• 제목/요약/키워드: Application Access Control

검색결과 404건 처리시간 0.024초

An Adaptive FEC Mechanism Using Crosslayer Approach to Enhance Quality of Video Transmission over 802.11 WLANs

  • Han, Long-Zhe;Park, Sung-Jun;Kang, Seung-Seok;In, Hoh-Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권3호
    • /
    • pp.341-357
    • /
    • 2010
  • Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantly compromised, however, due to the characteristics of the wireless channel such as burst packet loss, channel fluctuation and lack of Quality of Service (QoS) support. We propose herein an Adaptive Cross-layer FEC mechanism (ACFEC) to enhance the quality of video streaming over 802.11 WLANs. Under the conventional approaches, FEC functions are implemented on the application layer, and required feedback information to calculate redundancy rates. Our proposed ACFEC mechanism, however, leverages the functionalities of different network layers. The Automatic Repeat reQuest (ARQ) function on the Media Access Control (MAC) layer can detect packet losses. Through cooperation with the User Datagram Protocol (UDP), the redundancy rates are adaptively controlled based on the packet loss information. The experiment results demonstrate that the ACFEC mechanism is able to adaptively adjust and control the redundancy rates and, thereby, to overcome both of temporary and persistent channel fluctuations. Consequently, the proposed mechanism, under various network conditions, performs better in recovery than the conventional methods, while generating a much less volume of redundant traffic.

정사영상을 이용한 비접근지역의 위치결정 가능성 평가 (Assessment of Possibility for Unaccessible Areas Positioning Using Ortho Imagery)

  • 강준묵;이용웅;조현욱
    • 한국측량학회:학술대회논문집
    • /
    • 한국측량학회 2006년도 춘계학술발표회 논문집
    • /
    • pp.287-291
    • /
    • 2006
  • Currently application of high-resolution satellite imagery is expanding with development of high tech optical and space aviation technology. Although using 3 dimensional modeling technology in order to attain accurate terrain information using existing ground control points is the most dependable reference data, such means are unapplicable for certain area because of it's limited access. In this study, we have researched into ways to utilizing high resolution satellite images from IKONOS and Quickbird, and sub-meter class satellites images that will be utilized In the future such as Arirang images and PLEIADES images for unaccessible areas. For that purpose we have created accuracy verification and GCP files for existing ortho-imagery and digital elevation model. The results showed that accuracy of ortho-Imagery and digital elevation model was RMSE X:3.043m, Y:2.921m, Z:6.139m. Also, after ortho-rectifying IKONOS images using ground control points extracted from ortho imagery and digital elevation model the accuracy of the imagery was RMSE X:3.243m, Y:2.067m, Z:1.872m.

  • PDF

안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어 (Key Distribution Protocol and Call Control for Secure ISDN)

  • 정현철;신기수;이선우;김봉한;김점구;이재광
    • 한국정보처리학회논문지
    • /
    • 제4권1호
    • /
    • pp.195-208
    • /
    • 1997
  • 정보화 시대가 도래하면서 여러 가지 정보(텍스트, 화상, 음성)를 통합, 전송할 수 있도록 개발된 통신망이 종합 디지터 통신망(ISDN:Integrated Service Digital network)이다. 이러한 ISDN은 모든 정보가 디지털 형태로 전송되고, 통신망 접속이 개방성을 갖기 때문에 중요 정보 자원에 대한 위협 및 침입 등의 보안 문제점이 증가 하고 있다. 본 논문에서는 중요 정보 자원을 보호하기 위해, ISDN에 적용할 수 있는 암호화 시스템과 적용방식을 연구 하였고, ISDN 시스템 구조와 ITU-T 권고 Q.931 프 로토콜을 분석하여 효율적인 정보보호 서비스를 제공하는 암호화 키 분배 프로토콜과 하이브리드 암호화 시스템을 이용한 사용자 정보의 비밀성을 제공하는 호 제어 방법 을 제안하였다.

