• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.032 seconds

Design and Implementation of Smart Bus Information System(SBIS) based on Smartphone Server Network (스마트폰 서버 네트워크 기반의 스마트 버스운행정보시스템)

  • Moon, Jae Young;Im, Kwang Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.458-465
    • /
    • 2013
  • The purpose of this research is possible to reduce cost of management and maintenance to realization of smartphone and using data server network technology instead of GPS. Former wireless bus information system was focused on supply side management structure and national spread thus it needs to establish GPS terminal, Windows CE, Window XP embedded and LCD panels which provide only one way communication of information of public traffic information. Therefore, former system management and maintenance cost are very expansive. This research is not use GPS terminal and other hardware equipment but design and realization using smartphone and data network server. This system also provides low cost of management and maintenance. It is not only service downtown area but also out of town and small and medium-sized cities. This system functionally gets a satisfying result user convenience and satisfaction using function of set-up route map, real-time display, and running statically analysis.

WPAN Based Semantic-Web Health Monitoring (WPAN기반 시멘틱 웹 헬스 모니터링)

  • Lim, Myung-Jae;Kim, Myung-Gwon;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In recent years, mobile healthcare systems that transfer patient data wirelessly have been used in the medical field. However, the current messages supported to patients are difficult to satisfy the specific patients, and there is a lack of healthcare systems to help manage patients with diabetes or pregnant women on a regular basis. In this regard, this paper demonstrates that the semantic-web service to which data transfer method, application framework and networking of WPAN are applied can be implemented. In addition, it suggests common data types to integrate data from a variety of sources and provides a common framework in which information on the Web can be shared and reused in applications, businesses and communities, etc. As an example, the healthcare monitoring that can manage healthcare for pregnant women, which includes confirmation of pregnancy, periodic health management, fetal movement, prenatal care and health-related knowledge, is proposed.

m-Health System for Processing of Clinical Biosignals based Android Platform (안드로이드 플랫폼 기반의 임상 바이오신호 처리를 위한 모바일 헬스 시스템)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.97-106
    • /
    • 2012
  • Management of biosignal data in mobile devices causes many problems in real-time transmission of large volume of multimedia data or storage devices. Therefore, this research paper intends to suggest an m-Health system, a clinical data processing system using mobile in order to provide quick medical service. This system deployed health system on IP network, compounded outputs from many bio sensing in remote sites and performed integrated data processing electronically on various bio sensors. The m-health system measures and monitors various biosignals and sends them to data servers of remote hospitals. It is an Android-based mobile application which patients and their family and medical staff can use anywhere anytime. Medical staff access patient data from hospital data servers and provide feedback on medical diagnosis and prescription to patients or users. Video stream for patient monitoring uses a scalable transcoding technique to decides data size appropriate for network traffic and sends video stream, remarkably reducing loads of mobile systems and networks.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Design and Implementation a Remote Control Smart Multi-plug based on Wireless Network (무선 네트워크 기반 원격제어 스마트 멀티 플러그의 설계 및 구현)

  • Lee, Sang Hoon;Won, Hui Chul;Kim, Su-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.4
    • /
    • pp.47-54
    • /
    • 2015
  • With the spread of smart technology, in the personal and office equipment, many of the products are equipped with smart features. These changes have opened the era that can enforce the user's operation from a remote location. In this study, we design and implement a smart multi-plug system to make a multi-plug installed in the home can be operated anytime and anywhere via wireless network technologies add smart feature to a multi-plug that can be seen easily around us, it is intended to complement the limitations of traditional multi-plugs. The smart multi-plug proposed in this paper, by operating the plug remotely from smart devices at anytime and from anywhere, is possible to provide services required for the weak users such as elderly and children, it is expected that the proposed system are widely used in the various areas requiring remote control of the power supply including u-Farming, terrarium, and smart home, and so on.

Analysis of Connectivity between Jobs in University Libraries (대학도서관의 직무 연결성 분석)

  • Cho, Jane;Lee, Ji-Won
    • Journal of Information Management
    • /
    • v.43 no.4
    • /
    • pp.31-48
    • /
    • 2012
  • Social network analysis was performed on 545 job descriptions in 32 university libraries in Seoul, and drew the job distribution and their relations. Furthermore, for finding the differences according to scale of libraries, this study performed secondary analysis by dividing them two groups. Results show that large scale library show lower density and loose connectivity than small scale library. And while jobs of small scale library were clustered 3 groups, large scale university cluster 4 groups containing 1 technical job and 3 diverse user services. And the jobs that has high specificity, such as catalog or classification, shows high degree centrality in the case of small scale library. Whereas in large scale library they show lower degree centrality, so it can be said that these jobs were performed somewhat independently in large scale libraries.

Performance Improvement of the Statistical Information based Traffic Identification System (통계 정보 기반 트래픽 분석 방법론의 성능 향상)

  • An, Hyun Min;Ham, Jae Hyun;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.335-342
    • /
    • 2013
  • Nowadays, the traffic type and behavior are extremely diverse due to the growth of network speed and the appearance of various services on Internet. For efficient network operation and management, the importance of application-level traffic identification is more and more increasing in the area of traffic analysis. In recent years traffic identification methodology using statistical features of traffic flow has been broadly studied. However, there are several problems to be considered in the identification methodology base on statistical features of flow to improve the analysis accuracy. In this paper, we recognize these problems by analyzing the ground-truth traffic and propose the solution of these problems. The four problems considered in this paper are the distance measurement of features, the selection of the representative value of features, the abnormal behavior of TCP sessions, and the weight assignment to the feature. The proposed solutions were verified by showing the performance improvement through experiments in campus network.

Web Application Awareness using HTTP Host (HTTP Host를 이용한 웹 어플리케이션 인식에 관한 연구)

  • Choi, Ji Hyeok;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.327-334
    • /
    • 2013
  • Today's network traffic has become extremely complex and diverse since the speed of network became faster and a variety of application services appear. Moreover, many applications appear and disappear fast and continuously. However, the current traffic classification system does not give much attention to this dynamic change of applications. In this paper, we propose an application awareness system in order to solve this problem. The application awareness system can provide the information, such as the usage trend of conventional applications and the emergence of new applications by recognizing the application name in a rapidly changing network environment. In order to recognize the application name, the Host field of HTTP protocol has been utilized. The proposed mechanism consists of two steps. First, the system generates the candidates of application name by extracting the domain name from the Host field in HTTP packet. Second, the administrator confirms the name afterward. The validity of the proposed system has been proved through the experiments in campus network.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.