• Title/Summary/Keyword: Management of server system

Search Result 1,340, Processing Time 0.023 seconds

A Study on Development based on ToA Method of Location Determination System in Indoor (ToA 기반 실내 위치측위 시스템 개발에 관한 연구)

  • Lee, Doo-Yong;Piao, Xue-Hua;Song, Young-Keun;Jang, Jung-Hwan;Jho, Yong-Chul;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.99-105
    • /
    • 2011
  • Location-Based Service(LBS) is a service that provides a variety of convenience in life using location information that can be obtained by mobile communication network or satellite signal. In order to provide LBS precisely and efficiently, we have to need technologies such as location determination technology, platform technology and server technology first. In this study, we studied on how we can reduce the error on location determination of objects such people and things. Fingerprint location determination method was applied to this study because it can be used at current wireless communication infrastructure and less influenced by a variety of noisy environment than other location determination methods. We used the time of arrival(ToA) method in fingerprint location determination method. In order to confirm the performance of suggested method, we developed location determination test program with LAbVIEW 2010 and performed the test. According to indoor test results, the suggested method reduced the distance error by 24%, 34% and 19% respectively at indoor environment compared with deterministic kWNN and Rice Gaussian fingerprint methods.

Implementation of Prosumer Management System for Small MicroGrid (소규모 마이크로그리드에서 프로슈머관리시스템의 구현)

  • Lim, Su-Youn;Lee, Tae-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.590-596
    • /
    • 2020
  • In the island areas where system connection with the commercial power grid is difficult, it is quite important to find a method to efficiently manage energy produced with independent microgrids. In this paper, a prosumer management system for P2P power transaction was realized through the testing the power meter and the response rate of the collected data for the power produced in the small-scale microgrids in which hybrid models of solar power and wind power were implemented. The power network of the microgrid prosumer was composed of mesh structure and the P2P power transaction was tested through the power meter and DC power transmitter in the off-grid sites which were independently constructed in three places. The measurement values of the power meter showed significant results of voltage (average): 380V + 0.9V, current (average): + 0.01A, power: 1000W (-1W) with an error range within ±1%. Stabilization of the server was also confirmed with the response rate of 0.32 sec. for the main screen, 2.61 sec. for the cumulative power generation, and 0.11 sec for the power transaction through the transmission of 50 data in real time. Therefore, the proposed system was validated as a P2P power transaction system that can be used as an independent network without transmitted by Korea Electric Power Corporation (KEPCO).

Implementation of MPOA for Supporting Various Protocols over ATM (ATM 상에서 다양한 프로토콜을 지원하기 위한 MPOA의 구현)

  • Lim, Ji-Young;Kim, Mi-Hee;Choi, Jeong-Hyun;Lee, Mee-Jeong;Chae, Ki-Joon;Choi, Kil-Young;Kang, Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.181-199
    • /
    • 2000
  • In this paper, we implemented and tested MPOA(MutiProtocol Over ATM) standardized in ATM Forum, which provides service for various layer 3 protocols as well as legacy LAN applications over ATM networks. The functions of MPCs(MPOA Clients) and MPSs(MPOA Servers) which are the components in MPOA systems are implemented. MPCs are located at the edge device and MPOA hosts and MPSs exist in routers. The implemented MPCs have the functions such as exchances of primitives between an LEC(LAN Emulation Client) and an MPC, management and maintenance of Egress/Ingress cache, default transmission through LECs and shortcut transmission. Assuming that routing, convergence and NHRP(Next Hop Resolution Protocol) functions exist in routers, the implemented MPSs have the functions such as exchanges of primitives between an LEC and an MPC, conversion and exchanges of frames between MPOA and NHRP, and management and maintenance of Egress/Ingress cache. All of the possible scenarios are made up to test whether they run correctly. The implemented system is tested by simulation according to the scenarios.

