• Title/Summary/Keyword: Information Management Architecture

Search Result 1,946, Processing Time 0.033 seconds

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

Metadata Log Management for Full Stripe Parity in Flash Storage Systems (플래시 저장 시스템의 Full Stripe Parity를 위한 메타데이터 로그 관리 방법)

  • Lim, Seung-Ho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.11
    • /
    • pp.17-26
    • /
    • 2019
  • RAID-5 technology is one of the choice for flash storage device to enhance its reliability. However, RAID-5 has inherent parity update overhead, especially, parity overhead for partial stripe write is one of the crucial issues for flash-based RAID-5 technologies. In this paper, we design efficient parity log architecture for RAID-5 to eliminate runtime partial parity overhead. During runtime, partial parity is retained in buffer memory until full stripe write completed, and the parity is written with full strip write. In addition, parity log is maintained in memory until whole the stripe group is used for data write. With this parity log, partial parity can be recovered from the power loss. In the experiments, the parity log method can eliminate partial parity writes overhead with a little parity log writes. Hence it can reduce write amplification at the same reliability.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

A Visitor Study of The Exhibition of Using Big Data Analysis which reflects viewing experiences

  • Kang, Ji-Su;Rhee, Bo-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.81-89
    • /
    • 2022
  • This study aims to analyze the images of Instagram posts and to draw implcations regarding the exhibition of . This study collects and crawl 24,295 images from Instagram posts as a dataset. We use the Google Cloud Vision API for labeling the images and a total of 212,567 clusters of labels are finally classified into 9 categories using Word2Vec. The categories of museum spaces, photo zone, architecture category are dominant along with people category. In conclusion, visitors curate their experiences and memories of physical places and spaces while they are experiencing with the exhibition. This result reproves the results of previous studies which emphasize a sense of social presence and place making. The convergent approach of art management and art technology used in this study help museum professionals have an insight on big data based visitor research on a practical level.

Designing Integrated Diagnosis Platform for Heterogeneous Combat System of Surface Vessels (다기종 수상함 전투체계의 통합 진단 플랫폼 설계)

  • Kim, Myeong-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.186-188
    • /
    • 2021
  • The architecture named IDPS is a design concept of web-based integrated platform for heterogeneous naval combat system, which accomplishes efficiency(decreasing complexity) of diagnosis process and reduces time to diagnose system. Each type of surface vessel has its own diagnostic processes and applications, and that means it also requires its own diagnostic engineer(inefficiency in human resource management). In addition, man-based diagnostic causes quality issues such as difference approach of log analysis in accordance with engineer skills. Thus In this paper, we designed integrated diagnostic platform named IDPS with simplified common process regardless of type of surface vessel and we reinforced IDPS with status decision algorithm(SDA) that judges current software status of vessel based on gathered lots of logs. It will enable engineers to diagnose system more efficiently and to use more resources in utilizing SDA-analyzed diagnostic results.

  • PDF

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

Markerless camera pose estimation framework utilizing construction material with standardized specification

  • Harim Kim;Heejae Ahn;Sebeen Yoon;Taehoon Kim;Thomas H.-K. Kang;Young K. Ju;Minju Kim;Hunhee Cho
    • Computers and Concrete
    • /
    • v.33 no.5
    • /
    • pp.535-544
    • /
    • 2024
  • In the rapidly advancing landscape of computer vision (CV) technology, there is a burgeoning interest in its integration with the construction industry. Camera calibration is the process of deriving intrinsic and extrinsic parameters that affect when the coordinates of the 3D real world are projected onto the 2D plane, where the intrinsic parameters are internal factors of the camera, and extrinsic parameters are external factors such as the position and rotation of the camera. Camera pose estimation or extrinsic calibration, which estimates extrinsic parameters, is essential information for CV application at construction since it can be used for indoor navigation of construction robots and field monitoring by restoring depth information. Traditionally, camera pose estimation methods for cameras relied on target objects such as markers or patterns. However, these methods, which are marker- or pattern-based, are often time-consuming due to the requirement of installing a target object for estimation. As a solution to this challenge, this study introduces a novel framework that facilitates camera pose estimation using standardized materials found commonly in construction sites, such as concrete forms. The proposed framework obtains 3D real-world coordinates by referring to construction materials with certain specifications, extracts the 2D coordinates of the corresponding image plane through keypoint detection, and derives the camera's coordinate through the perspective-n-point (PnP) method which derives the extrinsic parameters by matching 3D and 2D coordinate pairs. This framework presents a substantial advancement as it streamlines the extrinsic calibration process, thereby potentially enhancing the efficiency of CV technology application and data collection at construction sites. This approach holds promise for expediting and optimizing various construction-related tasks by automating and simplifying the calibration procedure.

