• Title/Summary/Keyword: 통신량

Search Result 4,543, Processing Time 0.035 seconds

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

A Study on The Adaptive Equalizer Using High Order Statistics in Multipath Fading Channel (다중 경로 페이딩 채널에서 고차 통계치를 이용한 적응 등화기에 관한 연구)

  • Lim, Seung-Gag
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2562-2570
    • /
    • 1997
  • This paper deals with the design and performance of the adaptive equalizer using high order statistics in order to improve the transmission characteristics of multipath fading channel. The multipath propagational phenomenon occurred in digital radio transmission causes the distortion and ISI of receiving signal. These are main reasons to increase the bit error rate and degrade the performance of receivers. In this paper, the adaptive equalization algorithm using high order statistics of received signal is used instead of CMA algorithm, Bussgang and Godard which are known widely. The performance of this algorithm (residualisi, recovered constellation, calculation) is presented varing SNR. As the result of the computer simulation, equalizer algorithm using high order statistics is better than CMA in the range of low SNR, $10{\sim}20dB$. Therefore, considering the actual communication systems which use the range of $14{\sim}20$ SNR, the adaptive equalizer using high order statistics can be used in the real multipath fading environment.

  • PDF

3차 저장 장치의 장착을 위한 MIDAS-II의 확장

  • Kim, Yeong-Seong;Gang, Hyeon-Cheol;Kim, Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.1
    • /
    • pp.21-35
    • /
    • 2000
  • MIDAS-II is the storage system for BADA DBMS developed at ETRI. This paper describes the extension of MIDAS-II for incorporating the tertiary storage device such as an optical disk jukebox or a tape library, enabling MIDAS-II to function as a storage system of the data server that stores a massive amount of multimedia data. The MIDAS-II disk volume structure is extended to efficiently function as a volume for the tertiary storage device with multiple platters, which canstore huge amount of data of the order of tera bytes. The storage structure of the LOB is changed to efficiently manage the LOB data in the tertiary storage device. The data structures of the shared memory, the process structure, and the utilities in MIDAS-II are also extended to efficiently incorporating the tertiary storage device. The functionalities of each MIDAS-II API function are expanded to handle the tertiary storage device, while the prototypes of those functions are intact in order not to affect the existing application programs. The performance evaluation shows that the extended MIDAS-II works effectively with the tertiary storage device. All these extensions and the performance evaluation are conducted in the SunOS 5.4 environment.

  • PDF

An Efficient Multiple Tree-Based Routing Scheme in Faulty Wireless Sensor Networks (결함이 발생하는 센서 네트워크 환경에서 다중 트리 기반 라우팅 프로토콜)

  • Park, Jun-Ho;Seong, Dong-Ook;Yeo, Myung-Ho;Kim, Hak-Sin;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.75-79
    • /
    • 2010
  • Wireless sensor networks (WSN) are widely used in many applications. WSN acquires the data of surrounding environments with sensors attached to each node. It is important to design sensor networks that can communicate energy-efficiently as well as to get sensor readings with high accuracy. In this paper, we propose a novel routing scheme that assures high accuracy and significantly reduces data transmission costs in WSN with faults. First, we organize a number of network topologies randomly for routing sensor readings to the base station. Because every sensor node is connected each other with a single path, redundant transmissions are not incurred. It can reduce unnecessary transmissions and guarantee final sensor readings with high accuracy. To show the superiority of our scheme, we compare it with an existing multi-path routing scheme. In the result, our scheme has similar accuracy as the existing scheme and reduces unnecessary data transmissions by about 70% over the existing technique.

The Call Control Scheme for Multiple Cells CDMA System Under Non-Uniform Traffic Distribution (비균일 부하를 가진 다중 셀 CDMA시스템에서의 호 제어 기법)

  • 이동명
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.737-743
    • /
    • 2004
  • In this paper, we propose the call control scheme that can improve the capacity of the wireless system for the non-uniform traffic load distribution and the multiple types of services in multiple cells CDMA system. The number of mobile stations that can be served simultaneously in a base station is limited by the amount of total interference received in CDMA system. Further, the average number of mobile stations in each cell may not be uniformly distributed. Considering this factors, the call admission control scheme using the effective bandwidth concept is adapted in this paper. Thus, the bandwidth for a new call can be varied dynamically for reducing the blocking rate of new calls and the dropping rate of handoff calls. The suggested call control scheme is experimented through a simulation by dynamically assigning the bandwidth to new and handoff calls. The simulation results show that the proposed call control scheme can accommodate more mobile stations than the other methods in multiple cells environment.

