• 제목/요약/키워드: Internet-based checking

검색결과 79건 처리시간 0.022초

서로 다른 CNC 환경을 갖는 공작기계의 인터넷 기반 점검 (Overview of Internet-based checking for machine tools with a variant CNC environment)

  • 김동훈;김선호;김경돈;김찬봉;고광식
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2004년도 춘계학술대회 논문집
    • /
    • pp.329-334
    • /
    • 2004
  • This paper proposes Internet-based checking scheme for machine-tools with a variant CNC. Checking points defined in this research are classified into two categories such as structured point and operational point. The formal includes the vibration of bearing, temperature of spindle unit and another periodical management. And the latter includes oil checking, clamp locking/unlocking and machining on/off status. Through this research, for the global management of variant CNC machines interspersed with CAC and OAC in manufacturing system, the suitable environment for Internet-based checking of variant CNC machines was designed and the checking methods for CAC and OAC machines were compared with each other.

  • PDF

A Scheme on Internet-based Checking for Variant CNC Machines in Machine Shop

  • Kim, Dong-Hoon;Kim, Sun-Ho;Koh, Kwang-Sik
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1732-1737
    • /
    • 2004
  • This paper proposes Internet-based checking technique for machine-tools with variant CNC (Computerized Numerical Controller). According to the architecture of CNC, CNC is classified into two types such as CAC (Closed Architecture Controller) which is conventional CNC, and OAC (Open Architecture Controller) which is a recently introduced PC-based controller. CAC has a closed architecture and it is dependent on CNC vender specification. Because of this, it has been very difficult for users to implement an application programs in CNC domain. Therefore, an additionally special module is required for Internet-based application such as remote checking. In this case, web I/O embedded module can be efficiently applied for Internet-based checking. The module is directly attached to TCP/IP network for communication. In order to obtain the monitoring data of CNC machines, the I/O signals of the module are assigned to PLC (Programmable Logic Controller) input and output (I/O) signals within CNC domain. On the other hand, OAC has a PC-based open architecture and an additional module is not necessary for the connection with external site. Because of this, a simple DAU is just used for signal sensing and data acquisition without additional communication modules. For Internet-based remote checking of machine-tools with OAC, a user-defined daemon and application programs are implemented as the form of internal function within the PC-based controller. Internet communication is performed between the daemon program in CNC domain and web script programs in external server. Checking points defined in this research are classified into two categories such as structured point and operational point. The formal includes the vibration of bearing, temperature of spindle unit and another periodical management. And the latter includes oil checking, clamp locking/unlocking and machining on/off status.

  • PDF

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

Developing an Intelligent Health Pre-diagnosis System for Korean Traditional Medicine Public User

  • Kim, Kwang Baek
    • Journal of information and communication convergence engineering
    • /
    • 제15권2호
    • /
    • pp.85-90
    • /
    • 2017
  • Expert systems for health diagnosis are only for medical experts who have deep knowledge in the field but we need a self-checking pre-diagnosis system for preventive public health monitoring. Korea Traditional Medicine is popular in use among Korean public but there exist few available health information systems on the internet. A computerized self-checking diagnosis system is proposed to reduce the social cost by monitoring health status with simple symptom checking procedures especially for Korea Traditional Medicine users. Based on the national reports for disease/symptoms of Korea Traditional Medicine, we build a reliable database and devise an intelligent inference engine using fuzzy c-means clustering. The implemented system gives five most probable diseases a user might have with respect to symptoms given by the user. Inference results are verified by Korea Traditional Medicine doctors as sufficiently accurate and easy to use.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

대규모 네트워크에서 Modularity를 이용한 향상된 커뮤니티 추출 알고리즘 (An Enhanced Community Detection Algorithm Using Modularity in Large Networks)

