• Title/Summary/Keyword: Ubiquitous Environments

Search Result 574, Processing Time 0.031 seconds

USN Metadata Managements Agent based on XMDR-DAI for Sensor Network (센서 네트워크를 위한 XMDR-DAI 기반의 USN 메타데이터 관리 에이전트)

  • Moon, Seok-Jae;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.247-249
    • /
    • 2014
  • Ubiquitous Sensor Network (USN) environments, sensors and sensor nodes, and coming from heterogeneous sensor networks consist of one another, the characteristics of each component are also very diverse. Thus the sensor and the sensor nodes to interoperability between metadata for a single definition, management is very important. For this, the standard language for modeling sensor SensorML (Sensor Model Language) has. In this paper, sensor devices, sensor nodes and sensor networks for information technology in the application stage XMDR-DAI -based metadata to define the USN. The proposed XMDR-DAI USN based store and retrieve metadata for a method for effectively agent technology. Metadata of the proposed sensor is based SensorML USN environment by maintaining interoperability 50-200 USN middleware or a metadata management system for managing metadata in applications can be utilized directly.

  • PDF

An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services (안전한 웹서비스를 위한 멀티 에이전트 기반의 확장된 SAML 위임 모델)

  • Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.111-122
    • /
    • 2008
  • Web service is defined to support interoperable machine to machine interaction over a network and defined as distributed technologies. Recently in web service environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, the users of web services must temporarily delegate some or all of their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of web service and user privacy in ubiquitous computing environments. In order to provide safety of web service and user privacy, XML-based encryption and a digital signature mechanism need to be efficiently integrated. In this paper, we propose web service management server based on XACML, in order to manage services and policies of web service providers. For this purpose, we extend SAML to declare delegation assertions transferred to web service providers by delegation among agents.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

Mechanistic Study of FeS Reacted with Arsenate under Various pH Conditions (FeS 수용액 내 pH에 따른 5가비소의 반응 메커니즘 연구)

  • Han, Young-Soo;Lee, Mu Yeol;Seong, Hye Jin
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.1
    • /
    • pp.25-30
    • /
    • 2022
  • Mackinawite (FeS), as a ubiquitous reduced iron mineral, is known as a key controller of redox reactions in anaerobic subsurface environment. The reaction of FeS with redox-sensitive toxic element such as arsenic is substantially affected by pH conditions of the given environments. In this study, the interaction of As(V) with FeS was studied under strict anaerobic conditions with various pH conditions. The pH-dependent arsenic removal tests were conducted under wide ranges of pH conditions and X-ray absorption spectroscopy (XAS) was applied to investigate the reaction mechanisms under pH 5, 7, and 9. The removal efficiency of FeS for As(V) showed the higher removal of As(V) under low pH conditions and its removal efficiency decreased with increasing pH, and no As(V) reduction was observed in 1 g/L FeS solution. However, XAS analysis indicated the reduction of As(V) to As(III) occurred during reaction between FeS and As(V). The reduced form of As(III) was particularly identified as an arsenic sulfide mineral (As2S3) in all pH conditions (pH 5, 7, and 9). As2S3 precipitation was more pronounced in pH 5 where the solubility of FeS is higher than in other pH conditions. The linear combination fitting results of XAS demonstrated that As(V) removal mechanism is concerted processes of As2S3 precipitation and surface complexation of both arsenic species.

Preparing for low-surface-brightness science with the Rubin Observatory: characterisation of LSB tidal features from mock images

  • Martin, Garreth W.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.40.3-41
    • /
    • 2021
  • Minor mergers leave behind long lived, but extremely faint and extended tidal features including tails, streams, loops and plumes. These act as a fossil record for the host galaxy's past interactions, allowing us to infer recent accretion histories and place constraints on the properties and nature of a galaxy's dark matter halo. However, shallow imaging or small homogeneous samples of past surveys have resulted in weak observational constraints on the role of galaxy mergers and interactions in galaxy assembly. The Rubin Observatory, which is optimised to deliver fast, wide field-of-view imaging, will enable deep and unbiased observations over the 18,000 square degrees of the Legacy Survey of Space and Time (LSST), resulting in samples of potentially of millions of objects undergoing tidal interactions. Using realistic mock images produced with state-of-the-art cosmological simulations we perform a comprehensive theoretical investigation of the extended diffuse light around galaxies and galaxy groups down to low stellar mass densities. We consider the nature, frequency and visibility of tidal features and debris across a range of environments and stellar masses as well as their reliability as an indicator of galaxy accretion histories. We consider how observational biases such as projection effects, the point-spread-function and survey depth may effect the proper characterisation and measurement of tidal features, finding that LSST will be capable of recovering much of the flux found in the outskirts of L* galaxies at redshifts beyond local volume. In our simulated sample, tidal features are ubiquitous In L* galaxies and remain common even at significantly lower masses (M*>10^10 Msun). The fraction of stellar mass found in tidal features increases towards higher masses, rising to 5-10% for the most massive objects in our sample (M*~10^11.5 Msun). Such objects frequently exhibit many distinct tidal features often with complex morphologies, becoming increasingly numerous with increased depth. The interpretation and characterisation of such features can vary significantly with orientation and imaging depth. Our findings demonstrate the importance of accounting for the biases that arise from projection effects and surface-brightness limits and suggest that, even after the LSST is complete, much of the discovery space in low surface-brightness Universe will remain to be explored.

