• Title/Summary/Keyword: Data Message

Search Result 1,507, Processing Time 0.029 seconds

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation (가시광 통신에서 성능 저하 없는 보안 인코딩 연구)

  • Kim, Minchul;Suh, Taeweon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.

Design and Performance Evaluation of Digital Twin Prototype Based on Biomass Plant (바이오매스 플랜트기반 디지털트윈 프로토타입 설계 및 성능 평가)

  • Chae-Young Lim;Chae-Eun Yeo;Seong-Yool Ahn;Myung-Ok Lee;Ho-Jin Sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.935-940
    • /
    • 2023
  • Digital-twin technology is emerging as an innovative solution for all industries, including manufacturing and production lines. Therefore, this paper optimizes all the energy used in a biomass plant based on unused resources. We will then implement a digital-twin prototype for biomass plants and evaluate its performance in order to improve the efficiency of plant operations. The proposed digital-twin prototype applies a standard communication platform between the framework and the gateway and is implemented to enable real-time collaboration. and, define the message sequence between the client server and the gateway. Therefore, an interface is implemented to enable communication with the host server. In order to verify the performance of the proposed prototype, we set up a virtual environment to collect data from the server and perform a data collection evaluation. As a result, it was confirmed that the proposed framework can contribute to energy optimization and improvement of operational efficiency when applied to biomass plants.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

(A Scalable Multipoint-to-Multipoint Routing Protocol in Ad-Hoc Networks) (애드-혹 네트워크에서의 확장성 있는 다중점 대 다중점 라우팅 프로토콜)

  • 강현정;이미정
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.329-342
    • /
    • 2003
  • Most of the existing multicast routing protocols for ad-hoc networks do not take into account the efficiency of the protocol for the cases when there are large number of sources in the multicast group, resulting in either large overhead or poor data delivery ratio when the number of sources is large. In this paper, we propose a multicast routing protocol for ad-hoc networks, which particularly considers the scalability of the protocol in terms of the number of sources in the multicast groups. The proposed protocol designates a set of sources as the core sources. Each core source is a root of each tree that reaches all the destinations of the multicast group. The union of these trees constitutes the data delivery mesh, and each of the non-core sources finds the nearest core source in order to delegate its data delivery. For the efficient operation of the proposed protocol, it is important to have an appropriate number of core sources. Having too many of the core sources incurs excessive control and data packet overhead, whereas having too little of them results in a vulnerable and overloaded data delivery mesh. The data delivery mesh is optimally reconfigured through the periodic control message flooding from the core sources, whereas the connectivity of the mesh is maintained by a persistent local mesh recovery mechanism. The simulation results show that the proposed protocol achieves an efficient multicast communication with high data delivery ratio and low communication overhead compared with the other existing multicast routing protocols when there are multiple sources in the multicast group.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

The Effects of Personal, Familial, School Environmental Variables on Mobile Phone Addiction by Adolescent (청소년의 휴대폰 중독성에 영향을 미치는 개인, 가족, 학교환경 변인)

  • Lee, Yeon-Mi;Lee, Seon-Jeong;Shin, Hyo-Shick
    • Journal of Korean Home Economics Education Association
    • /
    • v.21 no.3
    • /
    • pp.29-43
    • /
    • 2009
  • The purposes of this study were to examine effective variables influencing on adolescents' mobile phone addiction. The subjects were the 666 middle or high school students who had their own mobile phone in Gwangju. Data were analyzed with frequency, percentage, cronbach's ${\alpha}$, mean, SD, pearson's correlation and multiple regression using SPSS/PC WIN 14.0 program. The major findings were as follows: 1. The most frequently used function of student mobile phones was text message and they used text message more than 41 times a day. Mostly they were talking to the same sex friends on the phone and the monthly charges ranged from 20,000 to 30,000 won. In general, they called to their friends after school. Their parents' attitudes toward their mobile phone using showed that the most of their parents did not care about their children's mobile phone use. The restriction of using their mobile phone at school was normal. 2. The average scores of mobile phone addiction were lower than median(3.0) and self esteem, self control, family strengths, peer conformity and school life adaptation were higher than median. 3. The adolescence's mobile phone additions were influenced by peer conformity, school life adaptation, school levels, sex and self control. And these variables explained to the adolescence's mobile phone additions about 28%.

