• Title/Summary/Keyword: Administrator

Search Result 576, Processing Time 0.027 seconds

A School Network Construction using the ESM System (ESM 시스템을 이용한 안정된 학내망 구축)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2005
  • Today, network is a fragile state in many threat attacks. Especially, the company serviced like internet or e-commerce is exposed to danger and targeted of attacker Therefore, it is realistic that the company use the security solution. It exist various security solution in our school network. For example, Firewall, IDS, VirusWall, VPN, etc. The administrator must manage various security solution. But it is inefficient. Therefore, we need the Management System to controll every security solution. In this paper, we deal with basic contents of security solution to manage the ESM and merits and demerits when use it. Also we suggest method that the Administrator can manage his network more efficiently and systematically by using the ESM in our school network.

  • PDF

Web Site Creation Method by Using Text2Image Technology (웹 기반 Text2Image 기술을 이용한 웹 사이트 제작 기법)

  • Ban, Tae-Hak;Kim, Kun-Sub;Min, Kyoung-Ju;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.227-229
    • /
    • 2011
  • To develop an effective web site, Ajax, jQuery and various techniques have been developed. Administrator interface to powerful, where the administrator can easily create a variety of functions from the menu, but this is not leaving the form of text or code, modify it and then when is low. To solve these problems, in this paper we are making conjunction with CSS which provide the database with open font and CSS features in variety of images, converted into text using the open font, these existing production methods with a Web site that provides a differentiated ways.

  • PDF

CCTV Monitoring System Development for Safety Management and Privacy in Manufacturing Site

  • Han, Ji Hee;Ok, Sang Hun;Song, Kyu;Jang, Dong Young
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.26 no.3
    • /
    • pp.272-277
    • /
    • 2017
  • CCTV image processing techniques have been developed for safety management in manufacturing sites. However, CCTV growth has become a social problem for video surveillance with regard to privacy. This study aims to manage the safety system efficiently and protect privacy simultaneously. In this study, the CCTV monitoring system is composed of five steps (accident monitoring, detection, notification, management, restoration). De-identified image is observed when we are in a normal situation. De-identified image changes to identified image when it detects an accident. As soon as it detects an accident, the accident information is sent to the safety administrator. Then the administrator could conduct safety measures. Afterward, accumulated accident data could be used for statistical data that could be utilized as analyzing expecting accident.

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

Remote Monitoring of Patients and Emergency Notification System for U-Healthcare

  • Lee, Jun;Jang, Hyun-Se;Yang, Tae-Kyu;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.1-5
    • /
    • 2013
  • This study proposes a remote monitoring of patients and emergency notification system with a camera and pulse wave sensor for U-Healthcare. The proposed system is a server client model based U-Healthcare system which consists of wireless clients that have micro-controller, embedded-board for patient status monitoring and a remote management server. The remote management server observes the change of pulse wave data individually in real-time sent from the clients that is to be remote-monitored based on the pulse wave data stored by users and divides them into caution section and emergency section. When the pulse wave data of a user enters an emergency situation, the administrator can make a decision based on the real-time image information and pulse rate variability. When the status of the monitored patient enters the emergency section, the proposed U-healthcare system notifies the administrator and relevant institutions. An experiment was conducted to demonstrate the pulse wave recognition of the proposed system.

A Study on Identification of Track Irregularity of High Speed Railway Track Using an SVM (SVM을 이용한 고속철도 궤도틀림 식별에 관한 연구)

  • Kim, Ki-Dong;Hwang, Soon-Hyun
    • Journal of Industrial Technology
    • /
    • v.33 no.A
    • /
    • pp.31-39
    • /
    • 2013
  • There are two methods to make a distinction of deterioration of high-speed railway track. One is that an administrator checks for each attribute value of track induction data represented in graph and determines whether maintenance is needed or not. The other is that an administrator checks for monthly trend of attribute value of the corresponding section and determines whether maintenance is needed or not. But these methods have a weak point that it takes longer times to make decisions as the amount of track induction data increases. As a field of artificial intelligence, the method that a computer makes a distinction of deterioration of high-speed railway track automatically is based on machine learning. Types of machine learning algorism are classified into four type: supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. This research uses supervised learning that analogizes a separating function form training data. The method suggested in this research uses SVM classifier which is a main type of supervised learning and shows higher efficiency binary classification problem. and it grasps the difference between two groups of data and makes a distinction of deterioration of high-speed railway track.

