• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.032 seconds

An Active Queue Management Algorithm Based on the Temporal Level for SVC Streaming (SVC 스트리밍을 위한 시간 계층 기반의 동적 큐 관리 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.425-436
    • /
    • 2009
  • In recent years, the user demands have increased for multimedia service of high quality over the broadband convergence network. These rising demands for high quality multimedia service led the popularization of various user terminals and large scale display equipments, which needs a variety type of QoS (Quality of Service). In order to support demands for QoS, numerous research projects are in progress both from the perspective of network as well as end system; For example, at the network perspective, QoS guaranteeing by improving of internet performance such as Active Queue Management, while at the end system perspective, SVC (Scalable Video Coding) encoding scheme to guarantee media quality. However, existing AQM algorithms have problems which do not guarantee QoS, because they did not consider the essential characteristics of video encoding schemes. In this paper, it is proposed to solve this problem by deploying the TS- AQM (Temporal Scalability Active Queue Management) which employs the differentiated packet dropping for dependency of the temporal level among the frames, based on SVC encoding characteristics by exploiting the TID (Temporal ID) field of the SVC NAL unit header. The proposed TS-AQM guarantees multimedia service quality through video decoding reliability for SVC streaming service, by differentiated packet dropping when congestion exists.

Slope Management Program of Available to an Urban Area (대도시지역에 적합한 사면관리프로그램)

  • Kim, Kyeong-Su;Cho, Yong-Chan;Chae, Byung-Gon;Song, Young-Suk;Lee, Choon-Oh
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2006.03a
    • /
    • pp.644-651
    • /
    • 2006
  • In general, a damage that occurs due to landslide or slope failure in urban areas is larger than that in rural areas. In order to reduce the damage, a program is necessary to categorize slopes based on properties and to manage them systematically. Based on the above necessity, a slope management program which is applicable to slope management in an urban area has been developed at Hwangryung mountain in Busan as a target area. The program has a function of systematic slope information constructed by slope ID number of each slope or sub-region of a mountain, making a slope data sheet, analysis and grouping of slope stability, and establishment of a data base. It can also be utilized practically by end users due to the convenient input, edition, printing, management and operation of slope data. For practical utilization of the developed program, a research related to construction of the slope management system for a regional area is demanded to be performed continuously. The supply and utilization of a web based slope management system would contribute to damage reduction.

  • PDF

A Study on the Enforcement of Violation of Traffic Laws by Delivery Motorcycle Riders (배달 이륜차 라이더 교통 법규 위반 단속 연구)

  • Cho, Yong Bin;Kim, Jin-Tae;Lim, Joon Bum;Oh, Sang Tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.182-192
    • /
    • 2022
  • Motorcycle accidents are increasing at an average annual rate of 10.01%, and fatalities are also increasing by 2.64%. Enforcement cameras are installed to enforce safe driving of more-than or equal-to four-wheeled vehicles on the road. Even though the main purpose of this enforcement camera is to disencourage the speed violation of all types of vehicle, one cannot expect complete enforcement by these cameras. In particular, enforcement of the motorcycle should rely on on-site activities through the input of on-site personnel. Recently, to discourage the illegal acts of motorcycling, the National Police Agency introduced the 'National Police Agency SMART National Report'. However, it is necessary to prepare an appropriate practical plan to maximize the effect of enforcement requiring continuous manpower management. This study proposed four types of rider certification IDs for delivery motorcycles. These IDs are institutional devices to manage delivery motorcycle riders. In addition, a experiment on enforcement was conducted using those license ID systems for delivery motorcycles. This experiment confirmed through the image-processing program (D-MESO) if one of the systems was possible to implement for enforcement on the delivery motorcycle rider's license.

Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC (금융 ISAC을 활용한 정보유출 2차피해 방지 방안)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.31-36
    • /
    • 2014
  • As security management center of financial area, financial ISAC monitors financial corporations and provides security services. Financial ISAC minimizes damage by responding quickly to external attack such as hacking, virus but it is poor at handling internal attack. For the efficient management and stable operation of information source, also to respond jointly to online hacking, the necessity of information sharing system increases day by day in and outside country. This paper proposes financial ISAC that can prevent a secondary damage of leakage information as well as providing security services. The proposed financial ISAC provides new password to financial corporation in which the same ID and password as leakage information are used and in case of financial information leakage it warns customers against phishing etc.

Network Modeling of Paddy Irrigation System using ArcHydro GIS (ArcHydro를 이용한 GIS기반의 관개시스템 네트워크 모델링)

  • Park, Geun-Ae;Park, Min-Ji;Jang, Jung-Seok;Kim, Seong-Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.323-327
    • /
    • 2006
  • During the past decades in South Korea, there have been several projects to reduce water demand and save water for paddy irrigation system by automation. This is called as intensive water management system by telemetering of paddy ponding depth and canal water level and telecontrol of water supply facilities. This study suggests a method of constructing topology-based irrigation network system using GIS tools. For the network modeling, a typical agricultural watershed included reservoirs, irrigation and drainage canals, pumping stations was selected. ArcHydro tools composed of edge, junction, waterbody and watershed were used to construct hydro-network. ArcHydro Model was then designed and the network was successfully built using the HydroID. Visualization using ArcHydro tools could display table property of each object. ArcHydro Model was linked to Agricultural Water Demamd and Supply Estimation System (AWDS) which developed by Korea Rural Community and Agriculture Corporation (KRC) to extract information of the study area. And menu of supply facilities information, demand analysis and supply analysis constructed for information acquisition and visualization of acquired informations.

  • PDF

Implementaion of Home Healthcare System for a Patient using SAW Tag (SAW 태그를 이용한 재택환자 종합관리시스템 구현)

  • Song, Jai-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.183-188
    • /
    • 2017
  • This paper is for the a study on home healthcare system for a patient using SAW Tag. This system is useful when there's a patient in home. Many patients are wounded in restroom. But restroom is very private place and nobody want to be disturbed here. The place where the patient is most injured in the house is the toilet, and it is the point where the privacy of the individual should be kept and the patient's condition should be checked and cope with in case of emergency. And using saw tag, we can calculate position and ID through reflected rf signal. Therefore we propose a general home healthcare system. The management system utilized a seat bed system to monitor at-home patients. The system mounts a bio-signal measuring unit on a toilet seat, measures a bio-signal from the bio-signal measuring unit, and the measured bio-signal is transmitted to the main server through the user's smart phone. With proposed system, we can expand operation area to silver town where many patients are cared. In this paper we developed sensor system and saw tag positioning system and showed the result.

Improved Implementation of Interlock Using Management Step Described by SFC (SFC로 기술된 매니지먼트 스텝에 의한 개선된 인터록의 실현)

  • You, Jeong-Bong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.3
    • /
    • pp.127-133
    • /
    • 2005
  • Programmable Logic Controller(PLC) is the most widely utilized and plays an important role in industrial control system. The study about a PLC language is performed actively. Ladder Diagram(ID) is the most widely used in PLC. In is not suitable for describing a complex sequential logic and is very difficult to grasp the sequential flow of control logic and has the disadvantage for a maintenance. On the other hand, Sequential Function Chart(SFC) is very easy to grasp the sequential flow of control logic and has the compatability for a maintenance but has the disadvantage for describing a condition and a interlock logic. In this paper, we propose the method that describe the interlock logic using management step, and confirm his feasibility through a actual examples.

Efficient security solution structure design for enterprise security management system (통합 보안 관리 시스템 구축을 위한 효율적인 보안 솔루션 구조 설계)

  • Kang Min-gyun;Han Kun-Hee;Ha Kyung-Jae;Kim Seok-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.824-831
    • /
    • 2005
  • Past corporaion's network security system is single security solution, or mixed several ways, but there was inefficient system because doing not get into organic link But, constructed more strong security system by ESM enterance on. ESM uses way to integrate of each agent to manage easily various kinds security solution. That is, it is system that connect system of existent VPN, FireWall, IDS and so on configurationally depending on security policy and manage. ESM is security system that is developed more than existent security system. But, practical use of network and the development speed of technology being increasing with the mon faster speed, is heightening the level more as well as dysfunction of information crime and so on. Many improvements are required at ESM system, this research wished to make up for the weak-point in the ESM system about interior security. Studied on structure of security solution that is basis of security policy. VPN, Firewall, IDS's link that is main composition of existing security system analysis, reconstructed. And supplemented security of ESM system itself. Establish imaginary intrusion and comparative analysis access data that apply each Telnet Log analysys IDS existent ESM system and proposed ESM system comparative analysis. Confirm the importance of interior security and inspected security of proposed system.

Database Table Management and Input/output Design System on the Web (웹 기반 서버 데이터베이스 테이블 관리 및 입출력 형태 정의 시스템)

  • 한순희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.433-445
    • /
    • 1999
  • Today's Web tends to change from simple guideline to more complex information Provider based on large amount of data, enabling a better understanding of the objects. It provides various information retrieval techniques. Therefore, these data have to be stored and maintained in a database system for efficiency and consistency. But database system absolutely requires systematic and consistent management techniques. As a consequence, a high trained and well-educated person should do it. In this paper, we design and implement a tool for easy and reliable database table creation and management on the web. If users log in this system, they can get a list of tables created by themselves and will find a hyper link per each table. Futhermore, they can view and manage it's contents.

  • PDF

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.