• Title/Summary/Keyword: Internet Address

Search Result 883, Processing Time 0.024 seconds

A Study on the Informatization Planning of Postal Address (우편주소 정보화 방안 수립에 관한 연구)

  • Chang, Tai-Woo;Jeong, Han-Il;Park, Chank-Won
    • IE interfaces
    • /
    • v.18 no.1
    • /
    • pp.104-116
    • /
    • 2005
  • In this paperm we provide a plan of construction, employment and management of the Korean postal address database and discuss the design of to-be models for it. For the purpose, we adopt and modify the information strategy planning methodology to fit it into our study. We examine the managerial environments and limitations of the postal services and define the requirements as a result. The U.S. Postal Service (USPS) was chosen as the best practice for a benchmarking and gap analysis with its advanced management of address information. After analyzing the current status of the postal business processes and information systems used, we classify the products and the services of USPS by the process to which they are applied and propose a deployment plan. In order to design a to-be model, we define the operating and managing functions for the address database and specify the scenario according to the functions. By managing the address database and supporting the postal services, it could be possible to make the business competitive and satisfy the customer demands.

On the Internet Securities Transaction (인터넷에 의한 증권거래에 관하여 - ILA. Committee on International Securities Regulation에서의 논의 -)

  • 박영길
    • Journal of Arbitration Studies
    • /
    • v.12 no.2
    • /
    • pp.221-262
    • /
    • 2003
  • In recent years, information technological revolution of using Internet in the Stock Market has shown reconsideration of Securities and Exchange Law. Since the 1998 Taipei Conference, ILA have studied upon it and presented 6th Interim Report during the 2000 London Conference. This paper summarizes a part of the 6th Interim Report. The Internet has created a medium to which traditional principles of jurisdiction may not have full relevance. To understand the jurisdictional issues posed by this new medium, we should first review the traditional principles of jurisdiction under international, U. S. law and Other Countries law. In previous reports, the general principles of jurisdiction in international law have been described. These principles are, however, difficult to apply in the context of Internet and other forms of computerized securities trading. Regulators all over the world are trying to address and solve jurisdictional issues raised by the Internet. The traditional rules of jurisdiction in international law, grounded as they are on a geography-based approach, may be in the process of being undermined by the Internet and other global networks allowing for remote access to information and to markets.

  • PDF

Method to Limit The Spread of Data in Wireless Content-Centric Network (무선 Content-Centric Network에서 Data 확산 제한 방법)

  • Park, Chan-Min;Kim, Byung-Seo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.1
    • /
    • pp.9-14
    • /
    • 2016
  • Since Devices such labtop, tablet, smartphone have been developed, a lots of huge data that can be classified as content is flooded in the network. According to changing Internet usage, Content-Centric Network(CCN) what is new concept of Internet Architecture is appeared. Initially, CCN is studied on wired network. but recently, CCN is also studied on wireless network. Since a characteristic of wireless environment is different from a characteristic of wired environment, There are issues in wireless CCN. In this paper, we discuss improvement method of Data spread issue on wireless CCN. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded. As using the proposed scheme, we reduce the spread of Data and offer priority of forwarding to nodes of shortest path, reduce delay by modifying retransmission waiting time.

IP lookup scheme for high speed packet forwarding (고속 패킷(packet) 처리를 위한 IP lookup scheme)

  • 박우종;정민섭;정진우;강성봉
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.213-216
    • /
    • 2000
  • In this paper, we propose a new scheme which improves the IP address lookup time. The new scheme is composed of two core technologies, named the prefix alignment and the prefix distance ordering. Now, as the Internet is being used commonly by improving the data transmission capacity, the need for enlarging the bandwidth of the Internet is on the rise. IP address lookup performance problem is an important obstacle in the router executing high speed packet forwarding. This results from the fact that the prefixes routing table is composed of and the traffic being processed in unit time are largely on the increase. The proposed lookup scheme is divided into two parts in technology, the one is the algorithm forming a routing database(routing table), the other is the lookup procedure in the actual packet processing.

  • PDF

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.

A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate (공인인증서를 이용한 주민등록번호 대체수단에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.

An efficent method of binocular data reconstruction

  • Rao, YunBo;Ding, Xianshu;Fan, Bojiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3721-3737
    • /
    • 2015
  • 3D reconstruction based on binocular data is significant to machine vision. In our method, we propose a new and high efficiency 3D reconstruction approach by using a consumer camera aiming to: 1) address the configuration problem of dual camera in the binocular reconstruction system; 2) address stereo matching can hardly be done well problem in both time computing and precision. The kernel feature is firstly proposed in calibration stage to rectify the epipolar. Then, we segment the objects in the camera into background and foreground, for which system obtains the disparity by different method: local window matching and kernel feature-based matching. Extensive experiments demonstrate our proposed algorithm represents accurate 3D model.

Robust Capacity Planning in Network Coding under Demand Uncertainty

  • Ghasvari, Hossien;Raayatpanah, Mohammad Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2840-2853
    • /
    • 2015
  • A major challenge in network service providers is to provide adequate resources in service level agreements based on forecasts of future demands. In this paper, we address the problem of capacity provisioning in a network subject to demand uncertainty such that a network coded multicast is applied as the data delivery mechanism with limited budget to purchase extra capacity. We address some particular type of uncertainty sets that obtain a tractable constrained capacity provisioning problem. For this reason, we first formulate a mathematical model for the problem under uncertain demand. Then, a robust optimization model is proposed for the problem to optimize the worst-case system performance. The robustness and effectiveness of the developed model are demonstrated by numerical results. The robust solution achieves more than 10% reduction and is better than the deterministic solution in the worst case.

Identification of mobile terminal for mobility support in all-IP Network (All-IP 기반 이동성 지원 네트워크에서 이동 단말 식별 체계)

  • Kim, Sang-Eon;Park, Se-Jun;Chang, Byung-Soo;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.318-322
    • /
    • 2005
  • An IP address plays both endpoint identifier and location identifier in wire based network. However, one IP address can not provide both endpoint identifier and location identifier for mobile Internet environment such as cellular network and portable Internet. To resolve this problem, mobile IPv4 and mobile IPv6 technologies are developed. These technologies are based on the concept of separation the endpoint identifier from location identifier. This paper describes some results of the recent studies such as mobile IPv4, mobile IPv6, host identify protocol and so on. Also, we propose the criteria to decide which technologies are suitable for deployment in the practical network environment.

  • PDF

Analysis of a NEMO enabled PMIPv6 based Mobility Support for an Efficient Information Transmission

  • Caytiles, Ronnie D.;Park, Byungjoo
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.197-205
    • /
    • 2018
  • Nowadays, wireless sensor networks (WSNs) have been widely adopted in structural health monitoring (SHM) systems for social overhead capital (SOC) public infrastructures. Structural health information, environmental disturbances and sudden changes of weather conditions, damage detections, and external load quantizing are among the capabilities required of SHM systems. These information requires an efficient transmission with which an efficient mobility management support for wireless networks can provide. This paper deals with the analysis of mobility management schemes in order to address the real-time requirement of data traffic delivery for critical SHM information. The host-based and network-based mobility management protocols have been identified and the advantages of network mobility (NEMO) enabled Proxy Mobile Internet Protocol version 6 (PMIPv6) have been leveraged in order to address the SHM information transmission needs. The scheme allows an efficient information transmission as it improves the handover performance due to shortened handover latency as well as reduced signaling overhead.