• Title/Summary/Keyword: safe web

Search Result 151, Processing Time 0.03 seconds

Web Based Smart Home Automation Control System Design

  • Hwang, Eui-Chul
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.70-76
    • /
    • 2015
  • The development of technology provides and increases security as well as convenience for humans. The development of new technology directly affects the standard of life thanks to smart home automatic control systems. This paper describes a door control, automatic curtain, home security (CCTV, fire, gas, safe, etc.), home control (energy, light, ventilation, etc.) and web-based smart home automatic controller. It also describes the use of ARM (Advanced RISC Machines) for automatic control of home equipment, a Multi-Axes Servo Controller using FPGA (Field Programmable Gate Array) and PLC (programmable logic controller). Additionally, it describes the development of a HTML editor using web auto control software. The tab loading time (7 seconds) is faster when using ARM-based web browser software instead of Chrome and Firefox is used because the browser has a small memory footprint (300M). This system is realized by web auto controller language which controls and uses PLCs that are easier than existing devices. This smart home automatic control technology can control smart home equipment anywhere and anytime and provides a remote interface through mobile equipment.

A Study on Web Security using NC Cipher System (NC 암호시스템을 이용한 웹 보안에 관한 연구)

  • 서장원;전문석
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.55-58
    • /
    • 2000
  • EC, which is done the virtual space through Web, has weakly like security problem because anybody can easily access to the system due to open network attribute of Web. Therefore, we need the solutions that protect the Web security for safe and useful EC. One of these solutions is the implementation of a strong cipher system. NC(Nonpolynomial Complete) cipher system proposed in this paper is advantage for the Web security and it overcomes the limit of the 64 bits cipher system using 128 bits key length for input, output, encryption key and 16 rounds. Moreover, it is designed for the increase of time complexity by adapted more complex design for key scheduling regarded as one of the important element effected to encryption.

  • PDF

Analyses of Security Scanning and Security Threat in Web Application Network (웹에서의 보안 위협과 시큐리티 스캐닝에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.603-604
    • /
    • 2010
  • In this paper, we analyses a testing methodology that allows for harmless auditing, define three testing modes.heavy, relaxed, and safe modes, and report our results from two experiments. In the first, we compared the coverage and side effects of the three scanning modes using Web applications chosen from the different vulnerable in a previous static verification effort.

  • PDF

VLC4WoT : Visible Light Communication for Web of Things

  • Durgun, Mahmut;Gokrem, Levent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1502-1519
    • /
    • 2020
  • Recently, new devices have been developed for the Internet of Things concept. The devices commonly use RF (Radio Frequency) based wireless communication. With the increase in the number of devices, the space allocated for the radio frequency band in wireless communication fills rapidly. Visible Light Communication (VLC) is an alternative, secure and economical communication technology that uses light instead of radio frequencies. While Web of Things (WoT) is the adaptation of the experience and knowledge acquired from the web into the internet of things ecosystems. By combining these two technologies, the development of the Visible Light Communication for Web of Things (VLC4WoT) system, which can use VLC and WoT technologies, has been our motivation. In our study, microcontroller control circuit was created for VLC4WoT system. Control of the circuits over the internet was performed. VLC based receiver and transmitter units have been developed for wireless communication. Web based interface was created for control. The test apparatus consisting of four objects with four outputs and a transfer unit was carried out. In this test, communication was achieved successfully. It was presented in the study that VLC can be used in the web of things architecture. In the future, it is envisaged to use this system as a safe and economical system in indoor environments.

Numerical investigation of buckling strength of longitudinally stiffened web of plate girders subjected to bending

  • Kim, Hee Soon;Park, Yong Myung;Kim, Byung Jun;Kim, Kyungsik
    • Structural Engineering and Mechanics
    • /
    • v.65 no.2
    • /
    • pp.141-154
    • /
    • 2018
  • In this study, the bend-buckling strength of the web in longitudinally stiffened plate girder was numerically investigated. The buckling strength of the reinforced web was evaluated through an eigenvalue analysis of the hypothetical model, in which the top and bottom junctions of the web to the flanges were assumed as simple support conditions. Major parameters in the analysis include asymmetrical cross-sectional property, aspect ratio of the web, stiffener locations, and bending rigidity of the stiffeners. The numerical results showed that current AASHTO LRFD specifications (2014) provides the buckling strength from considerably safe side to slightly unsafe side depending on the location of the stiffeners. A modified equation for buckling coefficients was proposed to solve the shortcomings. The bending rigidity requirements of longitudinal stiffeners stipulated in AASHTO were also investigated. It is desirable to increase the rigidity of the stiffeners when the aspect ratio is less than 1.0.

A Web application vulnerability scoring framework by categorizing vulnerabilities according to privilege acquisition (취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크)

  • Cho, Sung-Young;Yoo, Su-Yeon;Jeon, Sang-Hun;Lim, Chae-Ho;Kim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.601-613
    • /
    • 2012
  • It is required to design and implement secure web applications to provide safe web services. For this reason, there are several scoring frameworks to measure vulnerabilities in web applications. However, these frameworks do not classify according to seriousness of vulnerability because these frameworks simply accumulate score of individual factors in a vulnerability. We rate and score vulnerabilities according to probability of privilege acquisition so that we can prioritize vulnerabilities found in web applications. Also, our proposed framework provides a method to score all web applications provided by an organization so that which web applications is the worst secure and should be treated first. Our scoring framework is applied to the data which lists vulnerabilities in web applications found by a web scanner based on crawling, and we show the importance of categorizing vulnerabilities according to privilege acquisition.

