• Title/Summary/Keyword: Directory Services

Search Result 60, Processing Time 0.029 seconds

Network human-robot interface at service level

  • Nguyen, To Dong;Oh, Sang-Rok;You, Bum-Jae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1938-1943
    • /
    • 2005
  • Network human-robot interface is an important research topic. In home application, users access the robotic system directly via voice, gestures or through the network. Users explore a system by using the services provided by this system and to some extend users are enable to participate in a service as partners. A service may be provided by a robot, a group of robots or robots and other network connected systems (distributed sensors, information systems, etc). All these services are done in the network environment, where uncertainty such as the unstable network connection, the availability of the partners in a service, exists. Moreover, these services are controlled by several users, accessing at different time by different methods. Our research aimed at solving this problem to provide a high available level, flexible coordination system. In this paper, a multi-agent framework is proposed. This framework is validated by using our new concept of slave agents, a responsive multi-agent environment, a virtual directory facilitator (VDF), and a task allocation system using contract net protocol. Our system uses a mixed model between distributed and centralized model. It uses a centralized agent management system (AMS) to control the overall system. However, the partners and users may be distributed agents connected to the center through agent communication or centralized at the AMS container using the slave agents to represent the physical agents. The system is able to determine the task allocation for a group of robot working as a team to provide a service. A number of experiments have been conducted successfully in our lab environment using Issac robot, a PDA for user agent and a wireless network system, operated under our multi agent framework control. The experiments show that this framework works well and provides some advantages to existing systems.

  • PDF

Implementation of Scenario-based AI Voice Chatbot System for Museum Guidance (박물관 안내를 위한 시나리오 기반의 AI 음성 챗봇 시스템 구현)

  • Sun-Woo Jung;Eun-Sung Choi;Seon-Gyu An;Young-Jin Kang;Seok-Chan Jeong
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.91-102
    • /
    • 2022
  • As artificial intelligence develops, AI chatbot systems are actively taking place. For example, in public institutions, the use of chatbots is expanding to work assistance and professional knowledge services in civil complaints and administration, and private companies are using chatbots for interactive customer response services. In this study, we propose a scenario-based AI voice chatbot system to reduce museum operating costs and provide interactive guidance services to visitors. The implemented voice chatbot system consists of a watcher object that detects the user's voice by monitoring a specific directory in real-time, and an event handler object that outputs AI's response voice by performing inference by model sequentially when a voice file is created. And Including a function to prevent duplication using thread and a deque, GPU operations are not duplicated during inference in a single GPU environment.

Design of KT′s Single Sign-On on Public Key Infrastructure (공개키 기반 구조에서 KT Single Sign-On 설계)

  • Yeon, Seung-Ho;Park, Hyun-Gyu;Oh, Hee-Soo;Kim, Yeong-Heon;Jun, Byoung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.231-239
    • /
    • 2002
  • This paper gives a comprehensive overview of the SSO solution design on the intranet. SSO described in this paper is based on LDAP, PKI and CA. We designed the data structure to hold many various application services by changing the attribute and DN of LDAP DB. We built LDAP DB using the employee records stored in our organization database. LDAP DB is routinely updated from the database. CA Server that depends on PKI is used to issue the certificates. SHTTP based on SSL is used to protect the data between certificate server and the intranet users.

A Study on the International Standard for CCM Related RFID Packaging Technology (CCM(Cold Chain Management)과 연계된 RFID 패키징 국제 기술 표준의 분석)

  • Yoon, Seong-Young;Cha, Kyong-Ho;Park, Su-Il;Kim, Jai-Neung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.15 no.2
    • /
    • pp.67-73
    • /
    • 2009
  • The introduction of radio frequency identification (RFID) technology into cold chain system will be essentials for the better quality preservation of chilled products in the near future. The object of this study is to analyze the trends of international standardization activity for cold chain system and RFID packaging. The standardization of RFID technology is related to SC31 of ISO/IEC JTC1. The established standard from EPCglobal includes the air interface of UHF substitute actors, the control of EPC tag data and the event collected from RFID readers, the directory services and information storage of ONS and EPCIS, and securities. Also, EPC standards include the sensor functions of the cold chain. In Korea, the RFID packaging related techniques and their engineering standard are less studied as compared with Europe or North America. For effective application of RFID in the cold chain and packaging, scientific and systematic researches on RFID, including technical standards for domestic RFID frequency, will be key elements for preoccupation of these application techniques.

