• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.04 seconds

An Implementation of Base System for Web-based Cyber Engineering Laboratories (공학용 가상 실험실을 위한 Web용 기반 시스템의 구축)

  • Han Sang-Hoon;You Sung-Hyun;Cho Hyung-Je
    • Journal of Engineering Education Research
    • /
    • v.3 no.1
    • /
    • pp.27-41
    • /
    • 2000
  • Recently there have been many Internet-based studies to provide personal users an efficient educational tool making use of multimedia data. The typical examples are remote education and virtual university where many educational trials on theory-based contents have been performed more frequently than those on experiment-based contents for engineering area. This paper describes about a base system implemented as an example of Internet-based experiment-oriented educations to establish cyber engineering laboratories for mechanics, electronics and chemistry. For the first time as a model of cyber engineering laboratories we herein Introduce in detail a server-and-client-based simulative method in which the result may be displayed on computer monitor of client PC while a simulator program is executed on the server. Secondly we introduce an interactive method in which the user of client PC may not only communicate directly with experiment server after initial connection with management server but also he can confirm the status of experiment being performed by way of video as well as experimental result.

  • PDF

Generation Mechanism and Numerical Simulation of Rip Current at Haeundae Beach (해운대 해수욕장의 이안류 발생기구 및 수치모의)

  • Kim, In-Chul;Lee, Joo-Yong;Lee, Jung-Lyul
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.23 no.1
    • /
    • pp.70-78
    • /
    • 2011
  • At Haeundae Beach in Busan, people were swept away by the fast-moving rip current and rescued, on August 13th and 15th, 2009 & July 29th and 30th, 2010. In predicting the wave-induced current and consequent tube movement for public safety, the coastal flows and waves are calculated at each time step and grid point by means of systematic interfacing of hydrodynamic and wave models (Lee, 2001). To provide a user-friendly simulation tool for end-users, the forecasting system has been built in a software package called HAECUM. Outputs from the system are viewed as graphs of tube positions with combined current vectors for easy decision of emergency management officials. The tube-wave interaction is taken into account and the traces of swim tube are simulated by using a Lagrangian random walk (Chorin, 1978; Lee, 1994). In this study, we use the Lee's approach (Lee, 1993) in estimating the surface onshore currents due to wave breaking.

Design and Implementation of Reference Evapotranspiration Database for Future Climate Scenarios (기후변화 시나리오를 이용한 미래 읍면동단위 기준증발산량 데이터베이스 설계 및 구축)

  • Kim, Taegon;Suh, Kyo;Nam, Won-Ho;Lee, Jemyung;Hwang, Syewoon;Yoo, Seung-Hwan;Hong, Soun-Ouk
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.4
    • /
    • pp.71-80
    • /
    • 2016
  • Meanwhile, reference evapotranspiration(ET0) is important information for agricultural management including irrigation planning and drought assessment, the database of reference evapotranspiration for future periods was rarely constructed especially at districts unit over the country. The Coupled Model Intercomparison Project Phase 5 (CMIP5) provides several meteorological data such as precipitation, average temperature, humidity, wind speed, and radiation for long-term future period at daily time-scale. This study aimed to build a database for reference evapotranspiration using the climate forecasts at high resolution (the outputs of HadGEM3-RA provided by Korea Meteorological Administration (KMA)). To estimate reference evapotranspiration, we implemented four different models such as FAO Modified Penman, FAO Penman-Monteith, FAO Blaney-Criddle, and Thornthwaite. The suggested database system has an open architecture so that user could add other models into the database. The database contains 5,050 regions' data for each four models and four Representative Concentration Pathways (RCP) climate change scenarios. The developed database system provides selecting features by which the database users could extract specific region and period data.

Implementation and Memory Performance Analysis of a Service Mobility Agent System to Support Service Mobility in Home Network (홈 네트워크 환경에서 서비스 이동성 지원을 위한 에이전트 구현 방안 및 메모리 성능 분석)

  • Nam, Jong-Wook;Yu, Myung-Ju;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.80-90
    • /
    • 2010
  • In this paper, we introduce some issues to implement an agent system to support service mobility in home network environment, and describe detailed design method in terminal as well as server agent. Specifically, we describe user recognition module, signaling message receiving/parsing module of terminal agent and signaling message receiving/parsing module, multimedia switching module, memory management module of server agent. We define several parameters managed in IP sharing device and design binding table structure to support mobility. And we utilize M/M/1/K queueing theory to obtain relations between memory size, blocking probability and memory utilization. From the obtained results, we show that memory size can be predicted in server agent mounted on IP sharing device.

