• Title/Summary/Keyword: 이성적 정보처리

Search Result 366, Processing Time 0.03 seconds

Application Traffic Identification Speed Improvement by Optimizing Payload Signature Matching Sequence (페이로드 시그니쳐 매칭 순서 최적화를 통한 응용 트래픽 분류 속도 향상)

  • Lee, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup;Seok, Woojin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.575-585
    • /
    • 2015
  • The traffic classification is a preliminary and essential step for stable network service provision and efficient network resource management. However, the payload signature-based method has significant drawbacks in high-speed network environment that the processing speed is much slower than other methods such as header-based and statistical methods. In addition, as signature numbers are increasing, traffic analysis speed also declines because of signature matching method that does not consider analytic efficiency of each signature and traffic occurrence feature. In this paper, we propose a signature list reordering method in order by analytic value of each signature. When we reordered the signature list by the proposed method, we achieved about 30% improvement in speed of the traffic analysis compared with random signature list.

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

Improvement of Altitude Measurement Algorithm Based on Accelerometer for Holding Drone's Altitude (드론의 고도 유지를 위한 가속도센서 기반 고도 측정 알고리즘 개선)

  • Kim, Deok Yeop;Yun, Bo Ram;Lee, Sunghee;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.10
    • /
    • pp.473-478
    • /
    • 2017
  • Drones require altitude holding in order to achieve flight objectives. The altitude holding of the drone is to repeat the operation of raising or lowering the drone according to the altitude information being measured in real-time. When the drones are maintained altitude, the drone's altitude will continue to change due to external factors such as imbalance in thrust due to difference in motor speed or wind. Therefore, in order to maintain the altitude of drone, we have to exactly measure the continuously changing altitude of the drone. Generally, the acceleration sensor is used for measuring the height of the drones. In this method, there is a problem that the measured value due to the integration error accumulates, and the drone's vibration is recognized by the altitude change. To solve the difficulty of the altitude measurement, commercial drones and existing studies are used for altitude measurement together with acceleration sensors by adding other sensors. However, most of the additional sensors have a limitation on the measurement distance and when the sensors are used together, the calculation processing of the sensor values increases and the altitude measurement speed is delayed. Therefore, it is necessary to accurately measure the altitude of the drone without considering additional sensors or devices. In this paper, we propose a measurement algorithm that improves general altitude measurement method using acceleration sensor and show that accuracy of altitude holding and altitude measurement is improved as a result of applying this algorithm.

A Double Helix DNA Structure Based on the Block Circulant Matrix (I) (블록순환 행렬에 의한 이중나선 DNA 구조 (I))

  • Lee, Sung-Kook;Park, Ju-Yong;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.203-211
    • /
    • 2016
  • The genetic code is a key to bio-informatics and to a science of biological self-organizing on the whole. Modern science faces the necessity of understanding and systematically explaining mysterious features of ensembles of molecular structures of the genetic code. This paper is devoted to symmetrical analysis for genetic systems. Mathematical theories of noise-immunity coding and discrete signal processing are based on Jacket matrix methods of representation and analysis of information. Both of the RNA and Jacket Matrix property also have the Element(Block) - wise Inverse Matrices. These matrix methods, which are connected closely with relations of symmetry, are borrowed for a matrix analysis of ensembles of molecular elements of the genetic code. This method is presented for its simplicity and the clarity with which it decomposes a Jacket Matrix in terms of the genetic RNA Codon.

Enhanced High Contrast Image Rendering Method Using Visual Properties for Sharpness Perception (시각 선명도 감각 특성을 이용한 개선된 고명암 대비 영상 렌더링 기법)

  • Lee, Geun-Young;Lee, Sung-Hak;Kwon, Hyuk-Ju;Sohng, Kyu-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.669-679
    • /
    • 2013
  • When an image is converted from HDR (high dynamic range) to LDR (low dynamic range), a tone mapping process is the essential component. Many TMOs (tone mapping operators) have been motivated by human vision which has lower physical luminance range than that in real scene. The representative of human vision properties which motivate TMOs is the local adaptation. However, TMOs are ultimately compressing image information such as contrast, saturation, etc. and the compression causes defects in image quality. In this paper, in order to compensate the degradation of the image which is caused by TMOs, the visual acuity-based edge stop function is proposed for applying the property of human vision to base-detail separation. In addition, using CSF (contrast sensitivity function) which represents the relationship among spatial frequency, contrast sensitivity, and luminance, the sharpness filter is designed and adaptively applied to the detail layer in regard to surround luminance.

A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1 (CIKS-1 블록 암호에 대한 선택 평문 선형 공격)

  • 이창훈;홍득조;이성재;이상진;양형진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • In this paper, we firstly evaluate the resistance of the reduced 5-round version of the block cipher CIKS-1 against linear cryptanalysis(LC) and show that we can attack full-round CIKS-1 with \ulcorner56-bit key through the canonical extension of our attack. A feature of the CIKS-1 is the use of both Data-Dependent permutations(DDP) and internal key scheduling which consist in data dependent transformation of the round subkeys. Taking into accout the structure of CIKS-1 we investigate linear approximation. That is, we consider 16 linear approximations with p=3/4 for 16 parallel modulo $2^2$ additions to construct one-round linear approximation and derive one-round linear approximation with the probability P=1/2+$2^{-17}$ by Piling-up lemma. Then we present 3-round linear approximation with 1/2+$2^{-17}$ using this one-round approximation and attack the reduced 5-round CIKS-1 with 64-bit block by LC. In conclusion we present that our attack requires $2^{38}$chosen plaintexts with a probability of success of 99.9% and about $2^{67-7}$encryption times to recover the last round key.(But, for the full-round CIKS-1, our attack requires about $2^{166}$encryption times)

