• Title/Summary/Keyword: Information Infrastructure

Search Result 4,651, Processing Time 0.027 seconds

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

Identification of Voice for Listeners who Feel Favor Using Voice Analysis (음성 분석을 이용한 청자가 호감을 느끼는 목소리에 대한 규명)

  • Choi, Ji Hyun;Cho, Dong Uk;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.122-131
    • /
    • 2016
  • In the smart societies, such as the current unlike in the past, the voice that listeners will feel favor is changing through the development of ICT technologies and infrastructure. In other words, in the past, loud, intensive and fast voice is a favorite but now a new social and cultural situation that is changing them with ICT technologies. Now, this becomes one of the important things that we clarify 'Is it a voice that feels a favor?'. For this, in this paper, we identified what voice that listeners feel favor by applying ICT technologies. Studies were carried out to proceed largely divided into two categories. Firstly, as the quantified data, we extracted the impact on favorable feeling of listeners which related with emotional speech by empirical analysis work. To do this, we performed the experiment for the public. Secondly, we identified what kind of voice which listeners feel a good impression. For this, we identified voice characteristics that there are people who are influential in the real society. Also, we extracted both the voice characteristics of each influential people and common voice characteristics. In addition, we want to overcome the problems of qualitative methods that have originally limitations in objective respects which is significant to the voice analysis. For this, we performed the experiments of the voice analysis by numerical and visual approaches.

A Maximally Disjoint Multipath Routing Protocol Based on AODV in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서의 AODV 기반 치대 비중첩 다중경로 라우팅 프로토콜)

  • Kim Jungtae;Moh Sangman;Chung Ilyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.429-436
    • /
    • 2005
  • A mobile ad hoc network (MANET) is a collection of mobile nodes without any fixed infrastructure or my form of centralized administration such as access points and base stations. The ad hoc on-demand distance vector routing (AODV) protocol is an on-demand routing protocol for MANETs, which is one of the Internet-Drafts submitted to the Internet engineering task force (IETF) MANET working group. This paper proposes a new multipath routing protocol called maximally disjoint multipath AODV (MDAODV), which exploits maximally node- and link-disjoint paths and outperforms the conventional multipath protocol based on AODV as well as the basic AODV protocol. The key idea is to extend only route request (RREQ) message by adding source routing information and to make the destination node select two paths from multiple RREQs received for a predetermined time period. Compared to the conventional multipath routing protocol, the proposed MDAODV provides more reliable and robust routing paths and higher performance. It also makes the destination node determine the maximally node- and link-disjoint paths, reducing the overhead incurred at intermediate nodes. Our extensive simulation study shows that the proposed MDAODV outperforms the conventional multipath routing protocol based on AODV in terms of packet delivery ratio and average end-to-end delay, and reduces routing overhead.

A Study on Generalization of Security Policies for Enterprise Security Management System (통합보안관리시스템을 위한 보안정책 일반화에 관한 연구)

  • Choi, Hyun-H.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.823-830
    • /
    • 2002
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we propose the model of generalized security policies. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. In the generalization process of security policies. we first diagnose the security status of monitored networks by analyzing security goals, requirements, and security-related information that security agents collect. Next, we decide the security mechanisms and objects for security policies, and then evaluate the properness of them on the basis of security goals, requirements and a policy list. With the generalization process, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

A study on the navigation message contents of the future Korean navigation satellite (미래 한국형 항법위성을 위한 위성항법메세지에 대한 연구)

  • Jo, Jung-Hyun;Lee, Woo-Kyoung;Choe, Nam-Mi;Baek, Jeong-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.108-115
    • /
    • 2012
  • Many studies relating the satellite navigation has been done by a relatively small research community in Korea. Most of domestic research has been focused on the application of the satellite navigation technology, but recently the topics of the next generation satellite navigation system are emphasized for its importance. Even opinions suggesting a future Korea's own satellite navigation system are not that uncommon. Due to the geographic, economic, and technological reasons, it is not widely discussed yet. However, a development technical roadmap regarding the Korea's own navigation satellite was established on the Korea Space Development Plan in general term. Currently four global navigation satellite systems are operating or being deployed. Several regional navigation satellite systems are in planning and development phase. Particularly in Asia, China has launched several satellites to complete their own global navigation satellite system, COMPASS until 2020. Japan launched one satellite and has planned to launch rest of set until 2013. It is proper time to develop Korea's own navigation satellite system to acquire the domestic space development technology and the security of navigational infrastructure. In this study, the validity or the feasibility of the Korea's own satellite navigation system is not discussed; rather the possibility and suitability of the additional information to the current operational navigation message is main target. For the first payload of the future Korea's satellite navigation satellite, a regional augmented system is more likely. This study also is focused on that aspect.

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

Design and Performance Analysis of EU Directory Service (ENUM 디렉터리 서비스 설계 및 성능 평가)

  • 이혜원;윤미연;신용태;신성우;송관우
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.559-571
    • /
    • 2003
  • ENUM(tElephon NUmbering Mapping) is protocol that brings convergence between PSTN Networks and IP Networks using a unique worldwide E.164 telephone number as an identifier between different communication infrastructure. The mechanism provides a bridge between two completely different environments with E.164 number; IP based application services used in PSTN networks, and PSTN based application services used in IP networks. We propose a new way to organize and handle ENUM Tier 2 name servers to improve performance at the name resolution process in ENUM based application service. We build an ENUM based network model when NAPTR(Naming Authority PoinTeR) resource record is registered and managed by area code at the initial registration step. ENUM promises convenience and flexibility to both PSTN and IP users, yet there is no evidence how much patience is required when users decide to use ENUM instead of non-ENUM based applications. We have estimated ENUM response time, and proved how to improve performance up to 3 times when resources are managed by the proposed mechanism. The proposition of this thesis favorably influences users and helps to establish the policy for Tier 2 name server management.

Trend of Research and Industry-Related Analysis in Data Quality Using Time Series Network Analysis (시계열 네트워크분석을 통한 데이터품질 연구경향 및 산업연관 분석)

  • Jang, Kyoung-Ae;Lee, Kwang-Suk;Kim, Woo-Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.6
    • /
    • pp.295-306
    • /
    • 2016
  • The purpose of this paper is both to analyze research trends and to predict industrial flows using the meta-data from the previous studies on data quality. There have been many attempts to analyze the research trends in various fields till lately. However, analysis of previous studies on data quality has produced poor results because of its vast scope and data. Therefore, in this paper, we used a text mining, social network analysis for time series network analysis to analyze the vast scope and data of data quality collected from a Web of Science index database of papers published in the international data quality-field journals for 10 years. The analysis results are as follows: Decreases in Mathematical & Computational Biology, Chemistry, Health Care Sciences & Services, Biochemistry & Molecular Biology, Biochemistry & Molecular Biology, and Medical Information Science. Increases, on the contrary, in Environmental Sciences, Water Resources, Geology, and Instruments & Instrumentation. In addition, the social network analysis results show that the subjects which have the high centrality are analysis, algorithm, and network, and also, image, model, sensor, and optimization are increasing subjects in the data quality field. Furthermore, the industrial connection analysis result on data quality shows that there is high correlation between technique, industry, health, infrastructure, and customer service. And it predicted that the Environmental Sciences, Biotechnology, and Health Industry will be continuously developed. This paper will be useful for people, not only who are in the data quality industry field, but also the researchers who analyze research patterns and find out the industry connection on data quality.