• Title/Summary/Keyword: multi user system

Search Result 1,189, Processing Time 0.027 seconds

A Design and Implementation of User Authentication System using Biometric Information (바이오 정보를 이용한 사용자 인증 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Park, Yeong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3548-3557
    • /
    • 2010
  • Security enhancement technologies are required to preventing phishing and pharming attacks on Internet banking. One-time password(OTP) should be used with certificate for enhancing user authentication and security performance. However, existing OTP technique is weak on MITM(Man-In-The-Middle) attack and synchnonization should be provided on OTP system. Therefore, more advanced mechanism such as combining biometic data with OTP can be suggested to enhancing security on authentication system. In this paper, we designed and implemented a multifactor authentication system using one-time biometric template to generate unique authentication data after adapting biometric transform on each user's biometric data.

Design and Implementation of a 3D Virtual Desktop System based on Windows Operation System (윈도우즈 운영체제 기반의 3D 가상 데스크톱 시스템 설계 및 구현)

  • Hong, Seung-Pyo;Oh, Myeong-Jin;Shin, Jung-Hoon;Lee, Sang-Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1249-1253
    • /
    • 2010
  • As personal computers have been recently improved in performance, the multi tasking of running several applications at the same time has been generalized. Since only one task space is provided for performing such tasks on Windows operating system, a number of computer users feel inconvenient. In this paper, we propose a 3D Virtual Desktop System which can show a process of switching task spaces in 3D motion using DirectX. The proposed system can provide a computer user with more task spaces and the intuitive UI(User Interlace) such as Compiz of Linux.

A Study on Measurement Time Reduction for Multi-Channel Combination Scale (다채널 조합형 계량기의 안정화 성능 개선에 관한 연구)

  • Lee, Hyeong-Ill;Ban, Kap-Soo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.15 no.1
    • /
    • pp.103-109
    • /
    • 2016
  • The performance of a multi-head, computerized combination scaling system to automatically identify a group of agricultural products having a total weight within the target range has been optimized to reduce the package cycle time of the merchandise. First, the structure of the scale was modified to enable faster measurement by enhancing the dynamic stability during the process. Second, the high frequency noise in the measured signal was eliminated by a high frequency filter to provide more accurate weight data. Finally, the algorithm to identify a group of products with a total weight within the target range was modified to enable a user to select an optimal number of scales. According to the experimental verifications, this modified system reduced the package cycle time significantly and also was accurate in measuring the total weight of the selected products.

Design and Implementation of Multi Messaging System Using SK-VM Based On J2ME (J2ME기반의 SK-VM을 이용한 다중 메시징 시스템 설계 및 구현)

  • 김응곤;최완규;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.41-45
    • /
    • 2001
  • In the case of mobile internet service using WAP, It was connected to http protocol using WAP Gateway. So, Users take increased cost of mobile internet service. and it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language. Which is independant of platform and low cost and intensely security and downloadable application. Additional, Using socket connection, Multi Messaging System(MMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation o( multi messaging used SK-VM based on .12ME, It will be foundation to develop various mobile application in the future.

  • PDF

Channel estimation of TD/CDMA system using Multi-User detector (MUD 기법을 적용한 TD/CDMA 시스템에서의 채널 추정 기법)

  • 고균병;조영보;권동승;정인철;강창언;홍대식
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.17-20
    • /
    • 2001
  • This paper studies the channel estimation schemes of Time Division Duplex (TDD) Code Division Multiple Access (CDMA) system with a parallel interference cancellation (PIC) scheme in the multi-Path fading channel. Also, the effective interpolation scheme which maintains the merits of WCDMA TDD mode is proposed. By Monte Carlo simulations, it is shown that the proposed interpolation method can be used in order to obtain the proper performance of a multi-stage PIC and in order to reduce the required Eb/No in the second stage at a BER= 10$^{-2}$

  • PDF

Implementation of IEEE 802.11ac Down-link MU-MIMO WLAN MAC using Unified Design Methodology

  • Chung, Chulho;Jung, Yunho;Kim, Jaeseok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.6
    • /
    • pp.719-727
    • /
    • 2016
  • This paper proposes a unified medium access control (MAC) design methodology and presents the implementation of the IEEE 802.11ac down-link multi-user multi-input and multi-output wireless local area network MAC using the proposed design methodology. The proposed methodology employs unified code for both network simulation and system implementation. Because the unified code closely relates these two processes, the performance of the implemented MAC system can be estimated before implementation. The MAC architecture for an access point implemented using the proposed design methodology is verified on an ARM-based platform, and it is applied to a 65 nm CMOS library.

Channel Capacity-Based Multi-Channel Allocation in Cognitive Radio Networks (인지무선통신에서 채널 용량을 고려한 예측기반 다중채널할당기법)

  • Lee, Juhyeon;Park, Hyung-Kun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.12
    • /
    • pp.1755-1757
    • /
    • 2013
  • Dynamically exploiting unused-spectrum, cognitive radio has been proposed to solve spectrum utilization problem. In cognitive radio, it is important to minimize the interference to primary service as well as to provide efficient channel allocation. In this paper, we propose a multi-channel allocation scheme based on spectrum hole prediction. Proposed scheme considered both interference length and channel capacity to limit the interference to primary user as well as to enhance system performance. Simulation results show the proposed scheme improves the system throughput.

MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.63-74
    • /
    • 2012
  • Multicast data communication is an efficient communication scheme, especially inmulti-hop ad hoc networks where the media access control (MAC) layer is based on one-hop broadcast from one source to multiple receivers. Compared to unicast, multicast over a wireless channel should be able to deal with varying channel conditions of multiple users and user mobility to provide good quality to all users. IEEE 802.11 does not support reliable multicast owing to its inability to exchange request-to-send/clear-to-send and acknowledgement packets with multiple recipients. Thus, several MAC layer protocols have been proposed to provide reliable multicast. However, additional overhead is introduced, as a result, which degrades the system performance. In this paper, we propose an efficient wireless multicast MAC protocol with small control overhead required for reliable multicast in multi-hop wireless ad hoc networks. We present analytical formulations of the system throughput and delay associated with the overhead.

A Multi-Agent Negotiation System with Negotiation Models Changeable According to the Bargaining Environment

  • Ha, Sung-Ho;Kim, Dong-Sup
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.1-20
    • /
    • 2009
  • Negotiation is a process of reaching an agreement on the terms of a transaction. such as price, quantity, for two or more parties. Negotiation tries to maximize the benefits for all parties concerned. instead of using human-based negotiation. the e-commerce environment provides such an environment as adopting automated negotiation. Thus. choosing agent technology is appropriate for an automatic electronic negotiation platform. since autonomous software agents strive for the best deal on behalf of the human participants. Negotiation agents need a clear-cut definition of negotiation models or strategies. In reality, most bargaining systems embody nearly one negotiation model. In this article. we present a mobile agent negotiation system with reusable negotiation strategies that allows agents to dynamically embody a user's favorite negotiation strategy which can be preinstalled as a component in the system. We develop a prototype system, which is fully implemented in compliance with FIPA specifications, and then. describe the benefits of using the system.

  • PDF

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.