• Title/Summary/Keyword: 메시지 시스템

Search Result 2,106, Processing Time 0.034 seconds

Effects of Sending Text Message and Searching Navigation on Skin Conductance Level and Deviation of Vehicle Speed during Driving (문자 메시지 전송 및 내비게이션 명칭 검색이 운전 중 피부전도수준과 속도편차에 미치는 영향)

  • Yang, Jae-Woong;Lee, Su-Jeong;Kim, Ji-Hye;Choi, Mi-Hyun;Choi, Jin-Seung;Kim, Han-Su;Ji, Doo-Hwan;Tack, Gye-Rae;Chung, Soon-Cheol;Min, Byung-Chan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.1
    • /
    • pp.9-13
    • /
    • 2011
  • The purpose of this study was to investigate the effects of the secondary tasks such as sending text message (STM) and searching navigation (SN) on skin conductance level (SCL) and deviation of vehicle speed during driving. The participants included 30 healthy adults; 14 males aged $25.2{\pm}0.9$ with $1.9{\pm}1.8$ years of driving experiences and 16 females aged $22.6{\pm}1.9$ with $1.2{\pm}0.8$ years of driving experiences. All subjects were instructed to keep a constant speed (80km/h or 100km/h). SCL and deviation of vehicle speed were measured during driving only and driving with secondary tasks. SCL and deviation of vehicle speed were more increased during the driving with secondary tasks than driving only. Secondary tasks increased an activation of sympathetic nerve system and decreased driving performance. However, there were no significant differences in the SCL and deviation of vehicle speed according to gender and speed.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

Complexity Metrics for Analysis Classes in the Unified Software Development Process (Unified Process의 분석 클래스에 대한 복잡도 척도)

  • 김유경;박재년
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.71-80
    • /
    • 2001
  • Object-Oriented (OO) methodology to use the concept like encapsulation, inheritance, polymorphism, and message passing demands metrics that are different from structured methodology. There are many studies for OO software metrics such as program complexity or design metrics. But the metrics for the analysis class need to decrease the complexity in the analysis phase so that greatly reduce the effort and the cost of system development. In this paper, we propose new metrics to measure the complexity of analysis classes which draw out in the analysis phase based on Unified Process. By the collaboration complexity, is denoted by CC, we mean the maximum number of the collaborations can be achieved with each of the collaborator and detennine the potential complexity. And the interface complexity, is denoted by IC, shows the difficulty related to understand the interface of collaborators each other. We prove mathematically that the suggested metrics satisfy OO characteristics such as class size and inheritance. And we verify it theoretically for Weyuker' s nine properties. Moreover, we show the computation results for analysis classes of the system which automatically respond to questions of the it's user using the text mining technique. As we compared CC and IC to CBO and WMC, the complexity can be represented by CC and IC more than CBO and WMC. We expect to develop the cost-effective OO software by reviewing the complexity of analysis classes in the first stage of SDLC (Software Development Life Cycle).

  • PDF

Partial Path Selection Method in Each Subregion for Routing Path Optimization in SEF Based Sensor Networks (통계적 여과 기법 기반 센서 네트워크에서 라우팅 경로 최적화를 위한 영역별 부분 경로 선택 방법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.108-113
    • /
    • 2012
  • Routing paths are mightily important for the network security in WSNs. To maintain such routing paths, sustained path re-selection and path management are needed. Region segmentation based path selection method (RSPSM) provides a path selection method that a sensor network is divided into several subregions, so that the regional path selection and path management are available. Therefore, RSPSM can reduce energy consumption when the path re-selection process is executed. However, it is hard to guarantee optimized secure routing path at all times since the information using the path re-selection process is limited in scope. In this paper, we propose partial path selection method in each subregion using preselected partial paths made by RSPSM for routing path optimization in SEF based sensor networks. In the proposed method, the base station collects the information of the all partial paths from every subregion and then, evaluates all the candidates that can be the optimized routing path for each node using a evaluation function. After the evaluation process is done, the result is sent to each super DN using the global routing path information (GPI) message. Thus, each super DN provides the optimized secure routing paths using the GPI. We show the effectiveness of the proposed method via the simulation results. We expect that our method can be useful for the improvement of RSPSM.

