• Title/Summary/Keyword: User Identifier

Search Result 66, Processing Time 0.028 seconds

Design of the Autogenous Context Service and Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 자생적 컨텍스트 서비스와 미들웨어의 설계)

  • Oh Hae-Seok;Oh Dong-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1088-1098
    • /
    • 2005
  • Context-Aware is a one of the important researches in ubiquitous computing for providing optimal service to users by acquiring user's intentions and environmental information. Diverse researches are focused on the users and its environment facts for Context-Aware base and introduce a sensing based middleware which engages sever/sensor that operates identifier information to provide services. Context-Aware service which is limited by users and environment facts has the problem of overlapping sensing, unnecessary searching and anonymity of users. Also Server-Centric Context-Aware system requires very high cost to manage and operate the services. On this paper, We introduce Autogenous Context service model to simplify the Context-Aware process and design the middleware which performs decentralize management for Context-Aware information of user's portable devices to minimize problems which is occurred during the management and operation of existing Context-Aware system.

  • PDF

Service Class-Aided Scheduling for LTE (LTE를 위한 서비스 클래스를 고려한 스케줄링 기법)

  • Hung, Pham;Hwang, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.60-66
    • /
    • 2011
  • LTE (Long Term Evolution) supports QoS (Quality of Service) with several service classes. For each class of traffic, a big difference exists on BER (Bit Error Rate) requirement. This leads to a considerable difference in transmission power for various classes of traffic. In this paper, a novel scheduler is designed and proposed for LTE which supports CoS (Class of Service) with the consideration of priority as well as target BER. By the CQI (Channel Quality Indicator) and QCI (QoS Class Identifier), a minimum transmission power is assigned from the target BER for each class of traffic per each user. Hence, with the other information such as user's used rate in the past and the priority of traffic, the probability of occupying channels is determined. The simulation results of Service Class scheduling are compared with that of Maximum Rate and Proportional Fair. The results show that the service class-aided scheduling can improve the throughput of whole system significantly.

A Study on the Implementation of the Multi-Process Structured ISDN Terminal Adaptor for Sending the Ultra Sound Medical Images (다중처리 구조를 갖는 초음파 의료영상 전송용 ISDN(Integrated Services Digital Network) TA(Terminal Adaptor) 구현에 관한 연구)

  • 남상규;이영후
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.3
    • /
    • pp.317-324
    • /
    • 1994
  • This paper proposed a new method in the implementation of ISDN (integrated services digital network) LAPD (link access procedure on the D-channel) and LAPB (link access procedure on the B-channel) protocols. The proposed method in this paper implement ISDW LAPD protocol through multi-tasking operating system and adopt a kernel part that is changed operating system to target board. The features of implemented system are (1) the para.llel processing of the events generated at each layer, as follows (2) the supporting necessary timers for the implementation of ISDW LAPD protocol from the kernel part by using software, (3) the recommanded SAP (Service Access Point) from CCITT was composed by using port function in the operating system. With the proposed method, the protocols of ISDH layerl, layer2 and layer3 (call control) were implemented by using the kernel part and related tests were carried out by connecting the ISDH terminal simulator to ISDN S-interface system using the ISDN LAPD protocol The results showed that ISDW S-interface terminals could be discriminated by TEI (Terminal Equipment Identifier) assignment in layer 2 (LAPD) and the message transmission of layer 3 was verified by establishing the multi-frame transmission and then through the path established by the LAPD protocol, a user data was tranfered and received on B-channel with LAPB protocol Thererfore, as new efficient ISDN S-interface environment was implemented in the thesis, it was verified that the implemented system can be utilized by connecting ISDW in the future to transfer a medical image data.

  • PDF

A Study on the Conceptual Design of Integrated Management System for Public SW Project Information (공공 소프트웨어(SW) 사업정보 통합 관리체계의 개념적 설계에 관한 연구)

  • Shin, Kitae;Park, Chankwon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.199-216
    • /
    • 2019
  • The public SW market is 3 trillion won, which is less than 10% of the total SW market. However, due to the nature of the domestic market, it is an important market with a relatively large impact on small and medium-sized software companies. In this market, government is operating the Public SW Project Demand Forecasting System in order to support the marketing activities of small and medium sized SW companies and establish a fair market order. The current system has limitations such as lack of user convenience, insufficient analysis capability and less business connection. This study was conducted to identify the problems of these systems and to propose a new system for improving the convenience of users and expanding the information utilization of SMEs. To this end, we analyzed the requirements of each stakeholder. We proposed the 2-phased forecasting cycle, the management cycle, and the system life cycle of public SW projects and created a unified identifier (UID) so that the information of those projects can be identified and linked among them. As a result, an integrated reference model of project information management based on system life cycle was developed, which can explain the demand forecasting and project information, and the improved processes was also designed to implement them. Through the result of this study, it is expected that integrated management of public SW projects will be possible.

