• Title/Summary/Keyword: Access System

Search Result 6,584, Processing Time 0.025 seconds

Pipelined Parallel Processing System for Image Processing (영상처리를 위한 Pipelined 병렬처리 시스템)

  • Lee, Hyung;Kim, Jong-Bae;Choi, Sung-Hyk;Park, Jong-Won
    • Journal of IKEEE
    • /
    • v.4 no.2 s.7
    • /
    • pp.212-224
    • /
    • 2000
  • In this paper, a parallel processing system is proposed for improving the processing speed of image related applications. The proposed parallel processing system is fully synchronous SIMD computer with pipelined architecture and consists of processing elements and a multi-access memory system. The multi-access memory system is made up of memory modules and a memory controller, which consists of memory module selection module, data routing module, and address calculating and routing module, to perform parallel memory accesses with the variety of types: block, horizontal, and vertical access way. Morphological filter had been applied to verify the parallel processing system and resulted in faithful processing speed.

  • PDF

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

Development of a Prototype for Access Control in ICT Monitoring System Using Plasma (플라즈마를 이용한 ICT 모니터링 축사 출입관리 시제품 개발)

  • Kim, Jin-Ha;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1221-1226
    • /
    • 2019
  • The importance of livestock production of agriculture in Korea is very large. Investments in sanitation facilities and environmental factors such as animal health and odor have been relatively crude, and over the past few years animal disease has emerged as the leading cause of domestic livestock farmers' income stability. There is a need for an access control system that can be purchased and installed by small and medium-sized farmers who are suffering from pollutants and small farmers who can not afford to install costly sterilization on an economical basis. In this paper, based on the plasma access control system proposed previously, we developed an ICT surveillance access control prototype system that can ensure safety and security through access control and integrated control system that introduces a sterilization system using plasma required by farmers affected by pollutants.

Wireless Access Technologies for Smart Highway: Requirements and Preliminary Results (스마트하이웨이 무선전송기술: 요구사항 및 기본시험결과)

  • Cho, Woong;Oh, Hyun-Seo;Park, Byoung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.237-244
    • /
    • 2011
  • Vehicular communications extend their application areas by combining communication technologies with roads/vehicles, and one of major applications is Smart Highway project. Smart Highway is a new advanced highway system which enhances the current highway system in Korea by improving reliability, safety and convenience. In this paper, we introduce wireless access technologies for vehicular communications especially focusing on Smart Highway. We first introduce the overall communication system architecture and the basic service and communication requirements for Smart Highway. Then, we discuss wireless access technologies including L2-level hand-over scheme. In addition, the results of experimental measurements of Wireless Access in Vehicular Environments (WAVE) system are introduced.

Space Efficiency Improvement for Open Access Library -Focused on Book-storage Space of Academic Libraries in Province Area- (개가식 도서관의 공간효율 제고 방안 -지역 대학도서관 서고 공간을 중심으로-)

  • Ahn, Joon Suk
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.17 no.4
    • /
    • pp.67-74
    • /
    • 2015
  • Due to an inability to accommodate for the rapidly increasing number of printed materials, Korean academic libraries are facing serious space shortage problems. Very few academic institutions have the funds to expand existing libraries or construct new facilities in order to accommodate the influx of printed materials. Despite not having the luxury to create new space, many establishments continue to implement the open access system. Seeing that such a system is only user friendly when used in a spacious facility, the maintenance of the open access system is unreasonable. Only few libraries consider the space efficient closed access system which helps to resolve storage space shortage. In the current state of the problem, improving the efficiency to which books are stored in existing storage areas within a library facility is the only appropriate solution. Enacting methods to improve physical space utilization within a fixed volume library facility will undoubtedly diminish the space shortage issue at hand. In this article, several space efficiency improvement approaches are discussed. Methods of book storage plan re-layout (floor, plan, ceiling, height, bookshelf design), book arrangement possibilities, and the reduction of the physical volume of reserved materials are each examined.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

Research on the Application of Load Balancing in Educational Administration System

  • Junrui Han;Yongfei Ye
    • Journal of Information Processing Systems
    • /
    • v.19 no.5
    • /
    • pp.702-712
    • /
    • 2023
  • Load balancing plays a crucial role in ensuring the stable operation of information management systems during periods of high user access requests; therefore, load balancing approaches should be reasonably selected. Moreover, appropriate load balancing techniques could also result in an appropriate allocation of system resources, improved system service, and economic benefits. Nginx is one of the most widely used loadbalancing software packages, and its deployment is representative of load-balancing application research. This study introduces Nginx into an educational administration system, builds a server cluster, and compares and sets the optimal cluster working strategy based on the characteristics of the system, Furthermore, it increases the stability of the system when user access is highly concurrent and uses the Nginx reverse proxy service function to improve the cluster's ability to resist illegal attacks. Finally, through concurrent access verification, the system cluster construction becomes stable and reliable, which significantly improves the performance of the information system service. This research could inform the selection and application of load-balancing software in information system services.

A System Architecture Design for Web-Based Application Systems using Role-Based Access Control (직무기반 접근제어를 사용하는 웹기반 응용 시스템의 시스템 아키텍처 설계)

  • Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.217-225
    • /
    • 2010
  • Among web-based systems being widely used now, there are so many systems which are still using an user-level access control method. By successfully applying role-based access control(RBAC) to web-based application systems, we can expect to have an effective means with reinforced security for Internet-based systems. In order to apply RBAC to web-based application systems, we should come up with a system architecture for it. I proposed a system architecture which is needed to apply RBAC to web-based application systems. The proposed system architecture is largely composed of system composition and system functioning. For details, firstly, a certificate used by RBAC is specified. Secondly, a system architecture using a user-pull method is proposed and overall system components are mentioned with a role server being centered. Then, I showed how the system architecture can work to carry out RBAC on web-based application systems. Lastly, the analyses on the proposed system architecture are described for the purpose of proving its feasibility.

Mobile Communication Network to Access Technologies Utilizing Unlicensed Spectrum Interworking (이동 통신 망과 Unlicensed Spectrum 을 사 용하는 Access 기술과의 연동 방법)

  • Shim, Dong-Hee;Son, Sung-Mu;Kim, Ki-Yeol
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.354-358
    • /
    • 2007
  • This article presents several methods of mobile communication network to access technologies utilizing unlicensed spectrum interworking. Generic Access Network (GAN) technology was already specified in GERAN (GSM EDGE Radio Access Network) and Interworking WLAN (I-WLAN) was standardized for WCDMA system for WLAN user to access WCDMA packet based services through WLAN access point. Voice Call Continuity is not access network dependent technology but is a kind of domain change scheme for voice call from Circuit Switching (CS) network to IP Multimedia Subsystem (IMS) and vice versa.

  • PDF