• Title/Summary/Keyword: user access control

Search Result 683, Processing Time 0.026 seconds

Implementation and Economic Evaluation of Movable Power Supply Device for Electric Vehicle (EV용 이동형 전원공급장치의 구현 및 경제성 평가에 관한 연구)

  • Choi, Sung-Moon;Han, Byeong-Gill;Lee, Hu-Dong;Kim, Mi-Young;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.77-86
    • /
    • 2020
  • Power quality problems caused by feeder voltage drop and extension construction cost problems can occur with the increasing utilization rates of the existing fixed-type EV (electric vehicle) charger. Moreover, EV users might not be able to access the EV charger due to a lack of EV charging facilities. Therefore, this paper proposes an MPSD (movable power supply device) for EVs to overcome user inconvenience caused by the insufficient number of chargers and extension cost issues. The proposed MPSD was mainly composed of a PV (photovoltaic) system, ESS (energy storage system), EV charging system, and monitoring and control system. Furthermore, there are three operation modes available to enhance the flexibility of the MPSD application, depending on the situation. This paper also presents an economical evaluation modeling using the present worth method to consider the cost and benefit elements. The simulation results based on proposed modeling showed that MPSD is more economical than the existing EV charger. Moreover, its profit can be increased significantly depending on the distance to the installation point.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support

  • Chung, Jong-Moon;Kim, Chang Hyun;Lee, Daeyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.618-633
    • /
    • 2014
  • Relay technology is becoming more important for mobile communications and wireless internet of things (IoT) networking because of the extended access network coverage range and reliable quality of service (QoS) it can provide at low power consumption levels. Existing mobile multihop relay (MMR) technology uses fixed-point stationary relay stations (RSs) and a divided time-frame (or frequency-band) to support the relay operation. This approach has limitations when a local fixed-point stationary RS does not exist. In addition, since the time-frame (or frequency-band) channel resources are pre-divided for the relay operation, there is no way to achieve high channel utilization using intelligent opportunistic techniques. In this paper, a different approach is considered, where the use of mobile/IoT devices as RSs is considered. In applications that use mobile/IoT devices as relay systems, due to the very limited battery energy of a mobile/IoT device and unequal channel conditions to and from the RS, both minimum energy consumption and QoS support must be considered simultaneously in the selection and configuration of RSs. Therefore, in this paper, a mobile RS is selected and configured with the objective of minimizing power consumption while satisfying end-to-end data rate and bit error rate (BER) requirements. For the RS, both downlink (DL) to the destination system (DS) (i.e., IoT device or user equipment (UE)) and uplink (UL) to the base station (BS) need to be adaptively configured (using adaptive modulation and power control) to minimize power consumption while satisfying the end-to-end QoS constraints. This paper proposes a minimum transmission power consuming RS selection and configuration (MPRSC) scheme, where the RS uses cognitive radio (CR) sub-channels when communicating with the DS, and therefore the scheme is named MPRSC-CR. The proposed MPRSC-CR scheme is activated when a DS moves out of the BS's QoS supportive coverage range. In this case, data transmissions between the RS and BS use the assigned primary channel that the DS had been using, and data transmissions between the RS and DS use CR sub-channels. The simulation results demonstrate that the proposed MPRSC-CR scheme extends the coverage range of the BS and minimizes the power consumption of the RS through optimal selection and configuration of a RS.

Implementation of a Web-based Hybrid Engineering Experiment System for Enhancing Learning Efficiency (학습효율 향상을 위한 웹기반 하이브리드 공학실험시스템 구현)

  • Kim, Dong-Sik;Choi, Kwan-Sun;Lee, Sun-Heum
    • Journal of Engineering Education Research
    • /
    • v.10 no.3
    • /
    • pp.79-92
    • /
    • 2007
  • To enhance the excellence, effectiveness and economical efficiency in the learning process, we implement a hybrid educational system for engineering experiments where web-based virtual laboratory systems and distance education systems are properly integrated. In the first stage, we designed client/server distributed environment and developed web-based virtual laboratory systems for digital systems and electrical/electronic circuit experiments. The proposed virtual laboratory systems are composed of four important sessions and their management system: concept learning session, virtual experiment session, assessment session. With the aid of the management system every session is organically tied up together to achieve maximum learning efficiency. In the second stage, we have implemented efficient and cost-effective distant laboratory systems for practicing electric/electronic circuits, which can be used to eliminate the lack of reality occurred during virtual laboratory session. The use of simple and user-friendly design allows a large number of people to access our distant laboratory systems easily. Thus, self-guided advanced training is available even if a lot of expensive equipment will not be provided in the on-campus laboratories. The proposed virtual/distant laboratory systems can be used in stand-alone fashion, but to enhance learning efficiency we integrated them and developed a hybrid educational system for engineering experiments. Our hybrid education system provides the learners with interactive learning environment and a new approach for the delivery of engineering experiments.

