2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
Evaluation of a Radio Frequency Identification (RFID) Library System: Preliminary Results
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.1-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The literature has indicated that libraries in developed countries are fast growing early adopters of Radio Frequency Identification (RFID) technology. The adoption of RFID in supply chain has reported superior growth, spurred by mandate compliance from global retailers such as Wal-Mart and Target. Numerous tests have been performed in a variety of supply chain environment to determine the performance requirements, physical characteristics and limitations to achieve a near 100% read rate. However, the literature is sparse on reports of performance testing in a library setting, and results from supply chain testing should be reluctantly applied to other environments. Based on the above, this study addresses this gap in the literature with the execution of test cases to examine the operational efficiencies of the inventory reader and the self-check station. The study was conducted at a university library with a test sample of 200 books of different types. The factors examined include tag placement, reader orientation sensitivity, read distance, and metal and other possible sources of electromagnetic interference. Each test case was executed repeatedly and the accuracy rate was recorded. Additionally, a spectrum analyzer was used to monitor possible sources of interference. The preliminary findings suggested that mobile phones and wireless computers have no effect on the performance of the self-check station or inventory reader. In addition, the preliminary results also suggest that metallic shelves affect the performance of the inventory reader with reduced read rate accuracy.
Query Aggregation in Wireless Sensor Networks
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.19-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wireless sensor networks have been used more and more widely with the developments of related techniques in telecommunication and computer sciences. While sensor nodes in wireless sensor networks have very limited memory spaces and power. In this paper, we propose a new query aggregation method to preprocess the query predicates. The size of the relational table can be further reduced using the aggregated query predicates. The reduced relational table can be stored on the sensor nodes. This may cause false positive but definitely no false negative. When the required data are sent back to the sink, we can do join operation between the real query predicate and the relational table again, and eliminate the redundant data.
Design and Evaluation of Experiment Methods for Improving Performance In GIS Web Services
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.27-43
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
By introducing Web Services, distributed GIS(Geospatial Information System) services from different vendors can be dynamically integrated into a GIS application using the interoperable standard SOAP(Simple Object Access Protocol). However, it is debatable whether SOAP can really meet the performance requirement of GIS. Additionally, GIS Web Services’ performance may be improved by using asynchronous technique. Ajax, one of the technologies of “Web 2.0”. Integrating Ajax(Asynchronous JavaScript and XML) approach into GIS visualization Web Services have performance enhancement, because it provides more interactive user experience. This paper presents an experimental evaluation of the performance of different SOAP variants: standard SOAP, SwA/MIME, and SOAP/MTOM. SOAP/MTOM is proved to be the fastest and the most efficient messaging protocol. For sintegrating Ajax approach, compare performance of models between Web Services and Web Services using Ajax. This comparison results that Web Services using Ajax represent good performance in images fetching and user roundtrip time because it fetches required images beforehand.
Constructing a Conversation Key in Three-Party Communications Environment
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.45-51
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This article proposes an efficient, less communication rounds, three-party encrypted key exchange protocol to achieve the authentication requirement. The protocol is provided with (1) no asymmetric encryption algorithm which is adopted to reduce the costs (such as any public-key infrastructure); (2) using pre-shared key to prevent adversaries that masquerade as legal users after guessing attacks; (3) avoiding the variant man-in-the-middle attacks on Diffie-Hellman based protocols; (4) achieving mutual authentication. With these four features, the proposed protocol is suitable for being applied for establishing secure channels between two clients, which are supported with the same trusted server.
Designing Agent Architecture for Security Medical System
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.53-58
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the current situation there is a lack of researches on measures of security processing and monitoring patient status information produced from rapid growth of infra within Medical environment. It is thus necessary to conduct such research on the medical care environment where there is a high demand for utilization of status information. This study suggests a solution of using RFID to gather patient information such as inpatient information, location of treatment room, progress of patient, humidity, temperature, and diagnostic status, after which the information are protect and processed using security level method.
A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.59-63
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In 2000, Sun proposed a user authentication scheme without using a password table but the user’s password is assigned by the server. Due to this reason, Wu and Chieu proposed an improved scheme to overcome the drawback in 2003. Their scheme provides users to choose and change passwords freely. However, Yang and Wang has presented the possible attacks on Wu-Chieu scheme in 2004. In this article, we proposed an efficient scheme to avoid the weakness of Wu-Chieu scheme. Besides, our scheme provides the feature of mutual authentication between the user and the server.
Performance Measurement using Hybrid Prediction Model in Ubiquitous Computing
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.65-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Ubiquitous computing devices recently are increasing requirements of high-level performance management automation, and therefore a system management is changing from a conventional central administration to autonomic computing. Many research centers are conducting various studies on self-healing method. However, most existing research focuses on healing after a system error has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, we present how to predict the performance of system using hybrid prediction model. This hybrid prediction models adopts a selective healing model according to system context, for self-diagnosis and prediction of errors when using the four algorithms. In this paper, we evaluate the prediction time of the hybrid prediction model prototype and the performance of the target system’s workload. In addition, the prediction is compared with existing research and the effectiveness is demonstrated by experiment.
Self-healing Mechanism for Reliable Computing
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.75-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
One of the four major processes of an autonomic computing system is to free people from discovering, recovering, and failures, this process is called self-healing. Systems designed to be self-healing are able to heal themselves at runtime in response to changing environmental or operational circumstances. Thus, the goal is to avoid catastrophic failure through prompt execution of remedial actions. This paper proposes a self-healing mechanism that monitors, diagnoses and heals its own internal problems using self-awareness as contextual information. The self-management system that encapsulates the self-healing mechanism related to reliability improvement addresses: (1) Monitoring layer, (2) Diagnosis & Decision Layer, and (3) Adaptation Layer, in order to perform self-diagnosis and self-healing. To confirm the effectiveness of self-healing mechanism, practical experiments are conducted with a prototype system.
A study on Security Level Management Model Description
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.3 No.1 2008.01 pp.87-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Security level decision is a basic activity for developing and managing of safe information systems, and core factor which can affect the investment for security countermeasures. According to the security level of IS, where and how the security countermeasures are implemented, which security policies are selected, and who will manage them are able to be decided. But more important thing than level decision is the management of level decided. And in this model, we proposed a new model to manage security level of IS.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.