• Title/Summary/Keyword: 엑세스

Search Result 238, Processing Time 0.023 seconds

A New Dynamic Bandwidth Assigmnent Algorithm for Ethernet-PON (Ethernet-PON을 위한 새로운 동적 대역 할당 알고리즘)

  • Jang, Seong-Ho;Jang, Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.441-446
    • /
    • 2003
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. The PON architecture is very simple but it requires a MAC protocol for control of upstream traffic. The MAC protocol must support QoS (Quality of Service) administration function by various traffic class, efficient dynamic bandwidth assignment function, CDV (Ceil Delay Variation) minimization function etc. This paper proposes a dynamic bandwidth assignment algorithm of the MAC protocol for a broadband access network using an Ethernet Passive Optical Network supporting various traffic class. We compare our proposed with MDRR algorithm using simulation, and confirmed that our proposed Request-Counter algorithm produces shorter average cell delay.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

Integrated Social Networking Service Management: Comprehensive Approach for Efficient Multi-Platform Management and Enhanced User Experience (SNS 통합 관리 서비스:다중 플랫폼 효율적인 관리와 사용자 경험 강화를 위한 종합적 접근 방식)

  • Sung Jin Kim;Hyun Chul Kwon;Ji Hyun Park;Jae Min OH;Jin Seok Yang;Yun Ho jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.251-253
    • /
    • 2023
  • 본 연구는 spring framework와 각 SNS들의 API를 활용한 각 플랫폼들을 한 사이트에 연동하여 사용자들이 손쉽게 관리하기 위하여 진행하였다. SNS 통합 플랫폼에서의 중요한 요소는 사용자들의 SNS 관리 시간을 단축시키는 것인데 이를 위해 플랫폼들의 게시물들을 한 곳에서 게시, 수정, 삭제 그리고 여러 플랫폼에 게시물을 동시에 업로드하는 기능과 게시물들을 필터링하는 기능을 제공하였다. 이를 통해 사용자의 편의성은 올라가며 더 효율적으로 게시물들을 관리하여 시간을 단축시킬 수 있다.

  • PDF

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Design of Look-up Table in Huffman CODEC Using DBLCAM and Two-port SRAM (DBLCAM과 Two-port SRAM을 이용한 허프만 코덱의 Look-up Table 설계)

  • 이완범;하창우;김환용
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.10
    • /
    • pp.57-64
    • /
    • 2002
  • The structure of conventional CAM(Content Addressable Memory) cell, used to Look-up table scheme in Huffman CODEC, is not performed by being separated in reading, writing and match operation. So, there is disadvantages that the control is complicated, and the floating states of match line force wrong operation to be happened in reading, writing operation. In this paper, in order to improve the disadvantages and proces the data fast, fast Look-up table is designed using DBLCAM(Dual Bit Line CAM)-performing the reading, writing operation and match operation independently and Two-port SRAM being more fast than RAM in an access speed. Look-up table scheme in Huffman CODEC, using DBLCAM and Two-port SRAM proposed in this paper, is designed in Cadence tool, and layout is performed in 0.6${\mu}{\textrm}{m}$ 2-poly 3-metal CMOS full custom. And simulation is peformed with Hspice.

Systems of the Remote Control via the Web (웹을 통한 원격제어 시스템)

  • Lee, Chang-Hee;Lee, Kwang-Je;Won, Yong-Jin;Ryu, Hee-Sahm
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.65-70
    • /
    • 2002
  • This paper discusses the work-in-progress of a system to control a moving robot over the WWW(World Wide Web). That is, we describes the experimental results and control methods of system over the world wide web. The remote control of the system is controlled by accessing a simple form of interface that is connected to the server. For this application, a remote operator should have a general-purpose computer with Internet connection and a WWW browser to remotely operate the line-tracer through the Internet. As a remote operator summits an input by operating html files in the server, the program written in java is operated the equipment is being connected to the serial port. By being transmitted to the line-tracer through the infra-red sensor, the remote controlled signal is operated in distance. As a tool in order to identify the system's operation of the over the web is used the line-tracer. 

