• Title/Summary/Keyword: File Access

Search Result 404, Processing Time 0.039 seconds

Analyses of Security Design for Home Gateway in Ubiquitous Surroundings (유비쿼터스 환경하에서의 홈게이트웨어를 위한 보안 설계 분석)

  • Kim Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.761-764
    • /
    • 2006
  • We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file servers, through the internet. With a simple web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall, we analyses the sorority design for home gateway in ubiquitous surroundings.

  • PDF

Design and Implementation of Real-time File Access Monitoring System on NT Server (멀티 유저 윈도우 환경에서의 실시간 데이터 접근 모니터링 시스템 설계 및 구현)

  • 박영철;박진섭;김형선;송영기
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.57-60
    • /
    • 2003
  • 최근 대부분의 기업 정보 범죄가 기업 내부자 소행으로 일어난다. 허가되지 않은 사용자의 불법적인 사용 및 도용은 기업 내부의 정보유출, 파괴 등 기업에 막대한 피해를 가져온다. 이런 환경에서 공용으로 사용되는 기업 정보에 대한 사용자별 파일 또는 디렉토리 접근에 대한 실시간적인 관리가 이루어져야 한다. 본 논문에서는 멀티 유저 윈도우서버의 디렉토리 및 파일에 접근하는 사용자를 실시간적으로 모니터링하고, 사용자 권한에 위배되는 행동을 모니터링하는 시스템을 설계 및 구현한다.

  • PDF

Design of pitch parameter search architecture for a speech coder using dual MACs (Dual MAC을 이용한 음성 부호화기용 피치 매개변수 검색 구조 설계)

  • 박주현;심재술;김영민
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.5
    • /
    • pp.172-179
    • /
    • 1996
  • In the paper, QCELP (qualcomm code excited linear predictive), CDMA (code division multiple access)'s vocoder algorithm, was analyzed. And then, a ptich parameter seaarch architecture for 16-bit programmable DSP(digital signal processor) for QCELP was designed. Because we speed up the parameter search through high speed DSP using two MACs, we can satisfy speech codec specifiction for the digital celluar. Also, we implemented in FIFO(first-in first-out) memory using register file to increase the access time of data. This DSP was designed using COMPASS, ASIC design tool, by top-down design methodology. Therefore, it is possible to cope with rapid change at mobile communication market.

  • PDF

A Low Power Design of H.264 Codec Based on Hardware and Software Co-design

  • Park, Seong-Mo;Lee, Suk-Ho;Shin, Kyoung-Seon;Lee, Jae-Jin;Chung, Moo-Kyoung;Lee, Jun-Young;Eum, Nak-Woong
    • Information and Communications Magazine
    • /
    • v.25 no.12
    • /
    • pp.10-18
    • /
    • 2008
  • In this paper, we present a low-power design of H.264 codec based on dedicated hardware and software solution on EMP(ETRI Multi-core platform). The dedicated hardware scheme has reducing computation using motion estimation skip and reducing memory access for motion estimation. The design reduces data transfer load to 66% compared to conventional method. The gate count of H.264 encoder and the performance is about 455k and 43Mhz@30fps with D1(720x480) for H.264 encoder. The software solution is with ASIP(Application Specific Instruction Processor) that it is SIMD(Single Instruction Multiple Data), Dual Issue VLIW(Very Long Instruction Word) core, specified register file for SIMD, internal memory and data memory access for memory controller, 6 step pipeline, and 32 bits bus width. Performance and gate count is 400MHz@30fps with CIF(Common Intermediated format) and about 100k per core for H.264 decoder.

A Study on the Non-Authority Control System (무전거시스템에 관한 연구)

  • Choi Suk-Doo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.233-264
    • /
    • 1993
  • The authorized form is called the heading must be unique and consistent. Without both uniqueness and cosistency, retrieval from the bibliographic database will not be optimal and in some cases may even be impossible. But the authority control is extremely expensive, because it is labour-intensive and dependent on professional investigation and judgement. In fact, it is by far the most expensive function in all of bibliographic control. The processes used to determine the form of access points. maintain. use. and evaluate very accurate authority records reduce the efficiency to generate or merge bibliographic items without modification from any national level bibliographic utilities as well as individual library. In this paper non-authority control system was suggested to solve the disadvantages of authority work. The apparent advantages of the non-authority control system are it is easy to determine the heading, input the bibliographic data. integrate the access points into an existing file, and generate and merge bibliographic data without modification. In addition, non-authority control system can be transmitted into online information retrieval system conducted with a mixture of controlled vocabularies and natural language.

