• Title/Summary/Keyword: Access to Information (A2I)

Search Result 195, Processing Time 0.026 seconds

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

An Optimization Tool for Determining Processor Affinity of Networking Processes (통신 프로세스의 프로세서 친화도 결정을 위한 최적화 도구)

  • Cho, Joong-Yeon;Jin, Hyun-Wook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.131-136
    • /
    • 2013
  • Multi-core processors can improve parallelism of application processes and thus can enhance the system throughput. Researchers have recently revealed that the processor affinity is an important factor to determine network I/O performance due to architectural characteristics of multi-core processors; thus, many researchers are trying to suggest a scheme to decide an optimal processor affinity. Existing schemes to dynamically decide the processor affinity are able to transparently adapt for system changes, such as modifications of application and upgrades of hardware, but these have limited access to characteristics of application behavior and run-time information that can be collected heuristically. Thus, these can provide only sub-optimal processor affinity. In this paper, we define meaningful system variables for determining optimal processor affinity and suggest a tool to gather such information. We show that the implemented tool can overcome limitations of existing schemes and can improve network bandwidth.

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

An optimal security management framework for backhaul-aware 5G- Vehicle to Everything (V2X)

  • Vishal Sharma;Jiyoon Kim;Yongho Ko;Ilsun You;Jung Taek Seo
    • Journal of Internet Technology
    • /
    • v.21 no.1
    • /
    • pp.249-264
    • /
    • 2020
  • Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.

Design intelligent web-agent system using learning method (학습 방법을 이용한 지능형 웹 에이전트 시스템 설계)

  • 이말례;남태우
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.2
    • /
    • pp.285-301
    • /
    • 1997
  • Massive amount ofinformation is provided for the internet users. Therfore, the users are exposed even to the useless information. In this paper, a Intelligent Web-Agent system is present as a solution for this kind if users inconvinience. This Intelligent Web-Agent system i devised users to search by the keyword about which they get information and commend the sites which have more intensive relation with the examine keyword, judge by the users and the case-base constructed by the Intelligent Web-Agent system itself previously, so the users can access the essential web sites in short time. Intelligent Web-Agent system is compose of a interface-system and a learning system. According to the experiment, using the Intelligent Web-Agent System quicker than the case when not using the Intelligent Web-Agent System.

  • PDF

Development of a Control System for Automated Line Heating Process by an Object-Oriented Approach

  • Shin, Jong-Gye;Ryu, Cheol-Ho;Choe, Sung-Won
    • Journal of Ship and Ocean Technology
    • /
    • v.6 no.4
    • /
    • pp.1-12
    • /
    • 2002
  • A control system for an automated line heating process is developed by use of object-oriented methodology. The main function of the control system is to provide real-time heating information to technicians or automated machines. The information includes heating location, torch speed, heating order, and others. The system development is achieved by following the five steps in the object-oriented procedure. First, requirements are specified and corresponding objects are determined. Then, the analysis, design, and implementation of the proposed system are sequentially carried out. The system consists of six subsystems, or modules. These are (1) the inference module with an artificial neural network algorithm, (2) the analysis module with the Finite Element Method and kinematics analysis, (3) the data access module to store and retrieve the forming information, (4) the communication module, (5) the display module, and (6) the measurement module. The system is useful, irrespective of the heating sources, i.e. flame/gas, laser, or high frequency induction heating. A newly developed automated line heating machine is connected to the proposed system. Experiments and discussions follow.

A study on an Improved Model for Requirements Traceability (요구사항 추적모델 개선 연구 -공공부문 정보시스템 구축 사례를 중심으로-)

  • Kim, Chan-Hoe;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.247-254
    • /
    • 2012
  • The management of user requirements for information system development is a key element. The traceability has been studied in a specific method as using a traceability table or SOA related to the requirement management. But there are few case about proposing a objective and quantified evaluation method and judgement criterion for none-technical business managers. This researcher has proposed, easy to access by unprofessional and objective and qualifiable, evaluation methods and criteria of Judging for adequacy of requirements reflection in the development process of information system for the government office through a previous case study. In this study, I will give consideration to study the limitations of previous studies and improve the evaluation formula for measuring the reflection of the requirements and derive, reviewed to provide a variety of criteria for each business, through business case analysis.

