• Title/Summary/Keyword: Remote access

Search Result 663, Processing Time 0.029 seconds

Development of Database for Environment and Control Information in Greenhouse (온실 생육환경 및 제어정보 데이터베이스 개발)

  • 공대광;류관희;진제용
    • Journal of Biosystems Engineering
    • /
    • v.28 no.1
    • /
    • pp.59-64
    • /
    • 2003
  • This study was carried out to develop database system using internet fur greenhouse. The database system consisted of group monitor, client monitor. server monitor and DBMS. The results of the study are summarized as follows. 1. The monitoring module, as data collection system for database. could monitor the state of the control device and the greenhouse environment. 2 The group monitor was connected to the house monitors by RS-485 communication method. Data received by the group monitor were sent to the server monitor and then stored in database server by TCP/IP and MIDAS. 3. The data of database consisted of on growing environment. control devices, operation and cultivation data in greenhouse. It was developed using MS-SQL server. 4. Remote monitoring of greenhouse was realized in a client/server environment. The client module. which was named as the client monitor. made requests to access the measurement data of greenhouse through the remote data module of the server monitor in internet environment.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

An Integrated Home Entertainment System supporting Remote Control Service (원격 제어 서비스를 지원하는 통합 홈 엔터테인먼트 시스템)

  • Lee, Hyun-Ju;Kim, Sangok;Kim, Sang-Wook
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.3
    • /
    • pp.219-225
    • /
    • 2007
  • UPnP AV Framework automatically integrates and manages various AV devices that are connected to network as an important component in home network. Therefore, user can access and control AV contents at any time. But, other existing home entertainment systems target multimedia service support that is based on multimedia home server system. In this paper, we propose an integrated home entertainment system (u-MUSE system) that supports remote control service. It can manage application in remote AV device or control AV contents directly in home network environment. The proposed system sufficiently performs role of control center for electronic devices in home via integrated system control and AV contents playback service.

Knowledge-Based Unmanned Automation and Control Systems for the Wastewater Treatment Processes (하.폐수 처리장의 원격 모니터링 및 지식 기반 무인 자동화 시스템)

  • Bae, Hyeon;Jung, Jae-Ryong;Seo, Hyun-Yong;Kim, Sung-Shin;Kim, Chang-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.844-848
    • /
    • 2001
  • This paper introduces unmaned fully automation systems, which are applied for the CSTR(Continuously Stirred Tank Reactor) and SBR (Sequencing Batch Reactor) wastewater treatment system. The pilot plant is constructed in the country side which is little far from a main city. So networks and wireless modules are employed for the data transmission. The SBR plant has a local control and the remote monitoring system which is contained communication parts which consist of ADSL (Asymmetric Digital Subscriber Line) network and CDMA (Code Division Multiple Access) Wireless module. Remote control and monitoring systems are constructed at laboratory in a metropolis.

  • PDF

Security Improvement on Biometric-based Three Factors User Authentication Scheme for Multi-Server Environments (멀티서버 환경을 위한 생체정보 기반 삼중 요소 사용자 인증 기법의 안전성 개선)

  • Moon, Jongho;Won, Dongho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2167-2176
    • /
    • 2016
  • In the multi-server environment, remote user authentication has a very critical issue because it provides the authorization that enables users to access their resource or services. For this reason, numerous remote user authentication schemes have been proposed over recent years. Recently, Lin et al. have shown that the weaknesses of Baruah et al.'s three factors user authentication scheme for multi-server environment, and proposed an enhanced biometric-based remote user authentication scheme. They claimed that their scheme has many security features and can resist various well-known attacks; however, we found that Lin et al.'s scheme is still insecure. In this paper, we demonstrate that Lin et al.'s scheme is vulnerable against the outsider attack and user impersonation attack, and propose a new biometric-based scheme for authentication and key agreement that can be used in the multi-server environment. Lastly, we show that the proposed scheme is more secure and can support the security properties.

