• Title/Summary/Keyword: Attention network

Search Result 1,491, Processing Time 0.026 seconds

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

Conceptual Design of Product & Asset Lifecycle Management System for Marine Structures During Middle of Life (선박해양구조물의 유지보수 단계 수명주기관리 정보 시스템의 개념 설계와 구현)

  • Kim, Seung-Hyun;Lee, Jang-Hyun;Son, Gum-Jun;Han, Eun-Jung
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.2
    • /
    • pp.58-67
    • /
    • 2012
  • Recently, both the integration of product data during design and production and the effective management of information during full lifecycles have attracted attention from shipyards and ship owners as a result of recycling regulations and a desire for efficient operations. Generally, PLM (Product Lifecycle Management) supports a collaborative environment during the BOL (Beginning of Life) stage, while an ALM (Asset Lifecycle Management) system provides all of the information required to maintain, overhaul, and discard/recycle all or part of a vessel during the MOL (Middle of Life) and EOL (End of Life) stages. The main goal of this paper is to suggest the fundamental configuration of a PALM (Product Asset Lifecylce Management) system and a method that can be used to utilize a marine vessel's lifecycle information during the MOL, emphasizing the maintenance information during the middle of life. The authors also suggest a PALM system configuration in which lifecycle information can be collected by a PEID (Product Embedded Information Device) integrating a microcomputer, sensors, and wireless network communication. Through a prototype PALM system, the suggested features and PALM system configuration are implemented.

Rapid full-scale expansion joint monitoring using wireless hybrid sensor

  • Jang, Shinae;Dahal, Sushil;Li, Jingcheng
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.415-426
    • /
    • 2013
  • Condition assessment and monitoring of bridges is critical for safe passenger travel, public transportation, and efficient freight. In monitoring, displacement measurement capability is important to keep track of performance of bridge, in part or as whole. One of the most important parts of a bridge is the expansion joint, which accommodates continuous cyclic thermal expansion of the whole bridge. Though expansion joint is critical for bridge performance, its inspection and monitoring has not been considered significantly because the monitoring requires long-term data using cost intensive equipment. Recently, a wireless smart sensor network (WSSN) has drawn significant attention for transportation infrastructure monitoring because of its merits in low cost, easy installation, and versatile on-board computation capability. In this paper, a rapid wireless displacement monitoring system, wireless hybrid sensor (WHS), has been developed to monitor displacement of expansion joints of bridges. The WHS has been calibrated for both static and dynamic displacement measurement in laboratory environment, and deployed on an in-service highway bridge to demonstrate rapid expansion joint monitoring. The test-bed is a continuous steel girder bridge, the Founders Bridge, in East Hartford, Connecticut. Using the WHS system, the static and dynamic displacement of the expansion joint has been measured. The short-term displacement trend in terms of temperature is calculated. With the WHS system, approximately 6% of the time has been spent for installation, and 94% of time for the measurement showing strong potential of the developed system for rapid displacement monitoring.

Real-time Intelligent Health and Attention Monitoring System for Car Driver (실시간 지능형 운전자 건강 및 주의 모니터링 시스템)

  • Shin, Heung-Sub;Jung, Sang-Joong;Seo, Yong-Su;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1303-1310
    • /
    • 2010
  • Recently, researches related with automative mechanism have been widely studied to increase the driver's safety by continuously monitoring the driver's health condition to prevent driver's drowsiness. This paper describes the design of wearable chest belt for ECG and reflectance pulse oximetry for SpO2 sensors based on wireless sensor network to monitor the driver's healthcare status. ECG, SpO2 and heart rate signals can be transmitted via wireless sensor node to base station connected to the server. Intelligent monitoring system is designed at the server to analyze the SpO2 and ECG signals. HRV (Heart Rate Variability) signals can be obtained by processing the ECG and PPG signals. HRV signals are further analyzed based on time and frequency domain to determine the driver's drowsiness status.

A Study on Tools to Develop Electronic Documents (전자문헌 개발도구에 관한 고찰 - SGML, HTML과 PDF를 중심으로 -)

  • Kim, Yong;NamKoong, Hwang
    • Journal of Information Management
    • /
    • v.29 no.1
    • /
    • pp.1-19
    • /
    • 1998
  • With development in computing and networking technologies, national supports and attention for building digital library, which is to overcome the limits of time and location in using information resources, is increasing. To accomplish the main goal of digital library that is to freely share and transfer information on network, the importance of standardization in developing electronic document is increasing. Now several tools to develop electronic document, which will be used in digital library, are developed for electronic document used on WWW. But none of them has absolute advantages to other formats. Those tools, that is, have comparative advantages and disadvantages for making electronic documents. Through reviewing features and analyzing comparative advantage and disadvantage of SGML, HTML, and PDF, which will be used to develop electronic documents in digital libraries, this study focuses on their comparative advantages and disadvantages. With doing it, this study propose relevant type of electronic document formats to the types of information resources.

