• Title/Summary/Keyword: 정보통신 표준화

Search Result 2,952, Processing Time 0.032 seconds

IC-CARD TYPE ELECTRONIC MONEY AND IMPROVEMENT POLICY (IC카드헝 전자화폐 도입방안의 문제점과 개선책)

  • 박근수
    • The Journal of Information Technology
    • /
    • v.3 no.1
    • /
    • pp.73-88
    • /
    • 2000
  • Dramatic changes are beginning to occur in plastic card technologies today in the fields of banking, health care, id-cards and more. Advanced card technologies such as IC-card are playing an increasingly important role in new and innovation system. The merit of IC-card are more capacity, more secure, more reliable, quick and easy to update, secure offline processing, enabling technology etc than magnetic stripe card. And so many countries began using experiment of IC- card and our country began October 13 in Cheju island. Then there are three types using-experiment (K-cash, VISA-cash, MONDEX) in Korea. There are some problems such as standards, widely using, high cost, double investment etc. I think that important things in IC-card using is an international- standardizations and issuing corporation.

  • PDF

Design of Software Architecture for Integrating of Messages between Semiconductor Equipments (반도체 장비의 메시지 통합을 위한 소프트웨어 구조 설계)

  • Lim, Yong-Muk;Hwang, In-Su;Kim, Woo-Sung;Park, Geun-Duk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.151-159
    • /
    • 2007
  • It is very important to collect all production-related status values during the manufacturing process of semiconductor. The analysis results of the collected data can be used for the operation rate, fault diagnosis, process control and removal of predicted obstacles of equipments, eventually contributing to the improvement of production efficiency. For this propose. many IC makers have adopted EES(Equipment Engineering System). As the use of web has become a daily lift activity lately, it has been suggested to expand the scope of monitoring equipments using HTTP or SOAP protocols. To fulfill the web-based EES, EDA(Equipment Data Aquisition) should be facilitated first by integrating and standardizing various forms of messages generated from many different semiconductor equipments. In this paper, a method for integration between different types of information is suggested based on the analysis of various protocols used for the communication between semiconductor equipments. In addition, a software architecture to support the method is desisted.

  • PDF

리눅스 활성화 정책방향

  • 임종태
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.18 no.2
    • /
    • pp.4-7
    • /
    • 2000
  • 이상에서 소개된 정보통신부 리눅스 활성화 방안을 요약하면 다음과 같다.1991년 개발된 리눅스가 최근 저비용 고효율 안정성 등의 여러가지 이점 때문에 대표적인 PC서버용 운영체제로 부각되고 있다. IBM, Intel, Sun 등 세계적인 하드웨어 및 소프트웨어 업체들이 공식적으로 리눅스 지원을 시작하면서 Windows NT에 대적하는 새로운 서버 운영체제로 부각되었고, 이에 따라 다른 여러 업체들도 리눅스 시장을 선점하기 위해 활발한 개발활동을 전개하고 있다. 본 활성화 방안은 국내에서 리눅스 활성화를 통해 다음의 목표를 달성하기 위해 마련되었다. 추진목표는 첫째, 저가격 고성능의 리눅스를 이용한 PC 보급 확산으로 인터넷 이용환경 구축 예산을 절감하고 교육정보화 등 정보화사업에 리눅스 적용을 통해 국민의 보편적 이용환경을 조성하는 데 있고, 둘째, 리눅스 기반기술 개발을 통해 소프트웨어 기술을 국제수준으로 향상시키고, 셋째, 리눅스의 보급 활성화를 통한 국내 소프트웨어 산업을 육성하는 데 있다. 구체적 추진전략은 다음과 같다. 첫째, 리눅스 한글환경 표준화 및 리눅스 기반기술 개발 등과 같은 원활한 리눅스 보급을 위한 연구개발을 추진한다. 둘째, 리눅스 환경하의 다양한 응용 개발 촉진체계를 구축한다. 셋째, 공공분야에 대한 리눅스 보급을 추진한다. 셋째, 공공분야에 대한 리눅스 보급을 추진한다. 정보화사업 추진 시 리눅스 활용을 적극 추진하고 교육정보화 사업의 기본장비로 활용하는 시범사업을 추진한다. 또한 산 학 연의 리눅스 전문가들로 리눅스 협의회를 구성하여 리눅스 보급 확산을 위한 활동을 추진하게 될 것이다. 이 과정에서 기업들의 요구사항 및 이용활성화에 대해서 협의가 이루어질 것이다. 새 천년에는 시작부터 국가간에 치열한 정보화 경쟁이 있을 것이다. 정보화 환경이 얼마나 저비용 고효율으로 잘 구축되었느냐, 그리고 정보화 인력을 얼마나 갖고 있느냐가 그러한 국제사회에서의 경쟁력을 좌우하게 될 것이다. 이러한 관점에서 리눅스의 활성화는 매우 중요하다. 본 활성화 방안이 성공적으로 수행되어 우리나라가 아시아의 리눅스 메카로 떠올라 새천년에 우리나라가 정보화 선진국에 진입하도록 정부에서는 최대의 노력을 기울일 방침이다.

