• Title/Summary/Keyword: Access Control Software

Search Result 222, Processing Time 0.032 seconds

Mobile Software Agents for Information Retrieval in WWW-Databases

  • Baek, Seong-Min;Chung, Jae-Yong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.75.6-75
    • /
    • 2002
  • Current database technique offers the possibility to store giant amounts of data, worldwide networks provide the technical base for everybody to access it. However, it is usually very time-consuming or even impossible to find the most relevant information. This article describes the usage of mobile soft-ware agents to query different databases on the Internet, to rate and compress the results and to present them to the user in a consistent form, It contains a general definition of soft-ware agents, a detailed description of the approach and a discussion of its main advantages and weaknesses.

  • PDF

A study on the implementation of LLC and MAC (LLC와 MAC의 구현에 관한 연구)

  • 권욱현;안상철;박정우;강중용
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.618-622
    • /
    • 1990
  • In this study LLC and MAC program, which is the base of the communication software, is implemented. This program is tested in the MAP board for IBM PC. The LLC is of class 3, which provides the services of type 1 and 3. The MAC uses the Token Passing Bus Access Method of IEEE 802.4 standard. The LLC is implemented in C language, and MAC in C language and 80186 assembly language. MAC program takes advantage of MC 68824 which is the token bus controller produced by Motorola.

  • PDF

The design of Remote Control system based on web using the embedded-linux and SMS information transmission system (내장형 리눅스를 이용한 웹 기반 원격 제어 및 SMS 정보 전달 시스템 설계)

  • Jeong, Il-Kwon;Kim, Hee-Sun;Lee, Chang-Goo
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.454-456
    • /
    • 2002
  • Embedded system is used a lot in electric home appliances and home network equipment. However, this system is designed to operate by the system operator directly at home and operator could find out them only when he pays attention to the system in case event happens. In this paper, to improve above things, it designed to remote-control system anywhere in which internet access is possible as well as at home, and also it designed SMS(short message service) information transmission system to inform the errors to the operator when they happen. To design the system, development board(be included the Strong Arm), CDMA module, and electric door lock are used as hardware, and web browser, CGI(common gateway interface) programming, and C-language are used for implementation of software in embedded-linux platform.

  • PDF

Game-Theoretic Optimization of Common Control Channel Establishment for Spectrum Efficiency in Cognitive Small Cell Network

  • Jiao Yan
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.1-11
    • /
    • 2024
  • Cognitive small cell networks, consisting of macro-cells and small cells, are foreseen as a promising candidate solution to address 5G spectrum scarcity. Recently, many technological issues (such as spectrum sensing, spectrum sharing) related to cognitive small cell networks have been studied, but the common control channel (CCC) establishment problem has been ignored. CCC is an indispensable medium for control message exchange that could have a huge significant on transmitter-receiver handshake, channel access negotiation, topology change, and routing information updates, etc. Therefore, establishing CCC in cognitive small cell networks is a challenging problem. In this paper, we propose a potential game theory-based approach for CCC establishment in cognitive radio networks. We design a utility function and demonstrate that it is an exact potential game with a pure Nash equilibrium. To maintain the common control channel list (CCL), we develop a CCC update algorithm. The simulation results demonstrate that the proposed approach has good convergence. On the other hand, it exhibits good delay and overhead of all networks.

Access to and Utilization of the Open Source Data-related to Adolescent Health (청소년 건강관련 공개자료 접근 및 활용에 관한 고찰)

  • Lee, Jae-Eun;Sung, Jung-Hye;Lee, Won-Jae;Moon, In-Ok
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.11 no.1
    • /
    • pp.67-78
    • /
    • 2010
  • Background & Objectives: Current trend is that funding agencies require investigators to share their data with others. However, there is limited guidance how to access and utilize the shared data. We sought to determine what common data sharing practices in U.S.A. are, what data-related to adolescent health are freely available, and how we deal with the large dataset adopting the complex study design. Methods: The study included only research data-related to adolescent health which was collected in USA and unlimitedly accessible through the internet. Only the raw data, not aggregated, was considered for the study. Major keywords for web search were "adolescent", "children", "health", and "school". Results: Current approaches for public health data sharing lacked of common standards and varied largely due to the data's complex nature, large size, local expertise and internal procedures. Some common data sharing practices are unlimited access, formal screened access, restricted access, and informal exclusive access. The Inter-University Consortium for Political and Social Research and the Center for Disease Control and Prevention were the best data depository. "Data on the net" was search engine for the website providing data freely available. Six datasets related to adolescent health freely available were identified. The importance and methods of incorporating complex research design into analysis was discussed. Conclusion: There have been various attempts to standardize process for open access and open data using the information technology concept. However, it may not be easy for researchers to adapt themselves to this high technology. Therefore, guidance provided by this study may help researchers enhance the accessibility to and the utilization of the open source data.

  • PDF

The Mouse & Keyboard Control Application based on Smart Phone (스마트 폰 기반의 마우스와 키보드 제어 어플리케이션)

  • Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.396-403
    • /
    • 2017
  • In recent years, the use of touch screens has expanded, and devices such as remote controllers have been developed in various ways to control and access contents at long range. The wireless-based touch screen is used in classroom, seminar room, and remote video conversation in addition to the TV remote control. The purpose of the study is to design a smart phone-based intuitive interface that can perform the role of a wireless mouse and a wireless keyboard at range using Bluetooth and to develop an application that integrates functions of a mouse and a keyboard. Firstly, touch interaction model for controlling software such as PowerPoint by connecting to a general PC on a smart phone has been studied. The most simple touch operation interface is used to reproduce the function of existing devices and design more simply. The studies of the extension of interfaces with various functions are important, but development of optimized interfaces for users will become more important in the future. In this sense, this study is valuable.

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

Development of a Frame Buffer Driver for Embedded Linux Graphic System

  • Kim, Ga-Gue;Kang, Woo-Chul;Jung, Young-Jun;Lee, Hyung-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2116-2120
    • /
    • 2003
  • A frame buffer device is an abstraction for the graphic hardware. It allows application software to access the graphic hardware through a well-defined interface, so that the software doesn’t need to know anything about the low-level interface stuff. We develop a frame buffer driver for VIA’s CLE266 graphic system based on ‘Qplus’, an embedded linux operating system developed by ETRI. Then, it will be seen that our frame buffer system is applied to embedded solutions such as movie player and X server successfully.

  • PDF

Emulator for Generating Heterogeneous Interference Signals in the Korean RFID/USN Frequency Band

  • Lee, Sangjoon;Yoon, Hyungoo;Baik, Kyung-Jin;Jang, Byung-Jun
    • Journal of electromagnetic engineering and science
    • /
    • v.18 no.4
    • /
    • pp.254-260
    • /
    • 2018
  • In this study, we suggest an emulator for generating multiple heterogeneous interference signals in the Korean radio frequency identification/ubiquitous sensor network (RFID/USN) frequency band. The proposed emulator uses only one universal software radio peripheral to generate multiple heterogeneous interference signals more economically. Moreover, the physical and media access control parameters can be adjusted in real time using the LabVIEW program, thereby making it possible to create various time-varying interference environments easily. As an example showing the capability of the proposed emulator, multiple interference signals consisting of a frequency-hopping RFID signal and two LoRa signals with different spreading factors were generated. The generated signals were confirmed in both frequency and time domains. From the experimental results, we verified that our emulator could successfully generate multiple heterogeneous interference signals with different frequency and time domain characteristics.