• Title/Summary/Keyword: Computer terminals

Search Result 246, Processing Time 0.02 seconds

Scan Modeling and Performance Analysis for Extensive Terminal Information Identification (광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석)

  • Im, Sun-young;Shin, Seung-hun;Roh, Byeong-hee;Lee, Jung-tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.785-790
    • /
    • 2017
  • Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.

Comparison of The VDT Occupation and VDT-related Hobby Groups in terms of Patients' Subjective Symptoms of VDT Syndrome

  • Lee, Jun Cheol;Park, Si Eun;Shin, Hee Jun;Choi, Wan Suk
    • Journal of International Academy of Physical Therapy Research
    • /
    • v.8 no.2
    • /
    • pp.1168-1174
    • /
    • 2017
  • The purpose of this study was to investigate the health conditions of occupation group and hobby group related to visual display terminal (VDT) syndrome. The VDT occupation group was mainly composed of the worker in banks, telephone companies, and general offices. The VDT-related hobby group was composed of high school students, and Internet cafe users. A questionnaire survey was conducted to classify the subjects according to hours of computer usage. The results indicated that the occupation group represented a higher level of subjective symptoms than VDT-related hobby group. In the VDT occupation group, 'Poor body condition', 'Feeling uncomfortable or pain in the neck', 'Feeling uncomfortable or pain in the back', 'Feeling stressed out', and 'Feeling uncomfortable or pain in the shoulder' items indicated a high level of subjective symptoms. In the VDT-related hobby group, 'Feeling uncomfortable or pain in the neck', and 'Feeling uncomfortable or pain in the back' items indicated a high level of subjective symptoms. According to the hours of computer usage, 4-6 hours and 6 hours or more groups represented a higher level of subjective symptoms than 2-4 hours group. These findings suggest that Visual display terminal (VDT) work effects the individual's health conditions.

Asymptotically Optimal Cooperative Jamming for Physical Layer Security

  • Yang, Jun;Salari, Soheil;Kim, Il-Min;Kim, Dong In;Kim, Seokki;Lim, Kwangae
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.84-94
    • /
    • 2016
  • Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.However, the computational complexity of such exhaustive searching could be very high, which may limit the practical use of the optimal algorithm. We propose an asymptotically optimal algorithm, involving only a fast line searching, which can guarantee to achieve the global optimality when the total transmit power goes to infinity. Numerical results demonstrate that the proposed asymptotically optimal algorithm essentially gives the same performance as the algorithm in [1, (44)] but with much lower computational complexity.

Design of Educational Contents for Korean Listening of Foreigners (외국인을 위한 한국어 듣기교육용 콘텐츠의 설계)

  • Song, Jong-Yoon;Moon, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.953-955
    • /
    • 2010
  • Most domestic educational mobile contents put special stress on learning foreign languages such as English, and usually the telecommunications companies and the education companies partner to provide mobile terminals with the contents such as video files. Recently the trend of mobile platforms for the educational contents have been changed because of the release the many kinds of smart phones like iPhone and Google Phone. In this paper, we design the educational contents for Korean listening education to aid to study Korean effectively as a foreign language. It carries out a detailed design to realize and run the contents based on the Android OS which is an open source platform backed by Google.

  • PDF

Adaptive Cooperative Spectrum Sensing Based on SNR Estimation in Cognitive Radio Networks

  • Ni, Shuiping;Chang, Huigang;Xu, Yuping
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.604-615
    • /
    • 2019
  • Single-user spectrum sensing is susceptible to multipath effects, shadow effects, hidden terminals and other unfavorable factors, leading to misjudgment of perceived results. In order to increase the detection accuracy and reduce spectrum sensing cost, we propose an adaptive cooperative sensing strategy based on an estimated signal-to-noise ratio (SNR). Which can adaptive select different sensing strategy during the local sensing phase. When the estimated SNR is higher than the selection threshold, adaptive double threshold energy detector (ED) is implemented, otherwise cyclostationary feature detector is performed. Due to the fact that only a better sensing strategy is implemented in a period, the detection accuracy is improved under the condition of low SNR with low complexity. The local sensing node transmits the perceived results through the control channel to the fusion center (FC), and uses voting rule to make the hard decision. Thus the transmission bandwidth is effectively saved. Simulation results show that the proposed scheme can effectively improve the system detection probability, shorten the average sensing time, and has better robustness without largely increasing the costs of sensing system.