A Mobile Multimedia System for IP-based Convergence Networks (IP 기반 통합망에서의 모바일 멀티미디어 시스템)

  • Kim Won-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.1-12
    • /
    • 2006
  • In this paper we propose an efficient mobile multimedia communication protocol, mobile terminal software platform and mobile VoIP application for IP-based convergence networks. The Proposed mobile multimedia communication protocol is called as ST-MRSVP (Split tunnel based Mobile Resource reServation Protocol) which integrates split tunnel based Mobile IP and RSVP in order to support hish speed mobility. Since mobile terminal platform supports QoS (Qualify of Service) with keeping seamless mobility, mobile QoS supporting modules are developed and interworked together by means of shared memory mechanism. Testbed is composed of a core-network embedding the proposed protocols and wireless LAN-based access networks. We verify functionality and performance of the proposed techniques by using various mobility test over the testbed. As a result, the proposed architecture can reduce the handover delay time with QoS support under 30% comparing with the standard mechanisms and support voice quality as good as CDMA phone.

The effect of Timing Jitter on Orthogonal Hermite Pulsefor M-ary UWB System (직교 Hermite 펄스를 이용한 M진 UWB 시스템에서 타이밍 지터의 영향 분석)

  • Kim, Yoo-Mi;Kim, Jin-Su;Seo, Myoung-Seok;Shin, Chul-Min;Kwak, Kyung-Sub
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.5 no.3 s.11
    • /
    • pp.13-23
    • /
    • 2006
  • The system using UWB is processing brisk study with Bluetooth among the wireless access that is major technology in Telematics. The low complexity and cost for realization is advantage of UWB have communication of high speed. Mamy papers have published on the timing jitter effect on system performance except for the UWB system. In this paper, we analyze the effect of timing jitter on M-ary UWB system using orthogonal Hermite pulse and perform the simulation to show symbol error rate performance. For theoretical analysis, we derive correlation function of orthogonal Hermits pulse with closed form, and as well upper bound of Symbol Error Probability for M-ary orthogonal Hermite pulse system mathematically. It is found that numerical analysis is accurate enough through simulation.

  • PDF

A Study on the Training System of Institutional Repository Staffs (기관 레포지토리 실무자 연수 체계에 관한 연구)

  • Cho, Jane
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.4
    • /
    • pp.5-22
    • /
    • 2013
  • Institutional repository has been regarded as core facilities of research libraries to realize open access by collecting, preserving, distributing of intellectual asset what institution has created. In our country, many universities and research institutions are trying to introduce institutional repository system. But almost universities not only take the negative attitude to manage properly, but also never give basic training to staff members who take over institutional repository job. This study brightens up the current status of Korean training system and compares the British and Japanese cases what shows diverse advanced managing cases. Furthermore, by putting together demands of hands-on workers, suggest direction of future institutional repository staff training system. First, institutional repository staff training system has to suggest strategies to induce strong support from institution. Second, it has to give not only courses about content collecting and registering, but also practical training. Finally, the program for enhancing system management technology has to be provided, and the place where technical staffs can share their system information mutually has to be provided.

A Study on a Conceptual Model for Distributed Problem Solving (분산 문제 해결을 위한 개념적 모델에 관한 연구)

  • Kim, Eun-Gyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.107-117
    • /
    • 1996
  • This paper proposes a conceptual model for distributed problem solving(DPS), where cooperation and communication among agents are based on virtual shared memory (VSM) In this model, all agents in a DPS system view all the memory in a distributed computer system as a single shared memory in which data, tasks, and results can in a distributed computer system as a single shared memory, in which data, tasks, and results can / be accessed by any of the agents. Several agents cooperatively solve a complex problem, as agents write data, intermediate results of execution, and tasks requested to other agents to VSM and other agents read or execute them. Also, in order to develop DPS systems based on the proposed conceptual model, this paper designs a DPS system development environment(DPS-VSM)using Network Linda. Thi spaper shows utility ofthe proposed model by presenting an example of simulation a VSM-based DPS system, and analyzes the model by comparing the features of DPS- VSM with some other DAI programming shells.

  • PDF