• Title/Summary/Keyword: 복사 서비스

Search Result 136, Processing Time 0.021 seconds

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Expansion of Personal Identification to Vitalize the Use of Unmanned Civil Service Issuing Machines for Gongju-si (공주시 무인민원발급기 이용 활성화를 위한 신분 확인 확대 방안)

  • Kim, Eui Seok;Jung, Hanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.156-158
    • /
    • 2021
  • An initial local government center received direct asking from citizens, wrote the documents by hand, and issued them. Later the appearance of computers, printers, and faxes made it possible to handle civil complaints through copying. Since 2010, as the e-government has started, entering civil service requests into computers after identification by themselves and printing the results has become established. In addition, with the introduction of unmanned administrative services, civil services become available in various places, which causes the increased satisfaction of citizens. One of the services is an unmanned civil service issuing machine, and more than 20 kinds of documents, including a copy of resident registration, can be issued directly. Of course, additional help may be needed if citizens are not familiar with the latest technologies. However, the unmanned civil service issuing machine is a highly satisfactory way in that it is less time-limited as citizens can visit a community center or city hall after the end of work. However, the main problem is that resident registration numbers and fingerprint recognition are required depending on the type of issuance, which increases the inconvenience of handling citizen complaints and is shunned. To solve this problem, we aim to study a method for improving the fingerprint recognition method of unmanned civil service issuing machines by expanding personal identification.

  • PDF

A Study on the Evaluation of Foreign Science and Technology Serials with Reference to the Result of Interlibrary Loan Activity (상호대차 활성화에 따른 대학도서관 이.공계열 외국학술지의 평가에 관한 연구)

  • 이창수;김신영
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.71-88
    • /
    • 2002
  • The purpose of this use study is to evaluate foreign science and technology serials with reference to the result of interlibrary loan activity and to present the model of cooperative acquisition. This study was based upon an analysis of actual use data by library users and Interlibrary loan from March 1, 2000 to February 28, 2001. 603 titles of foreign serials which were composed of 459 subscription titles of I University Library and 144 cooperative acquisition titles in the fields of science and technology were analyzed. The study reveals that only 439 serials(72.8%) were used even more once and 164 serials were not used at all during 1 year interval. A relationship was found between rankings of serials as measured by use and JCR citation ranking. Based upon various aspects of use analysis, this study suggested effective techniques for managing academic serials.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

A Study on the Budget for Foreign Knowledge Information Resources in Korean Academic and Research Libraries (해외 지식정보자원의 수집 예산 규모에 관한 연구)

  • Kwack Dong-Chul
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.151-174
    • /
    • 2006
  • To improve the international competitiveness of research and academic libraries in Korea, it is essential to review the total amount of domestic information resources in comparison with those of other advanced countries, and then to make their best use. In this study, an attempt is made to estimate the annual budget for collecting foreign knowledge information resources spent by academic and research libraries in Korea. This budget estimate could be used for a basis for setting up the appropriate collection size and the efficient channel for distributing and sharing information resources among academic and research libraries on the governmental level. The total budget for collecting foreign knowledge information resources, including foreign monographs and scholarly journals in print, and the budget for foreign electronic journals, and web databases were estimated for academic libraries and research libraries, respectively, while the budget for international document delivery services was estimated without distinction between the types of libraries.

A Design and Fabrication of Microstrip Patch Antenna for PCS band and IMT-2000 band (PCS 대역과 IMT-2000 대역 겸용 마이크로스트립 패치 안테나의 설계 및 제작)

  • Lee, Won-Hui;Choi, Kyung-Sik;Hur, Jung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.2
    • /
    • pp.108-116
    • /
    • 2002
  • In this paper, to improve bandwidth of microstrip antenna, we discussed the patch structure using dual patch and probe feed. To provide PCS service and IMT-2000 service simultaneous, a microstrip patch antenna needs impedance bandwidth of 22%. We propose wide-band microstrip path antenna without complexity. To analyze characteristics of microstrip patch antenna, we used Ensemble of commercial software. The microstrip patch antenna was designed, fabricated, and tuned. The result was that 500 ㎒(25.5%) of impedance bandwidth for VSWR 2,430 ㎒(21.9%) of impedance bandwidth for VSWR 1.5. The microstrip patch antenna has side lobe of -14 dB. The front to back ratio is 20 dB overall. The measured gain of the microstrip patch antenna is 5.2 dBi.

