• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.024 seconds

Color Application on Sign System Typography for Dynamic Expression (색채를 활용한 사인시스템 활자의 동적표현 연구)

  • Park, Seong-Hyeon;Kim, Young-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.250-258
    • /
    • 2007
  • Typography is the combination of language of formative art. It is indeed the core means of human communication through understanding of language and formative values. Studies began on introduction of various techniques to overcome the phenomenon of the 'reaction of language', which appears as an impediment in delivery and sharing of information as the most fundamental roles. Successively, mobile printing types more readable and effective in delivering of meanings have been developed, thus widely distributed for general use. However, although such printing types might be easily used in image and digital media, such as in computer monitors, screens and mobile phone LCDs, etc., it is in fact difficult to use these printing types in printed surfaces, the traditional medium of information delivery, or in sign systems frequently encountered in our surrounding environment. As a solution for this, it is intended to create an effect of communication closer to dynamic typography expression by approaching visual message delivery system from the essence and substance of the color application, which corresponds to the visual spatial expression effect, the core element of expression in dynamic typography to possess significantly more powerful effect in terms of both message delivery capacity and readability than the conventional means of static typography.

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

Inter-Process Testing of Parallel Programs based on Message Sequence Charts Specifications (MSC 명세에 기반한 병렬 프로그램의 프로세스 간 테스팅)

  • Bae, Hyun-Seop;Chung, In-Sang;Kim, Hyeon-Soo;Kwon, Yong-Rae;Chung, Young-Sik;Lee, Byung-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.108-119
    • /
    • 2000
  • Most of prior works on testing parallel programs have concentrated on how to guarantee the reproducibility by employing event traces exercised during executions of a program. Consequently, little work has been done to generate meaningful event sequences, especially, from specifications. This paper describes techniques for deriving event sequences from Message Sequence Charts(MSCs) which are widely used in telecommunication areas for its simplicity in specifying the behaviors of a program. For deriving event sequences from MSCs, we have to uncover the causality relations among events embedded implicitly in MSCs. In order to attain this goal, we adapt vector time stamping which has been previously used to determine the ordering of events taken place during an execution of interacting processes. Then, valid event sequences, satisfying the causality relations, are generated according to the interleaving rules suggested in this paper. The feasibility of our testing technique was investigated using the phone conversation example. In addition, we discussed on the experimental results gained from the example and how to combine various test criteria into our testing environment.

  • PDF

A Real-Time Monitoring Method and Dynamic Load-Balancing Metrics for CORBA Applications (코바 어플리케이션의 동적 부하 분산을 위한 실시간 모니터링 기법 및 메트릭스)

  • Choi, Chang-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.315-326
    • /
    • 2000
  • As Internet is being widely used as an infra of distributed applications, the most of today's softwares are changing into Internet-based distributed applications. The development methods using the middleware, like CORBA ORB, make the development of the web-based software easy. However, the performance verification method useful for an optimized software distribution is not provided at software development. Additionally, monitoring methods and metrics for dynamic load-balancing are not presented at run-time. This paper presents the method to monitor the message between objects, load metric, and metrics for load-balancing. To calculate a load of a node, we define events occurred between applications, time between the events, then extract the data related to a load. And we derive formula calculating the load from the extracted data. Then using the formula, we present the metrics for dynamic load-balancing. Moreover, we observe the utilization and efficiency of the monitoring algorithm, load metric, and load-balancing metrics.

  • PDF

Dynamic Timeout Scheduling for Energy-Efficient Data Aggregation in Wireless Sensor Networks based on IEEE 802.15.4 (IEEE 802.15.4기반 무선센서네트워크에서 에너지 효율적인 데이터 병합을 위한 동적 타임아웃 스케줄링)

  • Baek, Jang-Woon;Nam, Young-Jin;Seo, Dae-Wha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.933-937
    • /
    • 2009
  • This paper proposes a dynamic timeout scheduling for energy efficient and accurate aggregation by analyzing the single hop delay in wireless sensor networks based on IEEE 802.15.4. The proposed scheme dynamically configures the timeout value depending on both the number of nodes sharing a channel and the type of wireless media, with considering the results of delay analysis of the single hop delay. The timeout of proposed scheme is much smaller than the maximum single hop delay which is used as the timeout of traditional data aggregation schemes. Therefore the proposed scheme considerably reduces the energy consumption of idle monitoring for waiting messages. Also, the proposed scheme maintains the data accuracy by guaranteeing the reception ratio required by the sensor network applications. Extensive simulation has revealed that proposed scheme enhances energy consumption by 30% with maintaining data accuracy, as compared with the TAG data aggregation.

A Large-Scale Conference Service by Distributed Focus Control Method (분산 포커스 제어 방식에 의한 대규모 컨퍼런스 서비스)

  • Jang, Choonseo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.10-17
    • /
    • 2014
  • The focus maintains and manages conference session in the conference service. Load of focus increases by the number of participants and it becomes the major reason that limits the extendability of the large-scale conference service. In this paper, a new distributed focus control method has been proposed to solve this problem. Load of focus has been distributed to several conference nodes to implement large-scale conference service in this architecture. Conference nodes which have focus function subscribe to conference server's conference information database, and focus hae been allocated dynamically to process participants needs according to total numbers of the conference participants. For this purpose a new conference control event package for focus load control has been suggested. Furthermore the exchange procedure of SIP messages between focuses and participants also been suggested. The performance of the proposed system has been evaluated by simulation.

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

Simulator Design and Performance Analysis of Link-K Based Relative Navigation System (한국형전술데이터링크(Link-K) 기반 상대항법 시스템의 시뮬레이터 설계 및 성능분석)

  • Lee, Ju Hyun;Lee, Jin Hyuk;Choi, Heon Ho;Choi, Hyogi;Park, Chansik;Lee, Sang Jeong;Lee, Seung Chan
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.528-538
    • /
    • 2016
  • In this paper, an extend kalman filter based relative navigation algorithm is proposed for Link-K based relative navigation. Link-K is a tactical data link system for joint operation capability upgrade of ROK forces. Link-K is inter-operable with Link-16 and transmit and received information of operations and target. In Link-K communication channel, PPLI message including transmitter position and TOA measurement can be used for relative navigation. Therefore Link-K based relative navigation system can be operated. In this paper, software based simulations were carried out for operational feasibility test and performance verification as error factors of proposed Link-K based relative navigation system.

OTP-EKE: A Key Exchange Protocol based on One-Time-Password (OTP-EKE:원-타임-패스워드 기반의 키 고환 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.291-298
    • /
    • 2002
  • Mutual authentication is essential for key exchange protocols and password-based authentication scheme is used widely, which is convenient to users and executed on the cheap. Password-based protocol should be not only secure against attach but also efficient to reduce user's load. In this paper, we propose a new key exchange protocol, called OTP-EKE(One Time Password based Encrypted Key Exchange), to provide authentication and to share a session key between a server and a user. We choose a password-based scheme as a user authentication. Especially, we use a one-time-password verifier and server's public password to protect against attacks on server's directory. As for efficiency, we improve the performance by reducing the number of modular exponentiations and the number of rounds.

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.