• Title/Summary/Keyword: 웹 서버

Search Result 2,130, Processing Time 0.026 seconds

A Study on the Optimal Availability of the Government Institution Websites - Focused on the Capacity Evaluation and Management of the Main Page of the Website (행정기관 웹사이트의 최적의 가용성에 대한 연구 - 메인 화면의 용량 평가와 관리를 중심으로)

  • Moon, Hyung-Nam
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.81-88
    • /
    • 2017
  • I conducted a study on the capacity evaluation and management of the main homepage screen to improve the availability of government institutions. As a result of three times evaluating the size of the homepage main page of the major institutions, the capacity of the homepage of the institution was very enormous, and when there were many concurrent users, the server was easily loaded. Governmental management guidelines are needed to fundamentally solve these problems, with the periodic and ongoing homepage management of each institution. In the future, the web site management detailed checkpoints should be additionally established in the government web site installation and management guidelines, and the recommended checking items; homepage performance evaluation, lightening homepage capacity.

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

Research on Effective Security Control Measures Against DDoS Attacks (DDoS 공격에 대한 효과적인 보안 관제 방안)

  • Jung, Il-Kwon;Kim, Jeom-Gu;Kim, Kiu-Nam;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2009
  • It is very difficult to completely block the DDoS attack, which paralyzes services by depleting resources or occupying the network bandwidth by transmitting a vast amount of traffic to the specific website or server from normal users' PCs that have been already infected by an outside attacker. In order to defense or endure the DDoS attack, we usually use various solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention System), ITS (Intrusion Tolerance System), FW (Firewall), and the dedicated security equipment against DDoS attack. However, diverse types of security appliances cause the cost problem, besides, the full function of the equipments are not performed well owing to the unproper setting without considering connectivity among systems. In this paper, we present the effective connectivity of security equipments and countermeasure methodology against DDoS attack. In practice, it is approved by experimentation that this designed methdology is better than existing network structure in the efficiency of block and endurance. Therefore, we would like to propose the effective security control measures responding and enduring against discriminated DDoS attacks through this research.

  • PDF

Implementation of Smartphone based Mobile Office for a Logistics Company using HTML5 (HTML5를 이용한 물류기업의 모바일 오피스 구현에 관한 연구)

  • Lim, Yongtaek;Byun, Haegwon;Yoo, Woosik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.433-442
    • /
    • 2012
  • This paper focuses on developing a smartphone-based mobile office system for a logistics company in Korea using HTML5. Mobile office is smart working environment of working out of a company office using mobile devices such as smartphones and portable computers which are connected to the company servers via WiFi or 3G/4G. Recently many companies are introducing mobile office information systems with the smartphone wave, but they are having difficulties in maintaining and updating their systems due to the transformative mobile application platform. Therefore, we need a platform-independent implementation tools for the mobile office application and HTML5 is one of the solution tools. In this paper, we develop mobile and web applications applicable to all kinds of mobile devices such as iOS, android and windows mobile etc using HTML5. The proposed mobile office system consists of groupware, marketing management, reporting module and transportation management system.

Custom Cryptographic Protocol Implementation Method Based on OpenSSL (OpenSSL 기반 사용자 지정 암호 프로토콜 구현 방안)

  • Lam, JunHuy;Lee, Sang-Gon;Lee, Hoon-Jae;Andrianto, Vincentius Christian
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.459-466
    • /
    • 2017
  • One of the most widely-used open source project; OpenSSL is a cryptography library that is used to secure most web sites, servers and clients. One can secure the communication with the Secure Socket Layer (SSL) or its successor, Transport Layer Security (TLS) protocols by using the OpenSSL library. Since cryptography protocols will be updated and enhanced in order to keep the system protected, the library was written in such a way that simplifies the integration of new cryptographic methods, especially for the symmetric cryptography protocols. However, it gets a lot more complicated in adding an asymmetric cryptography protocol and no guide can be found for the integration of the asymmetric cryptography protocol. In this paper, we explained the architecture of the OpenSSL library and provide a simple tutorial to modify the OpenSSL library in order to accommodate custom protocols of both symmetric and asymmetric cryptography.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

Implementation of RFID System using Wireless Sensor Networks (무선 센서 네트워크를 이용한 RFID 시스템 구현)