  • PDF

The Design and Development of a WIPI Certification Toolkit (모바일 표준 플랫폼(WIPI) 검증 도구 설계 및 개발)

  • Lee, Sang-Yun;Lee, Hwan-Gu;Choi, Byung-Uk
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.731-740
    • /
    • 2006
  • WIPI is developed by KWISF(Korea Wireless Internet Standardization Forum) and a wireless internet standard platform adopted by TTA. It needs the certification Process for standard specification in order to confirm interoperability. The WIPI is composed of the HAL, the Runtime Engine, and APIs(WIPI-C, WIPI-Java). nl applications are implemented through WIPI APIs that can be finished by themselves or provided essential functions from runtime engine or HAL. Therefore it needs to certify where the problems occur when errors occurred in a application. In this paper we propose the PCT that certifies a WIPI platform's functionality and APIs and the HCT that certifies HAL APIs. Because the PCT reports the final certification results for the platform it is impossible to know where the problems occur when it fails to certify platform. So, it needs to certify the HAL regardless of platform certification.

A study on the enhanced filtering method of the deduplication for bulk harvest of web records (대규모 웹 기록물의 원격수집을 위한 콘텐츠 중복 필터링 개선 연구)

  • Lee, Yeon-Soo;Nam, Sung-un;Yoon, Dai-hyun
    • The Korean Journal of Archival Studies
    • /
    • no.35
    • /
    • pp.133-160
    • /
    • 2013
  • As the network and electronic devices have been developed rapidly, the influences the web exerts on our daily lives have been increasing. Information created on the web has been playing more and more essential role as the important records which reflect each era. So there is a strong demand to archive information on the web by a standardized method. One of the methods is the snapshot strategy, which is crawling the web contents periodically using automatic software. But there are two problems in this strategy. First, it can harvest the same and duplicate contents and it is also possible that meaningless and useless contents can be crawled due to complex IT skills implemented on the web. In this paper, we will categorize the problems which can emerge when crawling web contents using snapshot strategy and present the possible solutions to settle the problems through the technical aspects by crawling the web contents in the public institutions.

A Study on the Minimum Route Cost Routing Protocol for 6LoWPAN (6LoWPAN을 위한 최소경로비용 라우팅 프로토콜에 관한 연구)

  • Kim, Won-Geun;Kim, Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2010
  • It is recently issued scalability, mobility and external internet connection on Wire-less sensor network. The low power wireless sensor networks based on IPv6 technology 6LoWPAN technology is being standardized in the IETF. This paper for the 6LoWPAN environment based on the routing protocol LOAD, route cost applied the packet re-transmission rate which follows in Link Qualities price which uses at course expense and packet transmission Minimum route Cost routing protocol where does on the course wherethe smallest packet re-transmission becomes accomplished proposed. The technique which proposes compared and LOAD and AODV that about 13%, about 16% energy consumption is few respectively averagely, Energy of the entire network equally, used and energy effectiveness and improvement of network life time experiment led and confirmed.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

Interference Mitigation Receiver for Control Channel Region in LTE-A (LTE-A 제어 채널 영역에 대한 간섭 제어 수신기)

  • Hwnag, Jin-Yup;Jung, Man Young;Lee, Sang-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.903-910
    • /
    • 2016
  • This paper investigates an advanced receiver for interference mitigation of downlink control channel in the 3GPP Rel-13 standard. There are several features for downlink throughput performance improvement with inter-cell interference management such as network coordination and advanced receivers during Rel-10~Rel-12. These features can be operated always under the assumption that UE perfectly decodes control channels (PCFICH and PDCCH) of serving cell. However, the performance of control channels could be deteriorated in the cell edge region due to inter-cell interference. In this paper, we introduce the advanced receivers and analyze performance for control channel interference mitigation (CCIM) based on 3GPP Rel-13 standard. Additionally, we propose UE behavior depending on network condition.

The Stereo Camera Measurement of Point Cloud on 3D Object and the Calculation of Volume Based on Irregular Triangular Mesh (스테레오 카메라와 측정에 의한 3D 대상체 포인트 클라우드의 불규칙 삼각 매싱 기반 체적 계산)

  • Lee, Young-Dae;Cho, Sung-Youn;Kim, Kyung;Lee, Dong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.153-159
    • /
    • 2012
  • For the construction of safe and clear urban environment, it is necessary that we identify the rubbish waste volume and we know the accuracy volume. In this paper, we proposed the algorithm computes the waste volume periodically for the way of waste repository standard. After stereo camera calibration, we obtained the point cloud on the surface of the object and took this as the input of the calculation algorithm of the object volume. We proposed the volume calculation algorithms based on the non-uniform triangular meshing methods and verified the validity of the algorithm through simulation and real experiments. The proposed algorithm can be used not only as the volume calculation of the waste repository but also as the general volume calculation of a three dimensional object.

A Study on the Design of Network Management Architecture based on TMN Concept (TMN 개념을 응용한 통신망 관리구조 설계에 관한 연구)

  • 김영명;조영현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.170-182
    • /
    • 1994
  • With the evolution of telecommunications network, the operational enviroments of a morden telecommunication network are becoming more complex and diverse. Therefore. the design of NMA( Network Management Aechitecture) that pursues standardization and openness in order to accommodatae them actively will be required. In such a network environment which composes various and heterogeneous network elements, it is not easy to surpport efficiently TMN MSs(Management Services) because it has lack of interoperability among them. This paper proposes a top-down approach being taken to design a network management architecture with establishing the hierarchical relationships of management services based on ITU-TS(Telecommunication Standardization in Europe) TMN concept, and allocating MSC(Management Service Component) by TMN management layer, and analyzing the information flow between FAs(Functional Areas).

  • PDF