Pipelining Semantically-operated Services Using Ontology-based User Constraints (온톨로지 기반 사용자 제시 조건을 이용한 시맨틱 서비스 조합)

  • Jung, Han-Min;Lee, Mi-Kyoung;You, Beom-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.32-39
    • /
    • 2009
  • Semantically-operated services, which is different from Web services or semantic Web services with semantic markup, can be defined as the services providing search function or reasoning function using ontologies. It performs a pre-defined task by exploiting URI, ontology classes, and ontology properties. This study introduces a method for pipelining semantically-operated services based on a semantic broker which refers to ontologies and service description stored in a service manager and invokes by user constraints. The constraints consist of input instances, an output class, a visualization type, service names, and properties. This method provides automatically-generated service pipelines including composit services and a simple workflow to the user. The pipelines provided by the semantic broker can be executed in a fully-automatic manner to find a set of meaningful semantic pipelines. After all, this study would epochally contribute to develop a portal service by ways of supporting human service planners who want to find specific composit services pipelined from distributed semantically-operated services.

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

Design of ULID-based Location-Sensing Service Model (ULID 기반 위치 인식 서비스 모델의 설계)

  • Nam, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.4
    • /
    • pp.143-154
    • /
    • 2005
  • This paper proposes the location acquisition methods and LBS(location-based services) system using RFID(radio frequency identification) tags with location information in ubiquitous city. Location information is checked using RFID tags attached to various buildings. stores and road signs. And various LBSs are provided based on the location information. Traditionally, when the location information is obtained by a GPS, the precision of the location information may deteriorate due to geographical displacement of a satellite and GPS receivers, for example shadow zone by building, in-door environment, and heavy cloud. The objective of this paper is to provide a ULID(universal location identification) data structure, a ULID-based location acquisition method and an LBS system, in which precise location information is extracted using RFID tags attached to various buildings, stores and road signs and ULID and also danger of information leakage is minimized so that an LBS of ubiquitous environment can be provided to a user.

  • PDF

A Secure Authentication Model Using Two Passwords in Client Server Systems (클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델)

  • Lee, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1350-1355
    • /
    • 2011
  • It is very important issues to protect many system resources using authorized client authentication in distributed client server systems. So it is not enough to prevent unauthorized opponents from attacking our systems that client authentication is performed using only the client's identifier and password. In this paper, we propose a secure authentication database modeling with two authentication keys such as a client authentication key and a server authentication key. The proposed authentication model can be used making high quality of computer security using two authentication keys during transaction processing. The two authentication keys are created by client and server, and are used in every request transaction without user's extra input. Using the proposed authentication keys, we can detect intrusion during authorized client's transaction processing because we can know intrusion immediately through comparing stored authentication keys in client server systems when hackers attack our network or computer systems.

Design and Implementation of Multiple View Image Synthesis Scheme based on RAM Disk for Real-Time 3D Browsing System (실시간 3D 브라우징 시스템을 위한 램 디스크 기반의 다시점 영상 합성 기법의 설계 및 구현)

  • Sim, Chun-Bo;Lim, Eun-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.13-23
    • /
    • 2009
  • One of the main purpose of multiple-view image processing technology is support realistic 3D image to device user by using multiple viewpoint display devices and compressed data restoration devices. This paper proposes a multiple view image synthesis scheme based on RAM disk which makes possible to browse 3D images generated by applying effective composing method to real time input stereo images. The proposed scheme first converts input images to binary image. We applies edge detection algorithm such as Sobel algorithm and Prewiit algorithm to find edges used to evaluate disparities from images of 4 multi-cameras. In addition, we make use of time interval between hardware trigger and software trigger to solve the synchronization problem which has stated ambiguously in related studies. We use a unique identifier on each snapshot of images for distributed environment. With respect of performance results, the proposed scheme takes 0.67 sec in each binary array. to transfer entire images which contains left and right side with disparity information for high quality 3D image browsing. We conclude that the proposed scheme is suitable for real time 3D applications.

A Study for Suggesting Online Reference Resources' Metadata Elements Based on the Users' Perceptions (이용자 인식조사를 기반으로 한 참고정보원 메타데이터 항목 제안에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.2
    • /
    • pp.81-96
    • /
    • 2010
  • This study aimed to suggest metadata elements for online reference resource systems based on users' perceptions. We surveyed librarians in four types of libraries, asking them indicate the need for each of 17 metadata elements. The survey results were compared to the current data input rates of the system, which has been operating for the past two years. Based on both the respondent data and current data input rates, we suggested that title, description, subject, creator, type, identifier, language, coverage, location, and tag elements must be included in the system as the metadata elements for online reference resources. n addition, the input rates of creator and copyright were 20.20% and 18.30%, respectively, but the respondents answered that these items were needed 82.15% and 82.77%, respectively. Therefore, these two items are necessary as metadata elements. On the other hand, the data input rates of type, source, date, relation, and contribution were less than 3%, but almost 70% of respondents answered that all these items were needed. So further research should be performed to determine whether or not these items are needed for online reference resource systems.