• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.03 seconds

An Opened EDI Document Management System for Electronic Commerces (전자상거래를 위한 개방형 EDI문서 관리 시스템)

  • 정재희;김성진;강현석
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.1
    • /
    • pp.1-12
    • /
    • 2001
  • EDI is being considered as a new way for exchange business data in the form of electronic document, aiming the paperless transaction in business-to-business commerce. However, only a few enterprises select and practically use EDI accepts the closed and complicated method based on exclusive protocol for electronic document exchange. There, second, is insufficient regulation and system that support it. Last, the cost for operating is too high. In this paper, Open EDI Document Information Management System (OEIMS) was designed for solving the problem that mentioned above. We represented exchange document in code from as XML DTD. OEIMS that makers feasible to transfer their document through the web with low cost and, manage and search the information more efficiently and effectively using object-oriented database. We suggest OEIMS that provide efficiency to reposit and manage a system by modulized design of structural feature from EDI unlike other systems.

  • PDF

Self-contained LED lantern Control system with BLE functions (BLE 기능을 갖는 일체형 LED 등명기 제어시스템)

  • Ye, Seong-hyeon;Park, Jeong-Seon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.1005-1012
    • /
    • 2016
  • LED beacons operated on an isolated marine area are mostly employing the solar power supply system, and this system is well known for increasing the cost of management and maintenance. Recently, a number of researches and demonstrations on self-contained LED beacon is actively conducted to solve this issue. In this work, we propose an self-contained LED beacon with Bluetooth Low Energy function for an effective management of LED beacon. Firstly, control program structure is designed by expanding the status protocol of self-contained LED beacon, and then it is implemented into the form which administrator can easily understand. The control system visualizes the status and control data of self-contained LED beacon, and this enables the rapid decision-making of administrator. Also, minimizing electricity consumption of the beacon, it can transfer and update the status or light information of self-contained LED beacons with smart phone.

u-IT Based Plant Green Growth Environment Management System (u-IT 기반의 그린 생장환경 관리 시스템)

  • Kim, Jong-Chan;Cho, Seung-Il;Ban, Kyeong-Jin;Kim, Chee-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1391-1396
    • /
    • 2011
  • A way to increase productivity in agriculture that is labor-centered industry is to graft IT technology. Today, many technologies in ubiquitous computing are deployed in all areas of society such as traffic control, automotive manufacturing, construction, defence, healthcare and clinical services. These IT technologies is gaining more attention as a fusion technology among traditional industries. To successfully build ubiquitous agriculture environment, it needs optimized core technology development for agriculture that includes sensor node H/W, middleware platform, routing protocol and agriculture environment application services. To achieve accurate botany growth environment management, we propose a green growth environment management system using environmental factor monitoring sensor and biological information sensors in greenhouse. By using our proposed system, it is expected to realize fusion complex agriculture technology with low cost.

Design and Implementation of a Multiple Client Remote Management System using WMI (WMI를 이용한 다중 클라이언트 원격 관리 시스템 설계 및 구현)

  • Yeo, Myung-Ho;Park, Jun-Ho;Kang, Gwang-Goo;Kwon, Hyun-Ho;Lee, Jin-Ju;Lee, Ji-Hee;Choi, Hyoung-Rak;Jang, Su-Min;Seo, Won-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.26-35
    • /
    • 2010
  • Recently, multi client PC technologies that several users can use one set of computer at the same time are being designed to use the surplus computer resource. In general, as the existing PC management system considers only a single client PC that only one user uses a computer, various kinds of complicated problems may be arisen. This paper designs and realizes a remote management system that can monitor and control the information used in the windows based OS multi-client using WMI technology. The proposed system herein uses WMI technology and newly defined client management protocol and provides the monitoring and control functions on individual resource use information of multi-client. As well, it provides a communication function between the server and the client, and locking setting and access control functions.

Design and Implementation of the SBM(Service Bundle Manager) for the Efficient Service Bundles Management based on OSGi(Open Service Gateway Initiative) (OSGi(Open Service Gateway Initiative) 기반의 효율적인 서비스 번들 관리를 위한 SBM(Service Bundle Manager)의 설계 및 구현)

  • Kim, Nam-Hoon;Son, Min-Woo;Shin, Dong-Kyoo;Shin, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.701-708
    • /
    • 2006
  • Since different kinds of home network technologies coexist, seamless connections between different kinds of network protocols are essential for home computing environments. Several kinds of home network middleware have been developed and OSGi(Open Service Gateway Initiative) was initiated mainly for interoperability support with service distribution between various middleware environments. Framework, OSGi service platform, has weaknesses of passive service bundle management, user management and device management. Therefore, this paper resolves passive management parts which are critical weaknesses of OSGi Specification Version 3 and proposes SBM (Service Bundle Manager) to effiently manage various service bundles. Additionally, we verify practical effects of SBM through experiments.

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.

CEM-PF: Cost-Effective Mobility Management Scheme Based on Pointer Forwarding in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 포인터 포워딩에 기반한 비용효과적인 이동성관리 기법)

  • Park, Seung-Yoon;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.81-93
    • /
    • 2012
  • We propose efficient mobility management schemes based on pointer forwarding for Proxy Mobile IPv6 Networks(PMIPv6) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user's specific mobility and service patterns. We demonstrate that there exists an optimal threshold of the forwarding chain length, given a set of parameters characterizing the specific mobility and service patterns of a mobile user. We also demonstrate that our schemes yield significantly better performance than schemes that apply a static threshold to all mobile users. A comparative analysis shows that our pointer forwarding schemes outperform routing-based mobility management protocols for PMIPv6.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

A New Mobility Management Scheme Using Pointer Forwarding in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 포인터 포워딩을 이용한 이동성 관리기법)

  • Yi, Myung-Kyu;Kim, Hyung-Heon;Park, Seok-Cheon;Yang, Young-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.109-118
    • /
    • 2010
  • Proxy mobile IPv6 (PMIPv6) protocol is a network-based mobility management protocol to support mobility for IPv6 nodes without host involvement. In PMIPv6, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves frequently. This increases network overhead on the LMA, wastes network resources, and lengthens the delay time. Therefore, we propose a new mobility management scheme for minimizing signaling cost using the pointer forwarding. Our proposal can reduce signaling costs by registration with the neighbor MAG instead of the remote LMA using the pointer forwarding. The cost analysis using imbedded Markov chain presented in this paper shows that our proposal can achieve performance superior that of PMIPv6 scheme.

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF