• Title/Summary/Keyword: Management server

Search Result 1,838, Processing Time 0.028 seconds

Implementation of a Web-based Hybrid Engineering Experiment System for Enhancing Learning Efficiency (학습효율 향상을 위한 웹기반 하이브리드 공학실험시스템 구현)

  • Kim, Dong-Sik;Choi, Kwan-Sun;Lee, Sun-Heum
    • Journal of Engineering Education Research
    • /
    • v.10 no.3
    • /
    • pp.79-92
    • /
    • 2007
  • To enhance the excellence, effectiveness and economical efficiency in the learning process, we implement a hybrid educational system for engineering experiments where web-based virtual laboratory systems and distance education systems are properly integrated. In the first stage, we designed client/server distributed environment and developed web-based virtual laboratory systems for digital systems and electrical/electronic circuit experiments. The proposed virtual laboratory systems are composed of four important sessions and their management system: concept learning session, virtual experiment session, assessment session. With the aid of the management system every session is organically tied up together to achieve maximum learning efficiency. In the second stage, we have implemented efficient and cost-effective distant laboratory systems for practicing electric/electronic circuits, which can be used to eliminate the lack of reality occurred during virtual laboratory session. The use of simple and user-friendly design allows a large number of people to access our distant laboratory systems easily. Thus, self-guided advanced training is available even if a lot of expensive equipment will not be provided in the on-campus laboratories. The proposed virtual/distant laboratory systems can be used in stand-alone fashion, but to enhance learning efficiency we integrated them and developed a hybrid educational system for engineering experiments. Our hybrid education system provides the learners with interactive learning environment and a new approach for the delivery of engineering experiments.

A Study on Conversion Methods for Generating RDF Ontology from Structural Terminology Net (STNet) based on RDB (관계형 데이터베이스 기반 구조적학술용어사전(STNet)의 RDF 온톨로지 변환 방식 연구)

  • Ko, Young Man;Lee, Seung-Jun;Song, Min-Sun
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.2
    • /
    • pp.131-152
    • /
    • 2015
  • This study described the results of converting RDB to RDF ontology by each of R2RML method and Non-R2RML method. This study measured the size of the converted data, the conversion time per each tuple, and the response speed to queries. The STNet, a structured terminology dictionary based on RDB, was served as a test bed for converting to RDF ontology. As a result of the converted data size, Non-R2RML method appeared to be superior to R2RML method on the number of converted triples, including its expressive diversity. For the conversion time per each tuple, Non-R2RML was a little bit more faster than R2RML, but, for the response speed to queries, both methods showed similar response speed and stable performance since more than 300 numbers of queries. On comprehensive examination it is evaluated that Non-R2RML is the more appropriate to convert the dynamic RDB system, such as the STNet in which new data are steadily accumulated, data transformation very often occurred, and relationships between data continuously changed.

Construction of CORBA Object-Group Platform for Distributed Real-Time Service (분산 실시간 서비스를 위한 CORBA 객체그룹 플랫폼의 구축)

  • Kim, Myung-Hee;Joo, Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.602-613
    • /
    • 2001
  • Recently, the computing has developing in distributed object computing environment for supporting a programming paradigm of distributed application requiring interoperability between heterogeneous clients and servers. It involves the complex networking and the object-oriented technologies for various multimedia application service. In this paper, we construct the real-time object group platform for solving the difficulties of managements of distributed objects and the real-time constraints by requiring for real-time service supporting of applications in distributed computing environment. The existing researches are being tried to only improving the performance of systems by using real-time CORBA itself, or modifying the part of CORBA compliance. Hence, we design a new model of real-time object group platform that can support the real-time requirement without modifying the ORB. The structure of our real-time object group analyzed and defined the requirement about object management and real-time application service sides. And the role of the components of real-time object group is divided into 2 classes for reducing the side effect of interoperability between management and service. Also, we considered how to transparently express the parameters of real-time properties for clients and developers of server's service objects. If the expression of real-time parameters is transparent, then the developer can easily extend the real-time parameters simply and flexibly. Therefore, in this paper we defined the role of components of platform and described functions of each component and designed and then implemented the real-time object group platform. Finally, we showed the execution procedures of implemented our platform for verifying the functionality.

