• Title/Summary/Keyword: Set ID

Search Result 88, Processing Time 0.034 seconds

Implementation of the Environment for Mobile HMI Communication Settings Based on QR Code

  • Kim, Jong-Joo;Kim, Jae-Woong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.139-145
    • /
    • 2022
  • As products that consumers want become more diverse, the types of automation equipment are becoming more diverse and advanced to produce competitive products. In general, equipment is manufactured with built-in interface devices (HMI) for users so that operators can efficiently monitor and operate equipment quickly. Because HMI devices are connected to various industrial controllers, elements such as communication protocols of various controllers must be understood and set up in the design stage. Non-experts not only have difficulty choosing compatible items among various protocols, but also have limitations in integrating and operating on one device because screens and settings are statically assigned. This paper proposes a model that can scan information such as equipment ID and communication protocol with QR code using a mobile device, access industrial controller, and remotely operate the displayed equipment screen. The proposed model is expected to increase efficiency in inspection and management of automated equipment as it can easily set, monitor, and operate the communication environment of various automated equipment using one mobile device.

Optimal Information Dispersal Scheme for Survivable Storage Systems (서바이벌 스토리지 시스템을 위한 최적 정보 분할 기법)

  • Song, Sung-Keun;Youn, Hee-Yong;Lee, Hyung-Soo;Lee, Kang-Shin
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.657-664
    • /
    • 2003
  • Supporting the availability, integrity, and confidentiality of the information is crucial. The survivability storage systems require to encode and distribute data over multiple storage nodes or data base to survive failures and malicious attacks Information dispersal scheme is one of the most efficient schemes allowing high availability and security with reasonable overhead. In this paper, we propose an algorithm determining the optimal (m, n)-lDS in terms of availability, given a set of IDS's. The proposed algorithm will be very useful for designing a highly available and secure storage system since many factors such as node number, storage space, operation speed, etc. interact with each other and thereby finding an optimal information dispersal scheme is very difficult.

Realization of Location based Service with ePosition by Defining the New DNS Resource Record (새로운 DNS 리소스 레코드 정의를 통한 ePosition 위치 기반 서비스)

  • Jang, Dong-Heyok;Lee, Sang-Zee;Kim, Kyung-Hun;Kwon, Oh-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.264-272
    • /
    • 2008
  • In ubiquitous geographic information environment, the users are provided with geographic information anywhere and any time on their needs by any types of devices and communication media. The unique location ID, ePosition, is a new technology to support UBGI environment, using a logical location ID instead of physical location of a point of interest. Domain names of plural ePosition servers, where location information with its ePosition is stored, needs to be registered in DNS for some service through Internet. For better ePosition service of the type of public service like email service, a set of DNS resource records can be newly defined. This paper suggests a new DNS resource record EPO for implementation of the ePosition service through Internet.

Precise-Optimal Frame Length Based Collision Reduction Schemes for Frame Slotted Aloha RFID Systems

  • Dhakal, Sunil;Shin, Seokjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.165-182
    • /
    • 2014
  • An RFID systems employ efficient Anti-Collision Algorithms (ACAs) to enhance the performance in various applications. The EPC-Global G2 RFID system utilizes Frame Slotted Aloha (FSA) as its ACA. One of the common approaches used to maximize the system performance (tag identification efficiency) of FSA-based RFID systems involves finding the optimal value of the frame length relative to the contending population size of the RFID tags. Several analytical models for finding the optimal frame length have been developed; however, they are not perfectly optimized because they lack precise characterization for the timing details of the underlying ACA. In this paper, we investigate this promising direction by precisely characterizing the timing details of the EPC-Global G2 protocol and use it to derive a precise-optimal frame length model. The main objective of the model is to determine the optimal frame length value for the estimated number of tags that maximizes the performance of an RFID system. However, because precise estimation of the contending tags is difficult, we utilize a parametric-heuristic approach to maximize the system performance and propose two simple schemes based on the obtained optimal frame length-namely, Improved Dynamic-Frame Slotted Aloha (ID-FSA) and Exponential Random Partitioning-Frame Slotted Aloha (ERP-FSA). The ID-FSA scheme is based on the tag set estimation and frame size update mechanisms, whereas the ERP-FSA scheme adjusts the contending tag population in such a way that the applied frame size becomes optimal. The results of simulations conducted indicate that the ID-FSA scheme performs better than several well-known schemes in various conditions, while the ERP-FSA scheme performs well when the frame size is small.