  • PDF

Information Seeking Behavior of the NAVER Users via Query Log Analysis (질의 로그 분석을 통한 네이버 이용자의 검색 형태 연구)

  • Lee, Joon-Ho;Park, So-Yeon;Kwon, Hyuk-Sung
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.2
    • /
    • pp.27-41
    • /
    • 2003
  • Query logs are online records that capture user interactions with information retrieval systems and all the search processes. Query log analysis offers ad advantage of providing reasonable and unobtrusive means of collecting search information from a large number of users. In this paper, query logs of NAVER, a major Korean Internet search service, were analyzed to investigate the information seeking behabior of NAVER users. The query logs were collected over one week from various collecions such as comprehensive search, directory search and web ducument searc. It is expected that this study could contribute to the development and implementation of more effective web search systems and services.

USN Directory Service For Mobile Sensor Node (모바일 센서 노드 지원을 위한 USN 디렉토리 서비스)

  • Ju, Su-Hyun;Park, Min-Su;Oh, Dae-Sung;Kim, Min-Ki;Han, Jae-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.280-285
    • /
    • 2007
  • 다가올 유비쿼터스 시대를 선도할 기술 중 하나인 USN(Ubiquitous Sensor Network)은 산업 전반에 커다란 변화를 가져올 것으로 기대된다. USN은 각종 센서 노드로부터 사물 및 환경 정보를 감지, 저장, 가공, 통합하고 상황인식 정보 및 지식 콘텐츠 생성을 통하여 언제, 어디서. 누구나 원하는 맞춤형 서비스를 자유로이 이용할 수 있는 첨단 지능형사회의 기반 인프라이다. USN과 더불어 이를 활용하기 위한 USN 어플리케이션의 개발들이 늘고 었으며 이에 USN 미들웨어의 필요성 또한 증가하고 있다. USN 디렉토리 서비스는 USN 미들웨어를 구성하는 핵심 서비스 중 하나이며, 지역적으로 분산된 USN 자원에 대한 정보를 관리하고 USN 자원에 대한 검색을 실시간으로 제공하는 서비스이다. USN 자원은 고정된 자원과 이동성을 지닌 자원으로 나눌 수 있다. 하지만 현재 이동성을 지닌 센서 노드(Mobile Sensor Node)를 지원할 수 있는 USN 디렉토리 서비스는 보이지 않고 있다. 본 논문은 이러한 Mobile Sensor Node의 특성을 지원하는 USN 디렉토리 서비스의 모델들을 제시하고 그에 대한 설계 및 구현을 논한다.

  • PDF

A Study on the Performances of Korean WWW Search Tools (국내 웹 검색도구의 특성 및 탐색 기능 평가에 관한 연구)

  • Lee Lan-Ju;Choi Kyung-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.3
    • /
    • pp.75-108
    • /
    • 1997
  • The purpose of the article is to help users to select appropriate Korean WWW search tools and to retrieve Web documents for their information needs by using them effectively. It analyzes the characteristics, functions, and advantages and disadvatages of each search tool, while search tools are divided broadly by two categories-subject directory services (Kor-seek, DIR, ZIP, Netquest21, Simmany) and keyword search engines (Simmany, Kachine, Jungbotamjung, Anysearch, Unifinder, Webglider, Missdachanni). It provides the selection criteria of search tools for users who have information needs. In addition, the study also attempts to contribute to the improvements in designing Korean WWW search tools, as investigating their shortcomings.

  • PDF

A Study on Multi_Kerberos Authentication Mechanism based on Certificate (인증서기반의 Multi_Kerberos 인증시스템에 관한 연구)

  • Shin, Kwang-Cheul;Cho, Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.57-66
    • /
    • 2006
  • In this paper. proposes Multi_Kerberos certification mechanism that improve certification service of based on PKINIT that made public in IETF CAT Working Group. This paper proposed to a certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, to get public key from DNS server by chain (CertPath) between realms by certification and key exchange way that provide service between realms applying X.509, DS/DNS of based on PKINIT, in order to provide regional services. This paper proposed mechanism that support efficient certification service about cross realm including key management. the path generation and construction of Certificate using Validation Server, and recovery of Session Key. A Design of Multi_Kerberos system that have effects simplify of certification formality that reduce procedures on communication.

  • PDF

Identity-based key distribution system and conference key distribution system (ID-Based 키 분비방식 및 회의용 키 분배방식)

  • 손기욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.38-46
    • /
    • 1991
  • This paper pro poses a ley distribution system based on identification information. The system uses an indivdual user's identification instead of the public file used in the Diffie-Hellman sustem. It does not require any services of a center to distribute work keys and users to keep directory public file. We propose an identity-based key distribution system for generating a commom secret conference kdy for two or more users. We assume users are connected in a ring network. Message among users authenticated using each user's identification informa-tion. The security of the our proposed system is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.