• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.027 seconds

A Study on the Performance Improvement of Bar Code Reader for the Automatic Processing of the Mail Items (우편물 자동처리를 위한 바코드 판독기 성능개선에 관한 연구)

  • Park, Moon-Sung;Nam, Yun-Seok;Kim, Hey-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.731-734
    • /
    • 2001
  • 우편물을 집배원이 배달하는 순서로 자동구분 처리하기 위한 요소기술 줌에서 4-state 바코드 시스템이 개발되고 있으며 우편번호, 배달순서코드, 고객정보 등이 적용될 예정이다. 기존의 고객 바코드 판독 시스템은 우편물상의 바코드 심볼로지가 존재하는 판독대상 영역의 기울기가 ${\pm}4.47^{\circ}$ 이하이고, 심볼의 훼손과 잡영이 없을 경우에 $79{\sim}100msec(35,000{\sim}45,000$통/시간)의 속도로 자동 구분 정보가 판독된다. 본 논문에서는 판독범위 및 판독성능을 개선을 위하여 CCD(Charge Coupled Device) 센서로부터 획득된 이미지상에서 존재하는 심볼로지 정보의 고속판독 방법을 제시한 것이다. 이 판독방법은 그레이(gray) 이미지 바탕면의 경계값(threshold) 기울기 분포를 기준으로 2개의 경계값을 설정하여 판독대상 정보를 획득하였다. 또한, 4-state 바코드 심볼로지의 존재 가능성 영역만을 탐색하고, 판독대상 영역에서 트래커(tracker)를 탐색하여 심볼로지의 기울기값, 심볼로지 경계값, 심볼위치 좌표값을 생성한 후 심볼값이 판독한 것이다. 판독시험 결과는 판독대상 영역의 심볼로지가 ${\pm}45^{\circ}$ 기울어지고, 잡영이 존재할 경우에도 $30{\sim}60msec(58,000{\sim}l16,000$통/시간) 이내에 판독되었다. 우편물 자동구분용 바코드 판독기로써 적용될 경우에 판독속도가 평균 57.25% 이상 개선되고, 판독범위의 확장으로 0.2%의 기계적인 오류(이송과정예서의 Jam 발생 비율)를 제외할 경우에 거의 99.8% 우편물을 판독하여 자동구분 처리할 수 있게 될 것으로 기대된다.onebook 엑세스 모들(Server Phonebook Access Module)로 구성되어 있다.외 보다 높았다(I/O ratio 2.5). BTEX의 상대적 함량도 실내가 실외보다 높아 실내에도 발생원이 있음을 암시하고 있다. 자료 분석결과 유치원 실내의 벤젠은 실외로부터 유입되고 있었고, 톨루엔, 에틸벤젠, 크실렌은 실외뿐 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에 의해서 개선되었다. 답이 없는 문제, 문제 만

  • PDF

Analyzing content placement interface requirements in a multi-display environment (멀티 디스플레이 환경에서 콘텐츠의 공간적 인터페이스 요구사항 분석)

  • Kim, Hyo-Yong;Lim, Soon-Bum
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.69-84
    • /
    • 2017
  • In order to display various art works such as media art in a multi-display environment, it is necessary to consider contents arrangement. The advantage of having a 1: N or N: N layout instead of a 1: 1 or N: 1 layout between display and content, but a more complex scheme of how to do spatial and temporal layout in multi-display Is required. In order to distribute contents, existing media server solution or programming-based multimedia production software is used. However, it takes much time to rearrange or modify the contents, and it is not easy to modify the contents. Therefore, It is difficult to place content in the environment. In order to solve this problem, various approaches are needed from research on content placement method to development of content placement software that improves the existing method. However, analysis on systematic content placement type supporting it, or interface There is also no access to. In this study, we have summarized the requirements for designing the interface for each type with the aim of making it possible to utilize previously analyzed content layout types in various display activities such as media art in multi - display environment. The requirements of each type of interface were derived based on spatial arrangement and temporal layout type which are most distinguished when content is placed. The contents of the interface requirements are summarized as follows: We expect to be a cornerstone for system development.

Design and Implementation of an HTML Converter Supporting Frame for the Wireless Internet (무선 인터넷을 위한 프레임 지원 HTML 변환기의 설계 및 구현)

  • Han, Jin-Seop;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.1-10
    • /
    • 2005
  • This paper describes the implementation of HTML converter for wireless internet access in wireless application protocol environment. The implemented HTML converter consists of the contents conversion module, the conversion rule set, the WML file generation module, and the frame contents reformatting module. Plain text contents are converted to WML contents through one by one mapping, referring to the converting rule set in the contents converting module. For frame contents, the first frameset sources are parsed and the request messages are reconstructed with all the file names, reconnecting to web server as much as the number of files to receive each documents and append to the first document. Finally, after the process of reformatting in the frame contents reformatting module, frame contents are converted to WML's table contents. For image map contents, the image map related tags are parsed and the names of html documents which are linked to any sites are extracted to be replaced with WML contents data and linked to those contents. The proposed conversion method for frame contents provides a better interface for the users convenience and interactions compared to the existing converters. Conversion of image maps in our converter is one of the features not currently supported by other converters.

