• Title/Summary/Keyword: Internet Server

Search Result 1,960, Processing Time 0.033 seconds

Electronic Approval System of XML-based Business Document using Crypto Algorithm (암호 알고리즘을 이용한 XML 기반 비즈니스문서의 전자 결재 시스템)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1983-1988
    • /
    • 2006
  • There are gradually built on electronic commerce and business information system for the effective and automated use of internet while the mainstream of industry moves on information. It is necessary that a company should develop a electronic approval system because the business documents have application to an electronic commerce, business information system as well Currently, electronic approval system on groupware is using the way of inserting the image of an approval signature, which is vulnerable on a security by attacks of fraudulent use of electrical signature and eavesdropping on electronic documents. In this paper, we implementation XML form generator based on DTD having business documents structure for creating a valid business XML documents. we designed electronic approval system based on secured XML which transfers encrypted documents. For the security issues of written XML business documents, it makes use of the crypto algorithm having high performance transaction by the interchange of public key between a server and a client.

A Wireless ECG monitoring System for Application in Life Emergency Event Detection and Analysis (긴급환자 상황인식 및 분석을 위한 무선 ECG모니터링 시스템)

  • Bhardwaj Sachin;Lee Dae-Seok;Chung Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.421-425
    • /
    • 2006
  • An ubiquitous healthcare system for the home care of elderly persons was designed and implemented using wireless sensor network technology. The wireless technology for home-care purpose gives new possibilities for monitoring of vital parameter with wearable biomedical sensors, and will give the patient the freedom to be mobile and still be under continuously monitoring and thereby to better quality of patient care. Emphasis is placed on recent advances in wireless ECG system for cardiac event monitoring with particular attention to arrhythmia detection in patient. This paper presents a diagnostic system for cardiac arrhythmias from ECG data, using wireless sensor technology. The system also provides an application for recording activities, events and potentially important medical symptoms. The hardware allows data to be transmitted wirelessly from on-body sensor to the base station and then to PC/PDA. Data is also transmitted to a back-end server for analysis using wireless internet connection. Experiments were conducted using the system for activity monitoring, exercise monitoring and medical screening tests and present preliminary data and results.

  • PDF

Object Picking and Concurrency for Solid Modeler in Collaborative Design System (협동설계시스템의 솔리드 모델러를 위한 오브젝트의 Picking과 Concurrency)

  • 윤보열;김응곤
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.723-729
    • /
    • 2001
  • We are able to work on the shared virtual space in Web-based Collaborative Design System using only Internet and Web browser. The users connect to the Solid Modeler Server through m and they create 3D shape and manipulate them variously. Then the users will share 3D objects and two problems can arise. The users must be able to pick the objects effectively which they want to manipulate. When one of the users manipulates a particular object, others should not disturb with the same object. In this paper, picking is implemented not only by computing intersection of mouse pointer with the objects of the virtual world, but also by using capabilities and attributes of scene graph node, by setting bounds intersection testing instead of geometric intersection testing, by limiting the scope of the pick testing, using Java 3D. These methods can reduce the computation of picking and can pick 3D objects effectively and easily using the system of hierarchy. To have effective concurrency, we used shared lock and exclusive lock as the action in work space.

  • PDF

Performance Evaluation of Personalized Textile Sensibility Design Recommendation System based on the Client-Server Model (클라이언트-서버 모델 기반의 개인화 텍스타일 감성 디자인 추천 시스템의 성능 평가)

  • Jung Kyung-Yong;Kim Jong-Hun;Na Young-Joo;Lee Jung-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.112-123
    • /
    • 2005
  • The latest E-commerce sites provide personalized services to maximize user satisfaction for Internet user The collaborative filtering is an algorithm for personalized item real-time recommendation. Various supplementary methods are provided for improving the accuracy of prediction and performance. It is important to consider these two things simultaneously to implement a useful recommendation system. However, established studies on collaborative filtering technique deal only with the matter of accuracy improvement and overlook the matter of performance. This study considers representative attribute-neighborhood, recommendation textile set, and similarity grouping that are expected to improve performance to the recommendation agent system. Ultimately, this paper suggests empirical applications to verify the adequacy and the validity on this system with the development of Fashion Design Recommendation Agent System (FDRAS ).