A Study on the Management Situation and Improvement Plan of Administrative Documents of University: Focusing on the case of K University (대학 행정기록물 관리현황과 개선방안 - K 대학 사례를 중심으로 -)

  • Seo, Joo-eun;Lee, Seongsin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.171-197
    • /
    • 2021
  • The purpose of this study is to suggest the ways of improving systematic records management based on the results of analyzing the present records management situation of college and department in an university which is operating archives. To achieve the purpose, survey and interview of the persons in charge of producing and managing the administrative documents of college and department were conducted. Furthermore, actual condition investigation of records management of college and department and university archives were analyzed. According to the results of analysis, the following problems were found: 1) lack of sufficient records management by college and department, 2) lack of understanding of tasks by processing staffs, 3) operational problems of university archives. Based on the results, recommendations were made as follows; First, it is necessary to improve an awareness of records management by operating staffs. Second, it is necessary to educate staffs through the development of training programs reflecting the characteristics of the university and set up guidelines for records management by college and department. Third, it is necessary to execute reorganization and supplement the personnel of university archives.

An Energy Efficient Unequal Clustering Algorithm for Wireless Sensor Networks (무선 센서 네트워크에서의 에너지 효율적인 불균형 클러스터링 알고리즘)

  • Lee, Sung-Ju;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.783-790
    • /
    • 2009
  • The necessity of wireless sensor networks is increasing in the recent years. So many researches are studied in wireless sensor networks. The clustering algorithm provides an effective way to prolong the lifetime of the wireless sensor networks. The one-hop routing of LEACH algorithm is an inefficient way in the energy consumption of cluster-head, because it transmits a data to the BS(Base Station) with one-hop. On the other hand, other clustering algorithms transmit data to the BS with multi-hop, because the multi-hop transmission is an effective way. But the multi-hop routing of other clustering algorithms which transmits data to BS with multi-hop have a data bottleneck state problem. The unequal clustering algorithm solved a data bottleneck state problem by increasing the routing path. Most of the unequal clustering algorithms partition the nodes into clusters of unequal size, and clusters closer to the BS have small-size the those farther away from the BS. However, the energy consumption of cluster-head in unequal clustering algorithm is more increased than other clustering algorithms. In the thesis, I propose an energy efficient unequal clustering algorithm which decreases the energy consumption of cluster-head and solves the data bottleneck state problem. The basic idea is divided a three part. First of all I provide that the election of appropriate cluster-head. Next, I offer that the decision of cluster-size which consider the distance from the BS, the energy state of node and the number of neighborhood node. Finally, I provide that the election of assistant node which the transmit function substituted for cluster-head. As a result, the energy consumption of cluster-head is minimized, and the energy consumption of total network is minimized.

A Sludge Collector Selection Model by Life Cycle Cost Analysis (LCC분석에 의한 슬러지수집기 선정 모델)

  • Lee, Seung-Hoon;Woo, Yu-Mi;Lee, Sung-Rak;Koo, Kyo-Jin;Hyun, Chang-Taek;Hong, Tae-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.7 no.6
    • /
    • pp.175-184
    • /
    • 2006
  • This study focused on developing Life Cycle Cost(LCC) analysis model for selecting sludge collectors in wastewater treatment system and applying the model to a case study. Cost items are examined through literature review and historical data of a facility. Analysis period, discount rate, energy cost escalation ratio are assumed to reasonable level. Monetary evaluation is performed using historical data and estimations from vendors. Sensitive analysis is executed using Monte Carlo Simulation for assumed factors. Interviews with operators, vendors, constructors, managers are conducted to define factors which indicates ease of maintenance, ease of delivery, technical performance, efficiency, environmental friendship. Factors are representing technical and social factors. Results from LCC analysis and qualitative analysis are evaluate together with Weighted Matrix Evaluation Methods for optimum alternative of sludge collectors.

A Topographical Classifier Development Support System Cooperating with Data Mining Tool WEKA from Airborne LiDAR Data (항공 라이다 데이터로부터 데이터마이닝 도구 WEKA를 이용한 지형 분류기 제작 지원 시스템)

  • Lee, Sung-Gyu;Lee, Ho-Jun;Sung, Chul-Woong;Park, Chang-Hoo;Cho, Woo-Sug;Kim, Yoo-Sung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • To monitor composition and change of the national land, intelligent topographical classifier which enables accurate classification of land-cover types from airborne LiDAR data is highly required. We developed a topographical classifier development support system cooperating with da1a mining tool WEKA to help users to construct accurate topographical classification systems. The topographical classifier development support system has the following functions; superposing LiDAR data upon corresponding aerial images, dividing LiDAR data into tiles for efficient processing, 3D visualization of partial LiDAR data, feature from tiles, automatic WEKA input generation, and automatic C++ program generation from the classification rule set. In addition, with dam mining tool WEKA, we can choose highly distinguishable features by attribute selection function and choose the best classification model as the result topographical classifier. Therefore, users can easily develop intelligent topographical classifier which is well fitted to the developing objectives by using the topographical classifier development support system.