Analysis & Design Electronic Commerce System Interface for The Blind (시각장애 사용자를 위한 전자상거래 인터페이스 분석 및 설계)

  • 박성제;강영무
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2001.12a
    • /
    • pp.413-426
    • /
    • 2001
  • 본 연구는 첫째, 정보통신기술의 발달이 시각장애인 복지 증진에 미칠 수 있는 가능성에 대한 이론적인 부분을 고찰하였다. 둘째, 우리나라 시각장애인 정보화의 문제점과 해결책을 도출하였고 셋째, 시각장애 사용자를 위한 전자상거래 인터페이스 디자인의 분석 및 설계를 통해 전자상거래에서 시각장애 사용자들이 큰 제약없이 사용할 수 있는 방안을 제시하고자 한다. 현재 시각장애인들의 웹 사용을 보면 시각장애 전용 S/W의 보조 하에 사용을 하고 있다. 그러한 보조 도구의 실정에 맞도록 텍스트 버전 및 Non-Frame버전, Alt-Text 옵션, 캡션 등을 넣어 접근성을 확보하고 인터넷을 큰 제약을 받지않고 이용할 수 있도록 웹 페이지의 설계가 필요한 실정이다. 이를 위하여 먼저 시각장애에 대한 개념과 원인 및 종류 그리고 특성을 통해 시각장애인에 대한 이론적 배경을 파악하였다. 그리고 시각장애인의 정보화 환경과 이용 현황과 시각장애인의 정보 접근을 제도적, 기기 및 소프트웨어 개발 측면에서 분석을 하였고, 장애인을 위한 정보통신기술 중 대표적인 사례를 검토해 보았다. 다음으로 국내외의 대표적인 전자상거래 사이트에서의 인터페이스를 화면구성(Layout), 텍스트(Text), 그래픽(Graphic), 멀티미디어(MultiMedia) 측면에서 분석을 하였다. 분석한 내용을 바탕으로 시각장애 사용자의 입력(User Input) 부분을 고려한 인터페이스 방향을 제시하고 프로토타입을 개발하여 시험 대상 사이트와의 만족도를 시각장애 사용자를 통해 비교 ·분석하였다. 결론부분에서는 정보불평등을 해소하고, 정보통신기술이 장애인의 복지향상에 기여하도록 하기 위해 전자상거래 싸이트에서의 시각 장애인들을 위한 방향을 제시하고자 한다.박의 표현, 등록 및 색인방법 (c) 공급 선박의 분류와 표현 방법 (d) 에이전트의 정보 수집을 위한 메시지 표현 방법 (e) 수집된 선박정보의 데이터베이스 저장 표현방법 (f) 요구 선박을 찾아주는 정보제공 서비스가 요구된다.동을 보여 조사대상 5호분, 6호분, 7호분, 중 가장 심한 거동을 보이고 있다. 이는 고분 벽돌의 깨짐이 6호분이 가장 심하다는 사실과 무관하지 않은 것으로 판단된다. 봉분내부의 토양층구조에 대한 지오레이다 영상단면을 분석한 결과 무령왕릉 연도상부의 누수지방지층이 심하게 균열되어 있음을 발견하였다. 이 곳은 고분내부로 직접누수가 발생하는 곳이다. 직접누수와 지하수 형태로 유입된 침투수는 고분군 주위의 지반의 함수비를 증가시켜 지반의 지지력을 약화시키고 또한 고분내로 서서히 유입되어 고분내부의 습도를 100%로 유지시키는 주된 원인이다. 이러한 높은 습도는 고분내의 남조류의 번식을 가져왔으며 남조류의 번식은 현재 6호분이 가장 심각하고 7호분이 우려되는 수준이며 5호분은 문제가 없는 것으로 판단된다. 이와 같이 고분군의 발굴후 인위적인 환경변화와 지속적인 강우침투 및 배수 불량의 영향은 고분군의 안정성에 상당한 위험을 초래하였으며, 현 상태는 각 고분에 대한 보강이 불가피한 것으로 판단된다. 고분 벽돌의 깨짐, 고분 벽체의 거동, 조류의 서식등을 포함하여 송산리 고분군에서 발생되고 있는 보존상의 제반 문제점들을 일차적으로 누수 및 침투수에 의한 결과이다. 그러므로 무엇보다도 고분군 내부 및 고분 주변으로의 강우 및 지하수 침투를 막는 차수 대책이 시급한 것으로 판단된다. 또한 이미 발생한 변위가 더 이상 진행되지 않도록 하중을 경감하고 토압의 균형을 이루는 보강대책이 시급한 실정이다. 고분군

  • PDF

A Development of Fusion Processor Architecture for Efficient Main Memory Access in CPU-GPU Environment (CPU-GPU환경에서 효율적인 메인메모리 접근을 위한 융합 프로세서 구조 개발)

  • Park, Hyun-Moon;Kwon, Jin-San;Hwang, Tae-Ho;Kim, Dong-Sun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.151-158
    • /
    • 2016
  • The HSA resolves an old problem with existing CPU and GPU architectures by allowing both units to directly access each other's memory pools via unified virtual memory. In a physically realized system, however, frequent data exchanges between CPU and GPU for a virtual memory block result bottlenecks and coherence request overheads. In this paper, we propose Fusion Processor Architecture for efficient access of main memory from both CPU and GPU. It consists of Job Manager, Re-mapper, and Pre-fetcher to control, organize, and distribute work loads and working areas for GPU cores. These components help on reducing memory exchanges between the two processors and improving overall efficiency by eliminating faulty page table requests. To verify proposed algorithm architectures, we develop an emulator based on QEMU, and compare several architectures such as CUDA(Compute Unified Device Architecture), OpenMP, OpenCL. As a result, Proposed fusion processor architectures show 198% faster than others by removing unnecessary memory copies and cache-miss overheads.