A Study of Job Analysis Method using Information Systems (정보체계를 활용한 직무분석 방안 연구)

  • Hwang, Ho-ryang
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.10
    • /
    • pp.521-531
    • /
    • 2016
  • In this paper, since most business process of D-agency is being performed through some information systems, including Onnara System is a government standard operating management system, computerized accumulated in the system documentation based on, even if there is no independent job analysis system, in a judgment that can be can be tissue diagnosis, it presented a job analysis plan that leverages the existing information system. Most material is passed online in business processing between departments and between colleagues, it is returned. In situations where most information systems for such business processing is built developed, grasp the work procedures and information systems D-agency data accumulated to derive the necessary elements for job analysis quantified, and verified the validity of the element in the regression statistics.In addition, classification system (BRM, Business Reference Model) of the existing functionality that is available only Onnara System, and to establish a job analysis architecture to be able to function diagnostic departments to leverage common also in other information systems, related implement illustrating additional features of the information system, to derive a department duties value calculation formula with it, and present various job analysis plan that can actually be utilized to diagnose and derived elements department appropriate personnel.

Development of School Health Nursing Phenomena in Korea by Retrospective Method of ICNP (ICNP의 후향적 개발방법에 의한 한국의 학교간호현상)

  • Kim, Young-Im;Young, Soon-Ok;Wang, Myoung-Ja;Kim, Chung-Nam;Kim, Hyeon-Suk;Park, Tae-Nam;Chung, Mi-Ja;Hyun, Hye-Jin
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.4
    • /
    • pp.595-607
    • /
    • 2002
  • The objectives of this study were to identify the phenomena of school health nursing at schools in Korea and to contribute to building a school health domain of International Classification for Nursing Practice. A retrospective method was used in this study to develop ICNP during the period from July to October 200l. The procedure of the study involved choosing nursing phenomena using preliminary terms from the reports on the field of school health nursing practice documented by nursing students in 10 different nursing colleges. The detail procedures of the study were as follows. 1) Choosing nursing phenomena by using preliminary terms 2) Choosing the characteristics of school health nursing practice from the selected nursing phenomena 3) In order to make a consensus regarding the appropriate characteristics of phenomena. 15 study group members re-categorized the nursing phenomena through 5 times of cyber meetings and 3 times of formal meetings. 4) To verify each characteristic, 5 community nursing faculties and 25 school health nurses participated in the procedure to give scores on nursing characteristics. 5) Classification of the definite nursing phenomena and characteristics. Following the 5 step procedures, school health nursing phenomena were categorized into human and environmental domains. Human domains were classified into human behavioral and functional domains. Environmental domains were classified into physical and psychosocial domains. The essential characteristics of each phenomena were selected when it obtains the mean score of 3.0 or over at the related characteristics. The human behavioral domain consisted of 7 phenomena including risk for spinal disorder, inadequate dietary habit, inadequate weight control, smoking and substance abuse, inadequate stress management, inadequate sex related coping strategies and inadequate accident management. The human functional domain consisted of 6 phenomena including inadequate eye care and visual management, risk for respiratory disorder, inadequate dental health care, inappropriate infectious disease control, risk for gastrointestinal disorder, and lack of sexual identity. The physical environmental domain consisted of 6 phenomena including risk for incident at inside classroom, risk for incident at outside classroom, risk for incident around school, risk for exposure to hazardous facilities around school. inadequate garbage and disposal management, and inadequate physical environment for learning. The psychosocial domain included impaired social interaction at school. Each phenomenon was composed of 2 to 8 characteristics and all phenomena will include a total number of 85 characteristics. The phenomena of school health nursing in Korea partially confirmed school health architecture of ICNP. Further study on verification of school health nursing phenomena in Korea needs to be done to support the findings of this study through review of literature on nursing classifications or field studies.

  • PDF

Analysis of Teachers' Perceptions to Establish the Management Direction of Outdoor Space in an Elementary School (초등학교 외부공간 관리방향 설정을 위한 교사의 인식 분석)

  • Jeong, Na-Ra;Jeong, Hyun-Jeong
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.19 no.3
    • /
    • pp.38-47
    • /
    • 2020
  • This study analyzed the perceptions of teachers to establish the direction for managing the space outside an elementary school. Satisfaction with outdoor school spaces is influenced by the satisfaction with tree and flower plantation and outdoor rest spaces. This study found that the longer the working years of a teacher, the higher their awareness of the importance and necessity of outdoor spaces in the school. Respondents emphasized the lack of manpower and budget, as well as the indifference of the administration as hindrances to the management of outdoor spaces in the school. The outdoor space in the school should include a secure play area, plant education space, class practice spaces, and a rest area. Furthermore, the space outside the elementary school should support learning, playing, and resting. To this end, facilities such as benches, pergolas, outdoor classrooms, ecological ponds, farms, and flower beds should be provided. In an outdoor space, plants featured in textbooks, seasonal plants, and those that provide shade can be planted along with labels to provide information and thereby promote learning. The teachers expected that the management of the external space will have an educational and emotional effect on students. In response to the innovation of the school spaces, it is necessary to continuously manage the external spaces to achieve educational and emotional effects by organically connecting the outdoor spaces with the indoor space. For this purpose, it is required to provide support for securing budgets and manpower, and to introduce relevant policies.