• Title/Summary/Keyword: Address Data

Search Result 2,389, Processing Time 0.028 seconds

An Improved Data Hiding Algorithm for Increasing Hidden Capacity

  • Dae-Jea Cho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.11-16
    • /
    • 2024
  • Illegal manipulation and alteration of digital content are becoming a social issue. To address this problem, there is an increasing demand for the development of technologies to prevent the manipulation and alteration of digital content. This paper proposes a data hiding algorithm capable of embedding a larger amount of confidential data in the original cover image while minimizing the degradation of image quality in stego images. The algorithm presented in this paper analyzes the characteristics of the image to extract corner points and then uses a method to insert watermarks around these extracted corner points. Additionally, through experimentation, it has been proven that this algorithm can insert a greater amount of watermark without degrading the image quality compared to other existing algorithms.

The Data Sharing Economy and Open Governance of Big Data as Public Good

  • LEE, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.87-96
    • /
    • 2021
  • Data-driven markets depend on access to data as a resource for products and services. Since the quality of information that can be drawn from data increases with the available amount and quality of the data, businesses involved in the data economy have a great interest in accessing data from other market players and sharing data with other stakeholders. Despite the growing need for access to data and evidence of the economic and social benefits, data access and sharing remains below its potential. Individuals, businesses, and governments often face barriers to data access, which may be compounded by the reluctance to share, including within and across sectors. To address these challenges, this paper focuses on finding possible solutions for a better data-sharing economy. This paper 1) Discusses opportunities and challenges of open data and the data-sharing economy, limitations of private sector data, and issues with open government data. 2) Introduces open government data initiatives and open governance networks initiatives. 3) Suggests possible solutions, including the governance and management, the legal and policy frameworks, and the technical standards for open data with proposing an open data governance model for the data-sharing economy.

AFTL: An Efficient Adaptive Flash Translation Layer using Hot Data Identifier for NAND Flash Memory (AFTL: Hot Data 검출기를 이용한 적응형 플래시 전환 계층)

  • Yun, Hyun-Sik;Joo, Young-Do;Lee, Dong-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.18-29
    • /
    • 2008
  • NAND Flash memory has been growing popular storage device for the last years because of its low power consumption, fast access speed, shock resistance and light weight properties. However, it has the distinct characteristics such as erase-before-write architecture, asymmetric read/write/erase speed, and the limitation on the number of erasure per block. Due to these limitations, various Flash Translation Layers (FTLs) have been proposed to effectively use NAND flash memory. The systems that adopted the conventional FTL may result in severe performance degradation by the hot data which are frequently requested data for overwrite in the same logical address. In this paper, we propose a novel FTL algorithm called Adaptive Flash Translation Layer (AFTL) which uses sector mapping method for hot data and log-based block mapping method for cold data. Our system removes the redundant write operations and the erase operations by the separating hot data from cold data. Moreover, the read performance is enhanced according to sector translation that tends to use a few read operations. A series of experiments was organized to inspect the performance of the proposed method, and they show very impressive results.

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

An EPG Configuration Constructing Method and Structure for Dynamically Implementing Viewer Chosen EPG Configurations (시청자 선택 기반의 EPG 형상의 동적 구현을 위한 EPG형상 제작 방법과 구조)

  • Ko, Kwang-Il
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.51-58
    • /
    • 2011
  • Due to the digital technology, the TV broadcasting platform is evolving to the digital-TV, which is supporting data broadcasting service. Although the data broadcasting services (i.e., games, wether information, stock trading service) provide rich entertainment to viewers, they make the operation manners of digital-TV so complex that some viewers feel difficulty in using their TV sets. Several researches have been performed to address the problem by improving the functions of EPG such as searching and reserving programs, applying gesture and voice recognition technologies to operating EPG, guiding the design of the EPG's user interface, and developing agents helping EPG to behave intelligently. A research, however, that tries to address the problem that viewers have different familiarities with IT services has not been performed yet. The paper tackles the problem by letting a viewer to choose an EPG configuration (among the several EPG configurations provided by a broadcasting network) and designing an EPG that implements an EPG configuration based on the choice.

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

Implementation of the Passenger Positioning Systems using Beacon (Beacon을 활용한 선박 탑승자 위치확인 시스템의 구현)

  • Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.153-160
    • /
    • 2016
  • In this paper, we propose a system that tracks the position of the passengers and sailors using a Bluetooth-based Beacon in the ship. The position of the tracking passengers, sometimes fatal emergencies of the rescue team, such as the sinking of the ship is utilized in order to efficiently and quickly rescue the passengers, and the collected data can be utilized additionally by grasping the flow of human traffic patterns. The system proposed in this paper, install MAC data acquisition called AP (Access Point) for each cabin, and in the installed AP retrieves Tag of the information provided to the passenger and collected. A Tag has only its own MAC Address to the privacy, no user information is not collected. All data communication by sending and receiving MAC Address was only to ensure anonymity.

Peducing the Overhead of Virtual Address Translation Process (가상주소 변환 과정에 대한 부담의 줄임)

  • U, Jong-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.118-126
    • /
    • 1996
  • Memory hierarchy is a useful mechanism for improving the memory access speed and making the program space larger by layering the memories and separating program spaces from memory spaces. However, it needs at least two memory accesses for each data reference : a TLB(Translation Lookaside Buffer) access for the address translation and a data cache access for the desired data. If the cache size increases to the multiplication of page size and the cache associativity, it is difficult to access the TLB with the cache in parallel, thereby making longer the critical timing path in the processor. To achieve such parallel accesses, we present the hybrid mapped TLB which combines a direct mapped TLB with a very small fully-associative mapped TLB. The former can reduce the TLB access time. while the latter removes the conflict misses from the former. The trace-driven simulation shows that under given workloads the proposed TLB is effective even when a fully-associative mapped TLB with only four entries is added because the effects of its increased misses are offset by its speed benefits.

  • PDF

An Efficient Collision Resolution Method in Wireless Sensor Networks Based on IEEE 802.15.4 Slotted CSMA/CA (IEEE 802.15.4 Slotted CSMA/CA 기반 무선 센서 네트워크의 효율적인 충돌 해결 기법)

  • Jung, Kyoung-Hak;Suh, Young-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.750-759
    • /
    • 2012
  • This paper addresses the collision resolution issue to enhance the performance of wireless sensor networks based on IEEE 802.15.4 slotted CSMA/CA. Some solutions in existing work try to solve this issue by adjusting Backoff Exponent (BE) value or Backoff Period (BP). In contrast to the existing solutions, the proposed scheme in this paper aims at providing high system throughput, but also achieving efficient energy consumption of sensor nodes by using Preamble Address (PA). For this, in the proposed scheme, only one sensor node begins data packet transmission by performing PA contention phase with other nodes before sending each data packet. Our simulation results show that the proposed scheme outperforms existing algorithms in terms of energy consumption and throughput.

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.