• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.022 seconds

A Design and Implementation of JPEG Streamer for Real Time Image Surveillance System (실시간 영상감시를 위한 JPEG Streamer의 설계와 구현)

  • Kim Kyung-Hwan;Yoo Hae-Young;Lee Jin-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.107-118
    • /
    • 2006
  • Recently, network infra grows rapidly and the digital image compression technique have made remarkable progress, and therefore the demand of the real-time image surveillance system which uses a network camera server is increasing. Network Camera Server has emerged as an attractive alternative to the CCTV for the real-time image surveillance. From this reason, the demand regarding the development of the real-time image surveillance system which uses a network camera server is increasing as well. In this paper, we will provide a model for JPEG Streamer which is used in real-time image surveillance system. And we will design and implement this model. For the stability and efficiency of the JPEG Streamer, we'll use the thread pool and shared memory. We will also introduce the concept of double buffering for increasing the quality of real-time image, Using the JPEG Streamer, a raising of the productivity, reliability and stability will be able to secure to development of real-time image surveillance system.

  • PDF

An Analysis of Intrusion Pattern Based on Backpropagation Algorithm (역전파 알고리즘 기반의 침입 패턴 분석)

  • Woo Chong-Woo;Kim Sang-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.93-103
    • /
    • 2004
  • The main function of the intrusion Detection System (IDS) usee to be more or less passive detection of the intrusion evidences, but recently it is developed with more diverse types and methodologies. Especially, it is required that the IDS should process large system audit data fast enough. Therefore the data mining or neural net algorithm is being focused on, since they could satisfy those situations. In this study, we first surveyed and analyzed the several recent intrusion trends and types. And then we designed and implemented an IDS using back-propagation algorithm of the neural net, which could provide more effective solution. The distinctive feature of our study could be stated as follows. First, we designed the system that allows both the Anomaly dection and the Misuse detection. Second, we carried out the intrusion analysis experiment by using the reliable KDD Cup ‘99 data, which would provide us similar results compared to the real data. Finally, we designed the system based on the object-oriented concept, which could adapt to the other algorithms easily.

  • PDF

Wireless Sensor Network based Remote Power Monitoring System for Anti Islanding application in Smart-Grid (스마트 그리드 내 독립전원의 단독운전 방지를 위한 무선 센서 네트워크 기반의 원격 전력 감시 시스템)

  • Kim, Kee-Min;Lee, Kyung-Jung;Moon, Chan-Woo;Ahn, Hyun-Sik;Jeong, Gu-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.57-62
    • /
    • 2010
  • Renewable energy and smart grid become the focus of attention of industry. The smart grid is an intelligent system which maximizes the efficiency of energy and it needs to monitor the amount of power generation and power consumption continuously. Remote Monitoring System(RMS) is very useful for monitoring the power generation and consumption, but mostly they are implemented on the wire communication. In this paper, we propose a wireless sensor network based remote power monitoring system. And as an application, a new anti-islanding method with the proposed RMS is presented. An experimental micro grid system is implemented to verify the proposed RMS and anti-islanding method.

Remote Communication of sensor data in Ballast Water Treatment System (선박 평형수 처리 시스템에서 센서 데이터의 원격 통신)

  • Kim, Chin-Hoon;Kim, Joo-Man;Kim, Byoung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.139-147
    • /
    • 2014
  • The ballast water may be discharged into another sea area with marine organisms, it caused problems to disturb the marine ecosystem. So, in order to remove these environmental risk factors, the IMO has mandated the installation of BWTS to the all ships. Our monitoring system diagnose and predict a failure of BWTS by analyzing the sensor information of BWTS collected from which the ships scattered in the ocean of several. This paper presents the design and implementation of communication modules for BWTS remote monitoring considering the satellite communication charge fee. In the our study, we implemented the safety and cost-saving communication modules by LabVIEW program. The collected sensor informations is encrypted and compressed by LabVIEW modules running on RIO. Then they will be transfer to the land server and will be decrypt to enable monitoring in the land server. For the verification, we build the test modules which can verify from collecting the sensor data to consuming them in the monitoring server. We carried out 20 times for the data pattern in all of case. So, we verified the excellent functionality and reliability through the experimental result.