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

Framework of e-Government based on GIS Service Network Integrating LMIS (GIS서비스 네트워크 기반의 전자정부 프레임워크 연구 : 토지종합정보망을 중심으로)

  • 최병남
    • Spatial Information Research
    • /
    • v.11 no.4
    • /
    • pp.493-508
    • /
    • 2003
  • This study proposes a framework of a GIS service network to connect local governments'Land Management Information Systems(LMIS) together. Databases constructed far LMIS's are very crucial information on both administrative business and civil affairs administration. However, they did not give full play to their values because they could not be shared sufficiently. Local governments build their databases individually using diverse GIS solutions. It causes some problems on sharing them. To demonstrate their geniuses, they should be connected to each other within a network for the whole country, and are served whenever and wherever to people who require them. for this, there are two main problems to be solved. Firstly, a GIS service network that handles heterogeneous and distributed computing environments is organized to link every LMIS each other by the GIS service network vertically and horizontally. Secondly, a mechanism should be developed to access the GIS service network readily and to search GIS data efficiently. The needs from every types of user should be satisfied by the mechanism. As the result of investigation of the issues, one of the most possible solution was suggested in this study, which is a Web based approach. To take into account the advance of information technology in the future and the requirements of e-government, stepwise strategies that integrate the LMIS's into a Web based system was recommended.

  • PDF

A Study on User Acceptance of Patent Application Education System: Focused on the Effect of Prior Knowledge (특허출원교육시스템의 사용자 수용관계에 관한 연구: 사전지식의 조절효과 중심)

  • Park, JaeSung
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.75-85
    • /
    • 2018
  • The purpose of this study was to analyze the college students' acceptance of PatentNOW, which was developed for effective proceeding of patent application education program. Results of this research as follow. First, perceived ease of use positively influenced perceived usefulness. Second, perceived usefulness and perceived ease of use positively influenced attitude toward using and attitude toward using also positively influenced behavioral intention to use. Third, the level of prior knowledge about the patent system and experience of patent application possessed by the users of PatentNOW had a negative effect on the relationship between perceived ease of use and attitude toward using. These results suggested that the teaching method of utilizing PatentNOW should be differentiated according to the level of prior knowledge of the students in order to improve the quality of patent application education.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Digital Application and Suggestions of Cultural Prototypes in Traditional Costumes (전통복식 문화원형 콘텐츠의 디지털 활용 현황과 제언)

  • Cho, Hyo-Sook;Lim, Hyun-Joo
    • Journal of the Korean Society of Costume
    • /
    • v.60 no.6
    • /
    • pp.89-100
    • /
    • 2010
  • This study is intended to analyze current status of costume in the cultural industry and explore feasibility of integrating costume as important cultural contents in the digital era. Among the websites for contents as the cultural archetypes, some have strong foundations while others don't. First, as for various archetypal characters restored based on the Korean history, most of their clothes focus on shapes and colors but lack details. They should be produced in 3D to provide back views or textile patterns to users. To ease understanding of the history of costume, user-friendly services such as launch of a pop-up window when users click on specific contents in question should be available for detailed information. At least there should be a link to other related sites where users can conveniently find more details. Second, some sites have too much data under one subject, increasing complexity and undermining orderliness. As a result, it takes long time to identify the site map. In this case, it is required to rearrange the contents with Quick View by subject and related links for in-depth study. Third, each subject is important to develop the archetypes for a variety of purposes. Creation of design derived from them or their commercialization can be an example but these activities should not restrict imagination of users or degrade the value of the archetypes. Last, it is needed to adopt validation system to detect the needs for a regular update (renewal) and to fix errors. We found many servers whose operation is not stable in general. When these technical issues are addressed for stable operation, users will rely on the sites to utilize them for their purpose of developing the cultural archetypes. In conclusion, advancement of www.culturecontent.com is essential. Based on efficient management and operation of the system, the quality of contents would be increased and multi-faceted advertising campaigns focusing on needs should be launched, to promote application of the contents. This is the recommendation for the future of the cultural archetype industry in Korea.