• Title/Summary/Keyword: 단말기 관리

Search Result 527, Processing Time 0.026 seconds

Development of a Signal Control Algorithm Using an Individual Vehicle's Data in a Wireless Environment (무선통신 환경에서의 개별차량 정보를 이용한 교차로 신호제어 알고리즘 개발)

  • Lee, In-Gyu;Kim, Yeong-Chan
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.125-134
    • /
    • 2009
  • Recently, as IT technology and the ubiquitous environment have diffused, the application of these techniques are being attempted in the field of traffic operations and management. Therefore, it is necessary to develop data collection systems and signal control strategies that are suitable in the ubiquitous environment and that will improve efficiency and safety of signalized intersections. The authors conducted a study on the Wireless Sensor Network (WSN) signal control strategy using a wireless communication network between individual vehicles and a signal-control system and full actuated signal control technique to propose a new signal control strategy in the ubiquitous environment. The WSN was defined to evaluate the algorithm used with PARAMICS API simulation. The simulation produced results that the WSN signal control is more effective than other signal control methods. The WSN signal control could reduce vehicle delay time to a maximum of 64% in comparison with other signal control methods in low and near saturation flow conditions.

A Group Update Technique based on a Buffer Node to Store a Vehicle Location Information (차량 위치 정보 저장을 위한 버퍼 노드 기반 그룹 갱신 기법)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • It is possible to track the moving vehicle as well as to develop the location based services actively according to the progress of wireless telecommunication and GPS, to the spread of network, and to the miniaturization of cellular phone. To provide these location based services, it is necessary for an index technique to store and search too much moving object data rapidly. However the existing indices require a lot of costs to insert the data because they store every position data into the index directly. To solve this problem in this paper, we propose a buffer node operation and design a GU-tree(Group Update tree). The proposed buffer node method reduces the input cost effectively since the operation stores the moving object location data in a group, the buffer node as the unit of a non-leaf node. hnd then we confirm the effect of the buffer node operation which reduces the insert cost and increase the search performance in a time slice query from the experiment to compare the operation with some existing indices. The proposed tufter node operation would be useful in the environment to update locations frequently such as a transportation vehicle management and a tour-guide system.

Implimentation of Smart Farm System Using the Used Smart Phone (중고 스마트폰을 활용한 스마트 팜 시스템의 구현)

  • Kwon, Sung-Gab;Kang, Shin-Chul;Tack, Han-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1524-1530
    • /
    • 2018
  • In this paper, we designed a product that can prevent environmental pollution, waste of resources, and leakage of foreign currency by commercializing a green IT solution by merging a used smart phone with the IoT object communication technology for the first time in the world. For the experiment of the designed system, various performance and communication condition was experimented by installing it in the actual crop cultivation facility. As a result, when a problem occurs, the alarm sound and video notification are generated by the user's smart phone, and remote control of various installed devices and data analysis in real time are possible. In this study, it is thought that the terminal management board developed for the utilization of the used smart phone can be applied to various fields such as agriculture and environment.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

Hybrid Web Content Management System Implementation (하이브리드 웹 콘텐츠 관리 시스템 구현)

  • Park, Seon-Gyeong;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.17 no.2
    • /
    • pp.15-20
    • /
    • 2019
  • The purpose of this study is to provide customized experience learning service platform that enables consumers to easily search for various content information about on - site experiential learning, exhibitions, events, and culture, and to provide services. To provide customized experiential learning information that meets the requirements of the consumer. Beacon technology implemented through this study is a BLE technology that broadcasts a URL in Eddystone format developed by Google. This means that even if a user does not install a separate application, Making it easier and faster to access. Based on this, when the database of local cultural contents is completed, it will be expanded to the whole country, and it is expected that more diverse and high quality self - directed cultural contents experiential learning activity education programs will be provided to consumers by diversifying contents and expanding the market.

A Study on the Status of e-Books Usage in Small University Library: Focusing on the D University Library (소규모 대학도서관의 전자책 이용실태에 관한 연구 - D대학교도서관을 중심으로 -)

  • Kim, Jin Young;Han, Sang Woo
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.429-445
    • /
    • 2021
  • The purpose of this study is to analyze the status of e-books usage in small university library and to suggest implications for e-book management policies. To do that, a survey was conducted with students in a local small university, and the valid responses of 259 people were analyzed. As a result of the analysis, the preference of paper books (71%) was higher than that of e-books (12%). However, satisfaction with e-books (45.6%) was higher than that of paper books (27.9%) if they had experience using e-books. In addition, satisfaction was highest when using e-books for general reading, and it was found that the use device preferred to use a tablet. Based on the results of this study, we proposed some suggestions; 1) establishment of e-books service policy and promotion plan, 2) use of e-books dedicated devices and development of user-friendly e-books using environment, 3) providing various topics of e-books, 4) formation of an association for joint use of e-books between small library universities.

Vehicle control system base on the low power long distance communication technology(NB-IoT)

  • Kim, Sam-Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.117-122
    • /
    • 2022
  • In this paper, we developed a vehicle control terminal using IoT and low-power long-distance communication (NB-IoT) technology. This system collects information on the location and status of a parked vehicle, and transmits the vehicle status to the vehicle owner's terminal in real time with low power to prevent vehicle theft, and in the case of a vehicle in motion, When primary information about the vehicle, such as an impact, is collected and transmitted to the server, the server analyzes the relevant data to generate secondary information on traffic congestion, road damage, and safety accidents. By sending it, you can know the exact arrival time of the vehicle at its destination. This terminal device is an IoT gateway for a vehicle and can be connected to various wired and wireless sensors inside the vehicle. In addition, the data collected from vehicle maintenance, efficient operation, and vehicles can be usefully used in the private or public sector.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

A Study on the Development of Technology Standards for the Batch Conversion of CI between Private and Personal Identity Proofing Organizations for Safe Mobile Electronic Notification Service (안전한 모바일 전자고지서비스를 위한 민간기관과 본인확인기관 간의 연계정보 일괄변환 기술기준 개발에 관한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.559-569
    • /
    • 2022
  • Due to the spread of mobile devices, the use of mobile electronic notification services is increasing. For the mobile electronic notification service, the connecting information is required to identify the owner of the mobile device and the recipient of the notification. The connecting information is an online resident registration number, and safe management is essential. Therefore, in this paper, the processing flow, interconnecting standard, and management plan are proposed when a mobile electronic notification requesting agency requests the identity verification agency to convert the resident registration number of the recipient of the electronic notification to connecting information. In the proposed method, it is suggested that a safe mobile electronic notification service is possible by defining the process of collective conversion of connecting information between private organizations and personal identity proofing agency, information transmission and reception methods, and interworking standards.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.