• Title/Summary/Keyword: Access hold

Search Result 56, Processing Time 0.029 seconds

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

A Comparative Study on the Service Characteristics for Transferring Process of High-Speed Rail and Domestic Airline Systems by Using Structural Equation Modeling (공분산구조분석을 이용한 고속철도와 국내항공의 이동단계별 서비스특성 비교연구)

  • Kim, Tae Ho;Jeong, Kwang Seop;Park, Je Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.2D
    • /
    • pp.183-190
    • /
    • 2009
  • In order to improve continuous success and stabilization of high-speed rail in the future, Using Frequency of high-speed rail should be enhanced by improving satisfaction of high-speed rail passenger. High-speed rail is needed to hold the priority in competition means by comparing the traits of service of domestic air lines. This study utilizes structural equation modeling to develop model for estimating factors influencing to service through conducting survey questionnaire. It also uses reliability analysis, correlation analysis, factor analysis to examine the rationalization of items and to establish hypothesis of this research. The results show that KTX contains 'inner service' item that is considered to be ameliorated and that domestic airline present low performance of 'outer service' item. In other words, moving section which partly is under a limited condition is needed to be improved. In addition, access to airport and transfer to other transportations have to be improved as they show the lowest satisfaction.

A Study on the Regional Forest Human Resources Policy based on the Forest Resource Conditions in Gyeongsangbuk-do (경상북도 산림자원 여건분석 및 지역 산림인재 정책 기초연구)

  • Yeon Su Ryu
    • Journal of Environmental Science International
    • /
    • v.32 no.9
    • /
    • pp.635-645
    • /
    • 2023
  • The purpose of this study is to establish a linkage between local forest human resources policies and the analysis of forest resource conditions in Gyeongsangbuk-do. In particular, the study aims to gather insights from students enrolled local formal education institutions through a demand survey and their opinions. These findings would serve as basic data for the formulation of medium- and long-term policies. According to the results of the analysis, all surveyed groups expressed a desire to pursue careers, entrepreneurship, or further school education based on their forestry majors. Among, the most important needs identified for local human resources, receiving training related to field practice and access to information emerged as paramount. In addition, it was observed that educational programs were conducted on weekends and during school vacations, with integration into the school curriculum to ensure participants not only benefit from self-development but also receive administrative support. A notable observation in the survey results was the absence of a network among forest professionals, signifying a key weakness within the forest sector in Gyeongsangbuk-do. The results of this study hold significant value in terms of analyzing and sharing the educational preferences of forest human resources in Gyeongsangbuk-do, thereby serving as basic research data for proposing policies. In the future, by expanding the scope to include case studies and forest human resource preference analyses through cooperation with other local governments and institutions, the research can contribute to the establishment of national-level policies for forest human resources on a broader scale.

A Study on Trade Structure between MERCOSUR and Korea (남미공동시장(MERCOSUR)과 한국의 교역구조에 관한 연구)

  • Chong-Suk Park
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.371-385
    • /
    • 2023
  • Purpose - The purpose of this study is to analyze Korea's trade relations centered on the MERCOSUR, a major economic integration in Latin America, and identify its problems and suggest measures that can be taken by the government and corporations to reinforce economic cooperation. Design/methodology/approach - To improve the level of contribution of the study, an empirical analysis is necessary. However, due to limited data access, the study will approach the topic of trade relations between Korea and the MERCOSUR with various statistics and literature. Findings - First, there is an urgent need for changes in import-export goods between Korea and the MERCOSUR, as trade is focused on specific items. Second, although foreign direct investment from Korea to the MERCOSUR is centered in manufacturing and mining industries, there should be different investment strategies by countries and industries. Third, it is necessary to reinforce commercial cooperation. Korea currently has Free Trade Agreements with Chile, Peru, and Columbia, but not with MERCOSUR. Therefore, Korea must take active measures to sign an TA with MERCOSUR, which has been put on hold. Research implications or Originality - Latin America has the most thriving market when it comes to Free Trade Agreements worldwide. MERCOSUR is a South American Trade Bloc established by the Treaty of Asunción in 1991 and Protocol of Ouro Preto in 1994. Its full members are Brazil, Argentina, Uruguay and Paraguay. However, there is still a lack of research on the MERCOSUR, and corporations that aim to enter the Latin American market face difficulties due to lack of information. By investigating MERCOSUR and its prospects and analyzing the trade relations with Korea, this study will provide strategic measures for corporations that wish to enter the Latin American market.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Which types of the strategies diffused to the public through company's announcement do contribute to the long-term performance? (공시된 경영전략의 유형별 장기실적 기여도 분석)

