• Title/Summary/Keyword: Wire. Wireless Internet

Search Result 135, Processing Time 0.024 seconds

Wire and wireless integration service support system design for automation of using the existing Internet contents in Mobile circumstance (모바일 환경에서 기존 인터넷 컨텐츠 활용의 자동화를 위한 유무선 통합 인터넷 서비스 지원 시스템 설계)

  • 류지현;권경환;이긍해
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.627-629
    • /
    • 2003
  • 무선 인터넷의 발전으로 PDA, 휴대폰, 노트북 등 여러 모바일 환경에서의 인터넷 사용이 유선 인터넷 환경만큼이나 편리하게 되었다. 이에 따라 인터넷 컨텐츠 제공자들은 기존 유선 인터넷 컨텐츠를 사용하여 무선인터넷 컨텐츠로 제공하고자 한다. 그러나 모바일 장치의 디스플레이 제한, 모바일과 PC의 환경적 차이등으로 기존 인터넷 컨텐츠를 그대로 사용하기는 어렵다. 본 논문에서는 위의 문제점을 해결하기 위한 새로운 시스템을 제안한다. 이 시스템은 HTML형태의 기존 인터넷 컨텐츠들을 XML문서로 변환하여 컴포넌트화하고 이를 이용하여 무선인터넷에서 기존 인터넷 컨텐츠들을 사용할 수 있도록 한다. 또한 이 시스템으로부터 생성된 XML문서를 가지고 모바일 환경에서의 제한된 입출력과 취약한 보안성을 고려하여 인터넷 서비스 사용시 발생되는 사용자정보의 반복적 입력을 자동화하는 사용자정보 자동 적용 시스템을 제안한다. 기존 인터넷 컨텐츠를 모바일 환경 내에서 사용하기 위한 작업을 자동화함으로써 새로운 유무선 통합 인터넷 서비스를 만들 수 있다.

  • PDF

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Wire/Wireless Internet based Job-offering/Job-hunting Tailored Information Agent System Modeling (유/무선 인터넷 기반 구인/구직 맞춤정보 에이전트 시스템의 설계)

  • 허재형;김정재;이종희;오해석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.322-324
    • /
    • 2001
  • 급속한 인터넷 발전과 사용자들의 증가에 따라 나날이 사용자 요구사항이 복잡 다양해지고 있다. 또한, 이러한 사용자 요구를 총족시키지 못하는 인터넷 업체는 뒤떨어지게 되어 있어 여러 가지 고객관리 기법들이 연구되고 있다. 그 중에서 개인별 성향을 분석하여 원하는 정보만을 선택하여 추천해 줌으로써 사용자와의 관계를 지속시키는 맞춤 서비스라는 것이 있다. 그리고, 이러한 서비스를 유선 인터넷뿐만 아니라, WAP 기반 무선 인터넷상에서도 제공해 줌으로써, 사용자들은 시간과 공간의 제약을 받지 않고, 이동 중에서도 원하는 정보를 얻을 수 있다. 본 논문은 에이전트를 이용하여 사용자별 구인/구직 성향을 분석하고, 이를 통해 가장 알맞은 사용자별 구인/구직 맞춤정보를 유/무선 인터넷상에서 제공해주는 시스템 모델을 제시한다.

  • PDF

Design and Implementation of Intrusion Detection System of Packet Reduction Method (패킷 리덕션 방식의 침입탐지 시스템 설계 및 구현)

  • JUNG, Shin-Il;KIM, Bong-Je;KIM, Chang-Soo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.17 no.2
    • /
    • pp.270-280
    • /
    • 2005
  • Many researchers have proposed the various methods to detect illegal intrusion in order to improve internet environment. Among these researches, IDS(Intrusion Detection System) is classified the most common model to protect network security. In this paper, we propose new log format instead of Apache log format for SSL integrity verification. We translate file-DB log format into R-DB log format. Using these methods we can manage Web server's integrity, and log data is transmitted verification system to be able to perform both primary function of IDS and Web server's integrity management at the same time. The proposed system in this paper is also able to use for wire and wireless environment based on PDA.

The Research for Interworking of the Mobile IPv4 in the CDMA2000 1x network (CDMA 2000 1x 망에서의 이동 인터넷 (Mobile IPv4) 연동에 관한 연구)

  • 김성관;한규호;채동현;강상욱;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.136-138
    • /
    • 2003
  • 인터넷은 이미 대중화되어 있으며, 이러한 인터넷 망을 기초로 한 All-IP 망으로의 망 진화에 대한 논의가 활발하게 진행되고 있다. 또한 현재 상용중인 IPv4에 이동성을 부여한 이동 인터넷(Mobile IPv4)에 대한 연구는 IETF(Internet Engineering Task Force)를 중심으로 활발하게 진행 중에 있으며, 이에 대한 구현 및 개발은 이미 많은 연구단체에서 많은 성과를 보여주고 있다. 본 논문에서는 3세대 이동통신 모델 중의 하나인 CDMA2000 1x 환경에서 기 구현된 Wire-less LAN에서의 이동 인터넷(Mobile IPv4)을 연동하여, 이기종 망(Heterogeneous Network)에서의 이동 인터넷(Mobile Ipv4) 모델을 제시한다. 제시된 이동 인터넷(Mobile IPv4) 프로토콜은 Layer-2망으로서 Wireless LAN과 CDMA2000 1x을 모두 사용하며, 하부 망(Layer-2 Network)의 변화에 능동적으로 반응하여, 통신을 유지한다.