Implementation of fast stream cipher AA128 suitable for real time processing applications (실시간 처리 응용에 적합한 고속 스트림 암호 AA128 구현)

  • Kim, Gil-Ho;Cho, Gyeong-Yeon;Rhee, Kyung Hyune;Shin, Sang Uk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2207-2216
    • /
    • 2012
  • Recently, wireless Internet environment with mobile phones and wireless sensor networks with severe resource restrictions have been actively studied. Moreover, an overall security issues are essential to build a reliable and secure sensor network. One of secure solution is to develop a fast cryptographic algorithm for data encryption. Therefore, we propose a 128-bit stream cipher, AA128 which has efficient implementation of software and hardware and is suitable for real-time applications such as wireless Internet environment with mobile phones, wireless sensor networks and Digital Right Management (DRM). AA128 is stream cipher which consists of 278-bit ASR and non-linear transformation. Non-linear transformation consists of Confusion Function, Nonlinear transformation(SF0 ~ SF3) and Whitening. We show that the proposed stream cipher AA128 is faster than AES and Salsa20, and it satisfies the appropriate security requirements. Our hardware simulation result indicates that the proposed cipher algorithm can satisfy the speed requirements of real-time processing applications.

User satisfaction analysis for layer-specific differences using the IoT services (IoT 서비스를 사용하는 사용자 계층별 차이에 대한 만족도 분석)

  • Park, Chong-Woon;Kwon, Chang-Hui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.90-98
    • /
    • 2017
  • Since 2010, SNS was holding the explosive spread of smartphones has created a place of public advertising platform, and it entered the Internet of Things (IoT) is born gradually countdown of the era came to us already. In utilizing a variety of location-based services IoT services (beacon, O2O) The focus of this paper to analyze the differences in satisfaction with the oil layer by experienced users of what is being used. We consider the type and overall utilization of the concepts typical IoT service in the current service is made to expand the contents of the paper. Hypothesis was reconstructed ease, attractiveness, a survey reliability, value four kinds of models, called Honeycomb UX, User Experience Honeycomp Peter Mobil. Company that provides the service IoT in this study are expected to be used as basic data to help provide a more accurate personalized service according to the user's satisfaction difference.

An SMS Notarization System Using Smartphones (스마트폰을 활용한 SMS 공증 시스템)

  • Lee, Yunho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.13-19
    • /
    • 2018
  • Although it's been nearly decade since the electronic notarization system enforced, the utilization is not high because of the troublesomeness of the client or his agent to visit the notarial office directly. Recently, the ministry of justice introduced e-notary based on audio-visual conference through amendament of the notarial law, and hence it will vitalize the usage of e-notary. In addition, due to the spread of smartphones, many people use SMS messages to express simple statements or promises. However, in case of legal disputes, the judgment of the court is different according to the case. The electronic notarization system can be used to prove of evidence of SMS messages, however, there is a hassle to convert SMS messages to electronic documents. To solve this problem, this paper proposes an SMS notarization system using smartphones. The proposed system uses reliable notarization server and it is divided into notarization system for message senders and notarization system for message receivers according to notary requestor.

Performance Improvement of Human Detection in Thermal Images using Principal Component Analysis and Blob Clustering (주성분 분석과 Blob 군집화를 이용한 열화상 사람 검출 시스템의 성능 향상)

  • Jo, Ahra;Park, Jeong-Sik;Seo, Yong-Ho;Jang, Gil-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.157-163
    • /
    • 2013
  • In this paper, we propose a human detection technique using thermal imaging camera. The proposed method is useful at night or rainy weather where a visible light imaging cameras is not able to detect human activities. Under the observation that a human is usually brighter than the background in the thermal images, we estimate the preliminary human regions using the statistical confidence measures in the gray-level, brightness histogram. Afterwards, we applied Gaussian filtering and blob labeling techniques to remove the unwanted noise, and gather the scattered of the pixel distributions and the center of gravities of the blobs. In the final step, we exploit the aspect ratio and the area on the unified object region as well as a number of the principal components extracted from the object region images to determine if the detected object is a human. The experimental results show that the proposed method is effective in environments where visible light cameras are not applicable.

A Secure Personal Health Record System for Handling of Emergency Situations (응급 상황 처리를 위한 안전한 개인건강기록 시스템)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • In recent years, Personal Health Record (PHR) has emerged as a patient-centric model of health information exchange. The Personal Health Record (PHR) owners enjoy the full right of accessing their records anywhere and anytime making storage and retrieval more efficient. Due to the sensitivity and confidential nature of the PHR, however, the PHR is maintained in a secure and private environment with the individual determining rights of access. In this paper, we propose a system which enables access to the user's PHR in the event of emergency. In emergency situation where the user is unconscious, the emergency staff can use the PHR information to request a emergency access to the PHR server based on the predefined rights of access for PHR. Under the proposed system, the PHR owner can specify a fine grain access control policy during emergency situations.

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF