• Title/Summary/Keyword: 네트워크 선택

Search Result 1,747, Processing Time 0.026 seconds

MOBIGSS: A Group Decision Support System in the Mobile Internet (MOBIGSS: 모바일 인터넷에서의 그룹의사결정지원시스템)

  • Cho Yoon-Ho;Choi Sang-Hyun;Kim Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.125-144
    • /
    • 2006
  • The development of mobile applications is fast in recent years. However, nearly all applications are for messaging, financial, locating services based on simple interactions with mobile users because of the limited screen size, narrow network bandwidth, and low computing power. Processing an algorithm for supporting a group decision process on mobile devices becomes impossible. In this paper, we introduce the mobile-oriented simple interactive procedure for support a group decision making process. The interactive procedure is developed for multiple objective linear programming problems to help the group select a compromising solution in the mobile Internet environment. Our procedure lessens the burden of group decision makers, which is one of necessary conditions of the mobile environment. Only the partial weak order preferences of variables and objectives from group decision makers are enough for searching the best compromising solution. The methodology is designed to avoid any assumption about the shape or existence of the decision makers' utility function. For the purpose of the experimental study of the procedure, we developed a group decision support system in the mobile Internet environment, MOBIGSS and applied to an allocation problem of investor assets.

  • PDF

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping (대역폭 감소를 적용한 MPEG-4 미디어 전송시의 암호화 기법 연구)

  • Shin, Dong-Kyoo;Shin, Dong-Il;Park, Se-Young
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.575-584
    • /
    • 2008
  • According to the network condition, the communication network overload could be occurred when media transmitting. Many researches are being carried out to lessen the network overload, such as the filtering, load distributing, frame dropping and many other methods. Among these methods, one of effective method is frame dropping that reduces specified video frames for bandwidth diminution. B frames are dropped and then I, P frames are dropped according to dependency among the frames in frame dropping. This paper proposes a scheme for protecting copyrights by encryption, when we apply frame dropping to reduce bandwidth of media following MPEG-4 file format. We designed two kinds of frame dropping: first one stores and then sends the dropped files and the other drops frames in real-time when transmitting. We designed three kinds of encryption methods in which DES algorithm is used to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I, P-VOP. Based on these three methods, we implemented a digital right management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption and quality of video sequences to select an optimal method, and there is no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in encryption and decryption of frames was obtained when we apply the macro block and motion vector encryption in I, P-VOP.

Automatic Extraction of Abstract Components for supporting Model-driven Development of Components (모델기반 컴포넌트 개발방법론의 지원을 위한 추상컴포넌트 자동 추출기법)

  • Yun, Sang Kwon;Park, Min Gyu;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.543-554
    • /
    • 2013
  • Model-Driven Development(MDD) helps developers verify requirements and design issues of a software system in the early stage of development process by taking advantage of a software model which is the most highly abstracted form of a software system. In practice, however, many software systems have been developed through a code-centric method that builds a software system bottom-up rather than top-down. So, without support of appropriate tools, it is not easy to introduce MDD to real development process. Although there are many researches about extracting a model from code to help developers introduce MDD to code-centrically developed system, most of them only extracted base-level models. However, using concept of abstract component one can continuously extract higher level model from base-level model. In this paper we propose a practical method for automatic extraction of base level abstract component from source code, which is the first stage of continuous extraction process of abstract component, and validate the method by implementing an extraction tool based on the method. Target code chosen is the source code of TinyOS, an operating system for wireless sensor networks. The tool is applied to the source code of TinyOS, written in nesC language.

Wearable antenna for Body area Network

  • Lim, Eng Gee;Wang, Zhao;Lee, Sanghyuk
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.27-32
    • /
    • 2013
  • Wireless Body Area Networks (WBAN) have been made possible by the emergence of small and lightweight wireless systems such as Bluetooth, enabled devices and PDAs. Antennas are an essential part of any WBAN system and due to various technical requirements and physical constraints, careful consideration of their design and deployment is needed. This paper is proposing on the design of wearable antenna as parts of clothing to serve communications functions, such as tracking and navigation in health care applications. The substrates of the wearable antennas will be made from textile materials and since it is wearable, it should have a small size, be light weight, low maintenance, and unobtrusive. This proposed paper will also investigate the influence of different parameters for wearable antenna including types of textile/substrate to ensure that the antenna design satisfies WBAN requirements. The characteristics and behavior of the antenna need to adhere to specifications set by wireless standards and system technology requirements. This means that the transmitting and receiving frequency bands of the various units need to be chosen accordingly. Since there are restrictions on the level of power to which the human body can be exposed to, the antenna as well as other RF system components must be designed to meet these restrictions. Antenna gain, which directly affects power transmitted, is a critical parameter in ensuring power levels fall within the safety guidelines and so will be of primary importance in the design. The electromagnetic interaction between WBAN antennas and devices and the human body will also be explored.

