• Title/Summary/Keyword: Integrated Information Network

Search Result 1,428, Processing Time 0.046 seconds

Integrated Indoor Positioning Systems Reflecting Map Information for Location Based Services (위치기반서비스를 위한 지도정보가 반영된 옥내측위통합 시스템)

  • Yim, Jae-Geol;Joo, Jae-Hun;Jeong, Seung-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.131-153
    • /
    • 2008
  • So many location based service systems, including automobile navigation system logistic management, taxi fleet management, and so on, are being used everywhere. However, these are all outdoors. This paper provides a stepping stone for commercial indoor location based services by developing an integrated system of our indoor positioning and map viewer modules. For the indoor positioning, we propose WLAN (Wireless Local Area Network) based EKF (Extended Kalman Filter) which estimates user's current location and tracts user's trace in the sequence of time. Our map viewer renders a map recorded in an Autocad DXF file and provides functions of map manipulation such as zoom-in, zoom-out, and move. We integrate our indoor positioning and map viewer modules and discuss the experimental results of the integrated system.

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Mobile Ubiquitous Healthcare System Using Wireless Sensor Network (무선센서네트워크 기반의 모바일 유비쿼터스 헬스케어시스템)

  • Shin, Kwang-Sig;Yau, Chiew-Lian;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2107-2112
    • /
    • 2006
  • As growing up of elderly population, the interesting on healthcare system in normal life using W is increasing. An integrated u-healthcare service architecture with IEEE 802.11 and IEEE 802.15.4 based sensor network and code divisi(m multiple access(CDMA) public mobile telecommunication networks was designed and developed. Sensor nodes with electrocardiogram(ECG), body core temperature sensors are attached on the patients' body. The healthcare parameters are transferred to web server via CDMA mobile network or through existed LAN network. The existed LAN network is suggested to be used for continuous monitoring of patient's health status in hospital while mobile networks can be used for general purpose at home or outdoor where infra networks unavailable. This system enable healthcare personal to be able to continuously access, review, monitor and transmit the patients information whereever they are, whenever they want. And immediately check their status by using cellular phone and obtain detail information by communication with medical information server through CDMA. By using this developed integrated u-healthcare service architecture, we can monitor patients' health status for 24 hours.

TCP Performance Improvement using 802.11 MAC MIB for Wireless Network (무선 환경에서 802.11 MAC의 MIB 정보를 이용한 TCP 성능 개선)

  • Kim, Ki-Won;Shin, Kwang-Sik;Yoon, Wan-Oh;Choi, Sang-Bang
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.59-60
    • /
    • 2006
  • TCP applied to the wireless-wired integrated network is the one that was applied to the existing wired network. In the wireless-wired integrated network, both wireless and congestion loss can occur. When wireless packet losses occur, the congestion control of TCP causes performance degradation by reducing its transmission rate. In this paper, we propose the algorithm to distinguish the wireless packet loss from congestion packet loss using MIB of the 802.11 MAC which has been generally used recently in wireless links.

  • PDF

Integrated Fire Monitoring System Based on Wireless Multi-Hop Sensor Network and Mobile Robot (무선 멀티 홉 센서 네트워크와 이동로봇을 이용한 통합 화재 감시 시스템)

  • Kim, Tae-Hyoung;Seo, Gang-Lae;Lee, Jae-Yeon;Lee, Won-Chang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.114-119
    • /
    • 2010
  • Network technology has been developed rapidly for digital service in these days. ZigBee, one of the IEEE 802.15.4 protocols, supporting local communication has become the core technology in the wireless network area. In this paper we designed an integrated fire monitoring system using a mobile robot and the ZigBee sensor nodes which are deployed to monitor fires. When a fire breaks out, the image information of the scene of a fire is transmitted by an autonomous mobile robot and we also monitor the current position of the robot. Furthermore, the data around the place where the fire breaks out and the positions of the sensor nodes can be transmitted to a server via the multi-hop communication in the real time.

The Structural Relationships Among Factors Affecting the Usage of Social Network Service:Focusing on the Technology Acceptance Model(TAM) and the Flow (소셜 네트워크 서비스(SNS) 이용요인간 구조적 관계 : 기술수용모델(TAM)과 플로우(Flow)를 중심으로)

  • Park, Yoon-Seo;Kim, Yong-Sik
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.247-272
    • /
    • 2012
  • Social Network Service(SNS) is a kind of advanced Internet service that acts as personal media. This study was intended to find out the structural relationships among factors affecting the usage of social network services by extending the Technology Acceptance Model(TAM). For this purpose, the variable 'Flow' was first integrated into the TAM in order to understand the internal motivations of users. And then the external factors of SNS usage were derived from the perspective of users, contents, and media side of SNS, and finally the dependent variable was set with the intention of sustainable use. Then these factors were carefully integrated into a structural model. We expect the findings of this study will be very helpful for the internet marketing professionals, SNS developers, and the others.

A Study on the Authentication Model using Integrated Management Center (통합관리센터를 이용한 인증 모델에 관한 연구)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.576-583
    • /
    • 2010
  • U-City includes various information devices and network techniques, which connect among several information devices. Integrated Management Center, which is the core element of u-City, is designed to manage all services of u-City and carry out the control function for a city. Accordingly, u-City needs the methods of user authentication and security, so these methods must be implemented to integrated management center. This paper is devoted to describe some conventional authentication techniques, and authentication methods and procedures that may be available to u-City network context. Proposed u-City integrated authentication model assigns IP to only right user after authenticating information terminals and users in u-City and authorizes users according to the policy, so this model plays an important role for the security of integrated management center.

A Study on the Traffic Controller of ATM Call Level Based on On-line Learning (On-line 학습을 통한 ATM 호레벨 트래픽 제어 연구)

  • 서현승;백종일;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.115-118
    • /
    • 2000
  • In order to control the flow of traffics in ATM networks and optimize the usage of network resources, an efficient control mechanism is necessary to cope with congestion and prevent the degradation of network performance caused by congestion. To effectively control traffic in UNI(User Network Interface) stage, we proposed algorithm of integrated model using on-line teaming neural network for CAC(Call Admission Control) and UPC(Usage Parameter Control). Simulation results will show that the proposed adaptive algorithm uses of network resources efficiently and satisfies QoS for the various kinds of traffics.

  • PDF