  • PDF

LoRa LPWAN-based Wireless Measurement Sensor Installation and Maintenance Plan (LoRa LPWAN 기반의 무선 계측센서 설치 및 유지관리 방안)

  • Kim, Jong-Hoon;Park, Won-Joo;Park Sang-Hyun, Jin-Oh
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.1
    • /
    • pp.55-61
    • /
    • 2020
  • Social infrastructure facilities that have been under construction since the country's high-growth period are undergoing rapid aging, and, thus, safety assessments of large structures such as bridge tunnels, which can be directly linked to large-scale casualties in the event of an accident, are necessary. It is difficult to construct economical and efficient wireless smart sensor networks that improve structural health monitoring (SHM) because the existing wire sensors have a short signal reach. However, low-power wide-area networks (LPWANs) are becoming popular within the Internet of Things, and enable economical and efficient SHM. In this study, the technology trends of a wireless measuring sensor based on LoRa LPWANs were investigated, and an installation and maintenance plan for this type of sensor is proposed.

The Implementation of Web Services System for Realtime Finger Recognition in Mobile Environments (모바일 환경에서 실시간 지문인식을 위한 웹 서비스 시스템 구현)

  • Ko, You-Jung;Kim, Yoon-Joong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.483-487
    • /
    • 2006
  • In this paper implemented that PDA sends finger images and can finger recognition web service system in realtime. Finger recognition web service system received the finger images and return the recognition result as XML style. because of this it can offer the same service to using wireless PDA as well as using wire internet client. This system consist of mobile client and finger recognition web service provider. Mobile client request finger recognition web service provider using DIME with taken finger image. We can easily receive and see the result of finger recognition without mass finger database in limited storage space of PDA. Finger recognition web service provider offers that receiving finger images and calling finger recognition system after the recognition return the result.

  • PDF

Comparative analysis for advanced technologies of the location based service (위치기반 서비스 고도화 기술 비교 분석)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.853-871
    • /
    • 2012
  • The location based service is divided into GPS that uses the artificial satellite or base transceiver station in order to cover the wide area and RTLS(Real Time Location System) using the Zigbee, RFID, CSS(Chirp Spread Spectrum), UWB, Bluetooth and Wi-Fi equipment in the space(close range) limited like the building inside or park. Moreover it also repeats the technical development upon through the acceleration of the development of the wire and wireless infrastructure and determination technology, the development of the Internet, diversification of the contents, and etc. As a result, it is expected to develop around the determination technology, witch is common core technology element, contents technology, Internet and mobile communication technology, and etc. afterward. In this research, the direction we investigate was to find and analyze new technology and standardization trend of LBS in order to contribute to the related industry.

A Real Time Network Game System Based on Retransmission Mechanism of Game Command History on Wire/Wireless Environments (유.무선 환경에서의 게임명령 히스토리 재전송 기법 기반 실시간 네트워크 게임 시스템)

  • Kim, Seong-Hoo;Kweon, Young-Do;Park, Kyoo-Seok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.143-155
    • /
    • 2006
  • In this paper, we suggest a network game system that can support video game based on multi-platform for multi-user video game, Latency occurring from the load fluctuation in realtime network game is overcomed by using an initial delay buffering scheme on client, when a real-fire game is played, and shows that stable play for a game is achieved as the result of the scheme. Also, We suggest a retransmission algorithm based on the history of game commands, and this Algorithm supplement shortcomings for packet loss and pocket error on UDP communication.

  • PDF

An experimental study about integrated service environment based on e-mail by using rich internet application concept (리치 인터넷 어플리케이션 개념을 적용한 전자메일 기반의 통합 서비스 환경 구현 사례 연구)

  • Kim, Bum-Jae;Shin, Yong-Tae
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.263-269
    • /
    • 2006
  • The trend of the web is moving from portal-centered to user-centered, and RIA(rich internet application) is considered best solution for usability and functionality of the next generation web. But the lack of reference document or technical guide for RIA implementation is a big obstacle for extension of RIA environment to practical business engineer or user. In this paper, I will suggest the implementation conceptand reference site for user-centered environment based on RIA concept. The suggested concept support wire/wireless environment, and use the e-mail that is already used by many company or portal. The contents of this paper will be very helpful to the practical engineer or portal/company that want to use or implement about RIA environment.

  • PDF