• Title/Summary/Keyword: 사용자 편의환경

Search Result 542, Processing Time 0.032 seconds

Design of University Management System Architecture of 3-Tier Environment Using .Net Smart Client Technology (닷넷 스마트클라이언트 기술을 이용한 3-티어 환경에서의 학사시스템 아키텍쳐 설계)

  • Kim, hyun-jun;Lee, Jun-Whan;Hyun, Duk-Chang;Cho, han-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.25-27
    • /
    • 2010
  • 인터넷 보급률이 증가함에 따라 동시 접속자 수가 크게 증가한 요즘 기존에 소규모 시스템 및 소수의 사용자에게 적합한 클라이언트와 서버 방식인 2-티어 환경에서의 시스템은 성능저하의 요인이 되었고 이는 대규모 프로젝트 수행시 좀더 높은 성능으로 처리하게 되었다. 본 논문에서는 대규모 프로젝트의 최적의 성능 및 유지보수 편의성을 제공하기 위해 닷넷 리모팅 서비스와 스마트 클라이언트를 기반으로 한 3-티어 환경에서의 학사시스템 아키텍쳐를 설계하였다.

  • PDF

Extension of EXT2 for Single Disk I/O Environment (단일 디스크 입출력 환경을 위한 EXT2의 확장)

  • 임동혁;황인철;변은규;맹승렬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.76-78
    • /
    • 2004
  • 단일 디스크 입출력 환경은 클러스터 시스템의 분산된 디스크들을 하나의 통합된 디스크의 이미지로 제공하여 사용자에게 편의성을 제공한다. 하지만, 디바이스 수준에서의 서비스를 제공하고 이로 인해 여러 노드에서의 파일의 병렬적인 접근을 지원하기 위해서는 클러스터 파일 시스템의 지원이 요구된다. 본 논문은 리눅스 시스템에서 가장 많이 사용하는 EXT2 파일 시스템을 단일 입출력 환경에서 효과적으로 사용할 수 있는 클러스터 파일 시스템으로의 확장하는 방안에 대해서 설명한다. 기존의 EXT2 파일 시스템을 커널 모듈의 형태로 재구성하고, 버퍼 캐쉬와 메타 데이터의 일관성 유지를 위하여 분산 락 모듈물 구현하고 이를 이용하여 데이터의 일관성과 동기화 문제를 동시에 해결하도록 하여, EXT2 파일 시스템을 클러스터 파일 시스템으로 확장하였다

  • PDF

Design of Authentication Protocol Based on Distance-Bounding in VANET (VANET 환경에서 Distance-Bounding 기반의 안전한 상호인증 프로토콜)

  • Kim, Minjin;Kim, Bumryong;Lee, Sanghyun;Jun, Moon-Soeg
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.809-811
    • /
    • 2015
  • VANET은 차량간 통신 네트워크로 사고나 교통정보를 차량간 전달하거나 인프라를 통해 교통시스템 등의 서비스를 가능하게 한다. 사용자의 편의와 교통시스템의 효율을 위해 확산이 기대된다. 이에 다수의 차량과 인프라 간, 차량과 차량간 통신에서 악의적인 해커의 공격에 대비할 수 있는 보다 안전한 인증 프로토콜이 필요하다. 본 논문에서는 VANET 환경에서 Distance-Bounding Protocol과 Diffie-Hellman을 이용한 상호 인증 및 키 교환 프로토콜을 제안한다. 제안하는 프로토콜은 보안성평가를 통해 안전성을 검증하였으며, 이를 통해 VANET 환경에서 불법적인 RSU나 해커의 공격으로부터 안전한 통신을 가능하게 할 것으로 예상된다.

Smart Home System with Indoor Lighting Control (실내 채광 조절이 가능한 스마트 홈 시스템)

  • Tae-Seon Kim;In-Ho Cho;Won-Yeong Kim;Woo-Young Choi;Su-In Choi;Do-Hyeon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.417-418
    • /
    • 2023
  • 최근 사용되는 스마트 홈 시스템은 다양한 환경의 효율성, 편안함, 기능성을 추구한다. 하지만 기존 스마트 홈 시스템에는 실내 채광 조절이 블라인드나 커튼과 같이 사람의 관리가 필요로 한 부분이 적용된다. 본 논문은 이를 보완하고자 현재 자동차 및 항공기에 사용되는 스마트 윈도우처럼 주변 조명 조건에 따라 투명도를 조절할 수 있는 스마트 글라스나 필름 사용을 제안한다. 기존 별도의 관리가 필요한 블라인드, 커튼 등과 달리 창문 자체적으로 외부 채광을 조절하고 실내 조명과 연동하여 자동적으로 실내의 환경을 변화시킨다면 사용자의 경제성과 편의성을 증가시키는 효과를 얻을 것이다.