  • Jung, Kyung-Kwon;Lee, Seung-Joon;Lee, Chang-Won;Nghia, Truong Van;Chung, Sung-Boo;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.858-861
    • /
    • 2011
  • In this paper, we present a RFID system by using a wireless sensor network. The proposed system is installed in glove for activity monitoring. The RFID reader, to send data by using sensor network platform and RFID tag are small size, the shape of quadrangle, and operate in the frequency of 13.56 MHz. The sensor node can read RFID tags on the various objects used in daily living such as furniture, medicines, and kitchenwares. The sensor node reads the data of RFID tags, it transmits wireless packets to the sink node. The sink node sends the received packet immediately to a server system. The data from each RFID system is collected into a database, and then the data are processed to visualize the measurement of daily living activities of users. We provide a web-based monitoring system, and can see the number of RFID tag readings per day as bar charts. The result of experiments demonstrates that the way we propose can help to check the situation of life for people who live alone.

  • PDF

Study Growth Environmental Monitoring and Controlling Platform for Hydroponic (양액재배를 위한 생육환경 모니터링 및 제어 플랫폼에 관한 연구)

  • Yeon, In-won;Lee, Won-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1132-1140
    • /
    • 2016
  • According to global trend, despite the overall scale of agricultural industry has been downsized, agriculture accommodating cutting-edge ICT technologies has been proliferated, and various timely-issued relevant researches have been on progress to deploy the future food cultivation. In this paper, we propose an effective nutrient management system with web-based monitoring with functionality of controlling temperature, humidity, pH (hydrogen ion), EC (Electric Conductivity), LED and cooling fan to maintain the hydroponic nurturing environment being optimal. In this paper, in order the arduino hardware and java software are employed to control the nurturing environment automatically in optimal fashion. In proposed system, due to the usage of WiFi router with the socket communication and DB-assisted Web server with proper interfaces, it allows to facilitate the management to keep monitoring and controling overall hydroponic nurturing environment. Since the proposed Web-based management system provides the superior reliability, the short nurturing period and the robustness to the pest by controlling LED emitting color rather than conventional system, so it can be applied and appropriate for in-house vegetable factory overcoming limitation of time and location.

VLSI Architecture for High Speed Implementation of Elliptic Curve Cryptographic Systems (타원곡선 암호 시스템의 고속 구현을 위한 VLSI 구조)

  • Kim, Chang-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.133-140
    • /
    • 2008
  • In this paper, we propose a high performance elliptic curve cryptographic processor over $GF(2^{163})$. The proposed architecture is based on a modified Lopez-Dahab elliptic curve point multiplication algorithm and uses Gaussian normal basis for $GF(2^{163})$ field arithmetic. To achieve a high throughput rates, we design two new word-level arithmetic units over $GF(2^{163})$ and derive a parallelized elliptic curve point doubling and point addition algorithm with uniform addressing based on the Lopez-Dahab method. We implement our design using Xilinx XC4VLX80 FPGA device which uses 24,263 slices and has a maximum frequency of 143MHz. Our design is roughly 4.8 times faster with 2 times increased hardware complexity compared with the previous hardware implementation proposed by Shu. et. al. Therefore, the proposed elliptic curve cryptographic processor is well suited to elliptic curve cryptosystems requiring high throughput rates such as network processors and web servers.

Development of Accident-prevention Smart Monitoring System for Woman Diver using Zigbee Module and GPS Sensor (Zigbee와 GPS를 이용한 해녀 사고예방 스마트 모니터링 시스템 개발)

  • Choi, Min Ho;Kim, Young Sang
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.74-80
    • /
    • 2016
  • In this paper, we propose an accident-prevention smart monitoring system for Haenyeo(Woman diver) using Zigbee module and GPS sensor. This system can collect such information as the diving location, the body temperature, the depth of diving, and the diving time of a Woman diver working under the water and then respond immediately to an accident occurring. The research developed a smart Teawak and smart swimming goggles which can measure the state of a Woman diver and her diving activities. Smart Teawak, the buoy tool while a Woman diver is collecting seafoods under water, is able to receive GPS and transmit the data from smart swimming goggles and Zigbee Module to IHSS(IoT based Haenyeo Safety service Software) server. In addition, IHSS, a responsive web, provides the diving location and the state of a Woman diver on the smart phone. As a result, the system will be useful in the aspects of Woman diver' health care and the safety, furthermore, which will significantly contribute to global marketing of Woman diver with its being designated as a UNESCO intangible cultural asset.