• Title/Summary/Keyword: Storage and Delivery System

Search Result 123, Processing Time 0.031 seconds

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

Dependent Quantization for Scalable Video Coding

  • Pranantha, Danu;Kim, Mun-Churl;Hahm, Sang-Jin;Lee, Keun-Sik;Park, Keun-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.127-132
    • /
    • 2006
  • Quantization in video coding plays an important role in controlling the bit-rate of compressed video bit-streams. It has been used as an important control means to adjust the amount of bit-streams to at]owed bandwidth of delivery networks and storage. Due to the dependent nature of video coding, dependent quantization has been proposed and applied for MPEG-2 video coding to better maintain the quality of reconstructed frame for given constraints of target bit-rate. Since Scalable Video Coding (SVC) being currently standardized exhibits highly dependent coding nature not only between frames but also lower and higher scalability layers where the dependent quantization can be effectively applied, in this paper, we propose a dependent quantization scheme for SVC and compare its performance in visual qualities and bit-rates with the current JSVM reference software for SVC. The proposed technique exploits the frame dependences within each GOP of SVC scalability layers to formulate dependent quantization. We utilize Lagrange optimization, which is widely accepted in R-D (rate-distortion) based optimization, and construct trellis graph to find the optimal cost path in the trellis by minimizing the R-D cost. The optimal cost path in the trellis graph is the optimal set of quantization parameters (QP) for frames within a GOP. In order to reduce the complexity, we employ pruning procedure using monotonicity property in the trellis optimization and cut the frame dependency into one GOP to decrease dependency depth. The optimal Lagrange multiplier that is used for SVC is equal to H.264/AVC which is also used in the mode prediction of the JSVM reference software. The experimental result shows that the dependent quantization outperforms the current JSVM reference software encoder which actually takes a linear increasing QP in temporal scalability layers. The superiority of the dependent quantization is achieved up to 1.25 dB increment in PSNR values and 20% bits saving for the enhancement layer of SVC.

  • PDF

Future Impacts of RFID on Supply Chain Management and Redesigning the Distribution Structure of Seafood in Korea (국내 수산물 유통구조 재설계와 수산물 SCM에서의 RFID 효과)

  • Park, Myong-Sop;Park, Sang-Cheol;Kim, Jong-Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.36
    • /
    • pp.143-170
    • /
    • 2007
  • In order to analyze the distribution channel of marine products in Korea, this study shows SCM approach to redesign of the marine distribution channel with case study related to previous literatures. In view of the supply chain and the future impact of RFID on the marine SCM on the recognition of the importance of the seafood traceability system, this study also provides the possibility to accomplish effective SCM for integration of production, storage, transportation, delivery, and sale when RFID is used in the seafood distribution channel based on the expansion of awareness on the marine product traceability. The traceability system for seafood is considered as the distribution infrastructure established in RFID deployment. By introducing Lotte mart case, this case study also discusses the marine distribution structure in view of the supply chain, to present an effective foundation for supplying seafood throughout production, distribution, and consumption. This is achieved by introducing RFID in an ubiquitous environment, and suggesting far more efficient control planning throughout the seafood distribution channel in view of the expected effects resulting from the introduction. In addition, as the alternative of solving this situation, this study propose the supply chain in seafoods by comprehensive management in whole distribution channels. In the SCM in seafood perspectives, HACCP can take into account the whole seafood chain from the point of supply to the point of consumption when assessing hazards. As the contributions of this study, this study emphasizes the seafood industry first should require the establishment of the relevant infrastructure, for which the efforts of the government and demonstrative project participants are essential.

  • PDF

Contactless Access Certification Management System for Infection Control in Special Rooms in Medical Institutions (의료기관 특수실 감염관리를 위한 비접촉 출입인증 관리 시스템)

  • Lee, Hyo-Seung;Choi, Woo-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.387-392
    • /
    • 2022
  • In addition to complying with access standards for facilities that require infection control (operating rooms, delivery rooms, intensive care units, etc.) in accordance with the 2019 Medical Care Act Enforcement Regulations, entry, exit, contact information, etc. for entry and exit, the criteria for entering and exiting special rooms of medical institutions have been revised so that records of facts are kept for one year. However, even now, the inconvenience continues due to the fact that such contents are created by hand or due to errors. For this reason, this study designed and implemented a system that provides automatic opening, closing, and accessing record storage functions for authorized users using IoT devices and UWB technology, and we expected that the convenience of the visitors and systemized access control will be possible.

A Study to Apply A Fog Computing Platform (포그 컴퓨팅 플랫폼 적용성 연구)

  • Lee, Kyeong-Min;Lee, Hoo-Myeong;Jo, Min-Sung;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.60-71
    • /
    • 2019
  • As IoT systems such as smart farms and smart cities become popular, a large amount of data collected from many sensor nodes is sent to a server in the Internet, which causes network traffic explosion, delay in delivery, and increase of server's workload. To solve these problems, the concept of fog computing has been proposed to store data between IoT systems and servers. In this study, we implemented a software platform of the fog node and applied it to the prototype smart farm system in order to check whether the problems listed above can be solved when using the fog node. When the fog node is used, the time taken to control an IoT device is lower than the response time of the existing IoT device-server case. We confirmed that it can also solve the problem of the Internet traffic explosion and the workload increase in the server. We also showed that the intelligent control of IoT system is feasible by having the data visualization in the server and real time remote control, emergency notification in the fog node as well as data storage which is the basic capability of the fog node.