  • PDF

An Efficient CPLD Technology Mapping considering Area under Time Constraint (시간 제약 조건하에서 면적을 고려한 효율적인 CPLD 기술 매핑)

  • Kim, Jae-Jin;Kim, Hui-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.79-85
    • /
    • 2001
  • In this paper, we propose a new technology mapping algorithm for CPLD consider area under time constraint(TMFCPLD). This technology mapping algorithm detect feedbacks from boolean networks, then variables that have feedback are replaced to temporary variables. Creating the temporary variables transform sequential circuit to combinational circuit. The transformed circuits are represented to DAG. After traversing all nodes in DAG, the nodes that have output edges more than two are replicated and reconstructed to fanout free tree. This method is for reason to reduce area and improve total run time of circuits by TEMPLA proposed previously. Using time constraints and delay time of device, the number of graph partitionable multi-level is decided. Initial cost of each node are the number of OR-terms that it have. Among mappable clusters, clusters of which the number of multi-level is least is selected, and the graph is partitioned. Several nodes in partitioned clusters are merged by collapsing, and are fitted to the number of OR-terms in a given CLB by bin packing. Proposed algorithm have been applied to MCNC logic synthesis benchmark circuits, and have reduced the number of CLBs by 62.2% than those of DDMAP. And reduced the number of CLBs by 17.6% than those of TEMPLA, and reduced the number of CLBs by 4.7% than those of TMCPLD. This results will give much efficiency to technology mapping for CPLDs.

  • PDF

The Effect of SNS(Social Network Services) Quality on Customer Loyalty: Focus on the Mediated Moderation Effect of Customer Satisfaction by Trust (소셜네트워크서비스(SNS) 품질이 고객 충성도에 미치는 영향: 신뢰를 통한 고객 만족의 매개된 조절효과를 중심으로)

  • Park, Wonhee
    • Journal of Service Research and Studies
    • /
    • v.3 no.1
    • /
    • pp.17-31
    • /
    • 2013
  • With the advent of smart phones, there are increasing demands from customers to connect to the social media services at any time and at any place without restraint. As a result, many foreign companies have lately been able to pursue two-way communication with customers through social media which has enabled them to see the reaction and the needs of customers immediately and respond timely. That is, they are actively engaged in the various marketing activities targeting customers using SNS. According to H. A. Simon's needle theory, it is efficient to make a decision within the bounded rationality due to the difficulty of collecting data in decision-making as well as the inability to collect all information because of limited time and money. If the information or the informant can be trusted, the customers would be able to make a quick decision and get higher satisfaction from it. Therefore, this study examines and thereby empirically demonstrates what role customers' trust plays in a company's marketing using SNS by exploring how trust condition works in the mediated model and, theoretically, intends to introduce an empirical methodology on more strictly mediated moderating effects and, in practice, revisit the role of trust on direct and indirect effect the SNS's quality has on the performance variables such as customer satisfaction and loyalty. This study thereby aims to provide a strategic tool for the companies that plan to use the SNS in developing marketing strategies.

  • PDF

Applicability for Detecting Trails by Using KOMPSAT Imagery (등산로 탐지를 위한 KOMPSAT 영상의 활용가능성)

  • Bae, Jinsu;Yim, Jongseo;Shin, Young Ho
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.6
    • /
    • pp.607-619
    • /
    • 2015
  • It is important to detect trails accurately for finding a proper management. We examined the applicability of KOMPSAT imagery to detect trails and found that it could be an efficient alternative to track trails correctly. We selected K2 and K3 imagery with different spatial resolution. Then, we processed each imagery to get NDVI, SAVI, and SC data. And then, we identified trails by object-based analysis and network analysis. Finally, we evaluated the potential trails with F-measurement and Jaccard coefficient which are based on correctness and completeness. The results show that the applicability is quite different in each case. Among them, especially the SC data with K3 shows the most highest value; correctness of detecting legal trails is 0.44 and completeness of that is 0.54. F-measurement and Jaccard coefficient are 0.49 and 0.32. In general, although there is a limit in detecting trails by using only KOMPSAT imagery, the usefulness of KOMPSAT imagery can be a higher considering its cost efficiency and availability of acquiring periodic data.