Mitigating Mobile Malware Threats: Implementing Gaussian Naïve Bayes for Effective Banking Trojan Detection

  • Najiahtul Syafiqah Ismail;Anis Athirah Masmuhallim;Mohd Talmizie Amron;Fazlin Marini Hussain;Nadiathul Raihana Ismail
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.17-24
    • /
    • 2024
  • Mobile phones have become immensely popular as intelligent terminals worldwide. The open-source nature of mobile platforms has facilitated the development of third-party mobile applications, but it has also created an environment for mobile malware to thrive. Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. This research presents a mobile malware static detection method based on Gaussian Naïve Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. The objectives of this project are to study the requirement of the Naïve Bayes algorithm in Mobile Banking Trojan detection, and to evaluate the performance and accuracy of the Gaussian Naïve Bayes algorithm in the Mobile Banking Trojan detection. This study presents a mobile banking trojan detection system utilizing the Gaussian Naïve Bayes algorithm, achieving a high classification accuracy of 95.83% in distinguishing between benign and trojan APK files.

Radiation effects on multi-channel Forksheet-FET and Nanosheet-FET considering the bottom dielectric isolation scheme

  • Gunhee Choi;Jongwook Jeon
    • Nuclear Engineering and Technology
    • /
    • v.56 no.11
    • /
    • pp.4679-4687
    • /
    • 2024
  • This study analyzes the single-event transient (SET) characteristics of alpha particles on multi-channel Forksheet-FET and Nanosheet-FET at the device and circuit levels through 3D TCAD simulations. The study investigates the differences in SET responses based on the energy and incident position of incoming alpha particles, considering the structural variances between Forksheet-FET and Nanosheet-FET, as well as the presence or absence of bottom dielectric isolation (BDI) in the fabrication process. Specifically, the introduction of BDI is observed to significantly suppress the voltage drop caused by 'unintended' current, as it can block the substantial electron-hole pairs (EHP) generated by injected alpha particles in the bulk substrate from reaching the FET terminals. Furthermore, it was confirmed that the size of abnormal current decreases as the energy of the injected alpha particle increases. Additionally, evaluating the response to SET based on the fundamental logic circuit, the CMOS inverter, revealed relatively small abnormal voltage drops for both Forksheet and Nanosheet when BDI was applied, confirming high immunity to radiation effects. Moreover, it can be observed that the application of BDI enhances reliability from a memory perspective by effectively suppressing voltage flips in the SRAM's cross-coupled latch circuit.

A security method for Gatekeeper based on Digital Authentication by H.235

  • Hwang Seon Cheol;Han Seung Soo;Lee Jun Young;Choi Jun Rim
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.759-763
    • /
    • 2004
  • While the needs for VoIPs(Voice over IP) encourage the commercial trials for VoIP services, there are many problems such as user authentication, blocking of illegal user and eavesdropping. In this paper, a management algorithm of registration of VoIP terminals is explained and security methods for tolling and data encryption module is designed and built up. The module structure will have the advantages of the entire development of secured gatekeeper without whole modification of gatekeeper. In order to secure the ordinary gatekeeper based on H.323 standard, user authentication and data encryption technologies are developed based on the H.235 standard and simply located over the plain H.323 stacks. The data structures for secured communications are implemented according to ASN.1 structures by H.235.

  • PDF

A Study on the Method for Computing the Relaiability in a Communication Network (통신회로망의 신속도계정방법에 관한 연구)

  • 고경식
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.15 no.6
    • /
    • pp.43-47
    • /
    • 1978
  • This paper presents a technique for symbolic reliability analysis of a general communication network. All simple paths are determined, then they are easily modified to be mutually disjoint by the specific Boolean expressions. A computer program for Binding all of the simple paths between two terminals is also developed. The examples are given to illustrate the technique.

  • PDF

Design and Implementation of Multipoint Videoconferencing System using H.323 (H.323을 지원하는 다자건 영상회의 시스템의 설계 및 구현)

  • Seong, Dong-Su;Kim, Hong-Rae;Heo, Mi-Yeong;Ham, Jin-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2041-2049
    • /
    • 2000
  • A various multimedia application services are developed wiht techniques of high speed networks and computer. Especially the videoconference system is important and useful in a remote discussion with multiple users. A vidoconferencing system in local area network used in corporation and university is useful and important. A standardization for it should be showed in ITU. Recommendation H.323 describes terminals, equipment, and services for videoconference over communication networks which do not provide a guaranteed Quality of Services for videoconference over communication networks which do not provide a guaranteed Quality of Service. In this paper, we introduce ITU-T H.323 which is the standardization over internet, and show a multipoint videoconferencing system and peer to peer videophone system using the ITU-T H.323.

  • PDF