• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.026 seconds

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Low-Cost Remote Power-Quality-Failure Monitoring System using Android APP and MCU (안드로이드 앱과 MCU를 이용한 저가형 원격 전원품질이상 감시 시스템)

  • Lim, Ho-Kyoun;Kim, Seo-Hwi;Lee, Seung-Hyeon;Choe, Sangho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.144-155
    • /
    • 2013
  • This paper presents a low-cost remote power-quality-failure monitoring system (RPMS) using Android App and TI MCU (micro-controller unit), which is appliable to a micro-grid. The designed RPMS testbed consists of smart nodes, a server, and Android APPs. Especially, the C2000-series MCU-based RPMS smart node that is low-cost compared to existing monitoring systems has both a signal processing function for power signal processing and a data transmission function for power-quality monitoring data transmission. The signal processing function implements both a wavelet-based power failure detection algorithm including sag, swell, and interruption, and a FFT-based power failure detection algorithm including harmonics such that reliable and real-time power quality monitoring is guaranteed. The data transmission function implements a low-complexity RPMS transmission protocol and defines a simple data format (msg_Diag) for power monitoring message transmission. We may watch the monitoring data in real time both at a server and Android phone Apps connected to the WiFi network (or WAN). We use RS-232 (or Bluetooth) as the wired (or wireless) communication media between a server and nodes. We program the RPMS power-quality-failure monitoring algorithm using C language in the CCS (Code Composer Studio) 3.3 environment.

Content Insertion Technology using Mobile MMT with CMAF (CMAF 기반 Mobile MMT를 활용한 콘텐츠 삽입 기술)

  • Kim, Junsik;Park, Sunghwan;Kim, Doohwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.4
    • /
    • pp.560-568
    • /
    • 2020
  • In recent years, as network technology develops, the usage of streaming services by users is increasing. However, the complexity of streaming services is also increasing due to various terminal environments. Even when streaming the same content, it is necessary to re-encode the content according to the type of service. In order to solve the complexity and latency of the streaming service, Moving Picture Experts Group (MPEG) has standardized the Common Media Application Format (CMAF). In addition, as content transmission using a communication network becomes possible, the Republic of Korea's Ultra High Definition (UHD) broadcasting standard has been enacted as a hybrid standard using a broadcasting network and a communication network. The hybrid service enables various services such as transmitting additional information of contents or providing user-customized contents through a communication network. The Republic of Korea's UHD transmission standard utilizes MPEG Media Transport (MMT), and Mobile MMT is an extension of MMT to provide mobile network-specific functions. This paper proposes a method of inserting CMAF contents suitable for various streaming services using signaling messages of MMT and Mobile MMT. In addition, this paper proposes a model for content insertion system in heterogeneous network environment using broadcasting and communication networks, and verifies the validity of the proposed technology by checking the result of content insertion.

Recognition Method of Korean Abnormal Language for Spam Mail Filtering (스팸메일 필터링을 위한 한글 변칙어 인식 방법)

  • Ahn, Hee-Kook;Han, Uk-Pyo;Shin, Seung-Ho;Yang, Dong-Il;Roh, Hee-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.287-297
    • /
    • 2011
  • As electronic mails are being widely used for facility and speedness of information communication, as the amount of spam mails which have malice and advertisement increase and cause lots of social and economic problem. A number of approaches have been proposed to alleviate the impact of spam. These approaches can be categorized into pre-acceptance and post-acceptance methods. Post-acceptance methods include bayesian filters, collaborative filtering and e-mail prioritization which are based on words or sentances. But, spammers are changing those characteristics and sending to avoid filtering system. In the case of Korean, the abnormal usages can be much more than other languages because syllable is composed of chosung, jungsung, and jongsung. Existing formal expressions and learning algorithms have the limits to meet with those changes promptly and efficiently. So, we present an methods for recognizing Korean abnormal language(Koral) to improve accuracy and efficiency of filtering system. The method is based on syllabic than word and Smith-waterman algorithm. Through the experiment on filter keyword and e-mail extracted from mail server, we confirmed that Koral is recognized exactly according to similarity level. The required time and space costs are within the permitted limit.

Development of a Framework for Anti-Collision System of Moving Drilling Machines on a Drill Floor (시추 작업장의 이동식 시추 장비 충돌 방지 시스템을 위한 프레임워크 개발)

  • Lee, Jaeyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.330-336
    • /
    • 2020
  • An anti-collision system between equipment is essential on a drill floor where multiple moving machines are operated simultaneously. This is to prevent accidents by halting the machines when required, by inspecting possibility of a collision based on the relative position data sent by the equipment. In this paper, we propose a framework for an Anti-Collision System (ACS) by considering expandability of the number of machines and computational speed, to promote development of drilling machines and corresponding ACS software. Each drilling equipment is represented as an object in the software with its own message format, and the message is constructed with serialization/deserialization to manage any additional equipment or data. The data handling process receives the current status of machines from the drilling control network, and relays a collision related message (including bypass signal) back to the machines. A commercial visualization software shows the bounding boxes moving with the equipment and indicates probable collision. It has been determined that the proposed system maintains total execution time below 5ms to process data from the network and relay the information hence, the system has no effect on the machine control systems having 100ms control cycle.