  • Kang, Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.4 no.4
    • /
    • pp.45-70
    • /
    • 2009
  • This article investigates which types of the strategies announced by the listed firms contribute to enhancing the long-term performance of the companies. Since 2002, Korean Exchange adopted the "faire disclosure policy" which mandates that all publicly traded companies must disclose material information to all investors at the same time. Thanks to the policy, Korean investors can, now, easily access the board's decision on management strategies on the same day the decision is made. If the companies trustfully carry out their announced strategies, we can decide which types of strategies actually enhance or deteriorate the long-term performance, simply by comparing the announced strategies and the firm's performance. The sample companies are confined to 60 firms that became listed in the KOSDAQ market through back-door listing from 2003 to 2005. Using only the newly listed companies, we can avoid the interference on the long-term performance of the strategies pursued before the event date. This often holds true, for many companies radically modify their strategies after the listing. Furthermore, the back-door listing companies serve our purpose better than IPO companies do, because the former tend to have a variety of announcement within a given period of time beginning the listing date. Using these sample companies, this article analyzes the effect on one year buy-and-hold returns and abnormal buy-and-hold returns after the listing of the various types of strategies announced during the same period of time. The results show that those evidences of restructuring such as 'reduction of capital' and 'resignation of incumbent board members', actually contribute to the increase in adjusted long-term stock returns. Those strategies which can be view as evidence of new investment such as 'increase in tangible assets', 'acquisition of other companies', do also helps the stockholders better off. On the contrary, 'increase in bank loans', 'changes of CEO' and 'merger' deteriorate the equity value. The last findings let us to presume that the back-door listing companies appear to use the bank loans for value-reducing activities; the change in CEO is not a sign of restructuring, but rather a sign of failure of the restructuring; another merger carried out after back-door listing itself is also value-reducing activity. This article's findings on reduction of capital, merger and bank loans oppose the results of the former empirical studies which analyze only the short-term effect on stock price. Therefore, more long-term performance studies on public disclosures are in order.

  • PDF

A Practical Quality Model for Evaluation of Mobile Services Based on Mobile Internet Device (모바일 인터넷 장비에 기반한 모바일 서비스 평가를 위한 실용적인 품질모델)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.341-353
    • /
    • 2010
  • Mobile Internet Device (MID) allows users to flexibly use various forms of wireless internet such as Wi-Fi, GSM, CDMA, and 3G. Using such Internet, MID users can utilize application services. MID usage is expected to grow due to the benefits of portability, Internet accessibility, and other convenience. However, it has resource constraints such as limited CPU power, small memory size, limited battery life, and small screen size. Consequently, MIDs are not capable to hold large-sized complex applications and to process a large amount of data in memory. An effective solution to remedy these limitations is to develop cloud services for the required application functionality, to deploy them on the server side, and to let MID users access the services through internet. A major concern on running cloud services for MIDs is the potential problems with low Quality of Service (QoS) due to the characteristics of MIDs. Even measuring the QoS of such services is more technically challenging than conventional quality measurements. In this paper, we first identify the characteristics of MIDs and cloud services for MIDs. Based on these observations, we derive a number of quality attributes and their metrics for measuring QoS of mobile services. A case study of applying the proposed quality model is presented to show its effectiveness and applicability.

