• Title/Summary/Keyword: Application Access Control

Search Result 404, Processing Time 0.032 seconds

Application of the Digital Mockup to Preliminary Analysis the Remote Maintainability of ACP

  • Song, Tai-Gil;Kim, Sung-Hyun;Park, Byung-Suk;Yoon, Ji-Sup;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.363-366
    • /
    • 2004
  • KAERI is developing the Advanced Spent Fuel Conditioning Process (ACP) as a pre-disposal treatment process for spent fuel. In this process, the management process must operate in intense radiation fields as well as in a high temperature. Therefore, remote maintenance has played a significant role in this process. Hence suitable remote handling and maintenance technology needs to be developed along with the design of the process concepts. To do this, we developed the digital mockup for the ACP. The digital mockup provides the capability of verifying the remote operability of the process without fabrication of the process equipment. In other words, by applying virtual reality to the remote maintenance operation, a remote operation task can be simulated in the digital mockup. Through utilizing this graphic simulation in this digital mockup, general guidelines can be established for designing equipment intended for remote handling and maintenance. Also, the designer of the equipment that must be remotely maintained should ensure that there is adequate access to the process equipment. The graphic simulator will substantially reduce the cost of the develo363pment of the remote handling and maintenance procedure as well as the process equipment.

  • PDF

The Authentication Framework Application Plan for the Security Improvement in Network Robot Environment (네트워크 로봇 환경에서 보안 향상을 위한 인증 프레임워크 적용 방안)

  • Cho, Han-Jin;Lee, Jun-Hwan
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.217-223
    • /
    • 2012
  • By using the network, the robot can provide the anytime and anywhere various services. There is the advantage that it can provide the real time service by using the network description but the network robot has the network security vulnerability. Therefore, in the network robot environment, the authentication framework which can be satisfied the security function has to be established. In this paper, the security vulnerability which it can be generated in the network robot environment is analyze and the plan for reaction is prepared. And the authentication framework controlling the network robot safely was proposed.

Dynamic knowledge mapping guided by data mining: Application on Healthcare

  • Brahami, Menaouer;Atmani, Baghdad;Matta, Nada
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.1-30
    • /
    • 2013
  • The capitalization of know-how, knowledge management, and the control of the constantly growing information mass has become the new strategic challenge for organizations that aim to capture the entire wealth of knowledge (tacit and explicit). Thus, knowledge mapping is a means of (cognitive) navigation to access the resources of the strategic heritage knowledge of an organization. In this paper, we present a new mapping approach based on the Boolean modeling of critical domain knowledge and on the use of different data sources via the data mining technique in order to improve the process of acquiring knowledge explicitly. To evaluate our approach, we have initiated a process of mapping that is guided by machine learning that is artificially operated in the following two stages: data mining and automatic mapping. Data mining is be initially run from an induction of Boolean case studies (explicit). The mapping rules are then used to automatically improve the Boolean model of the mapping of critical knowledge.

A Robust Method for Partially Occluded Face Recognition

  • Xu, Wenkai;Lee, Suk-Hwan;Lee, Eung-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2667-2682
    • /
    • 2015
  • Due to the wide application of face recognition (FR) in information security, surveillance, access control and others, it has received significantly increased attention from both the academic and industrial communities during the past several decades. However, partial face occlusion is one of the most challenging problems in face recognition issue. In this paper, a novel method based on linear regression-based classification (LRC) algorithm is proposed to address this problem. After all images are downsampled and divided into several blocks, we exploit the evaluator of each block to determine the clear blocks of the test face image by using linear regression technique. Then, the remained uncontaminated blocks are utilized to partial occluded face recognition issue. Furthermore, an improved Distance-based Evidence Fusion approach is proposed to decide in favor of the class with average value of corresponding minimum distance. Since this occlusion removing process uses a simple linear regression approach, the completely computational cost approximately equals to LRC and much lower than sparse representation-based classification (SRC) and extended-SRC (eSRC). Based on the experimental results on both AR face database and extended Yale B face database, it demonstrates the effectiveness of the proposed method on issue of partial occluded face recognition and the performance is satisfactory. Through the comparison with the conventional methods (eigenface+NN, fisherfaces+NN) and the state-of-the-art methods (LRC, SRC and eSRC), the proposed method shows better performance and robustness.

