• Title/Summary/Keyword: Controlling the Access

Search Result 186, Processing Time 0.024 seconds

Suggestion and Implementation of Improved Control Point for Remote Control Home-Network based on the UPnP (UPnP 기반의 홈-네트워크 원격제어를 위한 개선된 Control Point의 제안 및 구현)

  • Jeong, Jin-Gyu;Jin, Seon-Il;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.769-772
    • /
    • 2003
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility. The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this study is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform.

  • PDF

The Authentication Framework Application Plan for the Security Improvement in Network Robot Environment (네트워크 로봇 환경에서 보안 향상을 위한 인증 프레임워크 적용 방안)

  • Cho, Han-Jin;Lee, Jun-Hwan
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.217-223
    • /
    • 2012
  • By using the network, the robot can provide the anytime and anywhere various services. There is the advantage that it can provide the real time service by using the network description but the network robot has the network security vulnerability. Therefore, in the network robot environment, the authentication framework which can be satisfied the security function has to be established. In this paper, the security vulnerability which it can be generated in the network robot environment is analyze and the plan for reaction is prepared. And the authentication framework controlling the network robot safely was proposed.

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

Implementation of a Remote Controlling System between Server/Client based Mobile (모바일 기반의 서버/클라이언트간 원격제어시스템의 구현)

  • Kim, Jae-Saeng;Lee, Jeong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.106-114
    • /
    • 2010
  • Recently, with the development of network technology, the web-based remote control systems and the real time remote control systems that do not have any restrictions at any time and space are many developed in the several industry FA field. In this paper, we developed the graphic editor screen of the client PC (PDA) with wireless network and the real time remote control system that can access the industry's server and can control the transmission of data for the FA of iron and steel industry field. Implementation of this system brought on the several effects of the decrease of the worker's movement, the control of quick equipments, a step-up in production efficiency, and the decrease of maintenance expense and so on in administration side of industry field.

Future Northeast Asia Transport and Communications System

  • Rimmer, Peter J.
    • Journal of Korea Port Economic Association
    • /
    • v.17 no.2
    • /
    • pp.1-28
    • /
    • 2001
  • Korea has been at the forefront of efforts to enhance international cooperation in transport and communications within Northeast Asia. This effort is driven not only by the benefits that could accrue to the Korean Peninsula but also to all nations in the region. Mutual cooperation within Northeast Asia would reduce transport and communications costs and provide the basis for a regional transport and logistics network. Before progress can be made towards an integrated transport and communications system in Northeast Asia, however, there is a need to evaluate its prospects, outline a visionary plan, and detail a preferred strategy. The strategy to develop the Korean Peninsula as the gateway for Northeast Asia should harmonize with the region's common transport (and communications) policy The strategy adopted by South Korea is focused primarily on the development of an improved logistics infrastructure that would be extended to North Korea upon reunification. The seaport and airport developments In Korea will have to be supported by improved access to planned high-speed railways, expressways and freight distribution centers that, in turn, are to be integrated with new telecommunications and computer technologies. The benefits from these improvements will be lost unless existing government monopolies controlling seaport, airport, rail, road and expressway developments are commercialized to ensure that the price of transport reflects its actual cost. Technical harmonization between different modes should be promoted to facilitate efficient intermodal transport between the Korean Peninsula and the rest of Northeast Asia.

  • PDF

Implementation of a Performance Monitor using Object Oriented Concept (객체 지향 개념을 적용한 성능 모니터의 구현)

  • Kim, Yong-Soo;Lee, Keum-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.2038-2059
    • /
    • 1997
  • The physical attributes of a computer, such as processor speed, size and access time of memory, and I/O bandwidth, are fixed when the computer is delivered to the user. Under these conditions, the performance of a multi-process system where multiple processes share various resources can be enhanced by monitoring and controlling the relationship between the user processes and the system resources. This paper applies object oriented concept to the performance management and suggests a standard for the management. Resource managers and user processes are defined as managed object and a performance manager is defined as a managing object. A protocol between the user processes and performance manager is designed and attributes and methods of the objects are also defined. Through the standardization, the user processes and the performance manager can be developed independently and the system's performance can also be collectively managed.