Development of remote monitoring system based on wire and wireless internet Environment (유.무선 인터넷 환경에 연동한 원격 감시시스템 개발)

  • 박상국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.557-560
    • /
    • 2004
  • In this paper, wireless internet services are combined with conventional wire internet service system. These system support that instrument manager can be access his instrument by use personal mobile devices and instrument manager can be take emergency action by use mobile devices. for this, error signal of local instruments are transmitted to the serial port of local server through Rf wireless communication channel. Also, The image of local instruments are transmitted to the web monitoring screen of main server. Network Camera System Supports remote monitoring functions. The interfacing of nam server with external user are possible through the mobile devices.

  • PDF

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

A New Method for Hyperspectral Data Classification

  • Dehghani, Hamid.;Ghassemian, Hassan.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.637-639
    • /
    • 2003
  • As the number of spectral bands of high spectral resolution data increases, the capability to detect more detailed classes should also increase, and the classification accuracy should increase as well. Often, it is impossible to access enough training pixels for supervise classification. For this reason, the performance of traditional classification methods isn't useful. In this paper, we propose a new model for classification that operates based on decision fusion. In this classifier, learning is performed at two steps. In first step, only training samples are used and in second step, this classifier utilizes semilabeled samples in addition to original training samples. At the beginning of this method, spectral bands are categorized in several small groups. Information of each group is used as a new source and classified. Each of this primary classifier has special characteristics and discriminates the spectral space particularly. With using of the benefits of all primary classifiers, it is made sure that the results of the fused local decisions are accurate enough. In decision fusion center, some rules are used to determine the final class of pixels. This method is applied to real remote sensing data. Results show classification performance is improved, and this method may solve the limitation of training samples in the high dimensional data and the Hughes phenomenon may be mitigated.

  • PDF

A Development of Remote Medical Treatment System for Stroke Recovery using ZigBee-based Wireless Brain Stimulator and Internet (ZigBee 기반의 무선 뇌 자극기와 네트워크를 이용한 원격 뇌졸중 회복 시스템의 개발)

  • Kim, G.H.;Ryu, M.H.;Kim, J.J.;Kim, N.G.;Yang, Y.S.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.514-517
    • /
    • 2008
  • Ubiquitous healthcare (U-healthcare) system is one of potential applications of embedded system. Conventional U-healthcare systems are used in health monitoring or chronic disease care based on measuring and transmission of various vital signs. However, future U-healthcare system can be of benefit to more people such as stroke patients which have limited activity by providing them proper medical care as well as continuous monitoring. Recently, an electric brain stimulation treatments have been found to be a better way compared to conventional ones and many are interested in using the method toward the treatment of stroke. In this study, we proposed a remote medical treatment system using ZigBee-based wireless electric brain stimulator that can help them to get a treatment without visiting their doctors. The developed remote medical treatment system connects the doctors to the brain stimulator implanted in the patients via the internet and ZigBee communication built in the brain stimulator. Also, the system receive personal information of the connected patients and cumulate the total records of electric stimulation therapy in a database. Doctors can easily access the information for better treatment planning with the help of graphical visualization tools and management software. The developed remote medical treatment system can extend their coverage to outdoors being networked with hand-held devices through ZigBee.

A Low Latency Handoff Scheme with Lossless Remote Subscription for Real-time Multimedia Communications in Mobile IP Environments (모바일 IP환경에서의 실시간 멀티미디어 통신을 위한 무손실 원격지 가입 저 지연 핸드오프)

  • Kim Ho-cheal;Kim Young-tak
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.620-632
    • /
    • 2004
  • IP is not suitable for mobile nodes by network-based routing because mobile nodes are dynamically change their network attachment point. Mobile-IP is an IETF standard providing continuous access to the Internet for mobile nodes, but it has the triangle routing problem. Also it has a performance degradation problem by massive packet loss during layer 3 handoff of mobile nodes. Especially, two IETF multicast support schemes for Mobile-IP do not guarantee the quality of realtime multimedia services because they have several problems such as long routing path, packet duplication(hi-directional tunneling) and massive packet loss(remote subscription). In this paper, we propose a lossless remote subscription scheme that guarantees the quality of realtime multimedia services over Mobile-IP. From the result of simulation, we verified that the proposed scheme in this paper can reduce the delay time of remote subscription by the effect of the low latency handoff scheme that is extended to apply to the multicast group management and it requires only 0.58% buffer spaces of the previously proposed lossless remote subscription scheme.