• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.029 seconds

TPEG-based User Created Message Service Model Design for Terrestrial DMB (지상파DMB TPEG 기반 사용자 주도형 메시지 서비스 모델 설계)

  • Lee, Sang-Hee;Jo, Kang-Hyun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.6
    • /
    • pp.817-827
    • /
    • 2008
  • The terrestrial-digital multimedia broadcasting(T-DMB) is now provided for the public service and the number of receivers reaches 15 million at the present of August 2008. The service of T-DMB itself has been succeeded in the presence. It is however remained as a supplementary role of stationed TV. It is necessary to find an additional business model as a new media to acquire surplus escaping from the deficit of the present T-DMB service. In the present paper, data service of T-DMB is proposed as candidate of such solution. Especially, TTI(Traffic and Travel Information) service is proposed as a killer application using TPEG(Transport Protocol Experts Group). At present, TPEG has not been so popular in the sense of various user satisfaction. Thus the variety of service including bi-directional service using DMB2.0 as in the sphere of Web2.0 is necessary for the service providers. In the paper, the restriction of TPEG-POI(Point of Interest) application service using the conventional mobile communication infrastructure is indicated. To overcome such restriction, TPEG-UCM(User Created Message) application service model using individual bi-directional media which is initiated and interacting by the users is proposed. In the experiment, the application program shows the usability of the proposed method so that the implementation results show its operability.

User Oriented clustering of news articles using Tweets Heterogeneous Information Network (트위트 이형 정보 망을 이용한 뉴스 기사의 사용자 지향적 클러스터링)

  • Shoaib, Muhammad;Song, Wang-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.85-94
    • /
    • 2013
  • With the emergence of world wide web, in particular web 2.0 the rapidly growing amount of news articles has created a problem for users in selection of news articles according to their requirements. To overcome this problem different clustering mechanism has been proposed to broadly categorize news articles. However these techniques are totally machine oriented techniques and lack users' participation in the process of decision making for membership of clustering. In order to overcome the issue of zero-participation in the process of clustering news articles in this paper we have proposed a framework for clustering news articles by combining users' judgments that they post on twitter with the news articles to cluster the objects. We have employed twitter hash-tags for this purpose. Furthermore we have computed the credibility of users' based on frequency of retweets for their tweets in order to enhance the accuracy of the clustering membership function. In order to test performance of proposed methodology, we performed experiments on tweets messages tweeted during general election 2013 in Pakistan. Our results proved over claim that using users' output better outcome can be achieved then ordinary clustering algorithms.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Naming Scheme and Its Implementation for the Network Management of Content Centric Networking Integrated with SNMP (SNMP를 연동한 콘텐츠 중심 네트워킹 망관리를 위한 이름 구조 및 이의 구현)

  • Kim, Kwangsoo;Roh, Byeong-hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.119-126
    • /
    • 2018
  • Content-centric networking (CCN) is a future Internet technology to reorganize the paradigm of end-to-end communication of the current IP-based Internet architecture into a content-based paradigm. In managing such new networks, the network management is one of the most important functions. The standard for typical network management in existing IP networks is Simple Network Management Protocol (SNMP). Though there have been several works to implement network management functions on CCN, they have their own limitations to apply them to pure CCN operational environments. The basic reason of the limitation is that existing methods operate in an IP-overlay structure, or do not support push-type information exchange. In this paper, we propose a new naming structure that can accommodate both pull and push-type SNMP methods for CCN network management with SNMP. Then, methods to support GET and TRAP methods as well as a SET method of SNMP in the pure CCN environment using the proposed naming structure are proposed. We implement the proposed method using CCNx, and construct a CCN network testbed to validate the effectiveness of the proposed method by monitoring appropriate exchange of SNMP messages over the testbed.

Efficient Tracking System for Passengers with the Detection Algorithm of a Stopping Vehicle (차량정차감지 알고리즘을 이용한 탑승자의 효율적 위치추적시스템)

  • Lee, Byung-Mun;Shin, Hyun-Ho;Kang, Un-Gu
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.73-82
    • /
    • 2011
  • The location-based service is emerging again to the public attention. The location recognition environment up-to-now has been studied with its focus only on a person, an object or a moving object. However, this study proposes a location recognition model that serves to recognize and track, in real time, multiple passengers in a moving vehicle. Identifying the locations of passengers can be classified into two classes: one is to use the high price terminal with GPS function, and the other is to use the economic price compact terminal without GPS function. Our model enables the simple compact terminal to provide effective location recognition under the on-boarding situation by transmitting messages through an interface device and sensor networks for a vehicle equipped with GPS. This technology reduces transmission traffic after detecting the condition of a vehicle (being parked or running), because it does not require transmission/receiving of information on the locations of passengers who are confined in a vehicle when the vehicle is running. Also it extends battery life by saving power consumption of the compact terminal. Hence, we carried out experiments to verify its serviceability by materializing the efficient tracking system for passengers with the detection algorithm of a stopping vehicle proposed in this study. Moreover, about 200 experiments using the system designed with this technology proved successful recognition on on-boarding and alighting of passengers with the maximum transmission distance of 12 km. In addition to this, the running recognition tests showed the test with the detection algorithm of a stopping vehicle has reduced transmission traffic by 41.6% compared to the algorithm without our model.

