• Title/Summary/Keyword: Access Control Software

Search Result 220, Processing Time 0.028 seconds

Hardware and Software Implementation of a GPS Receiver Test Bed Running from PC (PC 기반 GPS 수신기 하드웨어 모듈 및 펌웨어 개발)

  • Long, Nguyen Phi;Hieu, Nguyen Hoang;Lee, Sang-Hoon;Park, Ok-Deuk;Kim, Hyun-Su;Kim, Han-Sil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.394-396
    • /
    • 2006
  • When developing a new GPS receiver module, the essential problems are evaluation of reliable algorithms, software debugging, and performance comparison between algorithms to find optimal solution. Most GPS receiver modules nowadays use a correlator to track signals from satellites and an MCU (Micro Controller Unit) to control operations of the entire module. The problem of software evaluation from MCU is very difficult, due to limitation of MCU resources and low ability of interfacing with user. Normally, user has to expense special tool kit for a limiting access to MCU but it is also hard to use. This article introduces an implementation of a GPS receiver test bed using correlator GP2021 interfacing with ISA (Industry Standard Architecture) PC bus. This way can give user complete control and visibility into the operation of the receiver, then user can easily debug program and test algorithms. For this article, the least square method is implemented to test the hardware and software performance.

  • PDF

Smart IoT Hardware Control System using Secure Mobile Messenger (모바일 메신저를 이용한 스마트 IoT 하드웨어 제어 시스템)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2232-2239
    • /
    • 2016
  • IoT industry has been highlighted in the domestic and foreign country. Since most IoT systems operate separate servers in Internet to control IoT hardwares, there exists the possibility of security problems. Also, IoT systems in markets use their own hardware controllers and devices. As a result, there are many limitations in adding new sensors or devices and using applications to access hardware controllers. To solve these problems, we have developed a novel IoT hardware control system based on a mobile messenger. For the security, we have adopted a secure mobile messenger, Telegram, which has its own security protection. Also, it can improve the easy of the usage without any installation of specific applications. For the enhancement of the system accessibility, the proposed IoT system supports various network protocols. As a result, there are many possibility to include various functions in the system. Finally, our IoT system can analyze the collected information from sensors to provide useful information to the users. Through the experiment, we show that the proposed IoT system can perform well.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Software Architecture of KHU Automatic Observing Software for McDonald 30-inch telescope (KAOS30)

  • Ji, Tae-Geun;Byeon, Seoyeon;Lee, Hye-In;Park, Woojin;Lee, Sang-Yun;Hwang, Sungyong;Choi, Changsu;Gibson, Coyne A.;Kuehne, John W.;Prochaska, Travis;Marshall, Jennifer;Im, Myungshin;Pak, Soojong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.69.4-70
    • /
    • 2018
  • KAOS30 is an automatic observing software for the wide-field 10-inch telescope as a piggyback system on the 30-inch telescope at the McDonald Observatory in Texas, US. The software has four packages in terms of functionality and is divided into communication with Telescope Control System (TCS), controlling of CCD camera and filter wheel, controlling of focuser, and script for automation observing. Each interconnect of those are based on exe-exe communication. The advantage of this distinction is that each package can be independently maintained for further updates. KAOS30 has an integrated control library that combines function library connecting each device and package. This ensures that the software can extensible interface because all packages are access to the control devices independently. Also, the library includes the ASCOM driver platform. ASCOM is a standard general purpose library that supports Application Programming Interface (API) of astronomical devices. We present the software architecture of KAOS30, and structure of interfacing between hardware and package or package and package.

  • PDF

Performance Evaluation of a Method to Improve Fairness in In-Vehicle Non-Destructive Arbitration Using ID Rotation

  • Park, Pusik;Igorevich, Rustam Rakhimov;Yoon, Jongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5098-5115
    • /
    • 2017
  • A number of automotive electronics-safety, driver assistance, and infotainment devices-have been deployed in recent vehicles. This raises new challenges regarding in-vehicular network arbitration. A performance analysis of non-destructive arbitration has revealed a fairness issue. The arbitration prioritizes without collisions, despite multiple simultaneous transmissions; however, the performances of the highest priority node and the lowest priority node are very different. In this paper, an ID-rotation arbitration method to solve the arbitration-fairness problem is proposed. The proposed algorithm was applied to several engine control units (ECUs), including a controller area network (CAN) controller. Experimental results showed that the algorithm improved the fairness as well as the total throughput within a specific performance constraint.