Realization of an IEEE 802.11g VoWLAN Terminal with Support of Adaptable Power Save and QoS During a Call (통화 중 적응적 Power Save와 QoS 지원이 가능한 IEEE B02.11g VoWLAN 단말기 구현)

  • Kwon, Sung-Su;Lee, Jong-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10A
    • /
    • pp.1003-1013
    • /
    • 2006
  • There is a serious problem in an 802.11g VoWLAN (Voice over Wireless LAN) terminal that talk time is less than 30% compared with an 802.11b terminal. It is almost impossible to achieve talk time level of the 802.11b MAC transmission method because IEEE 802.11g uses OFDM modulation, which is a kind of multi-carrier method and OFDM transmission speed is 54 Mbps faster than normal modulation. In this paper, a new concept of a Holdover time as a power saving method during a call with 802.11g terminal is suggested for the first time. Increase in the number of engaged terminals as a result of holdover time causes to QoS problem because of the increase in the number of back-off and then contention window. In this paper, to solve the QoS problem, a new approach is suggested such that when in down lint the sequence number of 802.11 G.711 is analyzed in the MAC of the terminal and then the Hold over time depending on loss rate is changed. Also, consumption of an electric current of 802.11b/g and MAC parameter's performance due to busy traffic caused by increase in the number of terminal are analyzed and then real data using VQT and Airopeek are analyzed.

A Strategy To Reduce Network Traffic Using Two-layered Cache Servers for Continuous Media Data on the Wide Area Network (이중 캐쉬 서버를 사용한 실시간 데이터의 좡대역 네트워크 대역폭 감소 정책)

  • Park, Yong-Woon;Beak, Kun-Hyo;Chung, Ki-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3262-3271
    • /
    • 2000
  • Continuous media objects, due to large volume and real-time consiraints in their delivery,are likely to consume much network andwidth Generally, proxy servers are used to hold the fiequently requested objects so as to reduce the network traffic to the central server but most of them are designed for text and image dae that they do not go well with continuous media data. So, in this paper, we propose a two-layered network cache management policy for continuous media object delivery on the wide area networks. With the proposed cache management scheme,in cach LAN, there exists one LAN cache and each LAN is further devided into a group of sub-LANs, each of which also has its own sub-LAN eache. Further, each object is also partitioned into two parts the front-end and rear-end partition. they can be loaded in the same cache or separately in different network caches according to their access frequencics. By doing so, cache replacement overhead could be educed as compared to the case of the full size daa allocation and replacement , this eventually reduces the backbone network traffic to the origin server.

  • PDF

Single-Channel Seismic Data Processing via Singular Spectrum Analysis (특이 스펙트럼 분석 기반 단일 채널 탄성파 자료처리 연구)

  • Woodon Jeong;Chanhee Lee;Seung-Goo Kang
    • Geophysics and Geophysical Exploration
    • /
    • v.27 no.2
    • /
    • pp.91-107
    • /
    • 2024
  • Single-channel seismic exploration has proven effective in delineating subsurface geological structures using small-scale survey systems. The seismic data acquired through zero- or near-offset methods directly capture subsurface features along the vertical axis, facilitating the construction of corresponding seismic sections. However, substantial noise in single-channel seismic data hampers precise interpretation because of the low signal-to-noise ratio. This study introduces a novel approach that integrate noise reduction and signal enhancement via matrix rank optimization to address this issue. Unlike conventional rank-reduction methods, which retain selected singular values to mitigate random noise, our method optimizes the entire singular value spectrum, thus effectively tackling both random and erratic noises commonly found in environments with low signal-to-noise ratio. Additionally, to enhance the horizontal continuity of seismic events and mitigate signal loss during noise reduction, we introduced an adaptive weighting factor computed from the eigenimage of the seismic section. To access the robustness of the proposed method, we conducted numerical experiments using single-channel Sparker seismic data from the Chukchi Plateau in the Arctic Ocean. The results demonstrated that the seismic sections had significantly improved signal-to-noise ratios and minimal signal loss. These advancements hold promise for enhancing single-channel and high-resolution seismic surveys and aiding in the identification of marine development and submarine geological hazards in domestic coastal areas.