• Title/Summary/Keyword: 토큰

Search Result 481, Processing Time 0.034 seconds

Design of Sequential System Controller Using Incidence Matrix (접속 행렬을 이용한 순차 시스템 제어기 설계)

  • 전호익;류창근;우광준
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.12 no.1
    • /
    • pp.85-92
    • /
    • 1998
  • In this paper, we design a sequential system controller, which is capable of processing parallel sequence, on the basis of analysis of control specification described by Petri Net with incidence matrix. The sequential system controller consists of input conditioning unit and petri net control unit which is composed of the token control unit and firing unit. The firing unit determines the firing condition of the transfer signal on the basis of the token status of token control unit. By the proposed scheme, we can easily develop and implement the sequential system controller of automated warehousing system, automated transportation system, elevator system, and so on, as it is possible to modify control specification by changing simply the content of incidence matrix ROM and to expand easily functional capacity as the result of modular design.design.

  • PDF

An Application Obfuscation Method Using Security Token for Encryption in Android (안드로이드 환경에서 보안 토큰을 이용한 앱 난독화 기법)

  • Shin, JinSeop;Ahn, Jaehwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1457-1465
    • /
    • 2017
  • With the growing of smart devices market, malicious behavior has gradually expanded its scope. Accordingly, many studies have been conducted to analyze malicious apps and automated analysis tools have been released. However these tools cause the side effects that the application protection tools such as ProGuard, DexGuard become vulnerable to analyzers or attackers. This paper suggests the protection mechanism to apply to the Android apps using security token, rather than general-purpose protection solutions that can be applied in malicious apps. The main features of this technique are that Android app is not properly loaded in the memory when the security token is abnormal or is not inserted and protected parts using the technique are not exposed.

Efficient Similarity Joins by Adaptive Prefix Filtering (맞춤 접두 필터링을 이용한 효율적인 유사도 조인)

  • Park, Jong Soo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.4
    • /
    • pp.267-272
    • /
    • 2013
  • As an important operation with many applications such as data cleaning and duplicate detection, the similarity join is a challenging issue, which finds all pairs of records whose similarities are above a given threshold in a dataset. We propose a new algorithm that uses the prefix filtering principle as strong constraints on generation of candidate pairs for fast similarity joins. The candidate pair is generated only when the current prefix token of a probing record shares one prefix token of an indexing record within the constrained prefix tokens by the principle. This generation method needs not to compute an upper bound of the overlap between two records, which results in reduction of execution time. Experimental results show that our algorithm significantly outperforms the previous prefix filtering-based algorithms on real datasets.

Vulnerability of Return Routability Protocol and Improvement (Return Routability 프로토콜의 취약점 및 개선 방안)

  • Jang, Hak-Beom;Kang, Seong-Yong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.945-948
    • /
    • 2011
  • 기존의 모바일 IPv6에서 경로 최적화를 하기 위해 바인딩 업데이트를 할 때 RR 프로토콜을 사용한다. IPv6에서 바인딩 업데이트는 이동노드가 홈 네트워크에서 외부 네트워크로 이동했을 때 Home Agent와 Correspondent Node(CN)에게 전송하며 이 과정에서 몇 가지 취약점으 가지고 있다. HoIT와 CoIT 메시지는 서로 연관이 없으며 이동 단말과 HA사이에만 IPSec으로 보호된 터널이 존재하고 HA와 CN 사이에는 보호되지 않는다. 따라서 공격자는 CN과 가까이에 위치하여 자신의 CoA를 CN에게 CoIT를 보내 토큰을 받아서 CN과 바인딩 업데이트를 할 수 있다. 바인딩 업데이트가 끝나면 두 노드사이는 정상적인 통신을 할 수 있고 공격자에 의해 위험에 노출 될 수 있다. 또한 CoIT 메시지를 보내면 CN에서는 토큰을 생성하게 되므로 공격자가 다수의 기기를 획득해 CN에게 계속 CoIT를 보내면 계속 토큰을 만들어야 하므로 다른 정상적인 노드의 통신을 방해할 수 있다. 따라서 이 논문에서는 이러한 RR프로토콜에 대한 문제점을 분석하고 이러한 문제점을 해결 할 수 있는 개선 방안을 논의 해본다.

Video Streaming Receiver with Token Bucket Automatic Parameter Setting Scheme by Video Information File needing Successful Acknowledge Character (성공적인 확인응답이 필요한 비디오 정보 파일에 의한 토큰버킷 자동 파라메타 설정 기법을 가진 비디오 스트리밍 수신기)

  • Lee, Hyun-no;Kim, Dong-hoi;Nam, Boo-hee;Park, Seung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1976-1985
    • /
    • 2015
  • The amount of packets in palyout buffer of video streaming receiver can be changed by network condition, and saturated and exhausted by the delay and jitter. Especially, if the amount of incoming video traffic exceeds the maximum allowed playout buffer, buffer overflow problem can be generated. It makes the deterioration of video image and the discontinuity of playout by skip phenomenon. Also, if the incoming packets are delayed by network confusion, the stop phenomenon of video image is made by buffering due to buffer underflow problem. To solve these problems, this paper proposes the video streaming receiver with token bucket scheme which automatically establishes the important parameters like token generation rate r and bucket maximum capacity c adapting to the pattern of video packets. The simulation results using network simulator-2 (NS-2) and joint scalable video model (JSVM) show that the proposed token bucket scheme with automatic establishment parameter provides better performance than the existing token bucket scheme with manual establishment parameter in terms of the generation number of overflow and underflow, packer loss rate, and peak signal to noise ratio (PSNR) in three test video sequences.

The Effects of Sports Team Performance and Social Media Operations on Fan Engagement: The Moderating Role of Fan Tokens (스포츠 구단의 경기 성적 및 소셜미디어 운영이 팬덤의 인게이지먼트에 미치는 영향: 팬 토큰의 조절 효과를 중심으로)

  • Wookyoung Kim;Yiling Li;Jeonghye Choi
    • Knowledge Management Research
    • /
    • v.24 no.4
    • /
    • pp.195-218
    • /
    • 2023
  • This study empirically analyzes the effect of a sports club's performance and social media operations on online information search volume, reflecting fan engagement. Additionally, it confirms that such effect can vary depending on the issuance of sports fan tokens. The analysis of the data resulted in the support of all four hypotheses presented in this study. The team's goal differentials during the games exhibited a significant and positive effect on the online information search volume by fans. Furthermore, the quantity of a team's social media posts also showed a significant and positive effect on the online information search volume. The aforementioned effects of the team's game-related performance and social media activity on the online information search volume appeared to be strengthened when the sports fan tokens of the team were issued. This study conducts an empirical analysis of fan engagement in sports clubs and delves into the marketing dimensions of sports fan tokens. By doing so, it broadens the research scope within sports marketing and offers practical insights for the development of marketing strategies by sports clubs.