• 제목/요약/키워드: Interaction Protocol

검색결과 139건 처리시간 0.025초

Hypergraph Game Theoretic Solutions for Load Aware Dynamic Access of Ultra-dense Small Cell Networks

  • Zhu, Xucheng;Xu, Yuhua;Liu, Xin;Zhang, Yuli;Sun, Youming;Du, Zhiyong;Liu, Dianxiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.494-513
    • /
    • 2019
  • A multi-channel access problem based on hypergraph model in ultra-dense small cell networks is studied in this paper. Due to the hyper-dense deployment of samll cells and the low-powered equipment, cumulative interference becomes an important problem besides the direct interference. The traditional binary interference model cannot capture the complicated interference relationship. In order to overcome this shortcoming, we use the hypergraph model to describe the cumulative interference relation among small cells. We formulate the multi-channel access problem based on hypergraph as two local altruistic games. The first game aims at minimizing the protocol MAC layer interference, which requires less information exchange and can converge faster. The second game aims at minimizing the physical layer interference. It needs more information interaction and converges slower, obtaining better performance. The two modeled games are both proved to be exact potential games, which admit at least one pure Nash Equilibrium (NE). To provide information exchange and reduce convergecne time, a cloud-based centralized-distributed algorithm is designed. Simulation results show that the proposed hypergraph models are both superior to the existing binary models and show the pros and cons of the two methods in different aspects.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • 통합자연과학논문집
    • /
    • 제11권4호
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Measuring Visual Attention Processing of Virtual Environment Using Eye-Fixation Information

  • Kim, Jong Ha;Kim, Ju Yeon
    • Architectural research
    • /
    • 제22권4호
    • /
    • pp.155-162
    • /
    • 2020
  • Numerous scholars have explored the modeling, control, and optimization of energy systems in buildings, offering new insights about technology and environments that can advance industry innovation. Eye trackers deliver objective eye-gaze data about visual and attentional processes. Due to its flexibility, accuracy, and efficiency in research, eye tracking has a control scheme that makes measuring rapid eye movement in three-dimensional space possible (e.g., virtual reality, augmented reality). Because eye movement is an effective modality for digital interaction with a virtual environment, tracking how users scan a visual field and fix on various digital objects can help designers optimize building environments and materials. Although several scholars have conducted Virtual Reality studies in three-dimensional space, scholars have not agreed on a consistent way to analyze eye tracking data. We conducted eye tracking experiments using objects in three-dimensional space to find an objective way to process quantitative visual data. By applying a 12 × 12 grid framework for eye tracking analysis, we investigated how people gazed at objects in a virtual space wearing a headmounted display. The findings provide an empirical base for a standardized protocol for analyzing eye tracking data in the context of virtual environments.

BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법 (Countermeasure against MITM attack Integrity Violation in a BLE Network)

  • 한혜경;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권2호
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

A Systematic Literature Review on Feedback Types for Continuous Learning Enhancement of Online Learners

  • Yoseph Park
    • International Journal of Advanced Culture Technology
    • /
    • 제12권3호
    • /
    • pp.449-465
    • /
    • 2024
  • This study conducted a systematic literature review using online databases to investigate the effective feedback types that enhance the learning experiences of online students. Feedback is a critical component for learner success. With the expansion of online education, the importance of feedback has become more evident due to the reduced interaction between instructors and learners. Instructors must provide high-quality feedback that motivates learners and supports their educational goals. This involves using automated tools appropriate for the environment and effective feedback strategies to deliver personalized feedback. The literature was gathered through an extensive search process, adhering to predetermined inclusion and exclusion criteria, and included a risk assessment of selected studies, drawing from sources such as Google Scholar, Elsevier, and other Scopus-indexed journals. The review adhered to the guidelines set forth by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). Specific keywords related to the study's focus, including "Online learning," "Improving learning," "Learner performance," "Feedback type," and "Feedback," guided the database searches. The protocol for selecting systematic reviews on learning enhancement involved screening articles published from 2013 to 2021 based on their titles and abstracts according to established criteria. Analyzing and studying data on learning patterns in non-face-to-face educational environments can improve learners' needs and educational effectiveness. Selecting the right types of feedback, taking into account the learners' levels and educational objectives, is crucial for providing effective feedback. A variety of feedback types are essential for the continuous improvement of learners' learning.

