• Title/Summary/Keyword: Access Control Software

Search Result 221, Processing Time 0.045 seconds

Intelligent Surveillance System using Kinect sensor and Multirotor (키넥트 및 멀티로터를 이용한 지능형 감시 시스템)

  • Oh, Jung-hak;Yu, Do-jun;Goo, Ha-neul;Kim, Ho-sung;Kim, Seong-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.541-544
    • /
    • 2012
  • In technology advances, The field of military and security surveillance system for a wide range of interest is required. Surveillance system offers a variety of services by the software that work with a remote access server. This paper shows the results of the implementation using three platforms as Mjpg-streamer for server, Arduino-multiwii for control system, OpenNI and OpenCV for image processing.

  • PDF

A Study of Development for High-speed Cloud Video Service using SDN based Multi Radio Access Technology Control Methods (초고속 클라우드 비디오 서비스 실현을 위한 SDN 기반의 다중 무선접속 기술 제어에 관한 연구)

  • Kim, Dongha;Lee, Sungwon
    • Journal of Broadcast Engineering
    • /
    • v.19 no.1
    • /
    • pp.14-23
    • /
    • 2014
  • This paper proposed controlling methods for SDN(Software Defined Network) based multiple radio access technology as the solutions of following two issues which were mainly occurred by explosive increasing of video traffic. The first one is a requirement for traffic off-loading caused by 3rd-party video service providers from the mobile network operator's viewpoint. The other one is a provision of high-speed video contents transmission services with low price. Furthermore, the performance evaluation was also conducted on the real test-bed which is composed of OpenStack cloud and SDN technology such as OpenFlow and Open vSwitch. A virtual machine running on the OpenStack provide a video service and the terminal which is able to use multiple radio access technology supports two 2.4GHz WLANs(Wireless Local Area Network) and three 5GHz WLANs, concurrently. Finally, we can get 820Mbps of the maximum transmission speed by using that five WLAN links for the single service at the same time.

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

Web based control modules Using LonWorks/Ethernet Server for Control a large Scale Renewable Energy System in Building (빌딩용 신.재생에너지시스템 제어를 위한 LonWorks기반 원격 제어모듈 개발)

  • Hong, Wonl-Pyo
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1706-1711
    • /
    • 2008
  • This paper proposes a new Web based-control concept & design method and implementation of LonWorks network system for a large scale renewable energy energy control and monitoring system in building. The Experimental LonWorks network system using LonWorks/Ethernet(Web) server is designed and fabricated. This article addresses issues in architecture of LonWorks/Ethernet sever, embedded processors architecture for converting LonTalks protocol to Modbus protocol and software, and Internet technologies. It is also verified that the multi-induction motor control and monitoring system using LonWorks/Ethernet server have available, interoperable, reliable performance characteristics from the experimental results, Especially, The seamless integration of TCP/IP networks with control networks allows access to any control point from anywhere. Thus, the results provide a available technical data for remote distributed control system of industrial and buildings field.

  • PDF

Design of Multi-protocol IED for Networked Control System of Multi-Induction Motor in Industrial Fields

  • Hong, Won-Pyo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.10
    • /
    • pp.60-71
    • /
    • 2012
  • This paper proposes a new design and implementation of multi-protocol IED for networked control system of multi-induction motor in industrial fields. The experimental multi-induction motor based multi-protocol IED of Modbus/LonTalks/TCP/IP module is designed and fabricated. This article addresses issues in architecture of LonWorks/Ethernet sever, embedded processors architecture for converting Modbus protocol to LonTalks protocol, integrating preconfigured software, and Internet technologies. It is also verified that the multi-induction motor control and monitoring system using LonWorks/Ethernet server have available, interoperable, reliable performance characteristics from the experimental results, especially, the seamless integration of TCP/IP networks with control networks allows access to any control point from anywhere. Thus, the results provide available technical data for remote distributed motor control system of industrial field or building microgrid with LonWorks BAS.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

Analysis of Response Characteristics of the CAN-Based Feedback Control System Considering the Network Delay Time

  • Jeon, Jong-Man;Kim, Dae-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.119.3-119
    • /
    • 2001
  • When building a network-based real-time control system, a network-induced delay time should be surly considered for real time schedulability to be guaranteed. The network delay time on end-to-end communication has been analyzed theoretically and modeled mathematically from many previous works. There also exist any other delay element not considered before. In this paper, the remote feedback control system using the CAN protocol is proposed to control three axes´ manipulator arm and the application layer of CAN is modeled to analyze the delay elements defined by three types of time delay: Software delay time, Controller delay time, and Access delay time, in details. The analyzed results are used as an important component to determine PID gains of the proposed system. The effect of the delay time on the control performance is evaluated by com paring the response characteristics of the control system through simulation.

  • PDF

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Design of a Bridge Transported ServoManipulator System for a Radioactive Environment

  • Park, B.S.;Jin, J.H.;Ahn, S.H.;Song, T.G.;Kim, D.G.;Yoon, J.S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2514-2518
    • /
    • 2003
  • The KAERI Spent Fuel Remote Technology Development (SFRTD) Department is developing the remote maintenance and repair equipment, which is used in a hot cell in an intense radiation field, as part of a project to develop the Advanced spent fuel Conditioning Process (ACP). Although several mechanical master-slave manipulators (MSMs) is mounted on the hot cell wall, their reach will be limited and cannot access areas for all the ACP equipment maintenance. A Bridge Transported ServoManipulator (BTSM) has been designed to overcome the limitation of access areas that is a drawback of MSMs for the ACP equipment maintenance. The BTSM system consists of four components: a transporter with telescoping tubeset, a slave manipulator, a master manipulator, and a remote control system. The BTSM system has been designed by Solid Edge that is a 3D computer-aided design (CAD) software, except for the remote control system. The master manipulator and the slave manipulator are kinematically similar in design, except for the handle and the tong, respectively. The manipulators have 6 degrees of freedom (DOF) plus the jaws motion. The transporter has traveling, traverse, and hoisting motion to position the slave manipulator.

  • PDF