  • PDF

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

Design of the Context Autogenesis Model and Service for Context-Aware in Ubiquitous Environments (유비쿼터스 환경에서의 컨텍스트-인식을 위한 자생적 컨텍스트 모델과 서비스의 설계)

  • Oh Dong yeol;Oh Hae seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.226-234
    • /
    • 2005
  • Context-Aware is the most important facts to reason a personalized and optimized service and to provide it to user. In the previous researches, user and surrounding environment were main facts of Context-Aware and middleware or center server has been proposed to support Context-Aware. In the daily space(for example, home, office, Car, etc), interactions between user and service can be a important facts of Context-Aware. In this paper, Context Autogenesis service model is introduced, simplified the Context-Aware process and designed the middleware which performs decentralize management for Context-Aware information of user's portable devices, so that problems occurred during the management and operation of existing Context-Aware system can be minimized and supporting user anonymity

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

Development of Data Synchronization Client based on SyncML (SyncML 기반의 자료 동기화 클라이언트 개발)

  • Jang, Dae-Jin;Park, Kee-Hyun;Ju, Hong-Taek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.357-367
    • /
    • 2005
  • According to the recent advancement of mobile computing technology and the hardware technology, the mobile device has rapidly come into wide use.'rho data in the central management server needs to confirm to that in mobile devices in order for the mobile device users to access the needed data regardless of time and place. This is called Data Synchronization. Currently, major mobile device manufacturing companies provide the data synchronization solutions, but these solutions are not compatible with other mobile devices/other applied services. In order to solve this problem, OMA(Open Mobile Alliance), mainly composed of mobile telecommunication companies, has suggested using the SyncML(Synchronization Markup Language) data synchronization method. This is an attempt to make a public standard. In this paper, the data synchronization client that synchronizes the PIMS (Personal Information Management System) data in mobile devices like PDA is developed, complying with the SyncML standard requirements.

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

중소기업의 공동 ASP환경을 이용한 WebERP 활용과 구축전략

  • Jeong, Sei-Hyun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.06a
    • /
    • pp.96-107
    • /
    • 2002
  • 21세기를 맞이하는 기업은 세계화와 국제화, 정보의 다양화 및 분산화, 제품수명주기의 단축과 수익률의 감소, 고품질의 제품, 지식산업의 등장, 고객 욕구의 증대 등 다양한 내 ${\cdot}$ 외적 환경변화에 대응해야 하고 경쟁우위를 확보하기 위해 끊임없이 기업의 변화능력을 확보해야 한다. 기업은 제품을 생산하여 판매하는 기업의 시스템 전체가 경쟁력을 갖추어 총체적 우위를 확보하고 고객의 기호와 감성에 호소하는 제품을 만들 수 있도록 다양한 정보를 제공하는 시스템을 필요로 하게 되었다. 즉, 시간과 서비스에 뒤진 고객지원체계는 기업의 성장에 절대적인 마이너스 요인이므로 고객 정보의 효율적 관리, 고객 요구에 대한 신속한 대응, 정기적 고객만족도 조사 등 고객이 원하는 것을 재빠르게 얻어낼 수 있는 고객 친밀형 정보시스템의 확립이 요구되는 것이다. 이를 해결해 줄 수 있는 새로운 경영정보시스템이 바로 WebERP인 것이다. WebERP는 기업의 원활한 자재, 구매활동을 위해 제안된 MRP에서 시작되었으며, 생산관리의 개념을 포함하고 있는 MRPII로 확대되었다가 다시 인사나 회계, 재무 등 조직이나 기업의 전업무영역을 수용하는 종합경영정보시스템으로 발전된 것이다. 현재는 전자상거래와 관련하여 WebERP의 필요성이 부각되었고, 모기업과 협력사간의 구매발주 및 납품관리를 확대시켜 소모성자재(MRO: Maintenance, Repair & Operation) 및 기타 공동구매서비스와 유사업종간의 그룹을 형성하여 ASP(Application Service Provider)의 공동 환경을 이용한 WebERP 환경을 이용한 WebERP활용이 현시점으로 적실히 필요한 것이다. 이는 중소기업들의 공동 협업체제를 도모하여 외세를 대비하는 응집력을 확고히 함으로써 집단체제의 e마켓플레이스 확립과 더불어 국제경쟁을 대비한 방안으로서 집단 공동의 웹환경 인프라가 필요한 것이다. 이러한 배경에서 ASP환경을 이용한 WebERP활용방안과 시스템 구축전략을 경남지역의 기계산업정보화사업단이 추진하는 일반기계, 전기기계, 금속기계, 수송기계, 정밀기계의 5개 업종을 4,877개 기업 대상으로 추진하고 있으며, 그 중 WebERP의 모델로서 2003년도까지 50개 기업을 선정하고, 이는 5개 업종 골고루 선정하여 적용과 표준화 모델로 전개해 나가는 것을 정리한 것이다.

  • PDF