• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.028 seconds

A Study on Zone-based Intrusion Detection in Wireless Network Environments (무선 네트워크 환경에서 영역기반 침입탐지 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • It is impossible to apply the routing protocol in the wired environment because MANET consists of only mobile nodes. Therefore, routing protocols considered these characteristics are required. In particular, if malicious nodes are not excluded in the routing phase, network performance will be greatly reduced. In this paper, we propose intrusion detection technique based on region to improve routing performance. In the proposed technique, the whole network is divided into certain areas, and then attack detection within the area using area management node is performed. It is a proposed method that can detect attack nodes in the path through cooperation with each other by using completion message received from member nodes. It also applied a method that all nodes participating in the network can share the attack node information by storing the detected attack node and sharing. The performance evaluation of the proposed technique was compared with the existing security routing techniques through the experiments and the superior performance of the proposed technique was confirmed.

Separated Control Signaling Protocol for WDM Optical Networks (파장 분할 다중화 방식을 사용하는 광 전송망을 위한 분리 제어 신호 방식)

  • 소원호;김영천
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.361-361
    • /
    • 2000
  • In this paper, we propose a novel control signaling protocol that efficiently controls connection setup and increases the utilization of network resources. The proposed protocol, Separated Control Signaling Protocol(SCSP), separates bearer control from call control lot WDM optical networks. The main function of call control is to check the availability of network resources such as wavelengths and receivers at destination node. Bearer control is to reserve and assign wavelengths. The signaling architecture of this protocol consists of call controller and hearer controller The call controller handles call setup and release, activates the beater controller, and manages the status of call and bearer. The bearer controller reserves wavelengths, sets up bearer, tears down bearer. and notifies the status of beater to call controller. The state transition diagrams of each controller are designed. Using control messages and related primitives, the information flows for call setup and bearer setup, hearer teardown and call release, and reaction for setup failures are described to evaluate the performance. The simulation results show that the separated control signaling protocol is superior to conventional one in terms of call blocking probability and resource utilization.

A Study on the Implementation Status of Improvements Being Made of Korean University Libraries (도서관 운영 개선방법에 대한 국내 대학도서관의 도입실태 분석)

  • Noh, Dong-Jo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.3
    • /
    • pp.139-149
    • /
    • 2010
  • This study determines the implementation status of the improvement being made to Korean university libraries. An e-mail survey was conducted targeting 24 Korean university libraries. Conclusions after analysing the responses of the survey were as follows:(1) 24 university libraries implemented 88 different methods of operating their libraries. In other words each library implemented an average 3.67 different methods operating.(2) Twelve universities initiated their improvement schemes in 2008, ten universities initiated their improvement schemes in 2007, nine universities initiated their improvement schemes in 2005, eight universities initiated their improvement schemes in 2010 and seven universities initiated their improvement schemes in 2009. Most university libraries implemented their improvement after 2005.(3) Most university libraries improvement schemes entailed online tours, special events, personal customized services, and SMS services. We noted that online reference services such as the Wiki Service, Twitter, Facebook, Cyworld were not initiated.

Factors Influencing Participation of Online Community and Intention of Joint Purchasing in Korea and China (온라인 커뮤니티 참여도와 공동구매의도에 영향을 미치는 요인: 한국과 중국을 중심으로)

  • Park, Cheol;Wang, Can
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.69-89
    • /
    • 2013
  • This study examined the factors influencing participation of online community and intention of joint purchase in Korea and China. The online community member actively participate the social activities that can cause the effective communication characters and the great support of the society. In these two factors, the sense of worth related with compensation, norm, interaction, shared values will be taken as the independent variables. These variables as a parameter are related with the intention of joint purchase. To be aware of their behavior norm, interaction, compensation, shared value, these factors will be taken as predicting their behaviors in the online community and their further participating, commitment and co-shopping intention. As the results, compensation, norms, interaction, shared values had significant effects on the participation of online community, and this affected the intention of joint purchase in online community. Compensation and norm were significant in Korean sample. Implications and further direction are suggested on the base of the results.