A Study on the Strategy in the Application of Advertisement Properties - Focused on the Advertisement in Magazine - (광고에 등장하는 소품(小品, Props)의 표현전략에 관한 연구 - 잡지 광고를 중심으로 -)

  • 전종경
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.59-68
    • /
    • 2001
  • The design on magazine advertisement has been developed and investigated in various fields, but the matter of properties has been inattentive in advertisement. Therefore, this study is to clarify the role of advertisement properties and the application tendency of it through the case study of the magazines for woman in Korea, and to analyze the relationship among the characteristic of manufactured goods for advertising, visual effects, copy-writing and the advertisement properties. The results of the study are as follows ; 1 . It is important to choose the discriminative property compared to the competitive company and to consider the purpose of advertisement from the beginning of idea developing. 2. Leading the photo artist to the photo working corresponding to the purpose of advertisement is critical point in advertisement design process. 3. After the photographing, it should be investigated from the designer's point of view. The presentation strategies on the application of advertisement properties are as follows, ·Conform the subject of advertisement massage. ·Choose the advertisement properties considered the relationship between manufactured goods for advertising and properties. ·Consider the properties as the supporting tool in bringing manufactured goods for advertising into relief. The pertinent application of advertisement properties is able to attract public attention and to increase the worthy of advertisement. Therefore, the prudent trial and experiment on it is needed.

  • PDF

A Study on Managerial Strategies of Electronic Mail(E-Mail) Messages as Records (전자우편문서의 기록관리적 접근전략에 관한 연구)

  • Seo, Eun-Gyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.1
    • /
    • pp.1-21
    • /
    • 2004
  • Records may furnish proof of a particular action, contain information that protects the rights of individuals or government, and document decisions made during the course of government business. As business in and between government agencies will increasingly be conducted through electronic messaging service, the need to manage e-mail messages and systems is the same as for other record management systems concerning the creation of, retention of, and access to public records. Therefore government agencies that use electronic mail(e-mail) have an obligation to make employee aware that e-mail messages, like paper records, must be managed according to established record management procedures. The purpose of this paper is to suggest guidelines and/or strategies on managing e-mail messages as records for agencies which must take steps in order to make, capture, maintain, dispose, store, protect, and provide access to e-mail messages. This paper discusses on the definition of e-mail messages, principles on managing e-mail message, and how to manage e-mail messages as records.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Implementation of Greenhouse Environmental Control Systems using Intelligence (지능을 이용한 온실 제어 시스템)

  • Yang, J.;Chung, C.D.;Hong, You-Sik;Ahn, B.I;Hwang, S.I.;Choi, Y.H.
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.29-37
    • /
    • 2012
  • An experiment for an optimized automatic greenhouse environment in a flower farming greenhouse by building a ubiquitous sensor network with various sensors was conducted and the results were evaluated. And various culturing environmental information and data in the greenhouse were collected and analyzed. Then, the greenhouse was designed to maintain the best culturing environment on the basis of existing recommended optimized figures. By measuring the growth of the crops in the greenhouse, A system which controls facilities in the greenhouse to maintain the best culturing environment in accordance with change in the environment was analyzed.Computer simulation result proced that we discovered that controlling the facilities and the artificial light source increased production, enhanced quality, reduced labor and heating cost immensely. The experiment has proved that the u-flower farming system can maximize the income of farm families by sending warning messages to users of this system when weather suddenly changes so that users may cope with such changes and maintain the best culturing environment.

A Study on Mobile Advertising Effects for Location-Based Advertisement - Focuse on both of Product Involvement and Forms of Advertising Expression - (위치 기반 서비스에 따른 모바일 광고 효과에 관한 연구 - 제품 관여도와 모바일 광고의 표현 형태를 중심으로 -)

  • Lee, Jong-Ho
    • Management & Information Systems Review
    • /
    • v.31 no.4
    • /
    • pp.109-137
    • /
    • 2012
  • This Research focuses on the effect of location-based mobile advertisement considering both of product involvement and advertising expression. The product involvement is classified as high and low involvement and forms of text and picture advertising, which are commonly used in mobile advertising, are chose in this research. To verify the advertising effect for location-based mobile advertisement, advertising attitude, brand attitude, and purchase intention are assessed by conducting survey experiment, which is stimulated for the location-based mobile advertisement including product involvement and advertising expressions. The results presented in this research indicate that the low-involvement product shows lower advertising effect rather than high-involvement product, because consumers recognize the mobile advertisement with low-involvement. The Second finding is that the effect of picture mobile advertising is more effective than that of text mobile advertising and this result is consistent with previous researchers. Finally, the favorable effects for location-based mobile advertisement is more effective than that of non-location-based mobile advertisement, because location-based mobile advertising can cause the immediate response for consumer to react with given advertising.

  • PDF