• Title/Summary/Keyword: Mobile Cloud

Search Result 565, Processing Time 0.026 seconds

Privilege Management Technology based-on One-time Certificate for Smart Device in Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 스마트 디바이스용 일회용 인증서 기반 권한 관리 기술)

  • Moon, Jong-Sik;Han, Seung-Wan;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.832-835
    • /
    • 2011
  • 공인인증서의 사용은 꾸준히 증가하고 있으나 증가하는 사용량에 비례하여 하드디스크에 저장된 공인인증서 해킹으로 인한 피해 사례가 증가하고 있다. 이에 따라 정부는 하드디스크 내 공인인증서 저장을 금지하고 이동형 저장매체에 저장하도록 하는 방침을 내놓았다. 또한 모바일 클라우드 컴퓨팅 환경에서는 중앙의 스토리지에 데이터가 저장되기 때문에 공인인증서를 중앙 스토리지에 저장하는 것은 매우 위험한 일이다. 이러한 방침으로 인해 앞으로 USB 메모리 및 스마트폰과 같은 이동형 저장매체에 대한 중요성이 높아질 것이며, 분실 위험이 높은 USB 메모리 및 스마트폰의 특징에 따라 인증서가 저장된 저장매체 없이도 인증서를 사용할 수 있는 방안이 필요하게 될 것이다. 본 논문은 일회용 인증서에 대한 요구사항 분석 및 형식을 설계하고, PKI 인증서를 기반으로 경량화된 일회용 인증서를 발급받아 인증서를 사용할 수 있도록 하였다. 또한 모바일 클라우드 컴퓨팅 환경에서 일회용 인증서를 이용한 권한 관리 기술을 제안하여 안전성과 효율성을 제공하도록 하였다.

User Verification System using QRcode in Mobile Telemedicine Cloud Environment (모바일 원격의료 클라우드 환경에서 QRcode를 이용한 사용자 검증 시스템 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Lee, Jun-Woo;Li, QiGui;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.858-861
    • /
    • 2011
  • Smart Society로 나아가는 핵심으로 손꼽히는 모바일의 급속한 확산은 교육, 교통, 경제뿐만 아니라 건강에도 큰 영향을 미치고 있다. 그동안 발전이 미진했던 u-Health 기술 및 시장 역시 모바일로 인해 새로운 서비스 모델을 제시함으로써 발전하고 있다. 본 논문은 제안하는 시스템은 u-Health 서비스 중 sensor를 이용하여 원격지 환자의 생체정보를 수집하고, 실시간으로 병원의 클라우드 서버에 전송하는 시스템에서 사용자 검증에 대하여 연구하였다. 여기서 사용자란 클라우드 서버에 접속하는 의사를 말하며, 환자의 생체정보를 보기 위하여 시스템 접속함에 있어 공인인증서나 기타 인증 시스템과 비교해 간편하고, 네트워크 트래픽이 적은 사용자 검증 시스템을 목표로 한다. 그리하여 QRcode를 3개 생성하고, 각 클라우드 서버에 분산 분배 후 서로 섞음으로써 기존의 QRcode와 전혀 다른 인증용 QRcode를 생성할 수 있었다. 이것을 3차원 인덱스를 통해 원본 사용자 QRcode와 대조함으로 사용자 검증 과정을 수행시킴으로써 절차를 간소화하고 네트워크 트래픽을 약 15% 감소시킬 수 있었다.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.

Mobile Augmented Reality based CFD Simuation Post-Processor (모바일 증강현실 기술을 활용한 유체시뮬레이션 후처리기 연구)

  • Park, Sang-Jin;Kim, Myungil;Kim, Ho-yoon;Seo, Dong-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.523-533
    • /
    • 2019
  • The convergence of engineering and IT technology has brought many changes to the industry as well as academic research. In particular, computer simulation technology has evolved to a level that can accurately simulate actual physical phenomena and analyze them in real time. In this paper, we describe the CFD technology, which is mainly used in industry, and the post processor that uses the augmented reality which is emerging as the post-processing. Research on the visualization of fluid simulation results using AR technology is actively being carried out. However, due to the large size of the result data, it is limited to researches that are published in a desktop environment. Therefore, it is limitation that needs to be reviewed in actual space. In this paper, we discuss how to solve these problems. We analyze the fluid analysis results in the post-processing, and then perform optimizing data (more than 70%)to support operation in the mobile environment. In the visualization, lightweight data is used to perform real-time tracking using cloud computing, The analysis result is matched to the screen and visualized. This allows the user to review and analyze the fluid analysis results in an efficient and immersive manner in the various spaces where the simulation is performed.

MMS Data Accuracy Evaluation by Distance of Reference Point for Construction of Road Geospatial Information (도로공간정보 구축을 위한 기준점 거리 별 MMS 성과물의 정확도 평가)

  • Lee, Keun Wang;Park, Joon Kyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.549-554
    • /
    • 2021
  • Precise 3D road geospatial information is the basic infrastructure for autonomous driving and is essential data for safe autonomous driving. MMS (Mobile Mapping System) is being used as equipment for road spatial information construction, and related research is being conducted. However, there are insufficient studies to analyze the effect of the baseline reference point distance, which is an important factor in the accuracy of the MMS outcome, on the accuracy of the outcome. Therefore, in this study, the accuracy of the data acquired using MMS by reference point distance was analyzed. Point cloud data was constructed using MMS for the road in the study site. For data processing, 4 data were constructed considering the distance from the reference point for MMS data, and the accuracy was analyzed by comparing the results of 12 checkpoints for accuracy evaluation. The accuracy of the MMS data showed a difference of -0.09 m to 0.11 m in the horizontal direction and 0.04 m to 0.19 m in the height direction. The error in the vertical direction was larger than that in the horizontal direction, and it was found that the accuracy decreased as the distance from the reference point increased. In addition, as the length of the road increases, the distance from the reference point may vary, so additional research is needed. If the accuracy evaluation of the method using multiple reference points is made in the future, it will be possible to present an effective method of using reference points for the construction of precise road spatial information.