IPv6 Networking with Subnet ID Deprecated

  • Kim, Young Hee;Kim, Dae Young;Park, Jong Won
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.49-57
    • /
    • 2017
  • This paper proposes a new IPv6 networking paradigm as a counter answer to the rationale for locator/identifier separation. Instead of involving separate number spaces each for node identifiers and locators, the context of the IP address as a node identifier alone is utilized and no additional locators are incorporated. That is, there are only node addresses and no locators, and location information is indirectly derived from neighbor relations between nodes. In order to accomplish this, no subnet IDs are utilized; the ID value is set to zero for all subnets. The paper details how to construct this paradigm through novel choice of operational policies in various IPv6 protocols and some trivial modifications. Especially, inherent provision of intra-domain node- as well as subnet-mobility by use of standard link-state intra-domain routing protocols is discussed. A number of important advantages of this paradigm over the canonical IPv6 networking and various known solutions of locator/identifier separation are discussed. Tailoring for multi-area domains and IPv4 is left for further study.

A new password authentication scheme using two-way password in Smartphone Banking (이중 패스워드 방식을 이용한 스마트폰 뱅킹 관리)

  • Song, Jong-Gun;Kim, Tae-Yong;Lee, Hoon-Jae;Jang, Won-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.195-200
    • /
    • 2012
  • Smart Phone devices offer convenience for users, but present a new set of security issues due to loss or malicious code. In this paper, a mobile cloud system environment is used with existing smart phones in an attempt to solve the problems in a banking environment. In order to prevent financial damages due to loss or personal information leakage by malicious code, a mobile cloud computing service that provides control and protection of personal information in environment that ensures individual authentication is used. Existing ID / Password with certificate, with the way smart phone dual password authentication scheme using the gyro sensors proposed.

Pupil Detection using Hybrid Projection Function and Rank Order Filter (Hybrid Projection 함수와 Rank Order 필터를 이용한 눈동자 검출)

  • Jang, Kyung-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.8
    • /
    • pp.27-34
    • /
    • 2014
  • In this paper, we propose a pupil detection method using hybrid projection function and rank order filter. To reduce error to detect eyebrows as pupil, eyebrows are detected using hybrid projection function in face region and eye region is set to not include the eyebrows. In the eye region, potential pupil candidates are detected using rank order filter and then the positions of pupil candidates are corrected. The pupil candidates are grouped into pairs based on geometric constraints. A similarity measure is obtained for two eye of each pair using template matching, we select a pair with the smallest similarity measure as final two pupils. The experiments have been performed for 700 images of the BioID face database. The pupil detection rate is 92.4% and the proposed method improves about 21.5% over the existing method..

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A GROWING ALGEBRA CONTAINING THE POLYNOMIAL RING

  • Choi, Seul-Hee
    • Honam Mathematical Journal
    • /
    • v.32 no.3
    • /
    • pp.467-480
    • /
    • 2010
  • There are various papers on finding all the derivations of a non-associative algebra and an anti-symmetrized algebra (see [2], [3], [4], [5], [6], [10], [13], [15], [16]). We and all the derivations of the growing algebra WN($e^{{\pm}x_1x_2x_3}$, 0, 3)[1] with the set of all right annihilators $T_3$ = $\{id,\;\partial_1,\;\partial_2,\;\partial_3\}$ in the paper. The dimension of $Der_{non}$(WN($e^{{\pm}x_1x_2x_3}$, 0, 3)$_{[1]}$) of the algebra WN($e^{{\pm}x_1x_2x_3}$, 0, 3)$_{[1]}$ is one and every derivation of the algebra WN($e^{{\pm}x_1x_2x_3}$, 0, 3)$_{[1]}$ is outer. We show that there is a class P of purely outer algebras in this work.

The User Identification System Using Walking Pattern over the ubiFloor

  • Yun, Jae-Seok;Lee, Seung-Hun;Woo, Woon-Tack;Ryu, Je-Ha
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1046-1050
    • /
    • 2003
  • In general, conventional user identification systems require users to carry a TAG or badge or to remember ID and password. Though biometric identification systems may relieve these problems, they are susceptible to environmental noise to some degree. We propose a natural user identification system, ubiFloor, exploiting user's walking pattern to identify the user. The system identifies a user, while tracking the user's location, with a set of simple ON/OFF switch sensors or equipments. Experimental results show that the proposed system can recognize the registered users at the rate of 92%. Future improvement in recognition rate may be achieved by combining other sensors such as camera, microphone, etc.

  • PDF