• Title/Summary/Keyword: Access Control Software

Search Result 220, Processing Time 0.025 seconds

Web-based Measurement of ECU Signals on Vehicle using Embedded Linux

  • Choi, Kwang-Hun;Lee, Lee;Lee, Young-Choon;Kwon, Tae-Kyu;Lee, Seong-Cheol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.138-142
    • /
    • 2004
  • In this paper, we present a new method for monitoring of ECU's sensor signals of vehicle. In order to measure the ECU's sensor signals, the interfaced circuit is designed to communicate ECU and the Embedded Linux is used to monitor communication result through Web the Embedded Linux system and this system is said "ECU Interface Part". In ECU Interface Part the interface circuit is designed to match voltage level between ECU and SA-1110 micro controller and interface circuit to communicate ECU according to the ISO, SAE communication protocol standard. Because Embedded Linux does not allow to access hardware directly in application level, anyone who wants to modify any low level hardware must develop device driver. To monitor ECU's sensor signals the most important thing is to match serial level between ECU and ECU Interface Part. It means to communicate correctly between two hardware we need to match voltage and signal level, and need to match baudrate. The voltage of SA-1110 is 0 ${\sim}$ +3.3V and ECU is 0 ${\sim}$ +12V and, ECU's communication Line K does multiple operation so, the interface circuit is used to match voltage and signal level. In Addition to ECU's baudrate is 10400bps, it's not standard baudrate in computer environment. So, we need to develop a device driver to control the interface circuit, and change baudrate. To monitor ECU's sensor signals through web there's a network socket program is working in Embedded Linux. It works as server program and manages user's connections and commands. Anyone who wants to monitor ECU's sensor signals he just only connect to Embedded Linux system with web browser then, Embedded Linux webserver will return the ActiveX webbased measurement software. It works in web browser and inits ECU, as a result it returns sensor signals through web. All the programs are developed with GCC(GNU C Compiler) and, webbased measurement software is developed with Borland C++ Builder.

  • PDF

Implementation of QoS-awared MAC Protocol for Home Networks (홈 네트워크를 위한 QOS 보장형 매체접속제어 프로토콜의 구현)

  • 황원주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.228-238
    • /
    • 2003
  • We believe that existing wire solutions such as HomePNA2.0 using phone lines and HomePlug using power line and wireless solution such as HomeRF are the most promising solutions, because of its cost-effectiveness. However, MAC protocols of these solutions provide only Class of Service(CoS) using priority mechanism like HomePNA and HomePlug or consider only voice among real-time traffics like HomeRF. For these reasons, we perceive the needs of the new MAC protocol which is no new wire solution and provides guaranteed Quality of Service (QoS) for not only voice but also video and audio. In light of this, we present the design and software implementation of a new MAC protocol for Home Networks. Our evaluation results of software implementation verify that proposed MAC protocol can provide low delay, low loss, and low jitter to real-time traffic by reserving bandwidth.

Development of Communication Module Based on IEEE 802.11a/g for u-TSN Service (u-TSN서비스를 위한 IEEE 802.11a/g 기반 통신모듈 개발)

  • Bae, Jeong-Kyu;Woo, Ri-Na-Ra;Song, Jung-Hoon;Ahn, Tae-Sik;Han, Dong-Seog
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.117-124
    • /
    • 2009
  • In this paper, we have developed communication modules for ubiquitous transportation sensor network (u-TSN). The developed module can be used for intelligent transportation services. The developed systems are based on IEEE 802.11a and IEEE 802.11g technologies for vehicle and infrastructure systems, respectively. We have found that the throughput for the developed systems is at maximum around 15 Mbps. It is reduced to 10 Mbps at a long distance and high speed condition. The performance is enough to support traffic control services in dense traffic condition.

