• Title/Summary/Keyword: 이동 로그

Search Result 203, Processing Time 0.023 seconds

A Study on the Realtime Wireless Remote Control Systems (실시간 무선 원격 제어 시스템에 관한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.63-69
    • /
    • 2009
  • The decentralized and open characteristic of the internet, along with the mobility and portability of mobile communication, and the interactivity of the internet and mobile communications all have been grafted to enable the creation of wireless internet in our lives, bringing about a lot of change. However, existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for realtime control. The implemented real time wireless remote control system provides remote server management functions, error or event message functions, log record functions, authentication function via mobile devices and system performance evaluation function classified by client transaction.

HVS Model-based Watermarking Robust to Lossy Compression, Cropping, and Scaling (유손실 압축, 잘라내기 및 신축에 대해 견고한 HVS 모델 기반 워터마킹)

  • Hong, Su-Gi;Jo, Sang-Hyeon;Choe, Heung-Mun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.548-555
    • /
    • 2001
  • In this paper, we proposed a HVS(human visual system) model-based digital image watermarking which is not only invariant to rotation and translation but also more robust to lossy compression, cropping, and scaling as compared to the conventional method. Fourier transform and log-polar mapping is used to make the proposed algorithm invariant to rotation and translation, and in addition, watermark energy is embedded maximally based on spatial frequency sensitivity of HVS without the deterioration of the invisibility. As a result, the robustness of watermarking is improved both in general image processing operations such as cropping, low pass filtering, and lossy compression and in geometrical transforms such as rotation, translation, and scaling. And, by disjoint embedding of the watermark and the template without intersection, the deterioration of invisibility and robustness is prevented. Experimental results show that proposed watermarking is about 30~75 [%] more robust af compared to the conventional methods.

  • PDF

Mobile Client-Server System for Realtime Continuous Query of Moving Objects (이동 객체의 실시간 연속 질의를 위한 모바일 클라이언트-서버 시스템)

  • Joo, Hae-Jong;Park, young-Bae;Choi, Chang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.289-298
    • /
    • 2006
  • Many researches are going on with regard to issues and problems related to mobile database systems, which are caused by the weak connectivity of wireless networks, the mobility and the portability of mobile clients. Mobile computing satisfies user's demands for convenience and performance to use information at any time and in any place, but it has many problems to be solved in the aspect of data management. The purpose of our study is to design Mobile Continuous Query Processing System(MCQPS) to solve problems related to database hoarding, the maintenance of shared data consistency and the optimization of logging, which are caused by the weak connectivity and disconnection of wireless networks inherent in mobile database systems under mobile client server environments. We proved the superiority of the proposed MCQPS by comparing its performance to the C I S(Client-Intercept-Slaver) model. In Addition, we experiment on proposed index structure and methodology in various methods.

  • PDF

The Development of Users' Interesting Points Analyses Method and POI Recommendation System for Indoor Location Based Services (실내 위치기반 서비스를 위한 사용자 관심지점 탐사 기법과 POI추천 시스템의 구현)

  • Kim, Beoum-Su;Lee, Yeon;Kim, Gyeong-Bae;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.81-91
    • /
    • 2012
  • Recently, as location-determination of indoor users is available with the development of variety of localization techniques for indoor location-based service, diverse indoor location based services are proposed. Accordingly, it is necessary to develop individualized POI recommendation service for recommending most interested points of large-scale commercial spaces such as shopping malls and departments. For POI recommendation, it is necessary to study the method for exploring location which users are interested in location with considering user's mobility in large-scale commercial spaces. In this paper, we proposed POI recommendation system with the definition of users' as 'Stay point' in order to consider users' various interest locations. By using the proposed algorithm, we analysis users' Stay points, then mining the users' visiting pattern to finished the proposed. POI Recommendation System. The proposed system decreased data more dramatically than that of using user's entire mobility data and usage of memory.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Outage Probability Analysis for Mobile Radio System Added Background Noise in Urban Area (배경잡음이 부가된 도심지역 이동무선시스템의 Outage 확률분석)

  • Shin, Kwan-Ho;Kim, Hae-Ki;Ahn, Chi-Hoon;Kim, Nam;Jeon, Hyung-Ku
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.9 no.4
    • /
    • pp.462-472
    • /
    • 1998
  • In this paper, considering the Rayleigh fading, the lognormal shadowing, and the man-made noise which is occurred in urban area randomly, the mobile radio channel and the radio propagations are analyzed. The system affected by the noise is compared to other modelings. The fading, shadowing, and background noise are wholly considered to evaluate the mobile radio propagation effectively. For N=0.000001, the outage probability in the absence of noise is $5.264{times}10^{-6}$, in the fading only $3.1796{times}10^{-4}$, and in the presence of noise $6.0{\times}10^{-3}$. The analysis with the presence of noise is very important for the performance evaluation of mobile radio system.

