• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.033 seconds

Study on Context-Aware SOA based on Open Service Gateway initiative platform (OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구)

  • Choi, Sung-Wook;Oh, Am-Suk;Kwon, Oh-Hyun;Kang, Si-Hyeob;Hong, Soon-Goo;Choi, Hyun-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2083-2090
    • /
    • 2006
  • In an proposed Context-Aware SOA(Service Oriented Architecture) based OSGi(Open Service Gateway initiative) platform, Service provider manages relative kinds of services in an integrative basis from various sensors, puts each service in a SOAP (Simple Object access Protocol) message, and register thorn to the UDDI(Universal Description Discovery and Integration) server of service registry, service requester retrivel the specified kinds of services and call them to service provider. Recently most context-aware technologies for ubiquitous home network are mainly putting emphasis on RFID/USN and location-based technology. Because of this, service-oriented architecture researches have not been made enough. Under the environment of an OSGi service platform, various context-aware services are dynamically mapping from various sensors, new services are being offered for the asking of users, and existing services are changing. Accordingly, the data sharing between services provided, management of service life cycle, and the facilitation of service distribution are needed. Taking into considering all these factors, this study has suggested an Context-Aware SOA based eclipse SOA Tools Platform using OSGi platform that can transaction throughtput of more than 546 TPS of distributional Little's Law from ATAM(Architecture Tradeoff Analysis Method) while remaining stable other condition.

A Performance Monitoring System for Heterogeneous SOAP Nodes (이기종 SOAP 노드의 실시간 성능 모니터링 시스템)

  • Lee Woo-Joong;Kim Jungsun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.484-498
    • /
    • 2004
  • In this paper. we propose a novel performance monitoring scheme for heterogeneous SOAP nodes. The scheme is basically based on two-level (kernel-level and user-level) packet filtering of TCP flows. By TCP flow, we mean a sequence of raw packet streams on a TCP transaction. In this scheme, we detect and extract SOAP operations embedded in SOAP messages from TCP flows. Therefore, it becomes possible to monitor heterogeneous SOAP nodes deployed on diverse SOAP-based middlewares such as .Net and Apache AXIS. We present two implementation mechanisms for the proposed scheme. The first mechanism tries to identify SOAP operations by analyzing all fragmented SOAP messages on TCP flows. However, a naive policy would incur untolerable overhead since it needs to copy all packets from kernel to user space. The second mechanism overcomes this problem by selectively copying packets from kernel to user space. For selective copying, we use a kernel-level packet filtering method that makes use of some representative TCP flags.(e.g. SIN, FIN and PSH). In this mechanism, we can detect SOAP operations only from the last fragment of SOAP messages in most cases. Finally, we implement a SOAP monitoring system using a component ca]led SOAP Sniffer that realizes our proposed scheme, and show experimental results. We strongly believe that our system will play a vital role as a tool for various services such as transaction monitoring and load balancing among heterogeneous SOAP nodes.

Intelligence e-Learning System Supporting Participation of Students based on Face Recognition (학습자 참여를 유도하기 위한 얼굴인식 기반 지능형 e-Learning 시스템)

  • Bae, Kyoung-Yul;Joung, Jin-Oo;Min, Seung-Wook
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • e-Learning education system as the next educational trend supporting remote and multimedia education. However, the students stay mainly at remote place and it is hard to certificate whether he is really studying now or not. To solve this problem, some solutions were proposed such as instructor's supervision by real time motion picture or message exchanging. Unhappily, as you can see, it needs much cost to establish the motion exchanging system and trampling upon human rights could occasion to reduce the student's will. Accordingly, we propose the new intelligent system based on face recognition to reduce the system cost. The e-Learning system running on the web page can check the student's status by motion image, and the images transfer to the instructor. For this study, 20 students and one instructor takes part in capturing and recognizing the face images. And the result produces the prevention the leave of students from lecture and improvement of attention.

  • PDF

Average Data Rate Analysis for Data Exchanging Nodes via Relay by Concurrent Transmission (데이타 교환 노드의 동시 전송 릴레이 이용을 위한 평균 데이터 전송률 분석)

  • Kwon, Taehoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.638-644
    • /
    • 2018
  • Relay systems have recently gained attentions because of its capability of cell coverage extension and the power gain as the one of key technologies for 5G. Relays can be exploited for small-cell base stations and the autonomous network, where communication devices communicate with each other cooperatively. Therefore, the relay technology is expected to enable the low power and large capacity communication. In order to maximize the benefits of using a limited number of relays, the efficient relay selection method is required. Especially, when two nodes exchange their data with each other via relay, the relay selection can maximize the average data rate by the spatial location of the relay. For this purpose, the average data rate is analyzed first according to the relay selection. In this paper, we analyzed the average data rate when two nodes exchange their data via dual-hop decode and forward relaying considering the interference by the concurrent transmission under Nakagami-m fading channel. The correctness of the analysis is verified by the Monte Carlo simulation. The results show that the concurrent transmission is superior to the non-concurrent transmission in the high required data rate region rather than in the low required data rate region.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Development of Code-PPP Based on Multi-GNSS Using Compact SSR of QZSS-CLAS (QZSS-CLAS의 Compact SSR을 이용한 다중 위성항법 기반의 Code-PPP 개발)

