• Title/Summary/Keyword: Database(DB)

Search Result 1,498, Processing Time 0.026 seconds

System Design for Location Determination Inside the Ship (선박 내부 위치 측위를 위한 시스템 설계)

  • Park, Jin-Gwan;Jung, Min A;Yoon, Seokho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.181-188
    • /
    • 2013
  • In this paper, we present a system design for location determination inside the ship. Since the GPS signal can not be received in the interior of the large vessel, we use the vessel wireless AP (Access Point) RSSI (received signal strength indication) to accurately measure the position. We convert the RSSI for the 3 AP's into distance through the Friis formula and get the location through triangulation. The signal strength varies irregularly due to noise making it difficult to obtain the exact location. Thus Kalman filter is used to real-time position correction, that is store in a server database.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

Implementation of 'Eye View' Application for book information providing service using Marker technology and AR (마커 기술 및 AR을 이용한 도서 정보 제공 서비스를 위한 'Eye View' 어플리케이션의 구현)

  • Cho, Young-Ju;Kim, Jin-Hyuk;So, Yoon-Jeong;Chung, Il-Yong
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.257-266
    • /
    • 2017
  • Recently, a variety of books have been published in various fields, and the range of selection for both online and offline bookstores have been widened. However, there is a vinyl packaging phenomenon to prevent damage being made to the books in bookstores. This makes it difficult to have a look through on the contents of the book, affecting consumers' purchasing decisions. These factors causes the annual average reading volume to decrease. Therefore, in this paper, we would like to propose a "bookmark" application to provide consumers with book information service using AR and Marker technology, tackling the decrease in sales caused by the problem.

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

A Study on the Framework Construction of Disaster Monitoring and Transmitting System based on Smart-Phone (스마트 폰(Smart-Phone)기반의 재난 감시 및 상황전달시스템 프레임워크(Framework) 구축에 관한 연구)

  • Jeong, Duk-Hoon;Min, Geum-Young;An, Chang-Keun;Lee, Hoon-Seok
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.31-42
    • /
    • 2011
  • Smart-Phones are utilized in disaster management field because it can deliver disaster information to large population simultaneously and quickly, and provide accurate information through situation-based service using the LBS(Location Based Service). To study on the utilization of smart phone for disaster information collection and dissemination method, this study suggest a framework which connects smart phone by loading application for reporting disaster. The disaster monitoring and situation dissemination system framework using smart phone is composed of 4 parts. First, smart phone application enters image, video, voice and text information and location of the disaster. Second, the disaster report reception and situation dissemination server receives the information, save in the DB, and send through smart phone SMS. Third, store into disaster information database. Fourth, display the disaster report and management information on 2D GIS, support the decision making process in deciding whether to manage as disaster, and disaster management web service which disseminates situation.

A Study on the State of Webzine Publications in Korean University Libraries (대학도서관의 웹진 발행실태에 관한 연구)

  • Noh, Dong-Jo;Min, Sook-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.3
    • /
    • pp.241-266
    • /
    • 2010
  • The purpose of this study is to examine the current state of webzine publications in Korean university libraries. We assess the menu, composition and contents of various types of webzines at thirty six different Korean university libraries. Highlights of our survey include the following: 1) Most university libraries operate several different webzine sites. 2) Categories included in library webzines mainly include 'Notices', 'Academic Database Information', 'Current Books', 'Recommended Reading', 'Utilization of Information', 'Book Review', 'Tips for Using the Library', 'Special Issues', 'Service Information', 'Quiz', 'Column', 'Special Events'. 3) Of these, the most popular categories were: 'Notices', 'Service Information', 'Tips for Using the Library', 'Special Issues', and 'Recommended Reading'.

Study on Object Modelling for Oceanic Data (해양자료 객체 DB 모델링 연구)

  • 박종민;서상현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.454-457
    • /
    • 1999
  • Most of oceanic information are related with spatial properties directly or impliedly and Presented differently depend on applications. So, without efficient integrated data model and strategies it inevitably occurs redundant development results of database itself and application systems. Therefor to avoid these inefficiencies it is most basic need to establish the ocean data infrastructure based on unified data model. In this paper we suggest the guideline for object data model based on ocean GIS concept followed with a sample primitive object data model implementing tile proposed guideline. With this unified data model we could expect the improvement ill the every phase of ocean related environment from data acquisition through translation and utilizing to service and exchange.

  • PDF

Implementation of Web GIS System for Space Management of University Facility (대학시설 공간관리를 위한 Web GIS 시스템 구현)

  • Kim, Mi-Jin;Lee, Hee-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1551-1559
    • /
    • 2007
  • The purpose of this study is to verify the technical possibilities and advantages of web GIS system, and its practical implementation for space management and information service accessible from anywhere. at anytime using ArcIMS on behalf of university facility management. It is found that the integration of GIS and web technology, in terms of its administrative and public service capabilities, carries many advantages in the aspects of time, cost, and effort saving. Finally, practical system architecture is proposed with its database structuring method for space management of university facility.

  • PDF

The Design Method on System Construction for the Marine Total Information Network in our Country (우리나라의 해양 정보 통합 시스템 구축 설계에 관한 연구)

  • Shin Hyun-Sik;Kim Chun-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.587-592
    • /
    • 2006
  • Our country has been surrounded an advantageous around condition by sea on three sides. But the development into the sea, for a lack of systematic database on the marine total information network for a foundation information and reseach infra construction. This marine total information network will be not contribute to an advance of domestic marine industry through information's common ownership but also international competitiveness strength.

  • PDF

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.457-461
    • /
    • 2017
  • Barcode is widely being used in many places such as supermarket, cafeteria, library, etc. ISBN, Code 128, Code 39 are mainly used in barcode. Among them, Code 128 which is based on ASCII Code can transfer control letters that range from ASCII Code 0 to ASCII 32. Control letters intrinsically imply letters that are used to deliver information to peripheral devices such as a printer or communication joint, however, they play quite different roles if they are inputted on Windows. Generally, barcode devices doesn't verify input data, thus it enables people to tag any barcode that has specific control letters and execute the commands. Besides, most barcode recognition programs are using a database and they have more security weakness compared to other programs. On the basis of those reasons, I give an opinion that SQL Injection can attack barcode recognition programs through this study.

  • PDF