  • 한치근;조무형
    • 인터넷정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.75-82
    • /
    • 2012
  • 본 논문에서는 modularity를 기반으로 한 향상된 커뮤니티 추출 알고리즘을 제안한다. 기존의 알고리즘은 modularity 값을 증가시키는 커뮤니티를 구축할 때 노드가 갖고 있는 정보를 고려하지 않음으로써, 계산을 비효율적으로 반복하여 수행한다. 제안하는 알고리즘은 노드의 degree(weight)를 계산하고 그것을 내림차순으로 정렬하고, 정렬된 순서대로 modularity 값의 증가여부를 확인함으로써, 반복되는 계산과정을 줄여 기존의 알고리즘보다 빠르게 최종 결과를 도출해낸다. 실험계산을 통해 제안하는 알고리즘이 더 짧은 시간 내에, 기존알고리즘이 구한 modularity 값보다 같거나, 향상된 값을 찾는다는 것을 보인다.

서답형 문항의 인터넷 기반 채점시스템 설계 연구 (A Study on design of The Internet-based scoring system for constructed responses)

  • 조지민;김경훈
    • 컴퓨터교육학회논문지
    • /
    • 제10권2호
    • /
    • pp.89-100
    • /
    • 2007
  • 대규모 집단을 대상으로 시행하는 서답형 문항을 수기 채점 방식으로 채점하는 경우 채점 과정에서 발생하는 채점 오차를 줄이기 위해서는 많은 노력과 시간을 필요로 한다. 이러한 문제점을 해결하기 위해 세계 각국에서는 서답형 문항 채점 시스템을 개발하여 운용하고 있지만, 국내에서는 채점 시스템의 기초적인 연구도 미흡한 실정이다. 본 연구의 목적은 '서답형 문항의 인터넷 기반 채점 시스템' 설계의 기반을 마련하는데 있다. 시스템 설계의 기반 마련을 위한 시스템의 개요와 기본 설계도, 채점자 배정 방법, 채점자 신뢰도 추정에 의한 채점자 오류 검색 알고리즘을 제안하였다. 본 시스템은 실시간으로 채점 신뢰도를 추정하여 채점 오차를 보정할 수 있는 장점이 있다.

  • PDF

SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구 (A Study on Electronic Commerce Transaction Modeling based on SET)

  • 고영철;송병열;조현규;함호상
    • 한국전자거래학회지
    • /
    • 제2권1호
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

A Study on the Life Prediction of Lithium Ion Batteries Based on a Convolutional Neural Network Model

  • Mi-Jin Choi;Sang-Bum Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권3호
    • /
    • pp.118-121
    • /
    • 2023
  • Recently, green energy support policies have been announced around the world in accordance with environmental regulations, and asthe market grows rapidly, demand for batteries is also increasing. Therefore, various methodologies for battery diagnosis and recycling methods are being discussed, but current accurate life prediction of batteries has limitations due to the nonlinear form according to the internal structure or chemical change of the battery. In this paper, CS2 lithium-ion battery measurement data measured at the A. James Clark School of Engineering, University of Marylan was used to predict battery performance with high accuracy using a convolutional neural network (CNN) model among deep learning-based models. As a result, the battery performance was predicted with high accuracy. A data structure with a matrix of total data 3,931 ☓ 19 was designed as test data for the CS2 battery and checking the result values, the MAE was 0.8451, the RMSE was 1.3448, and the accuracy was 0.984, confirming excellent performance.

자기연상 다층 퍼셉트론을 이용한 키 스트로크 기반 사용자 인증 (Keystroke Dynamics based User Authentication with Autoassociative MLP)

  • Sungzoon Cho;Daehee Han
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1997년도 종합학술발표회논문집
    • /
    • pp.345-353
    • /
    • 1997
  • Password checking is the most popular user authentication method. The keystroke dynamics can be combined to result in a more secure system. We propose an autoassociator multilayer perceptron which is trained with the timing vectors of the owner's keystroke dynamics and then used to discriminate between the owner and an imposter. An imposter typing the correct password can be detected with a very high accuracy using the proposed approach. The approach can also be used over the internet such as World Wide Web when implemented using a Java applet.

  • PDF