A Multicast Middleware for the Remote Educational Systems (원격 교육 시스템을 위한 멀티캐스트 미들웨어)

  • Byun, Sang-Seon;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.100-108
    • /
    • 2003
  • By choosing Multicast for transmission of educational contents in the Remote Educational System, we can reduce the server load and increase network bandwidth utilization. We design and implement Multicast Middleware for the Remote Educational System in this paper. There are three characteristics in this Multicast Middleware: 1) Through Centralized Multicast Group Management for passive members, it allows a host to make multicast group, which is composed of receivers, called Group Member and who are chosen by the host, called group Maker. Because, all groups are created by the Group Maker in Centralized Group Management, Group Member's join action will be passive 2) Maintenance and recovery of multicast group information in order to restore from exception and crash; the maintenance and recovery mechanism of Group Maker is distinct from that of Group Member. 3) The mechanism which enables to transmit large size multimedia data through multicasting and remove additional copy operation through shared buffer. Fragmentation/de-fragmentation for large data delivery results in additional copy operation in user level. But by using user level shared buffer, it can be done without user Bevel copy operation. By applying to Remote Educational environment which consists of 30 PCs and Fast Ethernet, we can examine the efficiency of this middleware, which can transmit 18frames/sec movie which resolution 320 $\times$ 120 pixels, 128Kbps encoded sound data and some text data.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Overlay Multicast for File Distribution using Virtual Sources (파일전송의 성능향상을 위한 다중 가상소스 응용계층 멀티캐스트)

  • Lee Soo-Jeon;Lee Dong-Man;Kang Kyung-Ran
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.289-298
    • /
    • 2006
  • Algorithms for application-level multicast often use trees to deliver data from the source to the multiple receivers. With the tree structure, the throughput experienced by the descendant nodes will be determined by the performance of the slowest ancestor node. Furthermore, the failure of an ancestor node results in the suspension of the session of all the descendant nodes. This paper focuses on the transmission of data using multiple virtual forwarders, and suggests a scheme to overcome the drawbacks of the plain tree-based application layer multicast schemes. The proposed scheme elects multiple forwarders other than the parent node of the delivery tree. A receiver receives data from the multiple forwarders as well as the parent node and it can increase the amount of receiving data per time unit. The multiple forwarder helps a receiver to reduce the impact of the failure of an ancestor node. The proposed scheme suggests the forwarder selection algorithm to avoid the receipt of duplicate packets. We implemented the proposed scheme using MACEDON which provides a development environment for application layer multicast. We compared the proposed scheme with Bullet by applying the implementation in PlanetLab which is a global overlay network. The evaluation results show that the proposed scheme enhanced the throughput by 20 % and reduced the control overhead over 90 % compared with Bullet.

A Reply Graph-based Social Mining Method with Topic Modeling (토픽 모델링을 이용한 댓글 그래프 기반 소셜 마이닝 기법)

  • Lee, Sang Yeon;Lee, Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.640-645
    • /
    • 2014
  • Many people use social network services as to communicate, to share an information and to build social relationships between others on the Internet. Twitter is such a representative service, where millions of tweets are posted a day and a huge amount of data collection has been being accumulated. Social mining that extracts the meaningful information from the massive data has been intensively studied. Typically, Twitter easily can deliver and retweet the contents using the following-follower relationships. Topic modeling in tweet data is a good tool for issue tracking in social media. To overcome the restrictions of short contents in tweets, we introduce a notion of reply graph which is constructed as a graph structure of which nodes correspond to users and of which edges correspond to existence of reply and retweet messages between the users. The LDA topic model, which is a typical method of topic modeling, is ineffective for short textual data. This paper introduces a topic modeling method that uses reply graph to reduce the number of short documents and to improve the quality of mining results. The proposed model uses the LDA model as the topic modeling framework for tweet issue tracking. Some experimental results of the proposed method are presented for a collection of Twitter data of 7 days.

A Study on the Economically Cost of User Using New Communication Technology of Smartphone: Focusing on the S Telecom in Korea (스마트폰 새로운 통신기술 도입에 따른 사용자의 경제적 부담에 관한 연구: 국내 S사 중심으로)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.243-246
    • /
    • 2013
  • Recently, the 4th generation of mobile communications in Korea with anyone supports was supported high speed multimedia communication services. With the launch of Apple iPhone, there is an explosion of interest in Smartphone itself as well as Internet-based services using Smartphone are being revitalized. Smartphone users, opinion experts almost of the economically active population is using, it has reached the saturation past the early stages of formation. In 1989, the 1st generation mobile communication service has been started with the analog voice service. After this, the 2nd generation mobile communication service for short messages and digital voices has been developed. And, the 3rd generation service of low speed data and low quality videos has been realized in 2000s. The very high speed data service of LTE (long term evolution), which is the 4th generation mobile communication service standards, had been in July 2011. and the subscribers are increasing constantly. However, changes in communication technology, has given an economical cost to Smartphone users. Therefore, the purposes of this study was trending of the communication cost according to the change in the communication technology of the mobile communication industry.

  • PDF