  • PDF

A Design of Framework for Secure Communication in Vehicular Cloud Environment (차량 클라우드 환경에서 안전한 통신을 위한 프레임워크 설계)

  • Park, Jung-oh;Choi, Do-hyeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2114-2120
    • /
    • 2015
  • Vehicle cloud technology is a fusion technology of vehicle communication technology and cloud computing used in wired and wireless Internet, and has attracted attention as a new IT paradigm. It is expected that it would contribute to resolve the road traffic problem with effective communication by providing computer, sensor, communication, device, and resource. but security is necessary to apply vehicle cloud environment and it have to resolve security threats and various attacks occurred in wired and wireless vehicle environment. Therefore, in this paper, we designed security framework to provide secure communication between vehicle and vehicle, and vehicle and the Road side in the vehicle cloud environment. Safety and security of the vehicle environment was satisfied with the security requirements of the vehicle and cloud-based environment, and increased efficiency than the conventional vehicle network communication protocols.

A Study on Developing the 3D Interaction Program for the Customized e-commerce (주문형 전자상거래를 위한 3차원 주문 프로그램 개발에 관한 연구)

  • 이수경;임창영
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.109-118
    • /
    • 2004
  • With the remarkable progression of network and the sophistication of contents, we now see various ways of communication methods in World Wide Web. In such trend, 3D web deserves our attention, which is applied for various areas such as education, game, chatting, e-commerce. Among those, by using 3D contents, e-commerce, especially the customized e-commerce, can give users more rich information about products. However, most of current 3D e-commerce sites are adopting a mere tool-based methods without considering contents and interaction required for the customized e-commerce. So, this paper proposes the direction of developing 3D interaction program for the customized e-commerce, based on a study on the required information elements about products and the interaction of controlling those factors. The evaluation to compare with the existing program is follows by the development of practical program, to give more persuasive reasons on the advantages of 3D e-commerce program.

  • PDF

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.

VirtFrame: A Sniffing-based Throughput Estimation Scheme in IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜 환경에서의 스니핑 기반 전송률 측정 기법(VirtFrame)에 관한 연구)

  • Seo, Sung-Hoon;Baek, Jae-Jong;Kim, Dong-Gun;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.187-194
    • /
    • 2011
  • IEEE 802.11 wireless LAN has become the center of attention for one of the most dominant wireless networking technologies nowadays. In densely deployed wireless LANs, mobile stations are exposed to a number of AP, thus it is needed to select the best AP to associate with. The most common approach is to select the AP with the highest received signal strength. However it does not consider traffic load imposed to each AP so that it may cause the poor network performance. Therefore, in this paper, we propose a throughput estimation scheme for neighboring APs by sniffing the traffic within 802.11 networks. We devise a tool, named "VirtFrame", which is to estimate the station's capable throughput from neighbor APs based on the channel access time by virtually combining the sniffed frames. Simulation results show that our proposed scheme well matches that there exists correlation between the channel access time and the actual throughput of the APs.

A Study on Power Control using PMS (PMS 시스템을 활용한 전력제어에 관한 연구)

  • Kim, Sung-Cheol;Kim, Kyoung-Wook;Woo, Chun-Hee
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.3
    • /
    • pp.194-198
    • /
    • 2016
  • The electric power industry have recently been building out Smart Grids, a two-way electricity grid that connects power consumers and producers to a network that enables one to respond quickly to any eventuality. The construction of a two-way electricity grid means that the power control process becomes unified, from what used to be separate processes that originate individually from the consumption phase and the production and supply phases. The role of power control that takes place within each section of the power system may be independent. However, this does not mean the independent control sections are operated individually, but are configured to meet a single target and purpose. Each control section possesses enough degree of independency to respond to eventualities that may occur within different stages of the power system, but at the same time, possesses unified system elements for the stability of the entire power system. From this perspective, Smart Grids are widely regarded as the most rational power industry operation plan. A variety of different control and communication systems can be applied for an effective deployment of Smart Grids. Recently, we have seen systems such as PMS(Power Management System) and PAS(Process Automation System) applied in the deployment of Smart Grids, which are developed from the techniques utilized in the industry. The PMS is attracting particular attention for its power operations management ability. In this study, we propose plans for improvement in the rational development of power system controls through case studies of live PMS operations.