A Study on The Design of China DSRC System SoC (중국형 DSRC 시스템 SoC 설계에 대한 연구)

  • Shin, Dae-Kyo;Choi, Jong-Chan;Lim, Ki-Taeg;Lee, Je-Hyun
    • 전자공학회논문지 IE
    • /
    • v.46 no.4
    • /
    • pp.1-7
    • /
    • 2009
  • The final goal of ITS and ETC will be to improve the traffic efficiency and mobile safety without new road construction. DSRC system is emerging nowadays as a solution of them. China DSRC standard which was released in May 2007 has low bit rate, short message and simple MAC control. The DSRC system users want a long lifetime over 1 year with just one battery. In this paper, we propose the SoC of very low power consumption architecture. Several digital logic concept and analog power control logics were used for very low power consumption. The SoC operation mode and clock speed, operation voltage range, wakeup signal detector, analog comparator and Internal Voltage Regulator & External Power Switch were designed. We confirmed that the SoC power consumption is under 8.5mA@20Mhz, 0.9mA@1Mhz in active mode, and under 5uA in power down mode, by computer simulation. The design of SoC was finished on Aug. 2008, and fabricated on Nov. 2008 with $0.18{\mu}m$ CMOS process.

Measurement of Classes Complexity in the Object-Oriented Analysis Phase (객체지향 분석 단계에서의 클래스 복잡도 측정)

  • Kim, Yu-Kyung;Park, Jai-Nyun
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.10
    • /
    • pp.720-731
    • /
    • 2001
  • Complexity metrics have been developed for the structured paradigm of software development are not suitable for use with the object-oriented(OO) paradigm, because they do not support key object-oriented concepts such as inheritance, polymorphism. message passing and encapsulation. There are many researches on OO software metrics such as program complexity or design metrics. But metrics measuring the complexity of classes at the OO analysis phase are needed because they provide earlier feedback to the development project. and earlier feedback means more effective developing and less costly maintenance. In this paper, we propose the new metrics to measure the complexity of analysis classes which draw out in the analysis based on RUP(Rational Unified Process). By the collaboration complexity, is denoted by CC, we mean the maximum number of the collaborations can be achieved with each of the collaborator and determine the potential complexity. And the interface complexity, is denoted by IC, shows the difficulty related to understand the interface of collaborators each other. We verify theoretically the suggested metrics for Weyuker's nine properties. Moreover, we show the computation results for analysis classes of the system which automatically respond to questions of the user using the text mining technique. As a result of the comparison of CC and CBO and WMC suggested by Chidamber and Kemerer, the class that have highly the proposed metric value maintain the high complexity at the design phase too. And the complexity can be represented by CC and IC more than CBO and WMC. We can expect that our metrics may provide us the earlier feedback and hence possible to predict the efforts, costs and time required to remainder processes. As a result, we expect to develop the cost-effective OO software by reviewing the complexity of analysis classes in the first stage of SDLC(Software Development Life Cycle).

  • PDF

Design and Development of Personal Healthcare System Based on IEEE 11073/HL7 Standards Using Smartphone (스마트폰을 이용한 IEEE 11073/HL7 기반의 개인 건강관리 시스템 설계 및 구현)

  • Nam, Jae-Choong;Seo, Won-Kyeong;Bae, Jae-Seung;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1556-1564
    • /
    • 2011
  • The increased life expectancy of human due to the advance of medical techniques has led to many social problems such as rapidly aging populations, increased medical expenses and a lack of medical specialists. Thus, studies on improving the quality of life with the least amount of expense have been going on by incorporating advanced technologies, especially for Personal Health Devices (PHDs), into the medical service market. However, compatibility and extensibility among manufacturers of PHDs have not been taken into account in most of the researches done on the development of PHDs because most of them have been supported by individual medical organizations. The interoperability among medical organizations can not be guaranteed because each medical organization uses different format of the messages. Therefore, in this paper, an expansion module that can enable commercially-available non-standard PHDs to support the IEEE 11073, and a smart-phone-based manager that can support easy and comprehensive management on receiving and transmitting the collected data from each PHD using IEEE 11073 standard were developed. In addition, a u-health system that can transmit the data collected in the manager using the standard data format HL 7 to medical center for real-time medical service from every medical institutions that support this standard was designed and developed.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.