U-Bus Advertisement Business Model and System Implementation based on Wireless Networks (무선망 기반의 U-버스광고 비즈니스 모델 및 시스템 구축 방안)

  • Roh, Su-Sung;Kim, Do-Nyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.88-97
    • /
    • 2010
  • Recently the more convenient services are provided to people in the city in line with the change of city paradigm and the recent development of ubiquitous. For example, Information on bus arrivals an effective advertisement the combination of high technology and departures through smart-phones. However, in respect of the mobile advertisement, because of difficulties such as the means of transferring the mass storage data or the burden of communication charges. there need means to improve such difficulties. This study has been conducted aiming to overcome such difficulties. This study suggests the strategic differentiation plan through the analysis of the media characteristics such as real time service information when in traveling, U-Bus business model in the category of mobile advertisement, etc. and also the concrete system establishment plan from the operation center via network to the delivery of the advertisement through vehicle terminals. In respect that this study suggests the implications as a practical business model through the fusion of high technology and diverse media. It has great significance.

Efficiency Analysis for RFID-based Curtain Wall of unit Type Construction (RFID 기술 적용에 따른 유닛타입 커튼월 공사의 효율성 분석)

  • Kang, Hyun-Koo;Ha, Young-Seo;Lim, Chul-Woo;Kim, Chang-Duk;Yu, Jung-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.3
    • /
    • pp.206-213
    • /
    • 2008
  • Due to the following reasons, the management of curtain wall parts and material is very Important. Firstly, curtain wall work is one of the main works in High-rise building construction for it takes about $10{\sim}15%$ of the total construction cost. Secondly, the whole process of curtain wall work including manu acture, delivery, storage, installation and maintenance is very complicated and sometimes more than 30 companies involve in the process. Thus there are many control points for curtain wall units. Thirdly, there are not enough space on site for material storage and this situation is more serious for sites in urban area. The purpose of this research is to validate an information systems using RFID technology that is developed to manage the curtain wall units following the process of curtain wall work. For the validation, the cycle times of curtain wall work before and a ter the system was used. The results show that using the systems shorten the cycle time of the curtain wall work. Thus it is concluded that the system can increase the efficiency of managing curtain wall work.

Efficiency and Productivity on ICT Industry (ICT 제조업과 서비스업의 효율성과 생산성)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.55-75
    • /
    • 2014
  • Non-parametric method such as technology efficiency, DEA/Window model and Malmquist Productivity Index (MPI) are used to measure efficiency and productivity of ICT (Information and Communication Technology) manufacturing industry and service industry over the period 2007-2011. The results of this paper indicate following: (1) Technology efficiency of the ICT manufacturing industry were found as the range of 0.34 and 0.39 over the sample period. Technology efficiency of the ICT service industry were found as the range of 0.16 and 0.20 over the sample period. (2) The geometric average of the Malmquist TFP indexes on ICT manufacturing industry indicated the productivity improvement an average of 8.3 percent. The geometric average of the Malmquist TFP indexes on ICT service industry indicated the productivity improvement an average of 1.6 percent. (3) TIER analysis result on ICT manufacturing industry showed that optimal bench marking made by storage devices${\rightarrow}$wireless communication equipment${\rightarrow}$broadcasting equipment${\rightarrow}$radio, recording and playback devices${\rightarrow}$computers, printers, video and audio-visual equipment path. TIER analysis result on ICT service industry indicated that optimal bench marking made by computers and packaged software${\rightarrow}$wired communication${\rightarrow}$communication, information, detection equipment${\rightarrow}$consulting and construction for computer systems integration${\rightarrow}$industrial machinery and equipment rental${\rightarrow}$telecommunications reseller${\rightarrow}$system software development and delivery${\rightarrow}$hosting path.

  • PDF

Web3.0 Video Streaming Platform from the Perspective of Technology, Tokenization & Decentralized Autonomous Organization

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.149-160
    • /
    • 2024
  • For examining Web3.0 video streaming (VS) platforms in terms of the decentralized technology, tokenization and decentralized autonomous organization (DAO), we look at four platforms like DLive, DTube, Livepeer, and Theta Network (Theta). As a result, DLive which firstly partnered with Medianova for CDN and with Theta for peer to peer (P2P) network and migrates to Tron blockchain (BC), receives no commission from what creators earn, gives rewards to viewers by measuring engagement, and incentivizes participation by allowing 20% of donation & fees for funding development, 5% to BitTorrent Token (BTT) stakeholders (among these 5%, 20% to partners, 80% to other BTT stakeholders). DTube on its own lower-layer BC, Avalon, offers InterPlanetary File System (IPFS), gives 90% of the created value to creators or curators, and try to empower the community. Livepeer on Ethereum BC offers decentralized CDN, P2P, gives Livepeer Token (LPT) as incentive for network participants, and delegators can stake their LPT to orchestrators doing good. Theta on its native BC pulls streams from peering caching nodes, creates P2P network, gives Theta utility token, TFUEL for caching or relay nodes contributors, and allows Theta governance token, THETA as staking token. We contribute to the categorization of Web3.0 VS platforms: DLive and DTube reduce the risk of platform censorship, promote the diverse content, and allow the community to lead to more user-friendly environments. On the other hand, Livepeer and Theta provide new methods to stream content, but they have some differences. Whereas Livepeer focuses on the transcoding layer, Theta concentrates both on the video application layer and content delivery layer. It means, Theta tries to deliver value to all participants by enhancing network quality, reducing CDN cost, and rewarding users in utility tokens for the storage and bandwidth they provide.