• Title/Summary/Keyword: 메시지 신뢰도

Search Result 433, Processing Time 0.028 seconds

Voice/Tone Warning System Design for Military Aircraft (군용 항공기를 위한 음성/톤 경고 시스템 설계)

  • Na, Hana;Kim, Do Gyun
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.24-35
    • /
    • 2021
  • High-speed military aircraft shall be able to identify and resolve enemy threats or internal component defects with survival equipment and warning systems to minimize casualties. Warning system is divided into visual method with symbolic display and auditory method with communication equipment, which is superior in that they it has a short response time and does not cause pilot confusion by listening to simple messages. Thus, this paper suggested and evaluated effective design methods of voice/tone warning systems for military aircraft based on a life cycle perspective. Since military aircraft is safety-sensitive, priorities and three properties(Inhibitible, Interruptible, and Deactivatable) were applied to each warning to reflect criticality and urgency. As a result, we confirmed that it took 40ms to play the voice warnings, satisfying all requirements through V model-based development and testing, and improving product reliability.

A Correlation Analysis between Word-of Mouth Message Sender Credibility and WOM Effect (외식업소에 대한 구전 메시지 발신자 신뢰도와 구전효과의 상관성 분석)

  • Cha, Sung-Mi;Shin, Seo-Young
    • Journal of the Korean Society of Food Culture
    • /
    • v.21 no.5
    • /
    • pp.536-540
    • /
    • 2006
  • The purposes of this study were 1) to analyze the correlation between Word-of-Mouth(WOM) message sender credibility and WOM effect and 2) to analyze the differences of WOM message sender creadibility and WOM effect in off-line and on-line WOM communication. The messages were created as a form of scenario for this study. Respondents were asked to evaluate the message sender credibility and predict WOM behaviors after reading given scenario. The questionnaires were distributed to 200 customers and a total of 175 questionnaires were used for analysis(87.5%). The statistical analysis was conducted using SPSS Win(12.0) for descriptive analysis, paired t-test, factor analysis, correlation analysis. The positive off-line WOM message sender was considered as more credible(p<.001) than on-line WOM message sender. 'Message sender credibility' is correlated with 'attitude formation' in both channels, but 'reliable' factor of 'credibility' variable is not significantly correlated with 'attitude change'.

A Route Selection Method for Transmitting Data in MANET(Mobile Ad-hoc NETwork) (MANET(Mobile Ad-hoc NETwork)에서의 효율적인 데이터 전송을 위한 경로선택기법)

  • Cha, Hyun-Jong;Han, In-Sung;Ryou, Hwang-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.671-674
    • /
    • 2008
  • 초기의 Ad-hoc 네트워크의 라우팅 프로토콜들은 Table-driven 알고리즘이 대두되었으나, 많은 문제점으로 이동단말의 이동성을 지원하는 On-demand 방식의 라우팅 프로토콜에 대한 연구가 진행되었다. 최근에는 On-demand 와 Table-driven의 장점을 반영한 AODV(Ad-hoc On-demand Distance Vector)가 널리 이용되고 있다. 그러나 AODV의 장점에도 불구하고 아직까지 AODV 는 노드들의 잦은 이동으로 Ad-hoc 네트워크에 많은 라우팅 패킷을 발생시켜 전체적인 네트워크의 성능 면에서 많은 약점을 보이고 있다. 본 논문에서는 Ad-hoc 네트워크를 구성하는 노드들 사이의 링크에 대한 신뢰성을 위해 노드의 이동경로예측을 기반으로 하는 새로운 경로설정 및 유지기법을 제안한다. 제안하는 기법은 AOMDV를 기반으로 노드의 위치와 이동 정보로 이동되는 방향과 위치를 예측하여 보다 안정적인 경로를 선택할 수 있는 기회를 제공하는 라우팅 기법이다. 또한 AOMDV로 다중경로를 보유하여 데이터의 종류와 특성에 적합한 최적의 경로선택으로 불필요한 경로설정 메시지의 오버헤드를 줄인다.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

A Study on the Tasks for the Preparation Process and Application of Faith Education Related to Experience (경험과 관련된 신앙교육 수업 준비과정과 적용을 위한 과제 연구)

