• Title/Summary/Keyword: Code request

Search Result 90, Processing Time 0.027 seconds

Analysis of Noise Sensitivity due to Image Wireless Transmission (링크암호 환경에서 이미지 데이터와 잡음의 영향)

  • Kim, KiHwan;Kim, HyeongRag;Lee, HoonJae;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.211-220
    • /
    • 2018
  • The standard data link layer encryption provided by CCSDS has a structure that encodes HDLC frame into it using an AES algorithm. However, CCSDS is standard method has a structure in which the receiving side cannot request a re-activation when noise interference occurs over an unstable channel. SES Alarmed has a structure that enables the receiving side to additionally detect errors and perform re-activation requests in an operational structure similar to that of link encryption in CCSDS. The SES Alarmed related paper was intended to identify the optimum range of thresholds and identify data corruption due to channel noise. In this paper, the focus was on reducing the re-activation process if the HDLC frame, excluding the password Sync code, consistently exceeds any threshold levels. The HDLC frame order was changed and the results of using SES Alarmed were proposed and compared.

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

Smart Contract's Hierarchical Rules Modularization and Security Mechanism (스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘)

  • An, Jung Hyun;Na, Sung Hyun;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.1
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

A Study on the Development and Performance Improvement of Chatbot for Office Automation (행정업무 자동화 챗봇 개발 및 성능 향상에 관한 연구)

  • Park, Junsoo;Kim, Youngjun;Jung, Yoonkyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.158-160
    • /
    • 2022
  • Many office workers spend a lot of time performing repetitive office tasks in inefficient ways. We developed a user-friendly chatbot system based on Kakaotalk to automate repetitive tasks and used the chatbot in the real workplace. In the process of operating the chatbot, if several people use the chatbot at the same time, the server was down or could not respond. To address these issues, we performed code migration of programs used by chatbot back-end servers and tried several ways to improve server performance such as database redesign and load balancing. To determine how much each method affects performance improvement, we measured total request per second and average latency. After that, we proposed ways to improve the problems of using the chatbot in the work environment.

  • PDF

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

A study on the improvement of Auxiliary Power Unit auto-shutdown of T-50 series aircraft based on analysis of ECU response characteristics (ECU 응답특성 분석을 통한 T-50 계열 항공기 보조동력장치 자동 꺼짐 개선에 관한 연구)

  • Park, Sung-Jae;Yoo, In-Je;Choi, Su-Jin;Lee, Dong-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.640-646
    • /
    • 2017
  • A GEN TEST of the auxiliary power unit of a T-50 series aircraft is performed as part of the operational test of its emergency power system on the ground before flight. At this time, the auxiliary power unit should be automatically turned off via the response signal of the ECU when power is not normally supplied to the emergency power system. If the correct operation of the emergency power system cannot be confirmed on the ground, it is not possible to proceed with the flight. This kind of defect is a major factor causing the operation rate of the aircraft to be decreased. The defect code identified by the ECU was confirmed as a defect in the inverter. However, the same defect was found after replacing the inverter. This report presents an improved method of identifying the cause of the defect by analyzing the response characteristics of the ECU and emergency power system and allows the ECU to be recognized as the cause of the defect if the inverter does not generate a voltage within a certain time. Also, the application of the improved method confirmed that it can satisfy the output request time of the emergency power system and effectively prevent the auto-shutdown of the auxiliary power unit.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

A Kernel-level RTP for Efficient Support of Multimedia Service on Embedded Systems (내장형 시스템의 원활한 멀티미디어 서비스 지원을 위한 커널 수준의 RTP)

  • Sun Dong Guk;Kim Tae Woong;Kim Sung Jo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.460-471
    • /
    • 2004
  • Since the RTP is suitable for real-time data transmission in multimedia services like VoD, AoD, and VoIP, it has been adopted as a real-time transport protocol by RTSP, H.323, and SIP. Even though the RTP protocol stack for embedded systems has been in great need for efficient support of multimedia services, such a stack has not been developed yet. In this paper, we explain embeddedRTP which supports the RTP protocol stack at the kernel level so that it is suitable for embedded systems. Since embeddedRTP is designed to reside in the UBP module, existing applications which rely ell TCP/IP services can proceed the same as before, while applications which rely on the RTP protocol stack can request HTP services through embeddedRTp API. EmbeddedRTP stores transmitted RTP packets into per session packet buffer, using the packet's port number and multimedia session information. Communications between applications and embeddedRTP is performed through system calls and signal mechanisms. Additionally, embeddedRTP API makes it possible to develop applications more conveniently. Our performance test shows that packet-processing speed of embeddedRTP is about 7.5 times faster than that oi VCL RTP for multimedia streaming services on PDA in spite that its object code size is reduced about by 58% with respect to UCL RTP's.

