• Title/Summary/Keyword: 컴퓨터네트워크

Search Result 4,223, Processing Time 0.032 seconds

The Application Service Model and Platform for Web Services Based on USN Application Developments (웹 서비스 기반의 USN 응용 개발을 위한 응용서비스 모델 및 플랫폼)

  • Kim, Chang-Su;Cao, Ke-Rang;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.713-718
    • /
    • 2011
  • The advancement of computer network technology, coupled with the growing prevalence of Internet, is promoting ubiquitous computing, also called next-generation computing paradigm, as an important study field that many researches are joining and undergoing. In this paper, as the support technology for creating ubiquitous computer environment, we design the SSDLbased on XMLwhich is used for sending and receiving data by USN application service in a standardized form. A ref model, with no regard to different platforms or implementation languages, is proposed in our research on the basis of web service so that most of unspecified users could apply the standardized protocol designed for sensor data to real sensor data in various application environments based on the designed language. Therefore, through this research we can take advantage of acquisition of USN-based technology and technology draft related to application service.

Intelligent evacuation systems considering bottleneck (병목 현상을 고려한 지능형 대피유도 시스템)

  • Kim, Ryul;Joo, Yang-ick
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.69-70
    • /
    • 2017
  • As the industry develops, the size of buildings and ships are getting bigger and more complicated. In such a complex space, emergency evacuation systems are required because of the possibility of casualties when an accident situation occurs. However, because present systems are composed of basic devices, such as alarms, emergency exit signs, and announcement regarding the situation and inform only the least information to evacuees, evacuees are not able to judge objectively. To solve these problems, various evacuation algorithms have been proposed. However, these studies aim to search evacuation routes based on specific risk factors or to model the effects of bottlenecks in evacuation situations. Therefore, there is a limit to apply to real systems. Therefore, we propose algorithms to search the optimal evacuation route considering various risk factors such as fire and bottleneck in evacuation situations and to be applicable in actual situation in this paper. Performance evaluation using computer simulations showed that the proposed scheme is effective.

  • PDF

Transmission Performance of MANET with Intermittent Blackhole Attacks (간헐적 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1037-1040
    • /
    • 2013
  • Based on easy construction and operation compared with infra-structure communication netowrks, and rapid spreading of smart phone having high powered calculation ability and Wi/Fi function, usage of MANET(Mobile Ad-Hoc Network), which is configured with simply several terminals, is increased in applications of emergency communications, leisure, explorations. However, because of supporting difficulty of communication infra-structure makes some defects of malicious information intrusion like as hacking. In this paper, effects of transmission performance caused by information intrusion is analyzed. The results of published studies is based on environment of continuous intrusions, but this paper assumed intermittent attacking condition. In this paper, blackhole attack is used for intrusion type to MANET, voice traffic is used as a application traffic. Compuer simulation, based on NS-2, is used for measuring of performance parameters, and the analysis for the simulation results is shown as considerations of this paper.

  • PDF

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

An Optimal Resource Distribution Scheme for P2P Streaming Service over Centralized DU Environment in LTE (LTE에서 집중화된 DU 환경에서 P2P 스트리밍 서비스를 위한 최적의 자원 배분 방안)

  • Kim, Yangjung;Chong, Ilyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.81-86
    • /
    • 2014
  • According to the development of streaming services with P2P and mobile network technologies, researches to enhance the service quality in mobile environment have been proposed. However, streaming services considering high-speed mobile environment and characteristics of heterogenous terminals have been hindered from being provided with the required quality from user because of bandwidth congestion between selfish peers of existing P2P system. It is also prone to long delay and loss in accordance with the repeated traffic amounts because there are no optimized solution for traffic localization. The structure to enhance peer contribution for service differentiation and peer selection with clustering scheme with location information of terminal can satisfy both users and service providers with service quality and efficiency. In this paper, we propose an incentive mechanism and resource distribution scheme with user contribution and traffic cost information based on user location, which make mobile users increase the satisfaction of service quality in LTE environments.

Analysis of Big Data Visualization Technology Based on Patent Analysis (특허분석을 통한 빅 데이터의 시각화 기술 분석)

  • Rho, Seungmin;Choi, YongSoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.149-154
    • /
    • 2014
  • Modern data computing developments have led to big improvements in graphic capabilities and there are many new possibilities for data displays. The visualization has proven effective for not only presenting essential information in vast amounts of data but also driving complex analyses. Big-data analytics and discovery present new research opportunities to the computer graphics and visualization community. In this paper, we discuss the patent analysis of big data visualization technology development in major countries. Especially, we analyzed 160 patent applications and registered patents in four countries on November 2012. According to the result of analysis provided by this paper, the text clustering analysis and 2D visualization are important and urgent development is needed to be oriented. In particular, due to the increase of use of smart devices and social networks in domestic, the development of three-dimensional visualization for Big Data can be seen very urgent.