  • Han, Kyoung-mi
    • Journal of Christian Education in Korea
    • /
    • v.70
    • /
    • pp.207-238
    • /
    • 2022
  • Faith education focuses on 'changing the direction of life' that pursues the life of Christ. This is possible only when the message of the Bible is embodied in life, not by accumulating biblical knowledge. Today, however, faith education does not allow biblical messages to be embodied in life. This is the result of focusing on knowing the Bible itself, instead of guiding the faith education to meet the Bible and the experience of human life. Church education emphasized the inner faith of individuals rather than changes in life and practice, preparing for the afterlife, and mostly for the training and quantitative growth of the church. As a result, in the COVID-19 era, Protestants showed an immature appearance that only cared about the safety of the church, and social trust in Protestants was lost. Therefore, faith education should educate what life of the Bible and the experiences of the learner will meet and respond to God in order for the Bible's message to be realized in life. I tried to find out how to prepare for this faith education in detail. So I would like to look at "The preparation process for religious classes related to experience" compiled by the German Protestant Lutheran Bavarian Presbyterian Church and present tasks for application to the Korean Church. Preparation for experience-related religious classes consists of five courses. It is a personal meeting, a theological orientation, a pedagogical orientation, a pedagogical decision, and a summary of the progress plan. The main purpose of this process is to learn how biblical believers interpreted their experiences in life from the perspective of faith and tried to overcome the problem. Faith education related to experience deals with the essence of faith education, not one of the Bible teaching methods. Although the field of education is in the social change of expanding from the real world to the virtual world, the essential nature of faith education cannot change. Therefore, research and application of faith education related to experience in Korean churches will help the biblical message to be embodied in Christian life.

Design of a Service Broker for Large Scale Connections to Support Pubsub QoS between TOS and Mobile Devices (TOS와 Mobile device 간의 펍섭 QoS를 지원하는 대량 커넥션 서비스 브로커 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.137-142
    • /
    • 2016
  • A two-step open system(TOS) was proposed to relay between a healing platform and a repository of personal health documents. TOS was designed by taking into consideration the pubsub service based on large scale connections to monitor a provider's access/request process for health documents in real time. TOS, however, uses WebSocket as a communication protocol in case of pubsub. Given the operational environment of low quality wireless networks for mobile devices that are user terminals in a healing platform, there is a need to add a messaging protocol to support QoS as well as a transmission protocol. As a light messaging protocol optimized for mobile devices, MQTT defines reliable messaging QoS to consider a wireless network situation of low speed/low quality. This study designed an MQTT protocol-based message broker to support QoS in case of large scale connections and pubsub by taking into consideration mobile devices that are user terminals in a healing platform. After designing a model between TOS and MQTT message broker, the study implemented a prototype based on the proposed design and compared it with its counterparts from previous studies based on the performance indicators in a load-test with the MQTT client tool.

Timestamps based sequential Localization for Linear Wireless Sensor Networks (선형 무선 센서 네트워크를 위한 시각소인 기반의 순차적 거리측정 기법)

  • Park, Sangjun;Kang, Jungho;Kim, Yongchul;Kim, Young-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1840-1848
    • /
    • 2017
  • Linear wireless sensor networks typically construct a network topology with a high reliability through sequential 1:1 mapping among sensor nodes, so that they are used in various surveillance applications of major national infrastructures. Most existing techniques for identifying sensor nodes in those networks are using GPS, AOA, and RSSI mechanisms. However, GPS or AOA based node identification techniques affect the size or production cost of the nodes so that it is not easy to construct practical sensor networks. RSSI based techniques may have a high deviation regrading location identification according to propagation environments and equipment quality so that complexity of error correction algorithm may increase. We propose a timestamps based sequential localization algorithm that uses transmit and receive timestamps in a message between sensor nodes without using GPS, AOA, and RSSI techniques. The algorithms for distance measurement between each node are expected to measure distance within up to 1 meter in case of an crystal oscillator of 300MHz or more.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

Efficient Self-Healing Key Distribution Scheme (효율적인 Self-Healing키 분배 기법)

  • 홍도원;강주성;신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.141-148
    • /
    • 2003
  • The self-healing key distribution scheme with revocation capability proposed by Staddon et al. enables a dynamic group of users to establish a group key over an unreliable network, and has the ability to revoke users from and add users to the group while being resistant to collusion attacks. In such a protocol, if some packet gets lost, users ale still capable of recovering the group key using the received packets without requesting additional transmission from the group manager. In this scheme, the storage overhead at each group member is O($m^2$1og p) and the broadcast message size of a group manager is O( ((m$t^2$+mt)log p), where m is the number of sessions, t is the maximum number of colluding group members, and p is a prime number that is large enough to accommodate a cryptographic key. In this paper we describe the more efficient self-healing key distribution scheme with revocation capability, which achieves the same goal with O(mlog p) storage overhead and O(($t^2$+mt)log p) communication overhead. We can reduce storage overhead at each group member and the broadcast message size of the group manager without adding additional computations at user's end and group manager's end.