on accessibility, mobility, effectiveness, complexity and consolidation, but to search more efficient methods for introducing applications to utilize various smart devices and websites with minimum investment in R&D.

Network based MPLS VPN using BGP-E for Mobility Support (이동서비스를 지원하는 BGP-E 방식 MPLS VPN의 설계 및 구현)

  • Lee, Young-Seok;Lim, Hyoung-Taek;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.927-937
    • /
    • 2003
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology is regarded as a good solution for intranets or extranets because of the low cost and the flexibility of the service provision. In this paper, we describea mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for and implemented on PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We designed VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol. The pilot implementation and performance measurement were carried out on a testbed.

Improvement of Energy Efficiency of LEACH Protocol for Wireless Sensor Networks (무선센서 네트워크를 위한 LEACH 프로토콜의 에너지 효율 향상 방안)

  • Lee, Sang-Hoon;Suk, Jung-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2B
    • /
    • pp.76-81
    • /
    • 2008
  • LEACH (Low Energy Adaptive Clustering Hierarchy) has been proposed as a routing protocol with a hierarchical structure, in order to achieve the energy efficiency that is of primary importance in the wireless sensor networks. A wireless sensor network adopting LEACH is composed of a few clusters, each of which consists of member nodes that sense the data, and head nodes that deliver the collected data from member nodes to a sink node that is connected to a backbone network. A head node in a cluster allocates TDMA slots to its member nodes without taking into account whether they have data to transmit or not, thus resulting in inefficiency of energy usage of head node that remains in active mode during the entire round time. This motivates us to propose a scheme to improve the energy efficiency of LEACH, by assigning TDMA slots only to those member nodes who have data to send. As a result, the head node can remain sleep during the period of no data transmission from member nodes, leading to the substantial energy saving. By using the ns-2 simulator, we evaluate the performance of the proposed scheme in comparison with the original LEACH. Experimental results validate our scheme, showing a better performance than original LEACH in terms of the number of outliving nodes and the quantity of energy consumption as time evolves.

Real-Time Monitoring of ECG Signal under Ubiquitous Environment (유비쿼터스 환경 하의 실시간 심전도 신호 모니터링)

  • Kim, Jungjoon;Kim, Jin-Sub;Ryu, Chunha;Kim, Jeong-Hong;Park, Kil-Houm
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.728-735
    • /
    • 2013
  • In this paper, we present a method of transmitting ECG signals in real-time mobile environment to be possible to implement the ubiquitous healthcare system. Because of the excessive amount of data transmission of ECG signals, it is necessary to propose a limitation to the real-time transmission. We propose a real-time electrocardiographic monitoring system based on the proposal of unusual waveform detection algorithm which detects the R-wave distortions from the arrhythmia ECG signals having unusual waveform of about 10% on average. It is very effective in terms of time and cost for medical staffs to monitor and analyze ECG signals for a long period of time. Monitoring unusual waveform by gradually adjusting the threshold values of potential and kurtosis makes the amount of data transmitted decrease and significance level of waveform to be enhanced. The unusual waveform detection algorithm is implemented with ubiquitous environment inter-working device client. It is applicable to ubiquitous healthcare system capable of real-time monitoring the ECG signal. While ensuring the mobility, it allows for real-time continuous monitoring of ECG signals.

A Correction Security Framework for Reliable Internet Services (신뢰성 있는 인터넷 서비스 제공을 위한 교정 보안 프레임워크)

  • Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.779-786
    • /
    • 2003
  • We propose a correction security framework as next generation security technology to provide secure and reliable Internet services. The framework guarantees durability of the services in spite of external attack, intrusion, vulnerability for fault tolerance, and network management technology that covers the set of techniques aimed at providing rapid service recovery. The improvement technology includes system itself improvement and synamic improvement preventing faults from being re-activated, in cooperation with other systems such as vulnerability anaysis system, NMS, ESM. It is expected that our framework will be applied to global networks as well as system alone, and be able to guarantee the network survivability and reliable Internet services.