KoFlux 에디 공분산 자료 처리의 표준화 (Standardization of KoFlux Eddy-Covariance Data Processing)

  • 홍진규;권효정;임종환;변영화;이조한;김준
    • 한국농림기상학회지
    • /
    • 제11권1호
    • /
    • pp.19-26
    • /
    • 2009
  • 연속적인 지표 플럭스 관측으로부터 축적되는 엄청난 양의 자료를 체계적으로 처리분석하고 종합하여 일관성 있는 결과를 도출해 내려면 에디 공분산 자료 처리 방법의 표준화가 우선되어야 한다. 이 논문에서는 국내 타워 플럭스 관측 네트워크인 KoFlux의 표준화된 자료 처리 방법을 소개하고, 처리 방법이 다른 경우에 생길 수 있는 지표 플럭스의 불확실성을 평가하였다. 광릉 활엽수림에서 관측된 탄소 플럭스의 경우, 순생태계교환량(net ecosystem exchange, NEE)과 생태계호흡량(ecosystem respiration, Re)은 각각 자료 처리 방법의 차이에 따라 민감한 반응을 보였다. 그러나 두 양이 서로 상쇄되어, 총일차생산량(gross primary productivity, GPP=NEE+Re)은 자료 처리 방법이 다른 경우에도 불구하고 오차 범위 내에서 일치하였다. 이러한 결과는 GPP를 산출할 때에 Re를 독립적으로 관측하는 것이 중요함을 시사한다. 반면 수증기 플럭스(증발산)의 경우, 야간 토양 증발이 작아서 연 적산증발산량은 자료 처리 방법에 민감하지 않았다. 이렇게 표준화된 자료처리 프로토콜을 아시아 타워 플럭스 네트워크인 AsiaFlux에 적용할 경우, 지역 규모 탄소 순환, 역학 식생 및 지면과정 모형의 검증을 위한 일관성 있는 데이터베이스의 구축이 가능해 질 것이다.

Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법 (HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications)

  • 서영웅;박승영
    • 정보과학회 논문지
    • /
    • 제44권1호
    • /
    • pp.1-12
    • /
    • 2017
  • 지속적으로 증가하는 인터넷 서비스 요구사항을 만족하기 위하여 인터넷 서비스를 제공하는 시스템은 웹 서버와 DB(database) 서버로 구성된 multitier 구조로 변화되어왔다. 이러한 multitier 웹 어플리케이션 환경에서 기존의 IDS(intrusion detection system)는 웹 서버와 DB 서버에서 misused traffic pattern들이나 signature들을 매칭하여 이미 알려진 공격을 검출하고 해당 접속을 차단하는 방식으로 동작한다. 하지만 이러한 방식의 IDS는 정상적인 HTTP(hypertext transfer protocol) request를 이용하여 악의적으로 DB 서버의 내용의 변조를 시도하는 attacker의 공격을 DB 서버단에서 제대로 검출하지 못한다. 그 이유는 DB 서버는 웹 서버로부터 받은 SQL(structured query language) query가 어떤 사용자의 HTTP request에 의해 발생한 것인지 알지 못하는 상태에서 처리하며, 웹 서버는 SQL query 처리 결과 중 어떤 것이 악의적으로 DB 서버 변조를 시도한 SQL query에 의한 결과인지 알 수 없기 때문이다. 이런 공격을 검출하기 위해서는 HTTP request와 SQL query 사이의 상호작용관계를 명확히 파악하고, 이를 이용하여 악의적인 SQL query를 발생시킨 사용자를 추적해야 한다. 이를 위해서는 해당 시스템의 소스코드를 분석하거나 application logic을 완벽하게 파악해야 하므로 현실적으로 불가능하다. 본 논문에서는 웹 서버와 DB 서버에서 제공하는 로그만을 이용하여 모든 HTTP request와 SQL query간의 mapping 관계를 찾아내고, 이를 이용하여 특정 SQL query를 발생시킨 HTTP request를 추정하는 기법을 제안한다. 모의실험을 통하여 94%의 정확도로 HTTP request를 추정할 수 있음을 확인하였다.