  • PDF

The Structural Relationships between Control Types over Salespeople, Their Responses, and Job Satisfaction - Mediating Roles of Role Clarity and Self-Efficacy - (영업사원에 대한 통제유형, 반응, 그리고 직무만족 간의 구조적 관계 - 역할명확성과 자기효능감의 매개효과 -)

  • Yoo, Dong-Keun;Lim, Jong-Koo;Lim, Ji-Hoon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.4
    • /
    • pp.23-49
    • /
    • 2007
  • Salespeople act at the point of MOT with customers and deliver the enterprise's message to the customers. They build up relationships with customers as well as deliver the customer's message to the enterprise. The salespeople's activity at the point of MOT with the customers and the degree of satisfaction of the customers' needs will affect the customers' attitude toward the enterprise, brand loyalty, and retention intention. Ultimately, it will influence the enterprise's financial performance. The control of salespe1ople is one of the most interesting topics of marketing. This research investigates the relationships of the control types over salespeople(positive/negative outcome control, positive/negative behavior control) and job satisfaction and their mediating variables. The mediating variables in the relationships have been identified as outcome/behavior-related role clarity and self-efficacy. The purpose of this study is more specifically as follows: First, it investigate how the perception of salespeople control types affect role-clarity. Second, it examines how the perception of salespeople control types influence self-efficacy. Third, it investigate the mediating role of role-clarity between the perception of salespeople control types and self-efficacy. Fourth, it investigates how role-clarity affect self-efficacy and job satisfaction. Finally, it will investigates how self-efficacy influences job satisfaction. Data were collected from the pharmaceutical industry salespeople and analyzed by SPSS 12.0 and AMOS 6.0. The data were collected by 400 respondents and 377 valid questionnaires were analyzed. The results are summarized as follows: First, positive/negative outcome controls had a positive relationship with outcome-related role clarity. Also positive behavior control had a positive effect on behavior-related role clarity, but negative behavior control didn't influence behavior-related role clarity. Second, positive outcome control influenced self-efficacy positively, but positive behavior control didn't have a positive effect on self-efficacy. In addition negative outcome control and negative behavior control had a positive effect on self-efficacy due to the mediating role of outcome-related and behavior-related role clarity. Third, outcome-related role clarity and behavior-related role clarity influenced self-efficacy positively. Behavior-related role clarity had a positive effect on job satisfaction, but outcome-related role clarity didn't influence job satisfaction. Finally, self-efficacy didn't have any effect on job satisfaction. The contributions of this study are as follows: First, existing studies have investigated the direct causal relationship between salespeoples' control type and performance, but this study investigates the structural causality between salespeoples' control types, responses, and performances. Second, this study found the mediating role of outcome-related/behavior-related role-clarity between outcome/behavior control and self-efficacy. Finally, the findings of this study further insight to existing studies on the relationship between job satisfaction and self-efficacy. The confidence of salespeoples' task influenced job satisfaction positively in existing articles,field studies, but the relationship between these two variables was not significant in this study. This means that there can be a different relationship between confidence and job satisfaction according to salespeoples' business. That is, the business environment may not be satisfying, even if the salespeople say that they have ability and confidence about their business. This means that able salespeople who have ability and confidence about their business are not satisfied with their job advancement in the company. Therefore, enterprise need to provide training that can establish a business environment that can satisfy the salespeole's expectation level which will secure good salespeople. This study may have limitation when applied to future studies. First,in this study as with existing studies it investigates the control level that salespeople feel is being measured. Actuality, the control level that a manager enforces and the control level that salespeople perceive when one is late can be different. There is need to measure lateness from both the perspective of the manager and salespeople should be done to supplement this study in the future Second, this study used variables that were connected with action result but salespeople's job satisfaction is due to the result of control. But, focusing on result of control can provide a more important financial result than sales performance. This study is also limited in that it did not consider financial result by result of control. Further studies on this will need to be done in the future. Third, this study may have a further limitation,because the investigation was restricted to pharmaceutical salespeople selling to hospitals. It is necessary to execute investigations in various industries to increase the generalization of the study findings Fourth, in this study, role clarity and self-efficacy by response variable for control and considered job satisfaction by outcome variable of control was considered. But, can other variables be considered beside response variable and result variable for control? For example, can financial affairs and change of post by outcome variable along with business stress by response variable for control be considered? Therefore, future studies need to consider various control variables. Finally, there is limited supporting research in the field of marketing which restricts the generalization of the study finding along with collecting material through random sampling of a limited size. This research summarizes the research in this area, the difference from the previous research, and provides a discussion of its limitations and the need and direction for further future research.