Effect of Toothbrushing Facilities on PHP index and Oral Health-related Behaviors in Elementary schools (양치시설 여부에 따른 초등학생의 구강환경관리능력 및 구강건강관리 행태 변화)

  • Hwang, Yoon-Suk;Kim, Kwang-Soo;Jung, Jae-Yeon;Yoo, Young-Jae;Kim, Soo-Hwa;Lim, Mi-Hee
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.14 no.3
    • /
    • pp.27-40
    • /
    • 2013
  • Objectives: This study was conducted at a request for cooperation through an analysis of the effect of toothbrushing facilities at a public health center in Seongdong-gu. Also, with the aim of furnishing basic data to the proposal of a program for improving the ability of school aged children in managing oral cavities and developing a correct toothbrushing habit, the study conducted an investigation of how toothbrushing facilities affect change in the oral environment management ability and behavior of oral health care. Methods: From among elementary schools located in Seongdong-gu, Seoul the study selected A Elementary School where toothbrushing facilities were established and have been operated since 2008, B Elementary School in an adjacent region within the jurisdiction of Seongdong-gu where the demographic environment was similar among schools where toothbrushing facilities were newly established in 2012, and C Elementary School without toothbrushing facilities. Then the study was aimed at first grade students of the schools and an investigation was carried out from April to December 2012. Through a dental checkup, the study evaluated the teeth and periodontal health conditions, and a test of the oral environment management ability was undertaken three times. Regarding change of oral health care behavior, the study carried out a self-recording survey. Results: 1. Concerning decayed and filled tooth(dft) and decayed and filled surface (dfs), A Elementary School where toothbrushing facilities have been established and operated from the past showed a relatively lower decayed, missing, and filled teeth index than B Elementary School where toothbrushing facilities were established in 2012 or C Elementary School without toothbrushing facilities; however, there was no significant difference (p>0.05). For CPI, there was no significant difference by school; however, in looking into the difference between boy students and girl students, Code (0) was discovered higher in boy students whereas Code (1) was shown higher in girl students. 2. In the PHP index test in accordance with the existence of toothbrushing facilities before the installation of toothbrushing facilities, for A Elementary School where toothbrushing facilities have been established and operated from the past, the school recorded 4.28 points whereas B Elementary School where the facilities were established in 2012 recorded 3.51 points. Meanwhile C Elementary School without the facilities posted 4.30 points. Therefore there was a statistically significant difference according to the existence of toothbrushing facilities (p<0.05). 3. In a comparison of teeth health care behavior according to the existence of toothbrushing facilities, the number of answers that the respondent did not brush their teeth after lunch over the past one week was higher in B Elementary School and C Elementary School where there were no toothbrushing facilities. Regarding the average number of brushing after lunch for one week, it was discovered higher in A Elementary School (p<0.01). 4. In change of teeth health care behavior before and after the establishment of toothbrushing facilities, the case of answering that the respondents did not brush their teeth after lunch for one week increased more after establishment than before establishment. Also the average number of teeth brushings after lunch for one week decreased further after the establishment of toothbrushing facilities; however, it did not show a significant difference (p>0.05). One of the reasons that they do not brush their teeth, "the lack of a place", decreased significantly after establishment than before establishment (p<0.05), whereas the answer, "because their friends do not brush their tooth" increased greatly after establishment than before establishment; however, there was no significant difference (p>0.05). 5. In the comparison of the degree of knowledge about dental health according to the existence of toothbrushing facilities, the degree of knowledge about dental health was shown significantly higher in A Elementary School with toothbrushing facilities than in B Elementary School and C Elementary School where there were no toothbrushing facilities (p<0.01). Conclusions: Given the above results, it is difficult to attract change in behavior only with an environmental improvement; therefore, it is deemed necessary to develop an educational program that will help children to make a habit of oral health care not only through a school but also through a related policy and financial support of government organizations as well as the construction of the basis of a systematic and consistent cooperative system with relevant organizations.

  • PDF

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.