• Title/Summary/Keyword: 네트워크 디바이스

Search Result 907, Processing Time 0.022 seconds

Preliminary Research for Korean Twitter User Analysis Focusing on Extreme Heavy User's Twitter Log (국내 트위터 유저 분석을 위한 예비연구 )

  • Jung, Hye-Lan;Ji, Sook-Young;Lee, Joong-Seek
    • Journal of the HCI Society of Korea
    • /
    • v.5 no.1
    • /
    • pp.37-43
    • /
    • 2010
  • Twitter has been continuously growing since October, 2006. Especially, not only the users and the number of messages have been increasing but also a new concept in social networking called 'micro blogging' has diffused. Within Korea, service such as 'me2day' has already been introduced and the improvement of internet accessibility within mobile devices is expected to expand the 'micro blogs'. In this point, this research is executed to study the new medium, 'micro blog'. To do so, we collected and analyzed Twitter logs of Korean users. Especially, we were curious about the extreme heavy users using Twitter, despite of the linguistic and cultural barrier of the foreign service. Who they are, why and how they use the 'micro blog'. First, we reviewed the general aspect of followers and messages by collecting a certain number of random samples. Using the Lorenz curve we found out that there was the imbalance within the users and based on this phenomenon we deducted an extreme heavy user group. In order to perform further analysis, log analysis was performed on the extreme heavy users. As the result, the users used multiple mobile and desktop 'Twitter' clients. The usage pattern was similar to that of internet usage time but was used during their "micro" time. The users using 'Twitter' not only to spread messages about important information, special events and emotions, but also as a habitual 'chatting tool' to express ordinary personal chats similar to SMS and IM services. In this research, it is proved that 68% of the total messages were ordinary personal chats. Also, with 24% of the total messages were retweets, we were able to find out that virtually connected 'people' and 'relationships' acted as the dominant trigger of their articulation.

  • PDF

Real-Time Remote Display Technique based on Wireless Mobile Environments (무선 모바일 환경 기반의 실시간 원격 디스플레이 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.297-302
    • /
    • 2008
  • In case of display a lot of information from mobile devices, those systems are being developed that display the information from mobile devices on remote devices such as TV using the mobile devices as remote controllers because it is difficult to display a lot of information on mobile devices due to their limited bandwidth and small screen sizes. A lot of cost is required to design and develop interfaces for these systems corresponding to each of remote display devices. In this paper, a mobile environment based remote display system for displays at real times is proposed for continuous monitoring of status data for unique 'Mote IDs'. Also, remote data are collected and monitored through sensor network devices such as ZigbeX by applying status perception based remote displays at real times through processing ubiquitous computing environment data, and remote display applications at real times are implemented through PDA wireless mobiles. The system proposed in this paper consists of a PDA for remote display and control, mote embedded applications programming for data collections and radio frequency, server modules to analyze and process collected data and virtual prototyping for monitoring and controls by virtual machines. The result of the implementations indicates that this system not only provides a good mobility from a human oriented viewpoint and a good usability of accesses to information but also transmits data efficiently.

Compression of CNN Using Low-Rank Approximation and CP Decomposition Methods (저계수 행렬 근사 및 CP 분해 기법을 이용한 CNN 압축)

  • Moon, HyeonCheol;Moon, Gihwa;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.125-131
    • /
    • 2021
  • In recent years, Convolutional Neural Networks (CNNs) have achieved outstanding performance in the fields of computer vision such as image classification, object detection, visual quality enhancement, etc. However, as huge amount of computation and memory are required in CNN models, there is a limitation in the application of CNN to low-power environments such as mobile or IoT devices. Therefore, the need for neural network compression to reduce the model size while keeping the task performance as much as possible has been emerging. In this paper, we propose a method to compress CNN models by combining matrix decomposition methods of LR (Low-Rank) approximation and CP (Canonical Polyadic) decomposition. Unlike conventional methods that apply one matrix decomposition method to CNN models, we selectively apply two decomposition methods depending on the layer types of CNN to enhance the compression performance. To evaluate the performance of the proposed method, we use the models for image classification such as VGG-16, RestNet50 and MobileNetV2 models. The experimental results show that the proposed method gives improved classification performance at the same range of 1.5 to 12.1 times compression ratio than the existing method that applies only the LR approximation.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

Advertising in the AR Ecosystem and Revitalization Strategies for the Advertising and PR Industry: Centered on Qualitative Research (AR 생태계(C-P-N-D)에서의 광고, PR 산업 분야의 활성화 방안: 질적 연구를 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.67-80
    • /
    • 2019
  • Augmented Reality (AR) is a crucial technology in the Fourth Industrial Revolution that can revolutionize the existing Information and Communication Technology (ICT) market and powerfully create a new market However, it is hard to find the clear answer for AD/PR strategies in the rapidly changing AR market. Thus this research explores the big picture of the AR industry as it pertains to Politics, Economy, Social, and Technology through in-depth interview with seven AR experts who are leading the domestic AR market. The research also analyzes the AR market's Strengths, Weaknesses, Opportunities, and Threats. Furthermore, it looks for strategies to vitalize the advertising and PR industry by analyzing the Contents, Platform, Network, and Devices of the AR ecosystem. The results of the research indicate a need for the government's strengthened policy of supporting the AR market, fostering of pace-setting killer contents, connecting services of several industries through AR platforms, strengthening the network of communication systems such as through 5G, and the commercialization and industrialization of domestic devices in order to vitalize the AR industry in its marketing and PR spheres. Therefore, this research suggests measures to revitalize the marketing and PR industries of the AR ecosystem, which has only recently gotten to its developing stage and provides an academic as well as practical foundation for future research in the field of AR.

Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing (비프로파일링 기반 전력 분석의 성능 향상을 위한 오토인코더 기반 잡음 제거 기술)

  • Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.491-501
    • /
    • 2019
  • In side-channel analysis, which exploit physical leakage from a cryptographic device, deep learning based attack has been significantly interested in recent years. However, most of the state-of-the-art methods have been focused on classifying side-channel information in a profiled scenario where attackers can obtain label of training data. In this paper, we propose a new method based on deep learning to improve non-profiling side-channel attack such as Differential Power Analysis and Correlation Power Analysis. The proposed method is a signal preprocessing technique that reduces the noise in a trace by modifying Auto-Encoder framework to the context of side-channel analysis. Previous work on Denoising Auto-Encoder was trained through randomly added noise by an attacker. In this paper, the proposed model trains Auto-Encoder through the noise from real data using the noise-reduced-label. Also, the proposed method permits to perform non-profiled attack by training only a single neural network. We validate the performance of the noise reduction of the proposed method on real traces collected from ChipWhisperer board. We demonstrate that the proposed method outperforms classic preprocessing methods such as Principal Component Analysis and Linear Discriminant Analysis.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.