  • PDF

Effects of Customers' Relationship Networks on Organizational Performance: Focusing on Facebook Fan Page (고객 간 관계 네트워크가 조직성과에 미치는 영향: 페이스북 기업 팬페이지를 중심으로)

  • Jeon, Su-Hyeon;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.2
    • /
    • pp.57-79
    • /
    • 2016
  • It is a rising trend that the number of users using one of the social media channels, the Social Network Service, so called the SNS, is getting increased. As per to this social trend, more companies have interest in this networking platform and start to invest their funds in it. It has received much attention as a tool spreading and expanding the message that a company wants to deliver to its customers and has been recognized as an important channel in terms of the relationship marketing with them. The environment of media that is radically changing these days makes possible for companies to approach their customers in various ways. Particularly, the social network service, which has been developed rapidly, provides the environment that customers can freely talk about products. For companies, it also works as a channel that gives customized information to customers. To succeed in the online environment, companies need to not only build the relationship between companies and customers but focus on the relationship between customers as well. In response to the online environment with the continuous development of technology, companies have tirelessly made the novel marketing strategy. Especially, as the one-to-one marketing to customers become available, it is more important for companies to maintain the relationship marketing with their customers. Among many SNS, Facebook, which many companies use as a communication channel, provides a fan page service for each company that supports its business. Facebook fan page is the platform that the event, information and announcement can be shared with customers using texts, videos, and pictures. Companies open their own fan pages in order to inform their companies and businesses. Such page functions as the websites of companies and has a characteristic of their brand communities such as blogs as well. As Facebook has become the major communication medium with customers, companies recognize its importance as the effective marketing channel, but they still need to investigate their business performances by using Facebook. Although there are infinite potentials in Facebook fan page that even has a function as a community between users, which other platforms do not, it is incomplete to regard companies' Facebook fan pages as communities and analyze them. In this study, it explores the relationship among customers through the network of the Facebook fan page users. The previous studies on a company's Facebook fan page were focused on finding out the effective operational direction by analyzing the use state of the company. However, in this study, it draws out the structural variable of the network, which customer committment can be measured by applying the social network analysis methodology and investigates the influence of the structural characteristics of network on the business performance of companies in an empirical way. Through each company's Facebook fan page, the network of users who engaged in the communication with each company is exploited and it is the one-mode undirected binary network that respectively regards users and the relationship of them in terms of their marketing activities as the node and link. In this network, it draws out the structural variable of network that can explain the customer commitment, who pressed "like," made comments and shared the Facebook marketing message, of each company by calculating density, global clustering coefficient, mean geodesic distance, diameter. By exploiting companies' historical performance such as net income and Tobin's Q indicator as the result variables, this study investigates influence on companies' business performances. For this purpose, it collects the network data on the subjects of 54 companies among KOSPI-listed companies, which have posted more than 100 articles on their Facebook fan pages during the data collection period. Then it draws out the network indicator of each company. The indicator related to companies' performances is calculated, based on the posted value on DART website of the Financial Supervisory Service. From the academic perspective, this study suggests a new approach through the social network analysis methodology to researchers who attempt to study the business-purpose utilization of the social media channel. From the practical perspective, this study proposes the more substantive marketing performance measurements to companies performing marketing activities through the social media and it is expected that it will bring a foundation of establishing smart business strategies by using the network indicators.