A Study on 3D Indoor mapping for as-built BIM creation by using Graph-based SLAM (준공 BIM 구축을 위한 Graph-based SLAM 기반의 실내공간 3차원 지도화 연구)

  • Jung, Jaehoon;Yoon, Sanghyun;Cyrill, Stachniss;Heo, Joon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.3
    • /
    • pp.32-42
    • /
    • 2016
  • In Korea, the absence of BIM use in existing civil structures and buildings is driving a demand for as-built BIM. As-built BIMs are often created using laser scanners that provide dense 3D point cloud data. Conventional static laser scanning approaches often suffer from limitations in their operability due to the difficulties in moving the equipment, the selection of scanning location, and the requirement of placing targets or extracting tie points for registration of each scanned point cloud. This paper aims at reducing the manual effort using a kinematic 3D laser scanning system based on graph-based simultaneous localization and mapping (SLAM) for continuous indoor mapping. The robotic platform carries three 2D laser scanners: the front scanner is mounted horizontally to compute the robot's trajectory and to build the SLAM graph; the other two scanners are mounted vertically to scan the profiles of surrounding environments. To reduce the accumulated error in the trajectory of the platform through loop closures, the graph-based SLAM system incorporates AdaBoost loop closure approach, which is particularly suitable for the developed multi-scanner system providing more features than the single-scanner system for training. We implemented the proposed method and evaluated it in two indoor test sites. Our experimental results show that the false positive rate was reduced by 13.6% and 7.9% for the two dataset. Finally, the 2D and 3D mapping results of the two test sites confirmed the effectiveness of the proposed graph-based SLAM.

YOLO-based Traffic Signal Detection for Identifying the Violation of Motorbike Riders (YOLO 기반의 교통 신호등 인식을 통한 오토바이 운전자의 신호 위반 여부 확인)

  • Wahyutama, Aria Bisma;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.141-143
    • /
    • 2022
  • This paper presented a new technology to identify traffic violations of motorbike riders by detecting the traffic signal using You Only Look Once (YOLO) object detection. The hardware module that is mounted on the front of the motorbike consists of Raspberry Pi with a camera to run the YOLO object detection, a GPS module to acquire the motorcycle's coordinate, and a LoRa communication module to send the data to a cloud DB. The main goal of the software is to determine whether a motorbike has violated a traffic signal. This paper proposes a function to recognize the red traffic signal colour with its movement inside the camera angle and determine that the traffic signal violation happens if the traffic signal is moving to the right direction (the rider turns left) or moving to the top direction (the riders goes straight). Furthermore, if a motorbike rider is violated the signal, the rider's personal information (name, mobile phone number, etc), the snapshot of the violation situation, rider's location, and date/time will be sent to a cloud DB. The violation information will be delivered to the driver's smartphone as a push notification and the local police station to be used for issuing violation tickets, which is expected to prevent motorbike riders from violating traffic signals.

  • PDF

A Study on Implementation of the Push System Based on FCM Service Inducing Communication of Candidates and Influence on Voters: Using Smart Devices Application (FCM 서비스를 이용한 후보자 소통 유도 푸시 시스템의 구현과 유권자에게 미치는 영향에 관한 연구 : 스마트 디바이스 어플리케이션을 활용하여)

  • Lee, Seungwon;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.454-463
    • /
    • 2017
  • Advancement of science and technology have led to development of the media, which has evolved election campaign strategies. Nowadays, media development has made communication more important, and it is a growing trend where smart-device applications are widely used to facilitate communication with electors. Based on Google's Fire base Cloud Messaging (FCM) push service, which keeps up with the fast-changing election trends and supports election campaigns systematically, this research aims to help accomplish the goals of an election campaign by developing an information system and performing empirical analysis of the variables that the information system affects. The system consists of an elector's application and a management system. The management system includes browsing and management of received-and sent-message history, and direct management of the application. By managing the push system in more progressive ways, this system will help to improve the effectiveness of election campaigns and accomplish election goals.

A study of Reference Model of Smart Library based on Linked Open Data (링크드오픈데이터 기반 스마트 라이브러리의 참조모델에 관한 연구)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1666-1672
    • /
    • 2016
  • In recent years, smart technology has been applied to various information system fields. Especially, traditional library service area is changing to Smart-Library from Digital-Library. In this environment are need to library service software platform for supporting variety content, library services, users and smart-devices. Due to this, existing library service has a limitation that inhibits semantic interoperability between different heterogeneous library systems. In this paper, we propose Linked-Open-Data based smart library as an archetype of future-library system that provide a variety content and system interaction and integration of services. It is an innovative system of the cutting-edge information intensive. Therefore, we designed system environments according to various integration requirements for smart library based on Linked-Open-Data. And, we describe the functional requirements of smart-library systems by considering the users' demands and the eco-systems of information technology. In addition, we show the reference framework, which can accommodate the functional requirements and provide smart knowledge service to user through a variety of smart-devices.

A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme (조건값의 개수에 독립적인 조건부 프록시 재암호화 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.147-155
    • /
    • 2013
  • Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption. To solve this problem, conditional proxy re-encryption scheme was proposed. But, it is computationally expensive generate the same number of re-encryption key with the number of condition values. In this paper, we propose an efficient conditional proxy re-encryption scheme in terms of re-encryption key generation. The proposed scheme uses only encryption and decryption process. Therefore it has advantage to generate one re-encryption key for one person. The proposed scheme is secure against chosen-ciphertext attack.