  • PDF

Quantitative Analysis about Visual Image Expression of Documentary Interview (다큐멘터리 인터뷰 영상표현의 정량적 분석)

  • Lee, Ik-Heui
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.113-122
    • /
    • 2011
  • Visual images are very close to our living and we make decisions and choose behavioral options with the visual images on mass media. In current-affair documentary programs, interviews have potential effects that can change public opinions on important issues. Therefore, it's a consequence that the study examined how different expressions of visual images in documentary. Using preceding research methods, this study focus on form, color, movement and depth of visual images. This study analyzed quantitatively all interview shots with 15 current-affair documentary programs from major TV stations such as KBS, MBC and SBS. The findings of the study are 1) half of interview shots used the visual image expressions to hide interviewees' face according to the shield law, 2) choosing close-up shots in company with bust shots, 3) using natural lights and hand-held camera techniques for interviews, and 4) showing wide angles without depths of visual image.

Implementation of ECO Driving Assistance System based on IoT (IoT기반 ECO 운전보조 시스템 구현)

  • Song, Hyun-Hwa;Choi, Jin-ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.157-163
    • /
    • 2020
  • Recently, fine dust has been known to cause cardiovascular diseases here, raising interest in ways to reduce emissions by efficiently using fuel from cars that cause air pollution. Accordingly, a driving assistance system was developed to save fuel by eco-driving and improve the driver's bad driving habits. The system was developed using raspberry pi, arduino and Android. Using RPM, speed, fuel injection information obtained from OBD-II, and gyro-sensor values, Fuel-Cut is induced to create an optimal inertial driving environment. It also provides various information system such as weather, driving environment, and preventing drowsy driving through GUI and voice recognition functions. It is possible to check driving records and vehicle fault information using Android application and has low overhead for message transmission using MQTT protocol optimized for IoT environment.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

An Energy-Efficient Mobile P2P Streaming Structure Using Agent Peers (에이전트 피어를 이용한 에너지 효율적인 모바일 P2P 스트리밍 구조)

  • Kim, Sang-Jin;Kim, Eun-Sam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.121-129
    • /
    • 2011
  • With advances in wireless networks and advent of powerful mobile devices such as smart phones, the demand for mobile IPTV services has been increasing. It is essential to minimize the energy consumption of mobile devices because their battery capacity is limited. In this paper, we therefore propose a new streaming structure in P2P-based mobile IPTV systems to minimize the energy consumption of mobile peers using agent peers. Agent peers can decrease the energy consumption of mobile peers significantly by performing streaming functionality and exchanging control messages for joining and leaving overlay networks in place of corresponding mobile peers. Finally, by simulation experiments using an energy model, we show that our proposed streaming structure can increase the lifetime of mobile peers using agent peers.

Cluster Based Multi-tier MAC Protocol for Dense Wireless Sensor Network (밀집된 무선센서네트워크를 위한 클러스터 기반의 멀티티어 MAC 프로토콜)

  • Hwan, Moon-Ji;Mu, Chang-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.101-111
    • /
    • 2011
  • A new MAC protocol, MT-MAC(Multi-Tier Medium Access Control) by name, is proposed for dense sensor networks. Depending on the density of nodes in a virtual cluster, the cluster header performs the splitting to several tiers in nodes of virtual cluster. MT-MAC split the tiers to use modfied-SYNC message after receiving the beacon message from the cluster header. Because only the sensor nodes in the same tier communicate each other, less power is consumed and longer network life time is guaranteed. By a simulation method with NS-2, we evaluated our protocol. In dense nodes environments, MT-MAC protocol shows better results than S-MAC in terms of packet delivery rates throughput and energy consumption.

DTDMA Procedure design of Tactical Data Link

  • Kim, Jin-Woo;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Kim, Min-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.43-50
    • /
    • 2019
  • In this paper, we designed a dynamic TDMA scheme for smooth tactical data distribution in TDMA tactical datalinks. Since the existing tactical datalinks use fixed time radio resources, it is impossible to change the resource status according to network conditions during operation. To overcome these limitations, we designed, implemented, and simulated the DTDMA processing and related messages such as initial timeslot allocation, intermediate time slot allocation, time slot return, and timeslot retrieval. As a result, it was shown that the method of effectively allocating and using timeslot resources according to the situation is applicable. Therefore, we will continue research to manage DTDMA communication on tactical data link in the future.