A Control Method for designing Object Interactions in 3D Game (3차원 게임에서 객체들의 상호 작용을 디자인하기 위한 제어 기법)

  • 김기현;김상욱
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.322-331
    • /
    • 2003
  • As the complexity of a 3D game is increased by various factors of the game scenario, it has a problem for controlling the interrelation of the game objects. Therefore, a game system has a necessity of the coordination of the responses of the game objects. Also, it is necessary to control the behaviors of animations of the game objects in terms of the game scenario. To produce realistic game simulations, a system has to include a structure for designing the interactions among the game objects. This paper presents a method that designs the dynamic control mechanism for the interaction of the game objects in the game scenario. For the method, we suggest a game agent system as a framework that is based on intelligent agents who can make decisions using specific rules. Game agent systems are used in order to manage environment data, to simulate the game objects, to control interactions among game objects, and to support visual authoring interface that ran define a various interrelations of the game objects. These techniques can process the autonomy level of the game objects and the associated collision avoidance method, etc. Also, it is possible to make the coherent decision-making ability of the game objects about a change of the scene. In this paper, the rule-based behavior control was designed to guide the simulation of the game objects. The rules are pre-defined by the user using visual interface for designing their interaction. The Agent State Decision Network, which is composed of the visual elements, is able to pass the information and infers the current state of the game objects. All of such methods can monitor and check a variation of motion state between game objects in real time. Finally, we present a validation of the control method together with a simple case-study example. In this paper, we design and implement the supervised classification systems for high resolution satellite images. The systems support various interfaces and statistical data of training samples so that we can select the most effective training data. In addition, the efficient extension of new classification algorithms and satellite image formats are applied easily through the modularized systems. The classifiers are considered the characteristics of spectral bands from the selected training data. They provide various supervised classification algorithms which include Parallelepiped, Minimum distance, Mahalanobis distance, Maximum likelihood and Fuzzy theory. We used IKONOS images for the input and verified the systems for the classification of high resolution satellite images.

Design and Implementation of Clipcast Service via Terrestrial DMB (지상파 DMB를 이용한 클립캐스트 서비스 설계 및 구현)

  • Cho, Suk-Hyun;Seo, Jong-Soo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.1
    • /
    • pp.23-32
    • /
    • 2011
  • Design and Implementation of Clipcast Service via Terrestrial DMB This paper outlines the system design and the implementation process of clipcast service that can send clips of video, mp3, text, images, etc. to terrestrial DMB terminals. To provide clipcast service in terrestrial DMB, a separate data channel needs to be allocated and this requires changes in the existing bandwidth allocation. Clipcast contents can be sent after midnight at around 3 to 4 AM, when terrestrial DMB viewship is low. If the video service bit rate is lowered to 352 Kbps and the TPEG service band is fully used, then 320 Kbps bit rate can be allocated to clipcast. To enable clipcast service, the terminals' DMB program must be executed, and this can be done through SMS and EPG. Clipcast service applies MOT protocol to transmit multimedia objects, and transmits twice in carousel format for stable transmission of files. Therefore, 72Mbyte data can be transmitted in one hour, which corresponds to about 20 minutes of full motion video service at 500Kbps data rate. When running the clip transmitted through terrestrial DMB data channel, information regarding the length of each clip is received through communication with the CMS(Content Management Server), then error-free files are displayed. The clips can be provided to the users as preview contents of the complete VOD contents. In order to use the complete content, the user needs to access the URL allocated for that specific content and download the content by completing a billing process. This paper suggests the design and implementation of terrestrial DMB system to provide clipcast service, which enables file download services as provided in MediaFLO, DVB-H, and the other mobile broadcasting systems. Unlike the other mobile broadcasting systems, the proposed system applies more reliable SMS method to activate the DMB terminals for highly stable clipcast service. This allows hybrid, i.e, both SMS and EPG activations of terminals for clipcast services.