An Efficient Snapshot Technique for Shared Storage Systems supporting Large Capacity (대용량 공유 스토리지 시스템을 위한 효율적인 스냅샷 기법)

  • 김영호;강동재;박유현;김창수;김명준
    • Journal of KIISE:Databases
    • /
    • v.31 no.2
    • /
    • pp.108-121
    • /
    • 2004
  • In this paper, we propose an enhanced snapshot technique that solves performance degradation when snapshot is initiated for the storage cluster system. However, traditional snapshot technique has some limits adapted to large amount storage shared by multi-hosts in the following aspects. As volume size grows, (1) it deteriorates crucially the performance of write operations due to additional disk access to verify COW is performed. (2) Also it increases excessively the blocking time of write operation performed during the snapshot creation time. (3)Finally, it deteriorates the performance of write operations due to additional disk I/O for mapping block caused by the verification of COW. In this paper, we propose an efficient snapshot technique for large amount storage shared by multi-hosts in SAN Environments. We eliminate the blocking time of write operation caused by freezing while a snapshot creation is performing. Also to improve the performance of write operation when snapshot is taken, we introduce First Allocation Bit(FAB) and Snapshot Status Bit(SSB). It improves performance of write operation by reducing an additional disk access to volume disk for getting snapshot mapping block. We design and implement an efficient snapshot technique, while the snapshot deletion time, improve performance by deallocation of COW data block using SSB of original mapping entry without snapshot mapping entry obtained mapping block read from the shared disk.

Development of an Agricultural Data Middleware to Integrate Multiple Sensor Networks for an Farm Environment Monitoring System

  • Kim, Joonyong;Lee, Chungu;Kwon, Tae-Hyung;Park, Geonhwan;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.38 no.1
    • /
    • pp.25-32
    • /
    • 2013
  • Purpose: The objective of this study is to develop a data middleware for u-IT convergence in agricultural environment monitoring, which can support non-standard data interfaces and solve the compatibility problems of heterogenous sensor networks. Methods: Six factors with three different interfaces were chosen as target data among the environmental monitoring factors for crop cultivation. PostgresSQL and PostGIS were used for database and the data middleware was implemented by Python programming language. Based on hierarchical model design and key-value type table design, the data middleware was developed. For evaluation, 2,000 records of each data access interface were prepared. Results: Their execution times of File I/O interface, SQL interface and HTTP interface were 0.00951 s/record, 0.01967 s/record and 0.0401 s/record respectively. And there was no data loss. Conclusions: The data middleware integrated three heterogenous sensor networks with different data access interfaces.

A New Framework of 6lowpan node for Neighboring Communication with Healthcare Monitoring Applications

  • Singh, Dhananjay;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.281-286
    • /
    • 2009
  • The proposed technique uses cyclic frame structure, where three periods such as beacon period (BP), mesh contention access period (MCAP) and slotted period (SP) are in a data frame. This paper studies on a mechanism to allow communication nodes (6lowpan) in a PAN with different logical channel for global healthcare applications monitoring technology. The proposed super framework structure system has installed 6lowpan sensor nodes to communicate with each other. The basic idea is to time share logical channels to perform 6lowpan sensor node. The concept of 6lowpan sensor node and various biomedical sensors fixed on the patient BAN (Body Area Network) for monitoring health condition. In PAN (hospital area), has fixed gateways that received biomedical data from 6lowpan (patient). Each 6lowpan sensor node (patient) has IP-addresses that would be directly connected to the internet. With the help of IP-address service provider can recognize or analyze patient data from all over the globe by the internet service provider, with specific equipments i.e. cell phone, PDA, note book. The NS-2.33 result shows the performance of data transmission delay and data delivery ratio in the case of hop count in a PAN (Personal Area Networks).

  • PDF