A study on the development of the simulation software for the fire evacuation (화재 대피 시뮬레이션 소프트웨어 개발에 관한 연구)

  • Kim, Young-Heon;Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.201-205
    • /
    • 2002
  • In case of fire in the buildings, the appropriate and safe evacuation plans for the building residents are very important to minimize the number of casualties. Since the evacuation time usually depends on the stairs and passages of design of the building, the evacuation plans should be considered while the architectural design is done. Conventionally, the calculation of the evacuation time in the case of fire breakout is based on the approximate mathematical equations which are prone to error. In this study, the simulation software is developed to help the architectural designers to access the more accurate evacuation time and find out the floor plans which offers the most sage evacuation plans for the residents in case of fire.

  • PDF

Mutual exclusion of shared memory access in the simulation software of the midclass commuter (중형항공기 시뮬레이션 소프트웨어의 작업간 공유메모리 사용의 상호배제)

  • 이인석;이해창;이상혁
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.207-209
    • /
    • 1996
  • The software of the midclass commuter flight simulation is running on multiprocessor/multitasking environments The software is consist of tasks which are periodically alive at a given interval. Each task communicates via shared memory. The data shared by tasks is divided by several block. Only one task, called producer, can produce data for a data block but several tasks, called consumers, can read data from the data block. Double buffer and conditional flag are used to implement a mutual exclusion which prevents the producer and consumers from accessing the same data block simultaneously.

  • PDF

Cloud System Security Technology Trend

  • Yoon, Jeong-Won;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.49-56
    • /
    • 2015
  • In this paper, we introduce recent cloud system security technologies categorizing them according to Reliability, Availability, Serviceability, Integrity, and Security (RASIS), terms that evaluate robustness of the computer system. Then we describe examples of security attacks and corresponding security technologies for each of them. We introduce security technologies based on Software Defined Network (SDN) for Reliability, security technologies based on hypervisor and virtualization for Availability, disaster restoration systems for Serviceability, authorization and access control technologies for Integrity, and encryption algorithms for Security. We believe that this paper provide wise view and necessary information for recent cloud system security technologies.

Internet-Based Control and Monitoring System Using LonWorks Fieldbus for HVAC Application

  • Hong, Won-Pyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1205-1210
    • /
    • 2004
  • The 4-20mA analog signal used in the various industrial fields to interface sensor in distributed process control has been replaced with relatively simple digital networks, called "fieldbus, and recently by Ethernet. Significant advances in Internet and computer technology have made it possible to develop an Internet based control, monitoring, and operation scheduling system for heating, ventilation and air-conditioning (HVAC) systems. The seamless integration of data networks with control networks allows access to any control point from anywhere. Field compatible field devices become so-called "smart" devices, capable of executing simple control, diagnostic and maintenance functions and providing bidirectional serial communication to higher level controller. The most important HVAC of BAS has received nationwide attention because of higher portion of more than 40% in building sector energy use and limited resources. This paper presents the Internet-based monitoring and control architecture and development of LonWorks control modules for AHU (air handling units) of HVAC in viewpoint of configuring BAS network. This article addresses issues in architecture section, electronics, embedded processors and software, and internet technologies.

  • PDF

Intelligent Surveillance System using Kinect sensor and Multirotor (키넥트 및 멀티로터를 이용한 지능형 감시 시스템)

  • Oh, Jung-hak;Yu, Do-jun;Goo, Ha-neul;Kim, Ho-sung;Kim, Seong-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.541-544
    • /
    • 2012
  • In technology advances, The field of military and security surveillance system for a wide range of interest is required. Surveillance system offers a variety of services by the software that work with a remote access server. This paper shows the results of the implementation using three platforms as Mjpg-streamer for server, Arduino-multiwii for control system, OpenNI and OpenCV for image processing.

  • PDF