• Title/Summary/Keyword: Inter Process Communication

Search Result 140, Processing Time 0.023 seconds

The Spatial Networks and Network Factors of the Internet Display Advertising Industry in Korea (한국 인터넷 디스플레이 광고산업의 공간 네트워크와 네트워크 형성요인)

  • Rhee, Ji-Won
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.274-291
    • /
    • 2012
  • Since the advent of the internet as representative of the development of information communication technology (ICT), information transfer forms have changed rapidly these days. In the new techno-economic paradigms, I would ultimately consider how spatial structures of a knowledge-based service industry have been altered dynamically. To delve into this background, this study conducts an empirical case study of the internet advertising industry, particularly, among the whole advertising industry. Therefore, the primary objective of this study is to identify dynamic characteristics of spatial networks among actors for knowledge creation in Korea's internet advertising industry. In addition, it also is to analyze the formative elements of spatial networks which would have an influence on constructing the space of new economic activities. There are multilateral approaches. This research is classified into types of actors such as inter-firm, intra-firm, and firm-customer, and categorized according to spatial ranges such as local, regional, global levels. In the meanwhile, formative factors of the spatial networks could draw a conclusion from two aspects: inter-firm networks in the process of business in the internet advertising industry, and individual networks in the nonoccupational aspect. Accordingly, the results of this study suggest that actors' networks of two perspectives would make mutually complementary relationships and create new relational spaces in the digital economy.

  • PDF

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

A Study on the Design and Validation of Switching Mechanism in Hot Bench System-Switch Mechanism Computer Environment (HBS-SWMC 환경에서의 전환장치 설계 및 검증에 관한 연구)

  • Kim, Chong-Sup;Cho, In-Je;Ahn, Jong-Min;Lee, Dong-Kyu;Park, Sang-Seon;Park, Sung-Han
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.7
    • /
    • pp.711-719
    • /
    • 2008
  • Although non-real time simulation and pilot based evaluations are available for the development of flight control computer prior to real flight tests, there are still many risky factors. The control law designed for prototype aircraft often leads to degraded performance from the initial design objectives, therefore, the proper evaluation methods should be applied such that flight control law designed can be verified in real flight environment. The one proposed in this paper is IFS(In-Flight Simulator). Currently, this system has been implemented into the F-18 HARV(High Angle of Attack Research Vehicle), SU-27 and F-16 VISTA(Variable stability. In flight Simulation Test Aircraft) programs. This paper addresses the concept of switching mechanism for FLCC(Flight Control Computer)-SWMC(Switching Mechanism Computer) using 1553B communication based on flight control law of advanced supersonic trainer. And, the fader logic of TFS(Transient Free Switch) and stand-by mode of reset '0' type are designed to reduce abrupt transient and minimize the integrator effect in pitch axis control law. It hans been turned out from the pilot evaluation in real time that the aircraft is controllable during the inter-conversion process through the flight control computer, and level 1 handling qualities are guaranteed. In addition, flight safety is maintained with an acceptable transient response during aggressive maneuver performed in severe flight conditions.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

WAP Abstract Kernel Layer Supporting Multi-platform (다중 플랫폼 지원을 위한 WAP 추상 커널 계층)

  • Gang, Yeong-Man;Han, Sun-Hui;Jo, Guk-Hyeon
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.265-272
    • /
    • 2001
  • In case of implementing a complicated application like WAP (Wireless Application Protocol) in a mobile terminal with the characteristics of bare machine and versatile kernel aspects of which are control, interrupt and IPC(Inter Process Communication), a special methodology should be needed. If not, it will cause more cost and human resources, even delayed product into launching for the time-to-market. This paper suggests AKL, (Abstract Kernel Layer) for the design and implementation of WAP on basis of multi-platform. AKL is running on the various kernel including REX, MS-DOS, MS-Window, UNIX and LINUX. For the purpose of it, AKL makes machine-dependant features be minimized and supports a consistent interface on API (Application Program Interface) point of view. Therefore, it makes poring times of a device be shorten and makes easy of maintenance. We validated our suggestion as a consequent of porting WAP into PlamV PDA and mobile phone with AKL.

  • PDF

A Study on Community Mapping for ICT-Based Livestock Infectious Disease Response (ICT 기반 가축 감염병 대응을 위한 커뮤니티 매핑 연구)

  • Koo, Jee Hee;Pyeon, Mu Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.3
    • /
    • pp.247-257
    • /
    • 2020
  • Livestock epidemics, such as foot and mouth disease, are causing enormous economic losses due to their strong infectious power. Early detection of infectious diseases in livestock is very important, but it is difficult to diagnose early in individual farms, and there are frequent cases of transmission through inter-farm movement such as veterinarians and feeding vehicles. In this study, we studied the technology that enables rapid diagnosis without veterinarian farm visits and prevents further spread by automatically monitoring the body temperature of livestock using ubiquitous-based information and communication technology in the early stage of onset and sending it in real time. We have presented a technique for systematically managing livestock epidemics at the farm level, regional level, and national level by using the community mapping technique by using the remote medical treatment system linked to the automatically collected information. In this process, community mapping items for each step and stakeholders were derived for crowd sourcing based spatial information technology.

A Study on The Correction of The Channel Equalizer Decision Error Using Channel Estimator (채널추정기를 이용한 등화기 결정오류 정정 알고리즘에 관한 연구)

  • Kim, Seon-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.18-24
    • /
    • 2017
  • The process of transmitting messages through a medium with a limited bandwidth or channel dispersion inevitably involves signal distortion and noise influxes, resulting in the degradation of transmission quality due to the inter-symbol interference and additional noise, which increases the error rate of the received symbols. The main role of the equalizer is to remove the channel distortion and noise from the received signal to recover the transmitted messages. A number of studies on the equalizer composed of a combination of linear filter and error control coding have shown that they played a key role in enhancing the transmission efficiency, which is essential for digital communication. This paper proposes a new algorithm to correct the residual symbol errors in the message signal. In general, equalizer performance improvement algorithms were developed to improve the initial convergence speed or steady-state error. In this paper, however, the equalizer input signal was reconstructed using the equalizer decision symbols and the channel estimates to directly correct the decision errors by analyzing the statistical characteristics of the difference signal between the actual received signal and the reconstructed signal.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

CNN based dual-channel sound enhancement in the MAV environment (MAV 환경에서의 CNN 기반 듀얼 채널 음향 향상 기법)

  • Kim, Young-Jin;Kim, Eun-Gyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1506-1513
    • /
    • 2019
  • Recently, as the industrial scope of multi-rotor unmanned aerial vehicles(UAV) is greatly expanded, the demands for data collection, processing, and analysis using UAV are also increasing. However, the acoustic data collected by using the UAV is greatly corrupted by the UAV's motor noise and wind noise, which makes it difficult to process and analyze the acoustic data. Therefore, we have studied a method to enhance the target sound from the acoustic signal received through microphones connected to UAV. In this paper, we have extended the densely connected dilated convolutional network, one of the existing single channel acoustic enhancement technique, to consider the inter-channel characteristics of the acoustic signal. As a result, the extended model performed better than the existed model in all evaluation measures such as SDR, PESQ, and STOI.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.