• Title/Summary/Keyword: Remote storage

Search Result 254, Processing Time 0.03 seconds

Development of a remote controlled mobile robot system for monitoring nuclear power plant (원전 이동감시 및 방사선 측정용 원격조종 로봇 개발)

  • 구관모;이범희;우희곤
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.511-515
    • /
    • 1996
  • A remote controlled mobile robot system has been developed and tested to monitor the radiation area in the nuclear power plant. The mobile robot system operates according to car-driving-like commands and is capable of radiation measurement and visual inspection in unmanned situations under radiation. The robot system is equipped with a radiation sensor and two cameras with appropriate illumination set-ups. The camera with auto-focus function and 8-times zoom lens is mounted on the pan/tilt rotational base and the other is mounted on the front panel of the robot system. All commands regarding the motion of the mobile robot and various sensors are given through the monitoring system which is designed to provide an integrated man-machine interface.

  • PDF

Oil Field Geographical Information System Based on Remote Sensing, GIS and GPS

  • Wang, Ziyu;Chen, Xiuwan
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1310-1311
    • /
    • 2003
  • Oil Field Geographical Information System (OFGIS) manages multiple spatial data, attribute data, and topographic data, which include almost every kind of ground info rmation and underground information. Subsystems managed by OFGIS include petroleum exploration subsystem (PESS), petroleum development and engineering subsystem (PDESS), petrochemical subsystem (PCSS), petroleum storage and transportation subsystem (PSTSS), petroleum sale subsystem (PSSS), etc. A basic OFGIS framework consists of oil field infrastructure coverage (OFIC), oil field specialized information coverage (OFSIC) and oil field synthesis and decision service coverage (OFSDSC). Basic function of OFGIS includes database management, geographic information management, spatial information processing and application.

  • PDF

Future Trends in Microcomputer Image Processing Technology

  • Yang, Young-Kyu;Miller, Lee-D.
    • Korean Journal of Remote Sensing
    • /
    • v.2 no.1
    • /
    • pp.35-47
    • /
    • 1986
  • The progress in computer technology has significantly improved the capabilities of the microcomputer image processing systems and brought down their hardware costs. This on-going trend of technological development seems to bring further substantive improvements in microcomputer image processing and decreasing hardware costs. The technical development in microcomputer image processing system including VLSI technology, semiconductor memory, disk and tape storage, and image display subsystems have been reviewed and their future trend have been projected. The impact of this technology to the development of image processing has been assessed in the time period of immediate future (2-3 years) and near future (5 years).

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.

An Improved Way of Remote Storage Service based on iSCSI for Mobile Device using Intermediate Server (모바일 디바이스를 위한 iSCSI 기반의 원격 스토리지 서비스에서 중간 서버를 이용한 성능 개선 방안)

  • Kim Daegeun;Park Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.843-850
    • /
    • 2004
  • As mobile devices prevail, requests for various services using mobile devices have increased. Requests for application services that require large data space such as multimedia, game and database [1] specifically have greatly increased. However, mobile appliances have difficulty in applying various services like a wire environment, because the storage capacity of one is not enough. Therefore, research (5) which provides remote storage service for mobile appliances using iSCSI is being conducted to overcome storage space limitations in mobile appliances. But, when iSCSI is applied to mobile appliances, iSCSI I/O performance drops rapidly if a iSCSI client moves from the server to a far away position. In the case of write operation, $28\%$ reduction of I/O performance occurred when the latency of network is 64ms. This is because the iSCSI has a structural quality that is very .sensitive to delay time. In this paper, we will introduce an intermediate target server and localize iSCSI target to improve the shortcomings of iSCSI performance dropping sharply as latency increases when mobile appliances recede from a storage server.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

KOMPSAT-2 MSC DCSU Operational Concept

  • Lee, Jong-Tae;Lee, Sang-Gyu;Lee, Sang-Taek
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.821-826
    • /
    • 2002
  • The KOMPSAT-2 DCSU(the data compression & storage unit) performs the acquisition of image data from cameras, the compression with requested compression rate, the storage with specified file ID on the mission command and the distribution to the assigned DLS(Data Link System) channels per the mission and operation requirements. The worldwide observation using the MSC is able to be achieved by this DCSU's behavior. This paper presents the features of KOMPSAT-2 DCSU and provides proper ground operation concept after launch.

  • PDF