  • PDF

Design and Implementation of Constructing and Utilizing an Attendance Book based on SmartPhone Apps (스마트폰 앱을 활용한 출석부 구성 및 활용 시스템의 설계와 구현)

  • Pyun, Kihyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.14-23
    • /
    • 2014
  • Existing attending management systems require a high cost and are lack of convenience. In this paper, we propose a convenient and practical attending management system as follows: First, our system allows us to construct an attendance book in an easy and simple way. A professor does not have to provide the information of students using the small screen of his smartphone. Instead, each student manages his own information via the app designed for a student in our system. Then the professor can construct the attendance book using another app designed for the professor by confirming the requests from the app designed for a student. Second, our system enables a professor to utilize the pictures of students as well as other information of students to have a good relationship with students. Third, our system provides a functionality of checking attendance automatically by calling the names of students via the app designed for the professor. Then the professor has only to match the name with the face of each student. Fourth, our system provides a functionality of checking attendance in a very fast manner. Our system can complete this behavior within a short time since all students can join the attendance simultaneously by using the app designed for the student. Fifth, our system can prevent an illegal attendance easily by utilizing the distance information.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

Implementation of Prosumer Management System for Small MicroGrid (소규모 마이크로그리드에서 프로슈머관리시스템의 구현)

  • Lim, Su-Youn;Lee, Tae-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.590-596
    • /
    • 2020
  • In the island areas where system connection with the commercial power grid is difficult, it is quite important to find a method to efficiently manage energy produced with independent microgrids. In this paper, a prosumer management system for P2P power transaction was realized through the testing the power meter and the response rate of the collected data for the power produced in the small-scale microgrids in which hybrid models of solar power and wind power were implemented. The power network of the microgrid prosumer was composed of mesh structure and the P2P power transaction was tested through the power meter and DC power transmitter in the off-grid sites which were independently constructed in three places. The measurement values of the power meter showed significant results of voltage (average): 380V + 0.9V, current (average): + 0.01A, power: 1000W (-1W) with an error range within ±1%. Stabilization of the server was also confirmed with the response rate of 0.32 sec. for the main screen, 2.61 sec. for the cumulative power generation, and 0.11 sec for the power transaction through the transmission of 50 data in real time. Therefore, the proposed system was validated as a P2P power transaction system that can be used as an independent network without transmitted by Korea Electric Power Corporation (KEPCO).

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

A Study on Usability of Open Source Software for Developing Records System : A Case of ICA AtoM (공개 소프트웨어를 이용한 기록시스템 구축가능성 연구 ICA AtoM을 중심으로)

  • Lee, Bo-Ram;Hwang, Jin-Hyun;Park, Min-Yung;Kim, Hyung-Hee;Choi, Dong-Woon;Choi, Yun-Jin;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.193-228
    • /
    • 2014
  • In recent years, as well as management of public records, interest in the private archive of large and small is growing. Dedicated archive has various types. In addition, lack of personnel and budget, personnel records management professional because the absence, that help you maintain these records in a systematic manner is not easy. Request to the system have continued to rise, but the budget and professionals in order to solve this problem are missing. As breakthrough of the burden to the system with archive dedicated, it introduces the trends and meaning of public recording system, and was examined in detail AtoM function. AtoM is public land can be made by a method that requires a Web service, the database server. Without restrictions, including the advantage of being available free of charge, by the application or operating system specific, installation and operation is convenient. In addition, compatibility, and is highly scalable, AtoM use and convenient archive of private experiencing a shortage of personnel and budget. Because in terms of data management, and excellent interoperability and search share, and use, it is possible in the future, it favors also documentary use through a network of inter-agency archives and private. In addition, Enhancements exhibition services through cooperation with Omeka, long-term storage through Archivematica, many discussion is needed. Public centered around the private area of the recording management spilling expanded, open-source software allows to balance the recording system will be able to play an important role. In addition, the efforts of academia and in the field, close collaboration between the open source recording system through a user study should be continued. Furthermore, co-operation and sharing of private archives expect come true.