An Autonomous Navigation System for Unmanned Underwater Vehicle (무인수중로봇을 위한 지능형 자율운항시스템)

  • Lee, Young-Il;Jung, Hee;Kim, Yong-Gi
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.3
    • /
    • pp.235-245
    • /
    • 2007
  • UUV(Unmanned Underwater Vehicle) should possess an intelligent control software performing intellectual faculties such as cognition, decision and action which are parts of domain expert's ability, because unmanned underwater robot navigates in the hazardous environment where human being can not access directly. In this paper, we suggest a RVC intelligent system architecture which is generally available for unmanned vehicle and develope an autonomous navigation system for UUV, which consists of collision avoidance system, path planning system, and collision-risk computation system. We present an obstacle avoidance algorithm using fuzzy relational products for the collision avoidance system, which guarantees the safety and optimality in view of traversing path. Also, we present a new path-planning algorithm using poly-line for the path planning system. In order to verify the performance of suggested autonomous navigation system, we develop a simulation system, which consists of environment manager, object, and 3-D viewer.

Design and Development of Management System Standard Software for Aids to Navigation Based on S-201 (S-201 기반 항로표지 관리운영시스템 표준 SW 설계 및 개발)

  • Yeo, Ji-Min;Chae, Jeong-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1927-1934
    • /
    • 2021
  • The AtoN are installed and operated on the sea in order to help the safe navigation of ships. With the development of maritime ICT, to monitor and control the condition of AtoN from land using multiplex communication network such as AtoN AIS, CDMA, and LTE. Currently, The information of AtoN is difficult to integrated manage because AtoN management systems has been independently developed and operatie according to the operating conditions of the Regional Office of Oceans and Fisheries. In addition, in preparation for the introduction for e-navigation and MASS, systematic and unified information of AtoN is required. In this paper, we study to design and develop standard software for AtoN management system based on the international standard for navigation information(S-201). Through this study, it will be possible to provide continuous AtoN information and effective AtoN management.

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

A Study on the Shipbuilding Yard Information System Based on Wireless LAN (Wireless LAN 기반의 조선소 현장 정보시스템에 관한 연구)

  • SEO K. H.;KIM H. M.;KIM S. Y.
    • Journal of Ocean Engineering and Technology
    • /
    • v.19 no.6 s.67
    • /
    • pp.86-91
    • /
    • 2005
  • Regarding some of tire important works in tire shipyard, like tire production process, quality control, and material handling, there are many elements that disturb tire work-flaw. For example, there are mistakes in manufacturing, delay of production, and poor quality. These kinds of disturbances are from tire delay of communication time between tire production field and tire management. Therefore, it would be possible to strengthen tire competitiveness of shipbuilding industries by applying tire information technology based on Wireless Local Area Network (Wireless LAN), in order to establish tire multi-possession of real time production information in limited large shipbuilding yard. In this study, tire construction concept of tire information system, based on Wireless LAN, is proposed to build communication infrastructures in shipyards. The various information regarding shipbuilding inspection, process management, and material flaw are analyzed and constructed to databases in tire middle ware system, as tire platform for using Personal Display Agent (PDA). At last, tire middle ware system, which delivers tire information, is developed by tire C$\sharp$ and Microsoft.net; also, tire PDA application system is structured in WinCE O/S, and is tested and evaluated under tire server linked condition.

Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading (SW 분할 실행을 이용한 데스크탑 가상화 환경에서 데이터 보안 기술)

  • Chung, Moonyoung;Choi, Won-Hyuk;Jang, Su-Min;Yang, Kyung-Ah;Kim, Won-Young;Choi, Jihoon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.555-560
    • /
    • 2014
  • This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.

Design and Implementation of a Device Virtualization Framework to control Virtual Desktop (가상데스크탑 제어를 위한 디바이스 가상화 프레임워크의 설계 및 구현)

  • Kang, Sang-Woo;Park, Se-Jin;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.702-706
    • /
    • 2010
  • In this paper, we propose a framework to change local devices to networked devices by using web browser. Network devices will be used in the virtual desktop. Management software maintains a pool of devices to manage network devices. Whenever user's request is occured, virtual desktop s/w which manages desktop's I/O access device pool. Then virtual desktop s/w selects proper device and forwards I/O to desktop. In this paper, we choose RIA solution for install-free environment. Consequently, user easily enrolls and revokes their devices. User easily commands virtual desktop s/w. In the second half of this paper, we explain usage scenario and evaluate our framework to show efficiency and flexibility of the framework.