  • PDF

Demand analysis on new Mobile Telecommunication Terminal using Conjoint analysis and Mixed logit (컨조인트 분석과 혼합 로짓 모형을 이용한 차세대 무선 이동 통신 단말기의 수요 분석)

  • 김연배;이정동;고대영
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.67-85
    • /
    • 2003
  • 본 논문에서는 최근 통신 산업에서 중요한 쟁점으로 떠오르고 있는 단말기 무선이동 통신 단말기의 발전 방향을 소비자 선호에 기반하여 살펴보았다. 소비자 선호 정보를 얻기 위하여 컨조인트(conjoint) 분석 방법이 사용되었다. 컨조인트 방법은 가상의 대안들에 대한 응답자의 진술 선호에 기반을 두기 때문에 미래의 무선 이동통신 단말기에 대해 분석하는데 적합한 방법이다. 컨조인트 방법을 위한 설문은 대한민국 서울에서 445 명의 성인남녀를 대상으로 행해졌다. 소비자의 이질적인 선호를 알기 위해 혼합 로짓(mixed legit) 모형을 사용하였다. 추정은 최근 새로운 시뮬레이션 기법으로 떠오르고 있는 베이지안(Bayesian) 방법을 이용하였다. 선호의 분포 가정으로 기존의 일관적인 정규 분포 가정과 달리 가격 계수를 위하여 로그 정규(lognormal) 분포, 하이퀄리티 인터넷 특성과 PC 프로그램 호환 가능 여부의 계수들에 대해서 잘린 정규(censored normal) 분포를 가정 하였다. 추정 결과 무선 이동 통신 단말기의 각 속성들에 대한 응답자들간 선호가 크게 차이 나는 것을 알 수 있었다. 화면 크기의 경우에는 대부분의 소비자들이 현재 일반적인 핸드폰보다는 큰 화면을 선호한다는 것과 휴대성을 상당히 고려한다는 것을 간접적으로 알 수 있었다. 또한, 소비자들이 무선 이동 통신 단말기가 휴대 인터넷과 PC 프로그램 호환이 가능한지 여부에는 대부분 무관심하다는 것을 알 수 있었다. 본 논문의 결과는 차세대 무선 이동 통신 단말기의 속성 조합 시 고려해야 할 점과 휴대 인터넷 서비스의 방향에 대해 시사점을 줄 수 있을 것이다.각 73.44±0.87%, 72.88±0.25%의 함량이였다. 운동사육시간이 길어질수록 운동사육구에서는 수분함량이 운동5일째에는 73.56±0.22%였으며, 운동 20일에는 75.88±0.94%로 초기수분함량보다는 3%정도 증가하였다. 반면, 비운동사육구에서는 큰 변화를 나타내고 있지 않았다(p<0.05). 운동과 비운동시킨 참돔의 지질 함량의 변화는 운동시킨 참돔은 운동으로 인한 에너지 소비로 인하여 함량이 유의적으로 감소했으며(r=-0.35), 비운동사육구에서는 절식으로 인하여 지질함량이 감소하였다(r=-0.38). 파괴강도와 가장 밀접한 영향을 가지는 콜라겐은 운동과 비운동 모두 사육기간동안 큰 변화는 보이지 않았다. 초기의 파괴강도값은 1.45±0.02kg(운동사육구), 1.36±0.18kg(비운동사육구)이였으며 사육기간동안 운동사육구는 파괴강도값이 증가한 반면, 비운동수조에서는 참돔의 파괴강도는 사육기간동안 큰 유의차가 없었다. 각 성분간의 상관도를 살펴보면, 수분함량과 파괴강도는 상관성을 가졌으며, 지질함량과 파괴강도도 같은 경향은 나타내었다. 운동기간동안의 파괴강도와 콜라겐 사이에는 상관성의 거의 없었다. 이는 운동기간에 따른 파괴강도의 증가가 콜라겐의 함량의 증가보다는 지질함량의 감소와 수분함량의 증가와 같은 성분과의 상관성이 크다고 판단된다. 다음으로는, 운동횟수에 의한 영향으로써 운동시간을 1일 6시간으로 설정하여, 운동횟수를 결정하기 위하여 오전, 오후에 각 3시간씩 운동시키는 방법과 오전부터 6시간동안 운동시키는 두 방법을 이용하여 품질을 비교하였다. 각 조건에 따라 운동시킨 참돔의 수분함량을 나타낸 것으로, 2회(오전

  • PDF

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

Personalized Recommendation of Mobile Phone Wireless Service Based on Collaborative Filtering with Clustering of Base Station (협업 필터링 기반의 휴대폰 무선 서비스추천을 위한 기지국 군집분석과 검증)

  • Kang, Ju-Young;Kim, Hyun-Ku;Park, Sang-Un
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.2
    • /
    • pp.1-18
    • /
    • 2010
  • Mobile Communication Companies are trying to increase data services rather than telephone communication services that already became saturated as the competition of mobile communication market gets intensified. However, it is hard and time-consuming for customers to find desired mobile phone wireless services because of the limitation of screen and speed of the mobile phone. Therefore, the market does not grow rapidly as mobile communication companies expected. In our research, we suggest a personalized wireless service recommendation system that considers each individual context by using geographic information and wireless internet usage logs to overcome the mentioned problems. In order to design and implement the system, we conducted clustering analysis on base stations and real service usage logs of each base station, and suggested a personalized recommendation system based on collaborative filtering that uses the clustering results. Moreover, we verified the performances of our system with experiments.

Analyzing Exceptions for Embedded System Software Development using Aspect Oriented Programming (임베디드 시스템 소프트웨어 개발을 위한 관점지향프로그래밍 방식의 예외원인분석)

  • Ju, Jae-Ho;Kim, Tae-Hyung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.355-359
    • /
    • 2009
  • When an unexpected software exception arises, we programmers are to analyze what causes it. Precisely speaking, we need to analyze the cause and property of the unexpected exception. But if exceptions arise irregularly from unknown causes, it is even more difficult for us to handle them, especially in embedded system like mobile phone software development. In this paper, we propose a debugger-friendly analyzing method for exceptions using aspect oriented programming technique. What we need to know upon arising exceptions is the function call history in order to identify the reason for the exceptions. Since programmers used to spend their debugging time on unidentified exceptions, which arise irregularly our method would greatly improve the embedded software development productivity.