  • Lee, Hae Chang;Park, Kwan Dong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.521-531
    • /
    • 2020
  • QZSS (Quasi-Zenith Satellite System) provides the CLAS (Centimeter Level Augmentation Service) through the satellite's L6 band. CLAS provides correction messages called C-SSR (Compact - State Space Representation) for GPS (Global Positioning System), Galileo and QZSS. In this study, CLAS messages were received by using the AsteRx4 of Septentrio which is a GPS receiver capable of receiving L6 bands, and the messages were decoded to acquire C-SSR. In addition, Multi-GNSS (Global Navigation Satellite System) Code-PPP (Precise Point Positioning) was developed to compensate for GNSS errors by using C-SSR to pseudo-range measurements of GPS, Galileo and QZSS. And non-linear least squares estimation was used to estimate the three-dimensional position of the receiver and the receiver time errors of the GNSS constellations. To evaluate the accuracy of the algorithms developed, static positioning was performed on TSK2 (Tsukuba), one of the IGS (International GNSS Service) sites, and kinematic positioning was performed while driving around the Ina River in Kawanishi. As a result, for the static positioning, the mean RMSE (Root Mean Square Error) for all data sets was 0.35 m in the horizontal direction ad 0.57 m in the vertical direction. And for the kinematic positioning, the accuracy was approximately 0.82 m in horizontal direction and 3.56 m in vertical direction compared o the RTK-FIX values of VRS.

The Use and Degree of Discomfort of Informatization Device Among the Elderly According to the Disabilities (장애여부에 따른 노인의 정보화기기 사용 및 불편함)

  • Kim, Hee-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.8
    • /
    • pp.327-335
    • /
    • 2021
  • The purpose of this study is to find out the use and inconvenience of informatization devices according to the disability of the elderly. A total 10,097 data from the elderly survey were used to analyze the differences in the possession and use of information devices, usage capabilities, and injustice according to disability. Descriptive analysis was conducted to find out general characteristics and disability-related characteristics. chi-square tests were conducted to find out the difference in informatization and communication device usage ability and information device usage inconvenience according to disability. The p-value was set at 0.001. As a result of the study, the elderly with disabilities in Korea had lower smartphones and tablet PCs than the non-disabled elderly. In terms of daily inconvenience, the elderly with disabilities often responded that they had no experience or did not know about the inconvenience of online reservations for trains/high-speed buses/intercity buses, ordering kiosks at restaurants, using ATMs, or reducing bank stores. Taken together, the ability of the elderly with disabilities in Korea to possess and use informatization devices is very low and they feel more inconvenience than the non-disabled elderly. It is necessary to improve the ability to possess and use informatization devices for the elderly with disabilities in the rapidly progressing aging of the disabled and the informatization of our society.

EC-RPL to Enhance Node Connectivity in Low-Power and Lossy Networks (저전력 손실 네트워크에서 노드 연결성 향상을 위한 EC-RPL)

  • Jeadam, Jung;Seokwon, Hong;Youngsoo, Kim;Seong-eun, Yoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.41-49
    • /
    • 2022
  • The Internet Engineering Task Force (IETF) has standardized RPL (IPv6 Routing Protocol for Low-power Lossy Network) as a routing protocol for Low Power and Lossy Networks (LLNs), a low power loss network environment. RPL creates a route through an Objective Function (OF) suitable for the service required by LLNs and builds a Destination Oriented Directed Acyclic Graph (DODAG). Existing studies check the residual energy of each node and select a parent with the highest residual energy to build a DODAG, but the energy exhaustion of the parent can not avoid the network disconnection of the children nodes. Therefore, this paper proposes EC-RPL (Enhanced Connectivity-RPL), in which ta node leaves DODAG in advance when the remaining energy of the node falls below the specified energy threshold. The proposed protocol is implemented in Contiki, an open-source IoT operating system, and its performance is evaluated in Cooja simulator, and the number of control messages is compared using Foren6. Experimental results show that EC-RPL has 6.9% lower latency and 5.8% fewer control messages than the existing RPL, and the packet delivery rate is 1.7% higher.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

LAN Based MFD Interface for Integrated Operation of Radio Facilities using Fishery Vessel (어선용 무선설비의 통합운용을 위한 LAN 기반 MFD 인터페이스)

  • In-ung Ju;In-suk Kang;Jeong-yeon Kim;Seong-Real Lee;Jo-cheon Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.6
    • /
    • pp.496-503
    • /
    • 2022
  • In the reality that the fishing population is decreasing and the single-man fishing vessels is increasing, mandatory equipment for navigation and radio equipments for the safety of fishing boats has continued to be added. Therefore, many equipment such as navigation, communication and fishing are installed in the narrow steering room, so it is very confusing and a number of monitors are placed in the front, which is a factor that degrades the function of maritime observation. To solve this problem, we studied an interface that integrates and operates to major radio facilities such as very high frequency-digital selective calling equipment (VHF-DSC), automatic identification system (AIS) and fishing boat location transmission device (V-pass) into one multi function display (MFD) based on LAN. In addition, IEC61162-450 UDP packets and IEC61162 sentence were applied to exchange data through link between MFD and radio equipments, and additional messages needed for each equipment and function were defined. The integrated MFD monitor is easily operated by the menu method, and the performance of the interface was evaluated by checking the distress and emergency communication functions related to maritime safety and the message transmission status by equipment.