SLM using GIS data formats for 3D virtual model of research (SLM 포맷을 이용한 GIS 데이터의 3D 가상모델에 대한 연구)

  • Han, Jeong-Ah;Seo, Laiwon
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.113-120
    • /
    • 2014
  • In recent years, devices using the smart ponwa IT service is activated, to research how the fusion of two or more devices will be able to be interest in the soybeans. One of them in the mobile sector through the development of network and hardware digital geo-spatial map of the rapid advances being made and the computer, how do you map data to efficiently simulate a 3D environment, providing services through a virtual environment focused on whether be. In this study, augmented reality and GIS (Geographic Information System), SLM (Static LOD Model) that combines augmented reality technology on the basis of the basic concepts and approaches in geographic space and how Augmented Reality Based on this interpretation of the relevant content What to do in the development and utilization has a purpose. In this study, the conventional SLM 3DS model data structure of a data format conversion of the proposed possibilities for analyzing and, SLM model generation and format of the existing three-dimensional visualization tools SLM model format for converting a format to a model function, and visualization features. In addition, 3D virtual model to propose a format for efficiently making.

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.

First Order Predicate Logic Representation and Management for Information Resource Dictionary (정보자원사전에 대한 서술논리 표현과 관리)

  • 김창화
    • The Journal of Information Technology and Database
    • /
    • v.5 no.1
    • /
    • pp.13-37
    • /
    • 1998
  • 인터넷 등의 컴퓨터 통신 네트워크의 발달로 인하여 분산된 정보자원의 공유를 통한 자원에 대한 재사용성의 필요성이 대두되었다. IRD(Information Resource Dictionary)는 조직 내에서 관련된 모든 정보에 대한 데이터가 논리적으로 중앙화된 정보저장소(repository)이다. IRD 내의 데이터는 다른 데이터를 기술하므로 이른바 메타 데이터라고 하기도 한다. IRD의 사전(dictionary) 요소는 정보자원의 종류, 정보자원의 의미, 정보자원의 논리적 구조, 정보자원의 위치, 그리고 정보자원의 접근방법 등을 기술한다. FIPS ANSI의 IRDS는 이항 관계를 이용하여 무결성 제약조건을 표현하므로 제약조건 규칙의 표현과 일반적인 추론 규칙의 표현이 제한되어 있으며, 다양한 형태의 무결성 제약조건의 표현과 IRD와 관련된 여러 정보의 도출 또는 추론 및 관리에 관한 사항은 IRD 응용 고유의 문제로 간주하여 언급하고 있지 않다. 한편, FIPS IRDS는 사용자가 SQL 및 IRD에 대한 전문적 지식이 없이는 사용자 질의 작성이 어려운 점등에 대한 문제점을 안고 있다. 본 논문은 FIPS IRDS의 기본모델에서 정보자원 표현, 정보자원들간의 관계, 정보자원의 관리 정보 구분을 명확히 하기 위해 정보자원 모델을 정보자원 표현요소와 정보자원 관리요소의 두 부류로 나누어 구분하고, 각 부류에 대한 자격 질의(competency question)를 통하여 유추된 요소들을 FIPS ANSI IRDS 기본 모델의 스키마 기술 레벨과 스키마 레벨에 첨가함으로써 그 기본 모델을 확장한다. 그리고, FIPS ANSI IRDS가 제공하는 IRD 기술과 관리 기능을 그대로 포함하면서 앞에서 문제점으로 지적된 제약조건 표현과 추론규칙 표현을 위하여 확장된 기본 모델을 중심으로 각 레벨의 구성 요소들의 형식적 의미(formal semantics)와 레벨 내 혹은 레벨 구성요소들간의 관계성(relationship), 그리고 제약조건의 표현과 질의 추론 규칙들을 식별하여 FOPL(First Order Predicate Logic)로 표현한다. 또한, 본 논문은 FOPL로 표현된 predicate들과 규칙들을 구현하기 위하여 Prolog로 변환하기 위한 이론적 방법론을 제시하고 정보자원 관리를 위한 기본 함수들과 스키마 진화(schema evolution)를 위한 방법론을 제안한다.

  • PDF

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.