• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,149, Processing Time 0.035 seconds

A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment (대용량 네트워크 환경에서 익명 네트워크 탐지 및 효과적 대응전략에 관한 연구)

  • Seo, Jung-woo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.667-678
    • /
    • 2016
  • Due to a development of the cable/wireless network infra, the traffic as big as unable to compare with the past is being served through the internet, the traffic is increasing every year following the change of the network paradigm such as the object internet, especially the traffic of about 1.6 zettabyte is expected to be distributed through the network in 2018. As the network traffic increases, the performance of the security infra is developing together to deal with the bulk terabyte traffic in the security equipment, and is generating hundreds of thousands of security events every day such as hacking attempt and the malignant code. Efficiently analyzing and responding to an event on the attack attempt detected by various kinds of security equipment of company is one of very important assignments for providing a stable internet service. This study attempts to overcome the limit of study such as the detection of Tor network traffic using the existing low-latency by classifying the anonymous network by means of the suggested algorithm about the event detected in the security infra.

A Study on MAC Protocol for Packet Data Services in Next-Generation Wireless Networks (차세대 무선망에서 패킷 데이터 서비스를 위한 MAC 프로토콜 연구)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1115-1120
    • /
    • 2004
  • In this paper, a CSSMA/AI MAC protocol for data services in packet CDMA network is presented. The main features of this protocol are the code status sensing and code reservation for reducing the packet collision. The base station broadcasts the code status on a frame-by-frame basis just before the beginning of each preamble transmission, and the mobile station transmits a preamble for reserving a randomly selected code based on the received code status. After having transmitted the preamble, the mobile station listens to the downlink of the selected code and waits for the base station reply. If this reply indicates that the code has been correctly acquired, it continues the packet transmission for the rest of the frame. If there are other packets waiting for transmission, the base station broadcasts the status of the code as reserved, and the mobile station transmits a packet on a reserved code for the successive frames.

RFID Technology based VIP Channel Management (RFID 기술을 이용한 VIP 고객 접점 관리)

  • Ro, Kwang-Hyun;Kim, Hyung-Su
    • CRM연구
    • /
    • v.2 no.2
    • /
    • pp.41-51
    • /
    • 2009
  • VIP marketing has recently become the main concern in the field of marketing, which could increase customer loyalty and sales through providing customers in the top 20% with customized services. In this study, some cases of RFID (Radio Frequency Identification) technology based VIP channel management are introduced and analyzed in the technology point of view. As a result of case studies, it has been shown what the companies may consider when applying RFID technology in customer relationship management (CRM) and its general scenario. As one of the AIDC(Automatic Identification and Data Capture) technologies, RFID can enable to identify humans or objects with radio frequency and is being widely used to many industrial areas such as logistics, delivery, inventory management, and so on. If this technology is applied to CRM as a new channel for customer management, it will be possible to provide an individual customer with various types of intelligent services customized to his or her spending habits. RFID for CRM channel management is still in its early stages, but it is sure that RFID technology will be an useful tool to manage customers including especially VIP in many businesses and capture important information applicable to marketing campaign in the near future.

  • PDF

Probabilistic Method to reduce the Deviation of WPS Positioning Estimation (WPS 측위 편차폭을 줄이기 위한 확률적 접근법)

  • Kim, Jae-Hoon;Kang, Suk-Yon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7B
    • /
    • pp.586-594
    • /
    • 2012
  • The drastic growth of mobile communication and spreading of smart phone make the significant attention on Location Based Service. The one of most important things for vitalization of LBS is the accurate estimating position for mobile object. Focusing on AP's probabilistic position estimation, we develop an AP distribution map and new pattern matching algorithm for position estimation. The developed approaches can strengthen the advantages of Radio fingerprint based Wi-Fi Positioning System, especiall on the algorithms and data handling. Compared on the existing approaches of fingerprint pattern matching algorithm, we achieve the comparable higher performance on both of average error of estimation and deviation of errors. Furthermore all fingerprint data have been harvested from the actual measurement of radio fingerprint of Seoul, Kangnam area. This can approve the practical usefulness of proposed methodology.