Fuzzy Closed BCMP Queueing Network Model for Performance Evaluation of Centralized Distributed Processing System (집중형 분산처리시스템의 성능평가를 위한 퍼지 폐쇄형 BCMP 큐잉네트워크모델)

  • Choo, Bong-Jo;Jo, Jung-Bok;Woo, Chong-Ho
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.45-52
    • /
    • 2002
  • This paper proposes the fuzzy closed RCMP queueing network model using fuzzy set theory for the performance evaluation of centralized distributed processing system with ambiguous system factors in the network environments. This model can derive the measures for system performances such as the job spending time, the system throughput, average job number and server utilizations using fuzzy mean value analysis which can process the fuzzy factors. Computer simulation has been performed centralized distributed system with fuzzy service requirement time for verifying the effectiveness of derived equations of performance evaluation according to the numbers of clients, and the results were analyzed. The proposed model provides more and flexible realistic than performance evaluation of conventional method when we evaluated system performance with ambiguous factors.

An Implementation of a Component Repository based on J2EE Application Model (J2EE 어플리케이션 모델 기반의 컴포넌트 저장소 구현)

  • 안성아;최희석;염근혁
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.77-93
    • /
    • 2002
  • Now we are following component-based software development as a solution to improve the reusability, reliability, and extensibility of the software. To support these, the developed components must be reused through component repository at software development. However, traditional centralized repositories couldn't activate component markets since not only the number of users were restricted but also most of the provided components were those on clients like user interface and so on. Recently, a lot of server-side components, reused in a specific domain, have appeared thanks to the development of both Internet technology and component technology such as EJB, DCOM, etc. Therefore, component repositories, based on domain information, classify and provide components and must offer web-based service for many users to use it stably. This study introduces the implementation of a component repository based on J2EE application model. It provides application developers with the service to search and extract appropriate components, and supplies them reliable services in web environment.

  • PDF

Design of Secure Game Character Migration System Between Online Game Servers using Dual Signature (이중 서명을 이용한 온라인 게임 서버 간의 안전한 게임 캐릭터 이주 시스템 설계)

  • Suk, Jin-Weon;Lim, Ung-Taeg
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.882-889
    • /
    • 2010
  • The development of network technology has made rapid growth for online gaming industry on the Internet. Recently, game players have been wanting for a free migration on the game character for game player managed by online game servers of different types. Existing research on the acceptance of the game players demands have suggested migration model of the game character. However, the game Character Migration Process between the game server of different types migration is focused only, and safety issue that is necessary in an online transaction is overlooked. Therefore, ensure the safety of transactions information and when a dispute arises is necessary countermeasures. In this paper, Secure game Character Migration System (SCMP) using dual signature method when migrating game characters between the game servers of different types based on existing research is propose and looks to examine the safety.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

A Study on Improved SMETA System and Applying Encryption Function (개선된 SMETA 시스템과 암호화적용에 관한 연구)

  • Hwang, In-Moon;Yoo, Nam-Hyun;Son, Cheol-Su;Kim, Won-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.849-856
    • /
    • 2008
  • As the XML is used as the standard format for information delivery and exchange in various fields, the SVG is frequently used as a user interface or expression tool for the embedded system like an internet based mobile phone. The SVG file must contain additional information specifying the structure of the document and it consumes more transmission time than the actual data sent. The SMETA(Svg transmission MEthod using Semantic meTAdata) system[9] is a study to reduce the size of the SVG file by partitioning the SVG file to a minimal size and assigning meaningful meta data to each portion of the data. In this paper, instead of the meta data exchange method for reducing the size of the file exchanged in the existing SMETA system, we studied an improved version of SMETA system that analyzes the data for each user in the server system and only transmits the data that a user needs. In addition, through our simulation, we verified that it provides better performance than the existing system even if encryption is used.

A Study of Efficient Transmission of SVG File using SMETA (SMETA를 이용한 효과적인 SVG 파일 전송에 관한 연구)

  • Yoo, Nam-Hyun;Son, Cheol-Su;Kim, Won-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.14-19
    • /
    • 2007
  • As XML is used by standard format for information expression and information exchange in various field, Many Company began to use SVG by user interface or information expression tool of embedded system such as mobile phone based wireless internet. Because SVG has many additional information to keep structure of SVG document exception real data, there is a problem that transfer time of SVG file is so cost for quantity of transmitted data actually. To solve this problem, many researches using compression conception have been conducted for applying to an embedded system. This paper proposes SMETA that can use existing researches using compression concept at once. SMETA divides SVG file to each part that can allocate meaning, and gives semantic metadata to each part without alteration of SVG structure. SMETA can reduce site of transmitted SVG file actually by transmitting specification part of SVG file that metadata does not agree or has unlisted part in an embedded system between an embedded system and server, before transmit whole SVG file. By size of transmitting SVG file is decreasing, transfer time can be shortened accordingly.