• Title/Summary/Keyword: 접속 정보

Search Result 3,012, Processing Time 0.031 seconds

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

M-Learning Application for Ubiquitous Learning Based on Android Web Platform (안드로이드 웹 플랫폼 기반 U-Learning을 위한 M-Learning 애플리케이션)

  • Kim, Hye-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5564-5569
    • /
    • 2011
  • In this paper we introduced Augmented Reality (AR) on Android platform for ubiquitous learning (u-learning). Android is breaking new ground for mobile computing and open technologies. Android is versatile as it is not limited only to mobile phones, but it can be installed on various devices. Android gives developers the opportunity to leverage their development skills, while also building an exciting and active community. Augmented Reality (AR) is going to be the future of most apps; all it takes is a decent processor, a camera, a compass and a GPS, all of which are becoming increasingly common on smart phones. Through AR we can have educational tools that provide individuals with total flexibility to receive, send, and review training and detailed product information through an increasingly ubiquitous web-enabled communication device. In this paper, we proposed Augmented Reality for Species Identification using Android Smartphone with augmented reality in species determination. This study is appropriate in the field of Biology. This is useful in outdoor experimental activities of the students. Like for example while they are visiting the zoo, botanical garden and etc.

Integrated Management System for Vehicle CCTV Video Using Reverse Tunneling (리버스 터널링을 이용한 차량용 CCTV 영상 통합 관리 시스템)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • The development of ICT technology has a huge impact on the existing closed CCTV security equipment market. With the importance of video data particularly highlighted in areas such as self-driving cars, unmanned vehicles and smart cities, various technologies using video are emerging. In this paper, we proposed a method to transmit videos and metadata as a part of smart city integration, and to solve the traffic, environment and security problems caused in urban life by utilizing the metadata instead of using CCTV videos for simple recording purposes, and reverse tunneling technique was designed and implemented as a method for accessing CCTV videos for vehicles from remote locations. Integrated management of CCTV videos and metadata for vehicles that have been used only for limited purposes in closed environments will enable efficient operation of integrated centers in real time required by smart cities, such as vehicle status check, road conditions and facility management.

Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment (Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜)

  • Lee, Young sook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Recently, the use of sensor devices is gradually increasing. As various sensor device emerge and the related technologies advance, there has been a dramatic increase in the interest in heterogeneous wireless sensor networks (WSNs). While sensor device provide us many valuable benefits, automatically and remotely supported services offered and accessed remotely through WSNs also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication among the involved parties: users, sensors and gateways. An user authentication protocol for wireless sensor networks is designed to restrict access to the sensor data only to user. In 2019, Chen et al. proposed an efficient user authentication protocol. However, Ryu et al. show that it's scheme still unstable and inefficient. It cannot resist offline password guessing attack and session key attack. In this paper, we propose an improved protocol to overcome these security weaknesses by storing secret data in device. In addition, security properties like session-key security, perfect forward secrecy, known-key security and resistance against offline password attacks are implied by our protocol.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

Design and Effect Analysis of Confederation Interface for ROK-US Combined Exercises (한미 연합연습 모의지원을 위한 다중 페더레이션 인터페이스 설계 및 효과분석)

  • Won, Kyoungchan;Jeong, Sukjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.498-506
    • /
    • 2018
  • Recently, the US commanded a wargame simulation system of a combined ROK-US exercise with single federation. However, after the OPCON transfer, many limitations to the single federation have been cited such as security policies and information protection. We suggest a hierarchical federation as a way to overcome these problems. Regarding HLA rules, the participants use the same FOM and RTI in single federation. There are limitations to implement CI in applying heterogeneous FOMs and RTIs in current single federation. Therefore, we propose implementing CI with heterogeneous FOMs and RTIs in a hierarchical federation. This system overcomes the weaknesses of the system structure, which is a disadvantage of the single federation. In the federation test, we can apply heterogeneous FOMs and RTIs and achieve similar performance to the current combined exercise simulation. In conclusion, ROK should lead the simulation system of combined exercises using the CI after the OPCON transfer.

Online Fitting service Study -Focusing on Interface design (온라인 피팅서비스 디자인 연구 -인터페이스 디자인을 중심으로)

  • Kim, Ryu-Hee;Yang, Sung-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.147-154
    • /
    • 2021
  • This study focused on the fitting window structure provided by the virtual fitting service web page. We analyzed the current cases and identified the user's needs for the service through usability assessment, survey, and FGI experiments. As a result of the design, the fitting window of the existing web page was opened at the same time as the site was accessed to improve the hassle of using the icons due to their small size and poor visibility. In the case of fitting windows, the problem of information delivery was supplemented so that even the initial user could understand the fitting map of the existing method, and additional items needed for user propensity were provided so that the service could be used accurately and easily. As a result of this study, it can be used as a basic research material in future virtual fitting service studies and is expected to provide good implications to fashion marketers.

NOMA Transmission Scheme using MU-MIMO and STBC (MU-MIMO와 STBC를 적용한 NOMA 전송 기법)

  • Bangwon, Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • In order to improve a total system throughput when a base station (BS) transmits data to user equipments (UEs), we propose a scheme to apply multiuser multiple-input multiple-output (MU-MIMO), space-time block coding (STBC), and non-orthogonal multiple access (NOMA) together. An MU-MIMO is applied to two UEs near the BS and STBC is applied to a UE far from the BS because of the difficulty of obtaining the channel information. Also NOMA is applied to differentiate the data from the near UE and the far UE. Two orthognal precoding vectors are used for the MU-MIMO UEs and it causes no interference between them. The STBC technique with the two procoding vectors are also used for the far UEs. Through performance analysis and simulation, we show that the proposed scheme has higher total system throughput than the conventional ones.

A Study on Backend as a Service for the Internet of Things (사물인터넷을 위한 백앤드 서비스에 관한 연구)

  • Choi, Shin-Hyeong
    • Advanced Industrial SCIence
    • /
    • v.1 no.1
    • /
    • pp.23-31
    • /
    • 2022
  • Cloud services, which started in the early 2000s as a method of using idle servers, are more active with the advent of the 4th industrial revolution, and are being used in many fields as an optimal platform that can be used for business by collecting and analyzing data. On the other hand, the Internet of Things is an environment in which all surrounding objects can freely connect to the Internet network anytime and anywhere to transmit sensed data. In the Internet of Things, data is transmitted in real time, so BaaS, that is, a cloud service for data only has been added. In this paper, among BaaS services for the Internet of Things, a back-end service method that manages data based on Parse Server is explained, and a service that helps patients in rehabilitation is presented using this. For this, a Raspberry Pi is used as a hardware environment, and it is connected to the Internet, collects patient movement information in real time, and manages it through the Parse Server.