• Title/Summary/Keyword: Remote access

Search Result 663, Processing Time 0.029 seconds

Status of Korean Research Activity on Arctic Sea Ice Monitoring using KOMPSAT-series Satellite

  • Kim, Hyun-cheol;Chae, Tae-Byeong
    • Journal of the Korean earth science society
    • /
    • v.40 no.4
    • /
    • pp.329-339
    • /
    • 2019
  • Arctic warming is a global issue. The sea ice in the Arctic plays a crucial role in the climate system. We thought that a recent abnormality in many countries in the northern hemisphere could be related to the effects of shrinking sea ice in the Arctic. Many research groups monitor sea ice in the Arctic for climate research. Satellite remote sensing is an integral part of Arctic sea ice research due to the Arctic's large size, making it difficult to observe with general research equipment, and its extreme environment that is difficult for humans to access. Along with monitoring recent weather changes, Korea scientists are conducting polar remote sensing using a Korean satellite series to actively cope with environmental changes in the Arctic. The Korean satellite series is known as KOMPSAT (Korea Multi-Purpose Satellite, Korean name is Arirang) series, and it carries optical and imaging radar. Since the organization of the Satellite Remote Sensing and Cryosphere Information Center in Korea in 2016, Korean research on and monitoring of Arctic sea ice has accelerated rapidly. Moreover, a community of researchers studying Arctic sea ice by satellite remote sensing increased in Korea. In this article, we review advances in Korea's remote sensing research for the polar cryosphere over the last several years. In addition to satellite remote sensing, interdisciplinary studies are needed to resolve the current limitations on research on climate change.

VRML Database Access for 3D Real-time Data Visualization in MiWiTM Thermal Wireless Sensor Network (마이와이 표준의 열 센서망의 3차원 실시간 자료 시각화를 위한 가상 현실 모델링 언어 데이터베이스 액세스)

  • Wan, Xue-Fen;Yang, Yi;Cui, Jian;Zheng, Tao;Ma, Li
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.164-170
    • /
    • 2012
  • A Virtual Reality Modeling Language (VRML) database access in remote virtual reality control platform for dyeing enterprise $MiWi^{TM}$ thermal sensor network is presented in this paper. The VRML-ASP framework is introduced for 3D real-time data plotting in this application. The activities of thermal sensor nodes and sensor area are analyzed. The database access framework is optimized for $MiWi^{TM}$ wireless sensor networks. The experimental results show that VRML-ASP database access framework could be a reliable and competitive data-manage candidate for targeted virtual reality remote industrial visualization application.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Internet-Based Remote Control System Using Power Line Communication (전력선 통신을 이용한 인터넷 기반 원격 제어 시스템)

  • 차주헌;전희연;김재덕;김근영
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.523-528
    • /
    • 2001
  • In this paper, we describe the internet-based remote home automation system that con control and manage home appliances or digital devices bi-directionally through Internet. The platform-independency of VRML and Java applet enables users to access their home appliances and to check current state of them in t he virtual reality environment. The main focus is on three aspects. One is on the virtual reality technology to support the user interface efficiently by using 3D GUI in web-browser. Another is on the system architecture that consists of Home server and its manager server called Gate server in this paper. These servers have been implemented by Java RMI which is the basic single programming interface for distribution of objects and services using Java technology. The third, remote PLC controller and each digital devices are composed of home networking by PLC using CEBus protocol.

  • PDF

The Mouse & Keyboard Control Application based on Smart Phone (스마트 폰 기반의 마우스와 키보드 제어 어플리케이션)

  • Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.396-403
    • /
    • 2017
  • In recent years, the use of touch screens has expanded, and devices such as remote controllers have been developed in various ways to control and access contents at long range. The wireless-based touch screen is used in classroom, seminar room, and remote video conversation in addition to the TV remote control. The purpose of the study is to design a smart phone-based intuitive interface that can perform the role of a wireless mouse and a wireless keyboard at range using Bluetooth and to develop an application that integrates functions of a mouse and a keyboard. Firstly, touch interaction model for controlling software such as PowerPoint by connecting to a general PC on a smart phone has been studied. The most simple touch operation interface is used to reproduce the function of existing devices and design more simply. The studies of the extension of interfaces with various functions are important, but development of optimized interfaces for users will become more important in the future. In this sense, this study is valuable.

Implementation of Remote Adapter for Debugging of Ubiquitous Embedded Software

  • Park Myeong-Chul;Ha Seok-Wun
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.2
    • /
    • pp.96-100
    • /
    • 2005
  • Since ubiquitous embedded software is sensitive to the resources and environment of target system, it should be debugged in the same environment as actual target system. However, existing tools to debug embedded software, in which access to internal signal or resources is limited, are uneconomical. In the thesis, economical and practical USB-JTAG Adapter that can use open GDB is suggested. It can remove existing limitations of environment implementation that have many difficulties in implementing an environment for remote debugging. Hence, the thesis provides economical interfacing environment that can debug ubiquitous embedded software inside remote system.

Information for Urban Risk Management: the Role of Remote and Close Sensing

  • Hofstee, Paul;Genderen, John van
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.162-164
    • /
    • 2003
  • The multi-disciplinary research project Strengthening Local Authorities in Risk Management (SLARIM), initiated by ITC, includes three case study cities in Asia. An important question is: what are the essential data for risk management and how to access such data. The role of common sources (e.g. census data), data derived from remote sensing (high-resolution satellite imagery, aerial photos), and data from close sensing (field observation, including mobile GIS) to acquire essential risk management data will be discussed. Special attention is given to the question of the minimum area and to disaggregating population data. A few examples are given of Kathmandu / Lalitpur, Nepal.

  • PDF

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

Development of Inter-Working Function Unit for the Advanced TDX Remote Subscriber Systems (TDX 고도화 시스팀 원격가입자 정합장치 개발)

  • 황우근;우창희;류영일
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.299-302
    • /
    • 2000
  • In this paper, a Inter-Working Function Unit(IWF) has been developed and designed in order to change to advanced subscriber system the Remote Subscriber System(RSS) that is operating with simple services(PSTN Function only). Regarding the cost and the effectiveness, RSS should be connected to Access Subscriber System with PCM cables directly. As this method being used, in the period of Retrofit, the connecting job covering RSS will be handled easily and safely.

  • PDF