  • PDF

Distribution and Antibiotic Resistance of Vibrio spp. Isolated from Fishery Products and Coastal Areas in Gyeongsangnam-do (경상남도 유통 어패류와 해양환경에서 분리된 비브리오균속 (Vibrio spp.) 분포 및 항생제 내성 특성)

  • Jin Yeong Tak;Jeong Gil Park;Ji-Young Um;Su Wan Choi;Na Lam Hwang;Mi Suk Kim;Jae Dong Kim
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.56 no.5
    • /
    • pp.626-633
    • /
    • 2023
  • Vibrio spp. are aquatic bacteria that are ubiquitous in warm estuarine and marine environments. Especially, V. vulnificus and V. cholerae are currently known to cause potentially fatal infections in humans. This study investigated the distribution and antibiotic resistance of V. vulnificus and V. cholerae isolated from coastal areas of Gyeongsangnam-do in 2022. A total of 252 samples of water, shellfish and coastal sediment were collected from 7 locations along the coast, and 124 samples of fishery products were collected from markets. Among the 252 samples, forty-four V. vulnificus (11.7%) and fourteen V. cholerae non-O1/non-O139 (3.7%), none of which carried the ctx gene, were isolated. Out of the 124 samples, 6 (4.8%) tested positive for V. vulnificus and V. cholerae was not detected. The isolation rates of V. vulnificus and V. cholerae showed a significant correlation with environmental factors such as seawater temperature and salinity. In an antibiotic resistance test, V. vulnificus was susceptible to amikacin, gentamicin, imipenem trimethoprim/sulfamethoxazole, and ciprofloxacin, but resistant to cefoxitin (100.0%), followed by tetracycline (9.1%). Multidrug resistance was also observed. Continuous monitoring of Vibrio pathogens with water temperature and salinity is expected to help reduce the outbreaks, and rational use of antibiotic agents is needed to prevent the accession of antibiotic-resistant microorganisms in aquatic ecosystems.

Holocarpic oomycete parasites of red algae are not Olpidiopsis, but neither are they all Pontisma or Sirolpidium (Oomycota)

  • Giuseppe C. Zuccarello;Claire M. M. Gachon;Yacine Badis;Pedro Murua;Andrea Garvetto;Gwang Hoon Kim
    • ALGAE
    • /
    • v.39 no.1
    • /
    • pp.43-50
    • /
    • 2024
  • Oomycetes are ubiquitous heterotrophs of considerable economic and ecological importance. Lately their diversity in marine environments has been shown to be greatly underappreciated and many lineages of intracellular holocarpic parasites, infecting micro- and macro-algae, remain to be fully described taxonomically. Among them, pathogens of marine red algae have been studied extensively as they infect important seaweed crops. Throughout the 20th century, most intracellular, holocarpic biotrophic oomycetes that infect red algae have been assigned to the genus Olpidiopsis Cornu. However, 18S rRNA sequencing of Olpidiopsis saprolegniae, the species considered the generitype for Olpidiopsis, suggests that this genus is not closely related to the marine pathogens and that the latter requires a nomenclatural update. Here, we compile and reanalyze all recently published 18S rRNA sequence data for marine holocarpic oomycetes, with a particular focus on holocarpic pathogens of red algae. Their taxonomy has been revised twice over the past four years, with suggestions to transfer them first into the genus Pontisma and then Sirolpidium, and into a monogeneric order, Pontismatales. We show however, that previously published topologies and the proposed taxa Pontisma, Sirolpidium, and Pontismatales are unsupported. We highlight that name changes that are unfounded and premature create confusion in interested parties, especially concerning pathogens of marine red algae that infect important seaweed crops. We thus propose that the names of these holocarpic biotrophic parasites of red algae are retained temporarily, until a supported topology is produced with more genetic markers to enable the circumscription of species and higher-level taxa.

A Smoothing Data Cleaning based on Adaptive Window Sliding for Intelligent RFID Middleware Systems (지능적인 RFID 미들웨어 시스템을 위한 적응형 윈도우 슬라이딩 기반의 유연한 데이터 정제)

  • Shin, DongCheon;Oh, Dongok;Ryu, SeungWan;Park, Seikwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.1-18
    • /
    • 2014
  • Over the past years RFID/SN has been an elementary technology in a diversity of applications for the ubiquitous environments, especially for Internet of Things. However, one of obstacles for widespread deployment of RFID technology is the inherent unreliability of the RFID data streams by tag readers. In particular, the problem of false readings such as lost readings and mistaken readings needs to be treated by RFID middleware systems because false readings ultimately degrade the quality of application services due to the dirty data delivered by middleware systems. As a result, for the higher quality of services, an RFID middleware system is responsible for intelligently dealing with false readings for the delivery of clean data to the applications in accordance with the tag reading environment. One of popular techniques used to compensate false readings is a sliding window filter. In a sliding window scheme, it is evident that determining optimal window size intelligently is a nontrivial important task in RFID middleware systems in order to reduce false readings, especially in mobile environments. In this paper, for the purpose of reducing false readings by intelligent window adaption, we propose a new adaptive RFID data cleaning scheme based on window sliding for a single tag. Unlike previous works based on a binomial sampling model, we introduce the weight averaging. Our insight starts from the need to differentiate the past readings and the current readings, since the more recent readings may indicate the more accurate tag transitions. Owing to weight averaging, our scheme is expected to dynamically adapt the window size in an efficient manner even for non-homogeneous reading patterns in mobile environments. In addition, we analyze reading patterns in the window and effects of decreased window so that a more accurate and efficient decision on window adaption can be made. With our scheme, we can expect to obtain the ultimate goal that RFID middleware systems can provide applications with more clean data so that they can ensure high quality of intended services.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.