  • PDF

Energy Efficiency for Building Security Application of Adaptive Error Control and Adaptive Modulation (빌딩 보안 어플리케이션의 적응 오류제어와 적응 변조의 에너지 효율에 관한 연구)

  • Long, Bora;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.423-429
    • /
    • 2007
  • Since the wireless smart card has played a main role in the identification security application for the building access; this research has its purpose to improve the performance of the smart card system and aims to offer more convenient to user. The contactless cards do not require insertion into a card reader and can work up to centimeters away from the reading device. To be able to cope with this performance the controlling of power consumption through the adaptive modulation and error control is needed. This paper addresses a forward error control (FEC) scheme with the adaptive Reed-Solomon code rate and an M-ary frequency shift keying (M-FSK) modulation scheme with the varying symbol size M over the link. The result of comparing energy efficiencies of adaptive error correction and adaptive modulation to other various static schemes shows to save over 50% of the energy consumption.

  • PDF

A Study on Low-Overhead Collision Warning Scheme using Vehicle-to-Vehicle Communications (차량 간 통신을 이용한 저비용 사고 위험 방지 기술에 관한 연구)

  • Lee, Ji-Hoon;Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.10
    • /
    • pp.1221-1227
    • /
    • 2012
  • It is expected that the vehicle safety systems using vehicle-to-vehicle communication can reduce the possibility of vehicle collision and prevent the chain crash by promptly delivering the status of neighboring vehicles. Many IEEE 802.11 DCF based Flooding schemes have been proposed, but they may generally expose the problems that the transmission efficiency is sharply declined as the vehicle density has increased and then is related to the low possibility of the channel access. Therefore, this paper proposes a collision prevention scheme using adaptively controlling the frequency of the message exchanges based on the current status of neighboring vehicles. Moreover, it is shown from simulation that the proposed scheme provides the performance gains over the existing Flooding based scheme.

Exploring the Usefulness of e-Resources for Engineering College Teachers and Scholars for their Academic and Research Activities - A Study

  • Puttaswamy, R.M.;Krishnamurthy, M.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.1
    • /
    • pp.62-70
    • /
    • 2014
  • The All India Council for Technical Education (AICTE), an apex body of controlling technical education in India, has made mandatory subscription of e-Resources to all its Engineering College Libraries. This policy has directly helped the teaching community, research scholars, and student's paternity, which has benefits for their teaching, research activities, and curriculum, respectively. This study emphasizes the usefulness of e-Resources among the teachers and scholars of engineering colleges in the Bangalore region under Visvesvaraya Technological University (VTU), Belgaum, Karnataka. Survey methodology has been used as the basic research tool for data collection with the help of questionnaires. 866 teaching faculties in VTU were selected randomly on the basis of willingness of users who access the e-Resources for their academic and research activities in the survey. The survey results were tabulated and analyzed with descriptive statistics methods using the SPSS 20 software package. The findings reveal that e-resources are useful for engineering college teachers and scholars for their academic and research activities.

A Study on Mitigation Methods of Indoor Radon Concentration in Residential Buildings(I) - Test Cell Study (주거용 건축물의 실내 라돈농도 경감방안에 관한 연구(I) -Test Cell Study)

  • Cha, Dong-Won
    • KIEAE Journal
    • /
    • v.1 no.2
    • /
    • pp.21-28
    • /
    • 2001
  • Naturally-ocurring short-lived decay products of radon gas in indoor air are the dominant source of ionizing radiation exposure to the general public. It is written in BEIR VI Report(l999l the radon progeny were identified as the second cause of lung cancer next to cigarette or 10 % to 14 %(15,400 to 21,800 persons p.a.) of all lung cancer deaths in USA. Indoor radon concentrations in houses typically result from radon gaining access to houses mainly from the underlying soil. In the States, they have "Indoor Radon Abatement Act" which was converted from "Toxic Substance Control Act" in 1988 to establish the national long-term goal that indoor air should be as free of radon as the ambient air outside of buildings. To review and study techniques for controlling radon, two test cells were constructed for a series of tests and are under measuring indoor and soil gas (underneath of floor slab)radon concentrations according to EPA's measurement protocol. In this paper, important theoretical studies are previewed and the following paper will explain the test results and confirm the theories reviewed to find out suitable coefficients. On the basis of test analysis, it will be described and evaluated various techniques that can be used to mitigate elevated indoor concentration of radon including the control of radon and its decay products.

  • PDF