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.

A Study on Application Plan LTE Wireless Network in the Container Terminal Yard (컨테이너터미널 장치장에서 무선네트워크 LTE 적용방안에 관한 연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.40 no.1
    • /
    • pp.43-50
    • /
    • 2016
  • Amid of the logistics hub center competition is going to intensifying between the world major port, it is essential to pre-occupied the base in the logistics hub world take advantage of advanced technology of logistics equipment than other ports. In existing container terminal, when container moves the terminal use the omnidirectional and directional antenna in order to exchange data information on the basis of 802.11 wireless network system. Case of loading height of exceeding, the blind sport will occur and a limited frequency channel can't help using in the area. A limited frequency channel usage and nested areas happen to use the closed terminal, it has a great influence to operate the terminal working. In this paper, LTE network is configured provided by the specified company ('L' Corp,.Ltd) and terminal data extracted through LBO (Local Breakout) in the cell site which is configured directly with container terminal operation server. Using this method, container terminal yard equipment operate without overlapping arises with uninterrupted data presented for ways to efficiently. I would suggest both the existing wireless AP LAN configuration of container terminal and new LTE system and applied to the real yard operating devices situations. Through these methods presented comparative the existing network traffic with new constructed LTE configuration. I admired to suggest that wireless network LTE introduction is fundamental factors to get rid of the blind spot, the problem of limited frequency channel and overlapping arises. These essential points can be a continual improving terminal services and more efficient terminal operational management.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Impact Assessment of Climate Change by Using Cloud Computing (클라우드 컴퓨팅을 이용한 기후변화 영향평가)

  • Kim, Kwang-S.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.13 no.2
    • /
    • pp.101-108
    • /
    • 2011
  • Climate change could have a pronounced impact on natural and agricultural ecosystems. To assess the impact of climate change, projected climate data have been used as inputs to models. Because such studies are conducted occasionally, it would be useful to employ Cloud computing, which provides multiple instances of operating systems in a virtual environment to do processing on demand without building or maintaining physical computing resources. Furthermore, it would be advantageous to use open source geospatial applications in order to avoid the limitations of proprietary software when Cloud computing is used. As a pilot study, Amazon Web Service ? Elastic Compute Cloud (EC2) was used to calculate the number of days with rain in a given month. Daily sets of climate projection data, which were about 70 gigabytes in total, were processed using virtual machines with a customized database transaction application. The application was linked against open source libraries for the climate data and database access. In this approach, it took about 32 hours to process 17 billion rows of record in order to calculate the rain day on a global scale over the next 100 years using ten clients and one server instances. Here I demonstrate that Cloud computing could provide the high level of performance for impact assessment studies of climate change that require considerable amount of data.

A Study on Interconnectioned LAN of Token Ring Network (토큰링 네트워크가 상호 연결된 근거리 통신망에 관한 연구)

  • 이상훈;김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1206-1218
    • /
    • 1992
  • Token ring systems which control to switch the data stream of networks by passing the token have been widely used to medium access controls in many ring or bus topology LANs. The system could be modeled for analysis as single-server-multi-queue system of the cyclic service method. These concepts could be expanded to multi-token ring systems interconnected with single ring consisting of bridges implemented simply to be stored and transmitted. In the proposal for the performance analysis of the interconnected token ring system, in has been assumed M/G/1 queueing model that frame arrivals are the Poisson process at each station queue and frame sizes are independently and identically distributed. And the average time delays were analyzed mathematically for arbitrary frame transferred from source station to destination area. The time delay of the frame transmission could be explained as the sum of the average time which the token passed from arbitrary position to source station, such as the waiting time in the source station transferring the previous arrival frames, and the propagation time from source station to interdestinated point. These delays were given as the sum of the duration from inner and outer bridge queues, the time delays from inner and outer bridge queues, and the time from outer bridge queue to destination station. These results were investigated by varing parameters effected to total time delays. In the results, those factors to be effected to dominant the total time delays were increased were in the cases of the high arrival rates and the high ration of destination of the other outerring. The system were shown the time delays increased exponentially in spite of the priority service policy. In order to decreasing the number of outerrings and increasing the number of nodes in backbone relatively, so the systems could be decreased the total delay in the interconnected token ring system.

  • PDF