Integrity Metadata Based of Multi CMSs System Providing Protection Copyright of Web Contents (웹 콘텐츠 저작권 보호를 제공하는 통합 메타데이터 기반의 다중 CMS 시스템)

  • Cho, Young-Bok;Li, Yong-Zhen;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.520-528
    • /
    • 2008
  • At present Content Management Systems (CMS) with various and diverse web contents have been in wide applications. But, for CMS of each enterprise has its own metadata which is very different from others, it causes the serious problem of web contents repetition. Also, it's a difficult technology to support protecting copyright of web contents which are in separated CMSs. Therefore, in this paper, we solved the problem of contents repetition through metadata integration between mutually heterogeneous CMSs. We also propose the technology of web contents authentication code for avoiding contents repetition and applying digital rights protection by supporting safe ship in vast quantity of contents.

Development of a Web Security System Using Cryptographic Token (보안토큰을 이용한 웹 보안 시스템 개발)

  • Ha, Gyeong-Ju;Yun, Jae-U;Gang, Chang-Gu;Jang, Seung-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.654-663
    • /
    • 1999
  • In this paper, we develop a security system which enhances the security of information during transmission over the World Wide Web for solving problems related to outflow of the information on the internet. Our system provides safe security functions without modifying the existing Web server and browser by utilizing CGI, Plug-in, and Socket Spy techniques. Our system implements user access control and data encryption/decryption by using the hardware cryptographic token instead of using a software technique as in previous systems, and hence is a more robust security system.

  • PDF

The Effectiveness of WBI(Web-Based Instruction) on the Knowledge and Attitude of Traffic Safety among Middle School Students (웹기반 교육이 중학생의 교통안전 지식과 태도에 미치는 효과 연구)

  • 장시원;이명선
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.3
    • /
    • pp.101-116
    • /
    • 2004
  • Korea has the highest traffic accident occurrence rate in the world. It means that we are forced to face a tremendous amount of economic loses and great cost of life. Even though this phenomenon consistently has arose as a public issue every year and many researchers have emphasized the importance of safety education as the fundamental solution, we are still trying to make a long-lasting and effective traffic safety education programs for children and adolescents. The purpose of this study was to test the effectiveness of web-based learning for traffic safety in Korea middle school. For this purpose, the instructive model was constructed based on the ASSURE model and a special web-site of education was developed on behalf of practical use of multi-media learning materials for the traffic safety. The research subject was represented by 259 students from second grade in 2 middle schools located in Seoul Korea. The traffic safety education program using web-site was preceded to the 136 students as a case group for 45 minutes total 3 times. Other 126 students are control group those who did not get with this program. The survey was conducted before and after the education. The results of this study were as follow: 1. The knowledge analysis from the comparison between before and after of the lesson showed case group and control group scored average at 11.25 points and 10.97 points. However, after they attended programs, case group scored 13.57 points and control group scored 10.85 points. The difference from the result of the case group was statistically significant(p<0.001). 2. The attitude analysis from the comparison between before and after of the lesson showed case group and control group scored averages at 29.59 points and 28.21 points. However, after they attended program, case group scored 37.23 points and control group scored 32.71 points. The difference from the result of the case group was statistically significant(p<0.05). 3. Regarding the domain analysis by means of web-based traffic safety education, only the case group had a statistically significant score in the case of knowledge 'safe utilization of bicycle' and 'The Characteristic of Automobile and Safer Mode of Walking for Pedestrian'(p<0.01, p< 0.001), and in the case of attitude 'safe walking and crossing' 'The Characteristic of Automobile and Safer Mode of Walking for Pedestrian'(p<0.01, p<0.001). 4. Web based instruction for traffic safety was effective in terms of improving students' knowledge and attitude for traffic safety.

Prioritization of Potential Technology for Establishing a Safe Work Zone Environment (안전한 도로 공사구간 환경 구축에 필요한 기술의 우선순위 선정)

  • Kim, Jin Guk;Yang, Choong Heon;Yun, Duk Geun
    • International Journal of Highway Engineering
    • /
    • v.17 no.6
    • /
    • pp.117-126
    • /
    • 2015
  • PURPOSES : This study prioritizes potential technology for establishing a safe work zone environment on roadways. We consider almost all conceivable technologies that enable mitigation of unexpected accidents for both road workers and drivers. METHODS : This study suggests a methodology to set the priority of potential technology for establishing a safe work zone environment by using the analytical hierarchy process (AHP). For this purpose, the AHP structure was first developed. Thereafter, a web-based survey was conducted to collect experts' opinions. Based on the survey results, weights associated with the relevant criteria of the developed structure were estimated. With the consistency index (CI) and consistency ratio (CR), we verified the estimated weights. In addition, a sensitivity analysis was performed to confirm whether the estimated weights were reliable. We finally proposed the priority for potential technology for establishing a safe work zone environment on roadways. RESULTS : In the first level, safety technology has the highest priority, and real-time information delivery for work zone, hazard warning for drivers, and temporal automated operation for traffic facilities were selected in the second level of hierarchy. CONCLUSIONS : The results imply that establishing the priority will be useful to establish a future road map for improving the work environment for road workers and drivers by employing appropriate protection facilities and developing safety systems.