Developing Forest Fire Status Information Management System using Web GIS Technology (웹 지리정보시스템 기술을 이용한 산불 현황정보 관리시스템 개발)

  • Jo, Myung-Hee;Kim, Joon-Bum;Kim, Hyun-Sik;Jo, Yun-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.4
    • /
    • pp.93-105
    • /
    • 2002
  • In this paper forest fire status information management system was developed under web environment using web GIS(geographic information system) technology. Though this system, general users can easily retrieval domestic forest fire status information and obtain that in visual way such as maps, graphs, and texts if they have only certain web browsers. Moreover, officials, who have system access authority, can easily control and manage all domestic forest fire status information through input interface, retrieval interface, and out interface of the system. This system can be considered as the first domestic system to manage forest fire status data and service them in visual through user friendly interfaces on web. In order to implement this system, IIS 5.0 of Microsoft is used as web server and Oracle 8i and ASP(active server page) are used for database construction and dynamic web page operation, respectively. Also, ArcGIS IMS(internet map server) of ESRI is used to serve maps by using Java and HTML as system development languages. Not only the domestic tendency of forest fire but also the forest fire status information of certain area and time such as the frequency and the loss can be presented through distribution maps, graphs and tables. Therefore, this system is supposed to play as a important role when the policy relate to domestic forest fire is established. In addition, the self consciousness of people against forest fire can be inspired and the foundation of scientific and systemic forest fire services can be obtained through this system in the future.

  • PDF

A Priority Based Multipath Routing Mechanism in the Tactical Backbone Network (전술 백본망에서 우선순위를 고려한 다중 경로 라우팅 방안)

  • Kim, Yongsin;Shin, Sang-heon;Kim, Younghan
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1057-1064
    • /
    • 2015
  • The tactical network is system based on wireless networking technologies that ties together surveillance reconnaissance systems, precision strike systems and command and control systems. Several alternative paths exist in the network because it is connected as a grid to improve its survivability. In addition, the network topology changes frequently as forces and combatants change their network access points while conducting operations. However, most Internet routing standards have been designed for use in stable backbone networks. Therefore, tactical networks may exhibit a deterioration in performance when these standards are implemented. In this paper, we propose Priority based Multi-Path routing with Local Optimization(PMPLO) for a tactical backbone network. The PMPLO separately manages the global and local metrics. The global metric propagates to other routers through the use of a routing protocol, and it is used for a multi-path configuration that is guaranteed to be loop free. The local metric reflects the link utilization that is used to find an alternate path when congestion occurs, and it is managed internally only within each router. It also produces traffic that has a high priority privilege when choosing the optimal path. Finally, we conducted a simulation to verify that the PMPLO can effectively distribute the user traffic among available routers.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

A Study on Development and Prospects of Archival Finding Aids (기록 검색도구의 발전과 전망)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.23
    • /
    • pp.3-43
    • /
    • 2010
  • Finding aids are tools which facilitate to locate and understand archives and records. Traditionally there are two types of archival finding aids: vertical and horizontal. Vertical finding aids such as inventories have multi-level descriptions based on provenance, while horizontal ones such as catalogs and index are tools to guide to the vertical finding aids based on the subject. In the web environment, traditional finding aids are evolving into more dynamic forms. Respecting the principles of provenance and original order, vertical finding aids are changing to multi-entity structures with development of ISAD(G), ISAAR(CPF) and ISDF as standards for describing each entity. However, vertical finding aids can be too difficult, complicated, and boring for many users, who are accustomed to the easy and exciting searching tools in the internet world. Complementing them, new types of finding aids are appearing to provide easy, interesting, and extensive access channels. This study investigates the development and limitation of vertical finding aids, and the recent trend of evolving new finding aids complementing the vertical ones. The study finds three new trends of finding aid development. They are (i) mixture, (ii) integration, and (iii) openness. In recent days, certain finding aids are mixed with stories and others provide integrated searches for the collections of various heritage institutions. There are cases for experimenting user participation in the development of finding aids using Web 2.0 applications. These new types of finding aids can also cause some problems such as decontextualised description and prejudices, especially in the case of mixed finding aids and quality control of user contributed annotations and comments. To solve these problems, the present paper suggests to strengthen the infrastructure of vertical finding aids and to connect them with various new ones and to facilitate interactions with users of finding aids. It is hoped that the present paper will provide impetus for archives including the National Archives of Korea to set up and evaluate the development strategies for archival finding aids.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF