• Title/Summary/Keyword: Internet-based checking

Search Result 79, Processing Time 0.032 seconds

Overview of Internet-based checking for machine tools with a variant CNC environment (서로 다른 CNC 환경을 갖는 공작기계의 인터넷 기반 점검)

  • 김동훈;김선호;김경돈;김찬봉;고광식
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.04a
    • /
    • pp.329-334
    • /
    • 2004
  • This paper proposes Internet-based checking scheme for machine-tools with a variant CNC. Checking points defined in this research are classified into two categories such as structured point and operational point. The formal includes the vibration of bearing, temperature of spindle unit and another periodical management. And the latter includes oil checking, clamp locking/unlocking and machining on/off status. Through this research, for the global management of variant CNC machines interspersed with CAC and OAC in manufacturing system, the suitable environment for Internet-based checking of variant CNC machines was designed and the checking methods for CAC and OAC machines were compared with each other.

  • PDF

A Scheme on Internet-based Checking for Variant CNC Machines in Machine Shop

  • Kim, Dong-Hoon;Kim, Sun-Ho;Koh, Kwang-Sik
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1732-1737
    • /
    • 2004
  • This paper proposes Internet-based checking technique for machine-tools with variant CNC (Computerized Numerical Controller). According to the architecture of CNC, CNC is classified into two types such as CAC (Closed Architecture Controller) which is conventional CNC, and OAC (Open Architecture Controller) which is a recently introduced PC-based controller. CAC has a closed architecture and it is dependent on CNC vender specification. Because of this, it has been very difficult for users to implement an application programs in CNC domain. Therefore, an additionally special module is required for Internet-based application such as remote checking. In this case, web I/O embedded module can be efficiently applied for Internet-based checking. The module is directly attached to TCP/IP network for communication. In order to obtain the monitoring data of CNC machines, the I/O signals of the module are assigned to PLC (Programmable Logic Controller) input and output (I/O) signals within CNC domain. On the other hand, OAC has a PC-based open architecture and an additional module is not necessary for the connection with external site. Because of this, a simple DAU is just used for signal sensing and data acquisition without additional communication modules. For Internet-based remote checking of machine-tools with OAC, a user-defined daemon and application programs are implemented as the form of internal function within the PC-based controller. Internet communication is performed between the daemon program in CNC domain and web script programs in external server. Checking points defined in this research are classified into two categories such as structured point and operational point. The formal includes the vibration of bearing, temperature of spindle unit and another periodical management. And the latter includes oil checking, clamp locking/unlocking and machining on/off status.

  • PDF

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

Developing an Intelligent Health Pre-diagnosis System for Korean Traditional Medicine Public User

  • Kim, Kwang Baek
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.85-90
    • /
    • 2017
  • Expert systems for health diagnosis are only for medical experts who have deep knowledge in the field but we need a self-checking pre-diagnosis system for preventive public health monitoring. Korea Traditional Medicine is popular in use among Korean public but there exist few available health information systems on the internet. A computerized self-checking diagnosis system is proposed to reduce the social cost by monitoring health status with simple symptom checking procedures especially for Korea Traditional Medicine users. Based on the national reports for disease/symptoms of Korea Traditional Medicine, we build a reliable database and devise an intelligent inference engine using fuzzy c-means clustering. The implemented system gives five most probable diseases a user might have with respect to symptoms given by the user. Inference results are verified by Korea Traditional Medicine doctors as sufficiently accurate and easy to use.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

An Enhanced Community Detection Algorithm Using Modularity in Large Networks (대규모 네트워크에서 Modularity를 이용한 향상된 커뮤니티 추출 알고리즘)

  • Han, Chi-Geun;Jo, Moo-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.75-82
    • /
    • 2012
  • In this paper, an improved community detection algorithm based on the modularity is proposed. The existing algorithm does not consider the information that the nodes have in checking the possible modularity increase, hence the computation may be inefficient. The proposed algorithm computes the node degree (weight) and sorts them in non-increasing order. By checking the possible modularity value increase for the nodes in the nonincreasing order of node weights, the algorithm finds the final solution more quickly than the existing algorithm does. Through the computational experiments, it is shown that the proposed algorithm finds a modularity as good as the existing algorithm obtains.

A Study on design of The Internet-based scoring system for constructed responses (서답형 문항의 인터넷 기반 채점시스템 설계 연구)

  • Cho, Ji-Min;Kim, Kyung-Hoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.2
    • /
    • pp.89-100
    • /
    • 2007
  • Scoring the constructed responses in large-scale assessments needs great efforts and time to reduce the various types of error in Paper-based training and scoring. For the purpose of eliminating the complexities and problems in Paper and pencil based training and scoring, many of countries including U.S.A and England already have applied online scoring system. There, however, has been few studies to develop the scoring system for the constructed responses items in Korea. The purpose of this study is to develop the basic design of the Internet-based scoring system for the constructed responses. This study suggested the algorithms for assigning scorers to constructed responses, employing methods for monitoring reliability, etc. This system can ensure reliable, quick scoring such as monitor scorer consistency through ongoing reliability checks and assess the quality of scorer decision making through frequent various checking procedures.

  • PDF

A Study on Electronic Commerce Transaction Modeling based on SET (SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구)

  • 고영철;송병열;조현규;함호상
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

A Study on the Life Prediction of Lithium Ion Batteries Based on a Convolutional Neural Network Model

  • Mi-Jin Choi;Sang-Bum Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.118-121
    • /
    • 2023
  • Recently, green energy support policies have been announced around the world in accordance with environmental regulations, and asthe market grows rapidly, demand for batteries is also increasing. Therefore, various methodologies for battery diagnosis and recycling methods are being discussed, but current accurate life prediction of batteries has limitations due to the nonlinear form according to the internal structure or chemical change of the battery. In this paper, CS2 lithium-ion battery measurement data measured at the A. James Clark School of Engineering, University of Marylan was used to predict battery performance with high accuracy using a convolutional neural network (CNN) model among deep learning-based models. As a result, the battery performance was predicted with high accuracy. A data structure with a matrix of total data 3,931 ☓ 19 was designed as test data for the CS2 battery and checking the result values, the MAE was 0.8451, the RMSE was 1.3448, and the accuracy was 0.984, confirming excellent performance.

Keystroke Dynamics based User Authentication with Autoassociative MLP (자기연상 다층 퍼셉트론을 이용한 키 스트로크 기반 사용자 인증)

  • Sungzoon Cho;Daehee Han
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.345-353
    • /
    • 1997
  • Password checking is the most popular user authentication method. The keystroke dynamics can be combined to result in a more secure system. We propose an autoassociator multilayer perceptron which is trained with the timing vectors of the owner's keystroke dynamics and then used to discriminate between the owner and an imposter. An imposter typing the correct password can be detected with a very high accuracy using the proposed approach. The approach can also be used over the internet such as World Wide Web when implemented using a Java applet.

  • PDF