  • PDF

An Adaptive Viterbi Decoder Architecture Using Reduced State Transition Paths (감소된 상태천이 경로를 이용한 적응 비터비 복호기의 구조)

  • Ko, Hyoungmin;Cho, Won-Kyung;Kim, Jinsang
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.2
    • /
    • pp.190-196
    • /
    • 2004
  • The development of a new hardware structure which can implement the viterbi algorithm efficiently is required for applications such as a software radio because the viterbi algorithm, which is an error correction code function for the second and the third generation of mobile communication, needs a lot of arithmetic operations. The length of K in the viterbi algorithm different from each standard, for examples, K=7 in case of IS-95 standard and GSM standard, and K=9 in case of WCDMA and CDMA2000. In this paper, we propose a new hardware structure of an adaptive viterbi decoder which can decode the constraint length in K=3~9 and the data rate in 1/2 ~ 1/3. Prototyping results targeted to Altera Cyclon EPIC20F400C8, shows that the proposed hardware structure needs maximum 19,276 logic elements and power dissipation of 222.6 mW.

  • PDF

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.

Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy

  • Lim, Jong-Hyun;Kim, Jong-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.65-72
    • /
    • 2020
  • Today, the Internet of Things is used in many places, including homes, industrial sites, and hospitals, to give us convenience. Many services generate new value through real-time data collection, storage and analysis as devices are connected to the network. Many of these fields are creating services and applications that utilize sensors and communication functions within IoT devices. However, since everything can be hacked, it causes a huge privacy threat to users who provide data. For example, a variety of sensitive information, such as personal information, lifestyle patters and the existence of diseases, will be leaked if data generated by smarwatches are abused. Development of IoT must be accompanied by the development of security. Recently, Differential Privacy(DP) was adopted to privacy-preserving data processing. So we propose the method that can aggregate health data safely on smartwatch platform, based on DP.

Solution to Remote Controlling and Managing Home Appliances Based-on Context Awareness (상황인지기반 가전제품 원격 제어 및 관리 솔루션 개발)

  • Jang, Min-Ki;Jang, Moon-Soo;Choi, Bong-Jun;Kim, Min-Jung;Choi, Kyung-Sam;Choi, Hyung-Soon;Moon, Mikyeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1256-1258
    • /
    • 2012
  • 본 논문에서는 스마트 일렉트로 에코 시스템(Smart Electro-Eco System)의 일환으로 상황인지기반 가전 제품 원격 제어 및 관리 솔루션에 대해 기술한다. 본 솔루션 중 각 세대에 배치되는 홈 관리시스템은 n개의 특정기업 가전제품군과 원격 제어 애플리케이션, 홈 서버 시스템으로 구성된다. 또한 이러한 홈서버 시스템 m개로부터 데이터를 전송받아 분석 처리하는 빅데이터 서버 시스템이 있다. 홈 관리시스템에서는 가전제품에 부착된 센서의 센싱 데이터를 홈 서버 시스템으로 전송한다. 홈 서버 시스템에서는 실시간 가전제품 정보를 모니터링 및 원격 제어를 하고 설정된 상황이 인식되면 자동 제어 및 알림을 준다. 원격 제어 애플리케이션과 홈 서버 시스템의 통신으로 스마트 폰을 통해 가전제품 정보 및 원격 제어, NFC Tag를 이용한 원터치 제어를 할 수 있다. 빅데이터 서버 시스템에서는 대량의 데이터를 분석 및 통계를 내어 지역별, 시간대별 전류 소모량, 판매 실적 등을 측정하여 다음 버전에 나올 제품을 실제 데이터 통계로 인해 개선할 수 있다. 본 논문에서 기술하는 솔루션을 통하여 장소, 시간에 관계없이 홈을 스마트하게 관리할 수 있으며 가전제품 사용관련 빅데이터 처리를 통해 에너지의 효용성을 높일 수 있다.

Task Migration in Cooperative Vehicular Edge Computing (협력적인 차량 엣지 컴퓨팅에서의 태스크 마이그레이션)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.311-318
    • /
    • 2021
  • With the rapid development of the Internet of Things(IoT) technology recently, multi-access edge computing(MEC) is emerged as a next-generation technology for real-time and high-performance services. High mobility of users between MECs with limited service areas is considered one of the issues in the MEC environment. In this paper, we consider a vehicle edge computing(VEC) environment which has a high mobility, and propose a task migration algorithm to decide whether or not to migrate and where to migrate using DQN, as a reinforcement learning method. The objective of the proposed algorithm is to improve the system throughput while satisfying QoS(Quality of Service) requirements by minimizing the difference between queueing delays in vehicle edge computing servers(VECSs). The results show that compared to other algorithms, the proposed algorithm achieves approximately 14-49% better QoS satisfaction and approximately 14-38% lower service blocking rate.