  • PDF

Recommendations and Analysis of Model-based User Interface Model (모델 기반의 사용자 인터페이스 모델 분석 및 제안)

  • Kim, Chang-Su;Yu, So-Ra;Kim, Sung-Han;Lee, Seung-Yun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1077-1082
    • /
    • 2012
  • User interface model technology can apply UI based on a user's choice. Recently, researches about th interface for the user's convenience have been actively made. For this, in W3C, various researches are ongoing in order to provide UI adjust service based on N-Screen service, consistent service provision, and the user's preference. In this paper, we study the model-based interface technology, which is fundamental to develop UI for the user's convenience. For this we study the verification process by analyzing elements of the user interface technology, analyzing the standards of the UI, and finding improvements for the MBUI standard. This will be used in order to secure the technology for web-application measures and to apply next-generation web-application.

A Study of Product Trade Service using Mobile Agent (모바일 에이전트를 이용한 상품거래서비스에 관한 연구)

  • 안성욱;오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.1-10
    • /
    • 2001
  • Recently, way of Electronic Commerce is changing with increment of Internet users. In the previous way of commerce, users used to search for information by themselves. However, for user's convience, it can be done for users from one site. Mobile in order to provide users with such service. By the mobile agent-based Electronic Commerce system, users can get information from one site, and service companies can provide various and useful information to users. This is very important for construction of reliable Electronic Commerce environment, However, in generally used mobile agent-based platforms, the user should know URL information. and it is based on search engines. And as user's requirement levels become higher, they want to be provided with integrated and summarized service. In this paper, we implement product-trading system by applying mobile agent concept in order to satisfy user's requirement of getting required information from one site with minimal mouse click. For implementing the product trading system, E-speak, which is a platform for E-Service, is used And contents are saved as XML documents and data are shared based on these documents.

  • PDF

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

A Study on the Development of Educational Software for Web-based Visual Effects Interactive Environment (Web 기반 VE(Visual Effects) 인터랙티브 환경 교육용 소프트웨어 개발에 관한 연구)

  • Na, Wonshik
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.89-93
    • /
    • 2017
  • As the cost of installing and maintaining software on large organizations such as recent companies and schools has increased, software installation and maintenance costs are low, system management is easy, demand for ease of use software solutions has increased. In the reality that special education for service center engineers is required along with the release of various products, training of the software and solution industry is regarded as important. Building Web-based user and system interactive environment, strengthened usability and educational ability effect suitable for engineer level. In the future, research that is familiar with specific software, not successfully combining multiple frameworks, rather than developers, will be increasingly important for research that can achieve optimal performance.

The Design and Implementation of a Effective web-based electronic mailing system (효율적인 웹기반 전자 우편 시스템의 설계 및 구현)

  • An, Syung-Og;Yoo, Sung-Jung;Yoo, Hyun-Ggung
    • The Journal of Engineering Research
    • /
    • v.4 no.1
    • /
    • pp.5-22
    • /
    • 2002
  • With the rapid advance of internet service and the corresponding migration of service environment from the text-based one to WWW (World Wide Web) environment, the number of internet users is growing rapidly due to its easy usage. Accordingly, usage of internet as services for sending electronic mails to the other party over the network is becoming increasingly prevalent. Web-based electronic mailing system is comprised of a server and a client. The former provides the users with e-mail accounts and services, while the latter serves as a user interface. In other words, it enables those public users who dos not own e-mail accounts on the existing mail server to have an access to the mailing service through the web. In this paper, we designed a effective web-based electronic mailing system which is based on the internet explorer and linux operating system, which overcomes limitations of the existing e-mail systems and meets the need of a cost-efficient alternative. Our electronic mailing system also supports the convenience of users through appropriate handling of preregistered spam e-mails and multiple e-mails, and this facilitates the development of a stable e-mail system by being able to avoiding the low system performance due to the bursty characteristics of e-mail messages and the increasing number of users

  • PDF

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.