  • PDF

업무 프로세스 중심의 정보기술 보안 위험분석 적용 사례-클라이언트/서버 시스템 중심으로 (A Case Study of Business Process Centered Risk Analysis for Information Technology Security)

  • 안춘수;조성구
    • 산업공학
    • /
    • 제16권4호
    • /
    • pp.421-431
    • /
    • 2003
  • Due to the increasing complexity of the information systems environment, modern information systems are facing more difficult and various security risks than ever, there by calling for a higher level of security safeguard. In this paper, an information technology security risk management model, which modified by adopting the concept of business processes, is applied to client/server distributed systems. The results demonstrate a high level of risk-detecting performance of the model, by detecting various kinds of security risks. In addition, a practical and efficient security control safeguard to cope with the identified security risks are suggested. Namely, using the proposed model, the risks on the assets in both of the I/O stage(on client side) and the request/processing stage(on server side), which can cause serious problems on business processes, are identified and the levels of the risks are analyzed. The analysis results show that maintenance of management and access control to application systems are critical in the I/O stage, while managerial security activities including training are critical in the request/processing stage.

A Mobile Robot Based on Slip Compensating Algorithm for Cleaning of Stud Holes at Reactor Vessel in NPP

  • Kim, Dong Il;Moon, Young Jun
    • 한국압력기기공학회 논문집
    • /
    • 제16권1호
    • /
    • pp.84-91
    • /
    • 2020
  • The APR1400 reactor stud holes can be stuck due to high temperatures, high pressure, prolonged engagement, and load changes according to pressure changes in the reactor. Threaded surfaces of a stud hole should be cleaned for the sealing of pressure in reactor vessel by removing any foreign materials which may exist in the stud holes. Human workers can access to the stud hole for the cleaning of stud holes manually, but the radiation exposure of human workers is increased. Robot is an effective way to work in hazardous area. So we introduced robot for the cleaning of stud holes. Localization of mobile robots is generally based on odometry, but with increased mileage, position errors can be accumulated. In order to eliminate cumulative error and to ensure stability of its driving, laser sensors and new control algorithm were utilized. The distance between the robot and the wall was measured by laser sensors, and the control algorithm was implemented so as to travel the desired trajectory by using the measured values from sensors. The performance of driving and hole sensing were verified through field application, and mobile robot was confirmed to be applicable to the APR 1400 NPP.

MRAM Technology for High Density Memory Application

  • Kim, Chang-Shuk;Jang, In-Woo;Lee, Kye-Nam;Lee, Seaung-Suk;Park, Sung-Hyung;Park, Gun-Sook;Ban, Geun-Do;Park, Young-Jin
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제2권3호
    • /
    • pp.185-196
    • /
    • 2002
  • MRAM(magnetic random access memory) is a promising candidate for a universal memory with non-volatile, fast operation speed and low power consumption. The simplest architecture of MRAM cell is a combination of MTJ(magnetic tunnel junction) as a data storage part and MOS transistor as a data selection part. This article will review the general development status of MRAM and discuss the issues. The key issues of MRAM technology as a future memory candidate are resistance control and low current operation for small enough device size. Switching issues are controllable with a choice of appropriate shape and fine patterning process. The control of fabrication is rather important to realize an actual memory device for MRAM technology.

교량유지관리 자동화를 위한 첨단 로봇 시스템 개발 (Development of Advanced Robot System for Bridge Inspection and Monitoring)

  • 이종세;황인호;김동우;이후석
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2007년도 정기 학술대회 논문집
    • /
    • pp.90-95
    • /
    • 2007
  • Conventional bridge inspection involves the physical positioning of an inspector by the hydraulic telescoping boom of a "snooper truck" thereby providing visual access to bridge components. The process is time consuming, hazardous, and may be affected by lighting conditions, Therefore, it is of great interest that an automated and/or teleoperated inspection robot be developed to replace the manual inspection procedure. This paper describes the advanced bridge inspection robot system under development and other related activities currently undergoing at the Bridge Inspection Robot Development Interface (BIRDI). BIRDI is a research consortium with its home in the Department of Civil and Environmental System Engineering at Hanyang University at Ansan. Its primary goal is to develop advanced robot systems for bridge inspection and monitoring for immediate field application and commercialization. The research program includes research areas such as advanced inspection robot and motion control system, sensing technologies for monitoring and assessment, and integrated system for bridge maintenance. The center embraces 12 institutions, which consist of 7 universities, 2 research institutes, and 3 private enterprises. Research projects are cross-disciplinary and include experts from structural engineering, mechanical engineering, electronic and control engineering. This research project will contribute to advancement of infrastructure maintenance technology, enhancement of construction industry competitiveness, and promotion of national capacity for technology innovation.