  • PDF

Design and Implementation of a Copyright Protection System base on the Program on-line Registration System (프로그램 온라인 등록 시스템기반의 저작권 보호시스템 설계 및 구현)

  • Jang Jae-Hyeok;Lee Jong-Sup;Choi Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.275-283
    • /
    • 2006
  • Writers enroll their outcome to Program Deliberation & Mediation Committee and get the copyright preserved for the protection of IPR. The program registration is conducted through off-line and on-line methods, and especially on-line registration provides program registrants convenience along with the safety of property from external copyright invaders. However, it is a shortcoming that the integrity and confidentiality of the enrolled program cannot be guaranteed in case of internal factors such as system errors, administrator's illegal access and revision. This paper proposes the reliable system, ensuring programs and offering convenience of Digital signature management from the system errors and intruding factors by internal administrator, using the security of confidentiality, integrity and Multi-Signature Scheme for program.

  • PDF

A Study on the Actual Conditions of Quality Standards Recognition of Rebar Workers (철근작업자의 품질기준 인지 실태 조사)

  • Lee, Byung-Yun;Choi, Oh-Young;Han, Byung-Min;Kim, Gwang-Hee
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.05b
    • /
    • pp.243-246
    • /
    • 2009
  • Importance of quality control is gradually increasing in the construction. And the reber work is very important things which influence in safety and durability of the building and accounts for about 9.8% of the total cost. Although reber work is important, quality control of the rebar work is still performed by attitude and experience of worker. Therefore, it is very important to quality achievement effort and quality standards recognition of rebar worker for quality sophistication in the construction. Some papers have dealt with the quality control in construction. But there was no study for actual conditions of quality standards recognition of rebar workers. The purpose of this study is to survey the actual conditions of quality standards recognition of rebar workers and to analyze difference of consciousness of administrator and worker. The result are : there id difference of consciousness of worker and administrator, workers work without knowing quality standard.

  • PDF

A Study of Password Management Methods for System in Access Control (시스템 접근통제를 위한 패스워드 관리 방안에 대한 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.303-306
    • /
    • 2011
  • System solutions for access control to the user's personal when you want to authenticate to the system is used. The valid user is really just a part of authorized users, the suitability of a valid user has been authenticated are not sure whether the problem is the fact. For example, one developer in the Unix operating system can be valid, but do not have permission to access the system should be limited for. In this paper, a single account for multiple users to use the system operational issues to improve the fine-grained delegation of authority, the session audit, the administrator account's policy-based management, with full rights the administrator account of distribution management and auditing the system overall is the study of access control measures.

  • PDF

A Study on Post Proposal Evaluation of Master Plan in Hospital Architecture (병원건축 마스터플랜의 제안 후 평가에 관한 연구)

  • Park, Cheolkyun;Yang, Naewon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.23 no.4
    • /
    • pp.85-92
    • /
    • 2017
  • Purpose: In recent years, since 2000 many hospitals have established a master plan. However, there are some hospitals proceeding in different way from the master plan while the process of execution plan. This is because the study of master plan has been incomplete yet and there is no feedback on the master plan. Therefore, the purpose of this study is to find the reasons why differences are occurred. Methods: Comparison analysis of five hospitals which have established master plans and constructed with execution plans and Questionnaire to an architect of execution plan have been conducted. Results: This study has found three points. The first one is the change in scope of business and the change of administrator. The second one is that administrator and staff of hospital have more demands for improvement in functional area rather than public area, like lobby. The last one is to check a possibility of the solution by architectural analysis. Implications: It is necessary to determine the cause of changes from master plan and execution plan, in order to reduce the change in advance.