  • PDF

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

Recognition of Passport Image Using Removing Noise Branches and Enhanced Fuzzy ART (잡영 가지 제거 알고리즘과 개선된 퍼지 ART를 이용한 여권 코드 인식)

  • Lee, Sang-Soo;Jang, Do-Won;Kim, Kwang-Baek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.377-382
    • /
    • 2005
  • 본 논문에서는 출입국자 관리의 효율성과 체계적인 출입국 관리를 위하여 여권 코드를 자동으로 인식하는 방법을 제안한다. 여권 이미지는 기울어진 상태로 스캔 되어 획득되어질 수도 있으므로 기울기 보정은 문자 분할 및 인식에 있어 매우 중요하다. 따라서 본 논문에서는 여권 영상을 스미어링한 후, 추출된 문자열 중에서 가장 긴 문자열을 선택하고 이 문자열의 좌측과 우측 부분의 두께 중심을 연결하는 직선과 수평선과의 기울기를 이용하여 여권 영상에 대한 각도 보정을 수행한다. 여권 코드 추출은 소벨 연산자와 수평 스미어링, 8방향 윤관선 추적 알고리즘을 적용하여 여권 코드의 문자열 영역을 추출하고, 추출된 여권 코드 문자열 영역에 대해 반복 이진화 방법을 적용하여 코드의 문자열 영역을 이진화 한다, 이진화된 문자열 영역에 대해 여권 코드의 인식율을 높이기 위하여 잡영 가지 제거 알고리즘을 적용하여 개별 문자의 잡영을 제거한 후에 개별 코드를 추출하며, CDM 마스크를 적용하여 추출된 개별코드를 복원한다. 추출된 개별코드는 개선된 퍼지 ART 알고리즘을 제안하여 인식에 적용한다. 실제 여권 영상을 대상으로 실험한 결과, CDM 마스크를 이용하여 추출된 개별 코드를 개선된 퍼지 ART 알고리즘을 적용하여 인식한 방법보다 잡영 제거 알고리즘과 CDM 마스크를 적용하여 개선된 퍼지 ART 알고리즘으로 개별 코드를 인식하는 것이 효율적인 것을 확인하였다. 그리고 기존의 퍼지 ART 알고리즘을 이용하여 개별 코드를 인식하는 경우보다 본 논문에서 제안한 개선된 퍼지 ART 알고리즘을 이용하여 개별 코드를 인식하는 경우가 서로 다른 패턴들이 같은 클러스터로 분류되지 않아 인식 성능이 개선되었다.생산하고 있다. 또한 이러한 자료를 바탕으로 지역통계 수요에 즉각 대처할 수 있다. 더 나아가 이와 같은 통계는 전 국민에 대한 패널자료이기 때문에 통계적 활용의 범위가 방대하다. 특히 개인, 가구, 사업체 등 사회 활동의 주체들이 어떻게 변화하는지를 추적할 수 있는 자료를 생산함으로써 다양한 인과적 통계분석을 할 수 있다. 행정자료를 활용한 인구센서스의 이러한 특징은 국가의 교육정책, 노동정책, 복지정책 등 다양한 정책을 정확한 자료를 근거로 수립할 수 있는 기반을 제공한다(Gaasemyr, 1999). 이와 더불어 행정자료 기반의 인구센서스는 비용이 적게 드는 장점이 있다. 예를 들어 덴마크나 핀란드에서는 조사로 자료를 생산하던 때의 1/20 정도 비용으로 행정자료로 인구센서스의 모든 자료를 생산하고 있다. 특히, 최근 모든 행정자료들이 정보통신기술에 의해 데이터베이스 형태로 바뀌고, 인터넷을 근간으로 한 컴퓨터네트워크가 발달함에 따라 각 부처별로 행정을 위해 축적한 자료를 정보통신기술로 연계${cdot}$통합하면 막대한 조사비용을 들이지 않더라도 인구센서스자료를 적은 비용으로 생산할 수 있는 근간이 마련되었다. 이렇듯 행정자료 기반의 인구센서스가 많은 장점을 가졌지만, 그렇다고 모든 국가가 당장 행정자료로 인구센서스를 대체할 수 있는 것은 아니다. 행정자료로 인구센서스통계를 생산하기 위해서는 각 행정부서별로 사용하는 행정자료들을 연계${cdot}$통합할 수 있도록 국가사회전반에 걸쳐 행정 체제가 갖추어져야 하기 때문이다. 특히 모든 국민 개개인에 관한 기본정보, 개인들이 거주하며 생활하는 단위인 개별 주거단위에 관한 정보가 행정부에 등록되어

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.