• Title/Summary/Keyword: Access System

Search Result 6,584, Processing Time 0.038 seconds

Tele-test Systems for ASIC Design (ASIC 설계를 위한 원격 테스트 시스템)

  • 윤도현;강성호
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.939-942
    • /
    • 1999
  • In this paper, Tele-Test System for ASIC Design is constructed. It consists of the server, and the clients. The server and clients are implemented by Java. Using Java RMI system, the remote access via information network is implemented. In this Tele-test system, fault simulation, test pattern compaction, test pattern generation, and path-delay fault test generation services are implemented. All service can be peformed parallel by network access.

  • PDF

Development of Parts Management System Using Intranet (인트라넷을 이용한 부품관리 시스템 개발)

  • 김정률;박정선;김선호
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.1
    • /
    • pp.81-94
    • /
    • 1998
  • In Client/Server environments, an employee should be able to access only applications which were assigned to him/her. That makes it difficult to share information among employees. The development of intranet system made it possible to share more information and to access broader information. In this paper, we present a parts management system developed by using Intrabuilder which is an intranet development tool. We intend to suggest a prototype which can guide the development of more delicate and complete parts management systems in the future.

  • PDF

A Design of Web based GEM Using Single Object Access Protocol

  • Kang W. Joon;Park, H. Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.57.5-57
    • /
    • 2001
  • This paper presents an enhanced web-based distributed system with Single Access Object Protocol(SOAP), which uses HTTP as a communication protocol and XML as a data presentation. The suggested system is applied into a Generic Equipment Model (GEM) for exchanging specified messages(SECS-II), which are encoded into XML presentation, between Equipment and Host via the web sorrel. In this paper, the designed system architecture and its soap components are presented.

  • PDF

Conditional Access System with A Group Hierarchy to Improve Broadcasting Channel Efficiency (방송 채널 효율 향상을 위한 그룹 계층 구성 기반 접근 제어 시스템)

  • Yang, Jang-Hoon;Kim, Dong-Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.726-735
    • /
    • 2009
  • In this paper, we proposed a novel conditional access system to reduce the overhead transmission rate for messages which verify the entitlement of subscribers in bandwidth-limited system. We adapted a key update system with the tree structure which had been used for IP multicast to a group hierarchy for the subscriber groups or channel groups. We also analyzed the overhead transmission rate for periodic key update and aperiodic one for change in a subscriber. The numerical evaluations show that the proposed system can significantly reduce the overhead transmission rate for dynamic subscriber change up to several hundred thousands times for various system configuration.

  • PDF

A Virtual File System for IoT Service Platform Based on Linux FUSE (IoT 서비스 플랫폼을 위한 리눅스 FUSE 기반 가상 파일 시스템)

  • Lee, Hyung-Bong;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.139-150
    • /
    • 2015
  • The major components of IoT(Internet of Things) environment are IoT devices rather than the conventional desktop computers. One of the intrinsic characteristics of IoT devices is diversity in view of data type and data access method. In addition, IoT devices usually deal with real-time data. In order to use such IoT data for internal business or cloud services, an IoT platform capable of easy domain management and consistent data access interface is required. This paper proposes a Linux FUSE-based virtual file system connecting IoT devices on POSIX file system view. It is possible to manage IoT domain with the native Linux utilities such as mkdir, mknod, ls and find in the file system. Also, the file system makes it possible to access or control IoT devices through POSIX interface such as open(), read(), write() or close() without any separate APIs or utilities. A test result shows that the management performance of the file system is lower than that of linux file system negligibly.

Implementation of Remote Physical Security Systems Using Smart Phone (스마트폰을 이용한 원격 물리적 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.217-224
    • /
    • 2011
  • Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.

Safety of a Totally Implantable Central Venous Port System with Percutaneous Subclavian Vein Access

  • Keum, Dong-Yoon;Kim, Jae-Bum;Chae, Min-Cheol
    • Journal of Chest Surgery
    • /
    • v.46 no.3
    • /
    • pp.202-207
    • /
    • 2013
  • Background: The role of totally implantable central venous port (TICVP) system is increasing. Implantation performed by radiologist with ultrasound-guided access of vein and fluoroscope-guided positioning of catheter is widely accepted nowadays. In this article, we summarized our experience of TICVP system by surgeon and present the success and complication rate of this surgical method. Materials and Methods: Between March 2009 and December 2010, 245 ports were implanted in 242 patients by surgeon. These procedures were performed with one small skin incision and subcutaneous puncture of subclavian vein. Patient's profiles, indications of port system, early and delayed complications, and implanted period were evaluated. Results: There were 82 men and 160 women with mean age of 55.74. Port system was implanted on right chest in 203, and left chest in 42 patients. There was no intraoperative complication. Early complications occurred in 11 patients (4.49%) including malposition of catheter tip in 6, malfunction of catheter in 3, and port site infection in 2. Late complication occurred in 12 patients (4.90%). Conclusion: Surgical insertion of TICVP system with percutaneous subclavian venous access is safe procedures with lower complications. Careful insertion of system and skilled management would decrease complication incidence.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.

Design and Implementation of SDR-based Digital Filter Technique for Multi-Channel Systems (다중채널 시스템을 위한 SDR 기술기반의 디지털 필터 기법 설계 및 구현)

  • Yu, Bong-Guk;Bang, Young-Jo;Ra, Sung-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.494-499
    • /
    • 2008
  • In this study, a Software Defined Radio(SDR) technology-based digital filtering technique applicable to a multiple channel processing system such as a wireless mobile communication system using Code Division Multiple Access(CDMA) technology is proposed. The technique includes a micro-processor to redesign Finite Impulse Response(FIR) filter coefficients according to specific system information and to download the filter coefficients to one digital Band Pass Filter(BPF) to reconfigure another system. The feasibility of the algorithm is verified by implementing a multiple channel signal generator that is reconfigurable to other system profiles, including those for a CDMA system and a WCDMA system on identical hardware platform.

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.