Optimization of a Virus-Induced Gene Silencing System with Soybean yellow common mosaic virus for Gene Function Studies in Soybeans

  • Kim, Kil Hyun;Lim, Seungmo;Kang, Yang Jae;Yoon, Min Young;Nam, Moon;Jun, Tae Hwan;Seo, Min-Jung;Baek, Seong-Bum;Lee, Jeom-Ho;Moon, Jung-Kyung;Lee, Suk-Ha;Lee, Su-Heon;Lim, Hyoun-Sub;Moon, Jae Sun;Park, Chang-Hwan
    • The Plant Pathology Journal
    • /
    • 제32권2호
    • /
    • pp.112-122
    • /
    • 2016
  • Virus-induced gene silencing (VIGS) is an effective tool for the study of soybean gene function. Successful VIGS depends on the interaction between virus spread and plant growth, which can be influenced by environmental conditions. Recently, we developed a new VIGS system derived from the Soybean yellow common mosaic virus (SYCMV). Here, we investigated several environmental and developmental factors to improve the efficiency of a SYCMV-based VIGS system to optimize the functional analysis of the soybean. Following SYCMV: Glycine max-phytoene desaturase (GmPDS) infiltration, we investigated the effect of photoperiod, inoculation time, concentration of Agrobacterium inoculm, and growth temperature on VIGS efficiency. In addition, the relative expression of GmPDS between non-silenced and silenced plants was measured by qRT-PCR. We found that gene silencing efficiency was highest at a photoperiod of 16/8 h (light/dark) at a growth temperature of approximately $27^{\circ}C$ following syringe infiltration to unrolled unifoliolate leaves in cotyledon stage with a final SYCMV:GmPDS optimal density $(OD)_{600}$ of 2.0. Using this optimized protocol, we achieved high efficiency of GmPDS-silencing in various soybean germplasms including cultivated and wild soybeans. We also confirmed that VIGS occurred in the entire plant, including the root, stem, leaves, and flowers, and could transmit GmPDS to other soybean germplasms via mechanical inoculation. This optimized protocol using a SYCMV-based VIGS system in the soybean should provide a fast and effective method to elucidate gene functions and for use in large-scale screening experiments.

RTOS기반 임베디형 LCD모듈 개발 (Development of Embedded LCD Module based on RTOS)

  • 이민중;박진현;진태석;차경환;최영규
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.209-212
    • /
    • 2008
  • 몇 년 동안 개발자의 편리성을 위해서 문자 및 그래픽 LCD 모듈을 이용한 산업용 및 개인용 제품이 많이 등장하였다. 최근에는 홈 네트워크 및 지능형 로봇분야의 발전에 힘입어 사람과 기기 상호간의 인터페이스에 대한 요구가 많아지고 있다. 그래서 최근 그래픽 인터페이스를 위한 TFT-LCD를 탑재한 제품들이 많이 출시되고 있다. 하지만 실제 제품의 기능을 보면 저가형 소형칩(ATMega128등)을 사용하여도 되지만 터치스크린 기능이 내장된 TFT-LCD를 구동시키기 위해서 ARM프로세서 등 고성능 칩을 사용하여야 하는 불편함이 있다. 그래서 본 연구개발에서는 일반 사용자 또는 개발자가가 쉽게 TFT-LCD 및 터치스크린을 사용할 수 있는 임베디드형 TFT-LCD 제어모듈을 개발하고자 한다. 임베디드형 TFT-LCD 모듈을 개발하기 위해서 기본적으로 RTOS를 내장하고, 사용자와 인터페이스를 쉽게 하기 위해 LAN, USB, 디지털 IO 등을 내장하는 것으로 한다.

  • PDF