  • PDF

Digital Watermarking Scheme Adopting Variable Spreading Sequence in Wireless Image Transmission (무선 이미지 전송에서 가변확산부호를 적용한 Digital Watermarking 기법)

  • 조복은;노재성;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.109-112
    • /
    • 2002
  • In this paper, we propose the efficient digital watermarking scheme to transmit effectively the compressed medical image that embedded with watermarking data in mobile Internet access channel. The wireless channel error based on multiple access interference (MAI) is closely related to the length of spreading sequence in CDMA system. Also, the fixed length coded medical image with watermark bit stream can be classified by significance of source image. In the simulation, we compare the peak signal to noise ratio (PSNR) performance when the watermarked image with a simple symbol and when the watermarked image with a text file is transmitted using variable length of spreading sequences in case of limited length of spread sequence.

  • PDF

A Study on User Authorization for Grid Resources

  • Lee, Seoung-Hyeon;Lee, Won-Goo;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.128-131
    • /
    • 2004
  • We suggest resource authorization system based on RBAC admitting someone to access resources. In existing grid environment, The authorization mechanism on user's resource is to give users an authority on the basis of DN(Distinguished Name) of proxy certificate and map file mapped in local system ID by one-to-one. In this case, it is difficulty in resource management such as each accounting management, memory resource, and disk resource, if the number of users, who want to use them is increased. To solve this problem, we specify the role of user's task in extension fields of his proxy certificate instead of the authorization mechanism of user's ID and propose resource authorization system being able to access his resource.

Test Bed for Radio Access Network Slicing Using FlexRAN Controller (FlexRAN 제어기를 이용한 무선 접근 망 슬라이싱을 위한 테스트베드)

  • Ahmed, Jahanzeb;Song, Wang-Cheol;Ahn, Khi Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.211-212
    • /
    • 2019
  • Slicing Radio Access Network (RAN) can help in effectively utilizing the network bandwidth and to better manage the increasing traffic over interent. RAN slicing system discussed in this paper is based on an open-source slicing mechanism in which we write a JSON configuration file for slicing policy and send it to the FlexRAN controller. FlexRAN controlls the core networks (CNs) through OAI-RAN on the evolved packet core (EPC) component of this system. Each CN is responsible for handling a saperate RAN slice. The type of internet traffic is identified by the FlexRAN crontroller and is sent to the respective CN through OAI-RAN. CN handles the traffic according to the allocated bandwidth and in this way the internet traffic is sliced inside the EPC component.

A Log Analysis Study of an Online Catalog User Interface (온라인목록 사용자 인터페이스에 관한 연구 : 탐색실패요인을 중심으로)

  • 유재옥
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.2
    • /
    • pp.139-153
    • /
    • 2000
  • This article focuses on a transaction log analysis of the DISCOVER online catalog user interface at Duksung Women's University Library. The results show that the most preferred access point is the title field with rate of 59.2%. The least used access point is the author field with rate of 11.6%. Keyword searching covers only about 16% of all access points used. General failure rate of searching is 13.9% with the highest failure rate of 19.8% in the subject field and the lowest failure rate of 10.9% in author field.

  • PDF

The Role of Facilitating Conditions and User Habits: A Case of Indonesian Online Learning Platform

  • AMBARWATI, Rita;HARJA, Yuda Dian;THAMRIN, Suyono
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.481-489
    • /
    • 2020
  • The study examines the role of facilitating conditions and user habits in the use of technology in Online Learning Platform (OLP) in Indonesia. The adoption of online learning, persistence, and learning results in online platforms is essential for ensuring that education technology is implemented and gets as much value as possible. People who use technology and systems will embrace new technologies even more. This quantitative study is based on a survey of 254 respondents, who were active users of the technology, and considers the facilitating conditions and user habits variables. Two research hypotheses were tested using the Partial Least Square-Structural Equation Modeling method. Cronbach's Alpha, path coefficient, AVE, R-square, T-test were applied. The results showed that the factors significantly influence the Online Learning Platform technology behavioral intention. This impact is primarily associated with the availability of the resources required to use OLP technology. The availability of these resources includes supporting infrastructures such as widespread Internet access, easy access to mobile devices, and file sizes that affect access speed. The findings of this study suggest that it is necessary to introduce and increase the availability of resources for using OLP technology, and familiarize people with the technology features.