  • PDF

계산 그리드를 위한 서비스 예측 기반의 작업 스케줄링 모델 (Service Prediction-Based Job Scheduling Model for Computational Grid)

  • 장성호;이종식
    • 한국시뮬레이션학회논문지
    • /
    • 제14권3호
    • /
    • pp.91-100
    • /
    • 2005
  • Grid computing is widely applicable to various fields of industry including process control and manufacturing, military command and control, transportation management, and so on. In a viewpoint of application area, grid computing can be classified to three aspects that are computational grid, data grid and access grid. This paper focuses on computational grid which handles complex and large-scale computing problems. Computational grid is characterized by system dynamics which handles a variety of processors and jobs on continuous time. To solve problems of system complexity and reliability due to complex system dynamics, computational grid needs scheduling policies that allocate various jobs to proper processors and decide processing orders of allocated jobs. This paper proposes a service prediction-based job scheduling model and present its scheduling algorithm that is applicable for computational grid. The service prediction-based job scheduling model can minimize overall system execution time since the model predicts the next processing time of each processing component and distributes a job to a processing component with minimum processing time. This paper implements the job scheduling model on the DEVS modeling and simulation environment and evaluates its efficiency and reliability. Empirical results, which are compared to conventional scheduling policies, show the usefulness of service prediction-based job scheduling.

  • PDF

계산 그리드를 위한 서비스 예측 기반의 작업 스케쥴링 모델 (Service Prediction-Based Job Scheduling Model for Computational Grid)

  • 장성호;이종식
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 춘계학술대회 논문집
    • /
    • pp.29-33
    • /
    • 2005
  • Grid computing is widely applicable to various fields of industry including process control and manufacturing, military command and control, transportation management, and so on. In a viewpoint of application area, grid computing can be classified to three aspects that are computational grid, data grid and access grid. This paper focuses on computational grid which handles complex and large-scale computing problems. Computational grid is characterized by system dynamics which handles a variety of processors and jobs on continuous time. To solve problems of system complexity and reliability due to complex system dynamics, computational grid needs scheduling policies that allocate various jobs to proper processors and decide processing orders of allocated jobs. This paper proposes the service prediction-based job scheduling model and present its algorithm that is applicable for computational grid. The service prediction-based job scheduling model can minimize overall system execution time since the model predicts a processing time of each processing component and distributes a job to processing component with minimum processing time. This paper implements the job scheduling model on the DEVSJAVA modeling and simulation environment and simulates with a case study to evaluate its efficiency and reliability Empirical results, which are compared to the conventional scheduling policies such as the random scheduling and the round-robin scheduling, show the usefulness of service prediction-based job scheduling.

  • PDF

CPTED 기법을 적용한 주거지역의 범죄예방에 관한 연구 (A Study on the Crime Prevention of Residential Zone through the Application of CPTED)

  • 김영환
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권5호
    • /
    • pp.273-278
    • /
    • 2008
  • 도시범죄 관리에 대한 새로운 전략으로써 사전예방적 범죄 통제전략 중의 하나로 추진하고 있는 것이 환경설계를 통한 범죄예방이다. 이에 본 연구에서는 도시범죄와 관련하여 현실적으로 범죄문제에 대응할 수 있는 범죄예방 전략을 모색하고자 하는데 연구의 목적을 두었다. 이를 위해 광주광역시에서 2004년도에 발생한 도시범죄 중 동구의 주거지역에서 발생한 범죄를 대상으로 범죄분포가 어떻게 이루어지고 있는지를 현지조사를 통하여 분석함으로써 CPTED의 입장에서 범죄예방전략을 모색하고자 하였다.

  • PDF