Design and Evaluation of Fast-Handover Mechanism Between Hetrogeneous Networks Considering the Location Management in PMIPv6 (PMIPv6에서의 위치관리기법을 고려한 이 기종 망간의 Fast Handover 기법 설계 및 평가)

  • Shim, JaeSung;Park, SeokCheon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.219-228
    • /
    • 2012
  • As the wireless Internet become more widely accessible, variety of Internet services can be used without limitation of location. However, existing mobility management methods such as MIP and PMIP of IETF requires the load of heavy protocol stack on the mobile nodes or the addition of components such as LMA and MAG. In this paper, we proposed the location management technique in the PMIPv6 and Fast Handover technique. according to the moving pattern of the node, the location management technique proposed in order to adjust the paging area dynamically. The Fast Handover technique applied MIH technology and it reduced the handover signal processing time between heterogeneous network. The location management cost in the environment which the node moves in order to evaluate this and handover delay time was calculate. The proposal technique was efficiently more evaluated than PMIPv6 with the smallest 29% and maximum 83%.

Mobile Ubiquitous Healthcare System Using Wireless Sensor Network (무선센서네트워크 기반의 모바일 유비쿼터스 헬스케어시스템)

  • Shin, Kwang-Sig;Yau, Chiew-Lian;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2107-2112
    • /
    • 2006
  • As growing up of elderly population, the interesting on healthcare system in normal life using W is increasing. An integrated u-healthcare service architecture with IEEE 802.11 and IEEE 802.15.4 based sensor network and code divisi(m multiple access(CDMA) public mobile telecommunication networks was designed and developed. Sensor nodes with electrocardiogram(ECG), body core temperature sensors are attached on the patients' body. The healthcare parameters are transferred to web server via CDMA mobile network or through existed LAN network. The existed LAN network is suggested to be used for continuous monitoring of patient's health status in hospital while mobile networks can be used for general purpose at home or outdoor where infra networks unavailable. This system enable healthcare personal to be able to continuously access, review, monitor and transmit the patients information whereever they are, whenever they want. And immediately check their status by using cellular phone and obtain detail information by communication with medical information server through CDMA. By using this developed integrated u-healthcare service architecture, we can monitor patients' health status for 24 hours.

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

An Exploratory Study on Healthcare Supply Chain Management of Large Hospitals (대형종합병원의 헬스케어 공급망관리 도입에 관한 탐색적 연구)

  • Park, Seong Taek;Kim, Tae Ung;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.145-155
    • /
    • 2019
  • The Healthcare supply chain management has recently attracted attention as a critical tool to improve service quality and reduce healthcare operational cost. Improving large hospital supply chain performance has become increasingly important as healthcare organizations strive to improve the service quality, while reducing the ever-increasing healthcare cost. This paper explores the strategic areas where the traditional supply chain management may enhance the overall performance of the large hospitals. Based on the literature review and relevant case analysis, this paper argues that the visibility, information sharing and standardization are the critical factors for deploying the supply chain principles, and also proposes the supply chain framework for efficient planning and execution, the use of RFID-enabled system for the end-to-end traceability of medical products, and cross-docking system for minimizing the inventory level in the hospital supply chain. Implications of the study findings are discussed.

UAV-MEC Offloading and Migration Decision Algorithm for Load Balancing in Vehicular Edge Computing Network (차량 엣지 컴퓨팅 네트워크에서 로드 밸런싱을 위한 UAV-MEC 오프로딩 및 마이그레이션 결정 알고리즘)

  • A Young, Shin;Yujin, Lim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.437-444
    • /
    • 2022
  • Recently, research on mobile edge services has been conducted to handle computationally intensive and latency-sensitive tasks occurring in wireless networks. However, MEC, which is fixed on the ground, cannot flexibly cope with situations where task processing requests increase sharply, such as commuting time. To solve this problem, a technology that provides edge services using UAVs (Unmanned Aerial Vehicles) has emerged. Unlike ground MEC servers, UAVs have limited battery capacity, so it is necessary to optimize energy efficiency through load balancing between UAV MEC servers. Therefore, in this paper, we propose a load balancing technique with consideration of the energy state of UAVs and the mobility of vehicles. The proposed technique is composed of task offloading scheme using genetic algorithm and task migration scheme using Q-learning. To evaluate the performance of the proposed technique, experiments were conducted with varying mobility speed and number of vehicles, and performance was analyzed in terms of load variance, energy consumption, communication overhead, and delay constraint satisfaction rate.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.