A Web-based Right Management System Considering Execution time and Security (실행시간과 안전성을 고려한 웹 기반의 저작권관리 시스템)

  • Ko, Il-Seok;Cho, Yong-Hwan;Shin, Seung-Soo;Cho, Do-Eun;Kwon, Yong-Ai
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.697-702
    • /
    • 2004
  • As for the digital content, a reproduction is easy and manuscript is identical with original copy. Because of these characteristics, there are difficulties on prevention of an illegal reproduction and an illegal currency. In recent days various digital content service systems based on a web are commercialized. An appropriate copyright protection technology is required so that these systems develop as a profit model. Generally we use encrypted digital content transmission method for the copyright protection on a web base system. At the time of this, it is increased sire of encrypted digital content. As for this, it be increased time required on an execution process. Therefore, a design of the system that considered a execution time and a security is required. In this study, we designed the digital content transmission system that considered execution time and a security through a partial encryption based on a digital content copyright management technique. Also we evaluated performance of a proposed system through analysis.

A Single-Layer Waveguide Slot Array Antenna using Diaphragms for 38 GHz Frequency Band (칸막이 구조를 이용한 단일 평면상의 38 GHz용 도파관 슬롯 배열 안테나)

  • 황지환;오이석
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.7
    • /
    • pp.721-726
    • /
    • 2003
  • This paper present a waveguide slot 16${\times}$16 assay antenna with diaphragms for 38 GHz frequency band. Diaphragms are used to control the impedance and to minimize the return loss of the structure. A 20 dB Chebyshev array of 16 waveguide slots has been designed by optimizing the positions and sizes of the diaphragms. A serial feeding system with $\pi$- and T-junction power dividers has also designed to get a 20 dB Chebyshev power distribution. A 16${\times}$16 slot array was designed for a Fixed Wireless Access System at 38 GHz frequency band, manufactured using a computer controlled milling technique, and measured for the return -19 dB and the frequency band of 740 MHz.

A Dual Band Microstrip Antenna with Two Y-Shaped Slots for Satellite Internet Service (위성 인터넷 서비스를 위한 두 개의 Y 형태 슬롯을 가지는 이중 대역 마이크로스트립 안테나)

  • Kim, Byoung-Chul;Lee, Sang-Un;Han, Sung-Min;Lee, Ho-Jin;Choo, Ho-Sung;Park, Ik-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.2
    • /
    • pp.145-151
    • /
    • 2008
  • In this paper, a dual band microstrip antenna with similar radiation pattern for the satellite internet service is proposed. The proposed antenna has two Y-shaped slots on the microstrip patch that is fabricated on RO4003 substrate with a dielectric constant of 3.38 and a thickness of 0.508 mm, and operates in the 2 GHz and 5 GHz bands. The size of the antenna is $50\times47.5\times6.5\;mm^3$, and fed by coaxial cable. The measured bandwidths of the antenna are 2.398$\sim$2.507 GHz and 5.458$\sim$5.972 GHz for VSWR<2. The measured gains are 8.92 dBi and 7.74 dBi, respectively, for the lower and upper bands.

A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent (경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델)

  • Park, Yeon-Hee;Kim, Jong-Uk;Lee, Seong-Uck;Kim, Chol-Min;Tariq, Usman;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.517-521
    • /
    • 2008
  • A worm is a malware that propagates quickly from host to host without any human intervention. Need of early worm detection has changed research paradigm from signature based worm detection to the behavioral based detection. To increase effectiveness of proposed solution, in this paper we present mechanism of detection and prevention of worm in distributed fashion. Furthermore, to minimize the worm destruction; upon worm detection we propagate the possible attack aleγt to neighboring nodes in secure and organized manner. Considering worm behavior, our proposed mechanism detects worm cycles and infection chains to detect the sudden change in network performance. And our model neither needs to maintain a huge database of signatures nor needs to have too much computing power, that is why it is very light and simple. So, our proposed scheme is suitable for the ubiquitous environment. Simulation results illustrate better detection and prevention which leads to the reduction of infection rate.