A Design and Implementation of Computer-based Test System (컴퓨터기반 시험 시스템 설계 및 구축)

  • Cho Sung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.1-8
    • /
    • 2005
  • E-learning is the application of e-business technology and services to teaching and learning. It use of new multimedia technologies and Internet to improved the qualify of learning by facilitating access to remote resources and services. In this paper, we show a computer-based test system, which is carefully designed and implemented. The system consists of a contents delivery mechanism, computer-adaptive test algorithm, and review engine. In this papepr, we describe what are points to be considered when design and implementing a computer-based test system. In addition, this paper shows how to control the bias value for computer-adaptive algorithm using real data.

  • PDF

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

Recent advances in pediatric interventional cardiology

  • Kim, Seong-Ho
    • Clinical and Experimental Pediatrics
    • /
    • v.60 no.8
    • /
    • pp.237-244
    • /
    • 2017
  • During the last 10 years, there have been major technological achievements in pediatric interventional cardiology. In addition, there have been several advances in cardiac imaging, especially in 3-dimensional imaging of echocardiography, computed tomography, magnetic resonance imaging, and cineangiography. Therefore, more types of congenital heart diseases can be treated in the cardiac catheter laboratory today than ever before. Furthermore, lesions previously considered resistant to interventional therapies can now be managed with high success rates. The hybrid approach has enabled the overcoming of limitations inherent to percutaneous access, expanding the application of endovascular therapies as adjunct to surgical interventions to improve patient outcomes and minimize invasiveness. Percutaneous pulmonary valve implantation has become a successful alternative therapy. However, most of the current recommendations about pediatric cardiac interventions (including class I recommendations) refer to off-label use of devices, because it is difficult to study the safety and efficacy of catheterization and transcatheter therapy in pediatric cardiac patients. This difficulty arises from the challenge of identifying a control population and the relatively small number of pediatric patients with congenital heart disease. Nevertheless, the pediatric interventional cardiology community has continued to develop less invasive solutions for congenital heart defects to minimize the need for open heart surgery and optimize overall outcomes. In this review, various interventional procedures in patients with congenital heart disease are explored.

Ship Tests of PLC and Analysis of Its Signal Characteristics (전력선 통신의 실선시험 및 신호특성 분석)

  • Cho, Seong-Rak;Paik, Bu-Geun;Yi, Ji-Eun;Lee, Dong-Kon;Bae, Byung-Dueg
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.1
    • /
    • pp.93-98
    • /
    • 2010
  • In this paper, PLC which can be installed easily and is stable to transfer datum, is tested for approving its application in a real ship. Internet access service, CCTV monitoring, light control and huge sensor communications are needed for enhancing the convenience and safety of passengers and crew in ships. In order to apply PLC in ships, we surveyed some noises interrupting PLC in ships and investigated the PLC characteristics. The Hannara, a training ship of Korea Maritime University, was used for the test. We measured and analyzed blocking noises using by NI's SCXI-1001. When noises of specific frequency band occurred near the PLC frequency band, PLC transfer capacity was low for mass datum. We developed and verified some methods to apply PLC in a ship under lots of noises.

A Study on the Evolution of Local Area Networks (근거리통신망의 진화방향에 관한 연구)

  • Joo, Gi-Hoo;Ryu, Hwang
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.131-138
    • /
    • 1998
  • In this paper, we investigate the direction of LAN evolution. We focus rather on the philosophical changes than on the advances of technologies. In terms of topology, channel structure, and medium access control, we categorize major local area networks widely used in the past. We then investigate new directions in the concept and advances in the technology of local area networks. The idea of collapsed backbone is shown to be the most fundamental factor influencing the evolution of local area networks. Asynchronous Transfer Mode that is radically different form the existing LAN technology is now actively applied to LAN. In order to compete with ATM, conventional LANs should evolve to support quality of service for multimedia application

  • PDF

Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading (SW 분할 실행을 이용한 데스크탑 가상화 환경에서 데이터 보안 기술)

  • Chung, Moonyoung;Choi, Won-Hyuk;Jang, Su-Min;Yang, Kyung-Ah;Kim, Won-Young;Choi, Jihoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.555-560
    • /
    • 2014
  • This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.