• Title/Summary/Keyword: Internet Address

Search Result 887, Processing Time 0.022 seconds

A Study on the Support of Intermediate Node Mobility by Double Paths in CCN Real-Time Services (CCN 실시간 서비스 간 이중 경로에 의한 중간노드 이동성 지원에 관한 연구)

  • Keum, Suk-Ju;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.825-834
    • /
    • 2021
  • With the development of various devices and Internet platforms, production and demand for content are increasing rapidly. However, effective response to exponentially increasing data usage is difficult in current TCP/IP schemes. As a result, with the emergence of an alternative called CCN, data can be transmitted and received from the host-centered to the content-oriented, and large-capacity content can be handled with more mitigated network resources. In this paper, we will address intermediate node mobility, which is one of the areas studied in CCN. In CCN, real-time services are a very important factor for information providers as well as requestors. However, when a node departure situation occurs, packet transmission and transmission speed decreases. Therefore, to ensure these numbers, even if the intermediate node deviates using a dual path, it provides a complete QoS (Quality of Service) using an alternative path.

A Comparative Study of Men and Women on the Preparation of Retirement Life

  • Lim, Ahn Na
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.113-121
    • /
    • 2021
  • This study was conducted on 1,174 retirees in their 50s and 60s nationwide using the 7th data of the National Pension Service's National Elderly Security Panel Survey. We were able to confirm the following results through the SPSS WIN 18.0 program.. First, men showed a higher level of education than women. From these results, it is expected that men will be better prepared for retirement. Second, men had spouses and two or more household members than women. According to previous studies showing that men are better prepared for retirement if they have a spouse, it is expected that men are better prepared for retirement. Second, 38% of men and 62% of women were voluntary retirees. Third, both men and women responded that their own and spouses should play the main role in preparing for retirement. Fourth, both men and women had very low rates of preparation for old age, economic independence, and public and private pensions. Among them, women were lower than men. Fifth, economic problem solving, health, and medical care were the priority as parts to be done for retirement in oneself and society. Based on these results, the directions for preparing retirees for retirement are as follows. First, education on wage peak system, retirement age extension and financial management for involuntary retirees is required, and guidance and management methods on health care and disease should be provided to address needs for health and health care. Women had more voluntary retirees than men, and they need to know why. Second, when both men and women are very poor at preparing for retirement, there should be job creation measures to ensure that they and their spouses are fully prepared for retirement.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

Digital Transformation of Education Brought by COVID-19 Pandemic

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.183-193
    • /
    • 2021
  • In this paper, the author found and analyzed the problems caused by the change of traditional teaching methods to online in classrooms and laboratories. Looking at the analysis of major problems, first, there were various technical problems, including not all environments and facilities being connected to the Internet. Second, the effectiveness of virtual classes, which were suddenly switched online, could also be questioned. Finally, in the face of a new environment, the stress of teachers to adapt rapidly to the new teaching methodology was a problem. The author proposed digital transformation as a way to address these problems. The author analyzed educational changes, learning modalities and various technical tools, and various tasks to enable digital transformation. First, the author investigated, analyzed, and presented the factors necessary to efficiently operate the classroom environment that will change to online. Next, the author analyzed the factors and problems needed to make the students' classes reliable and efficient, and proposed solutions. Finally, the author pointed out the problem that during online lectures, the responsibility of learning is excessively transferred from teachers to students, and proposed a solution to this problem. Subsequently, the author proposed future studies.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

Associations between depressed mood with negative health behaviors of Koreans during the COVID-19 pandemic (COVID-19 유행 기간 동안 한국인의 우울한 기분과 부정적인 건강 행동 사이의 연관성)

  • Jung, Suyeon;Lee, Ji-Young;Kim, Heejin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.79-88
    • /
    • 2022
  • The objective of this study was to assess the association of changes in behaviors and depressed mood during the COVID-19 pandemic in Korea. A cross-sectional internet-based survey was conducted, using proportional samples of Korean adults and a logistic regression model was used to assess the association. As a result, negative changes of daily sitting or lying down time, daily walking time, smoking, and alcohol consumption were associated with being more depressed during the COVID-19 pandemic [odds ratios (ORs): 2.23 (95% CI=1.77-2.81), 2.04 (95% CI=1.63-2.56), 2.84 (95% CI=1.51-5.36), and 1.82 (95% CI=1.26-2.63), respectively]. This indicates that strategies to promote positive health behaviors change (increased activities and decreased consumption of smoking and alcohol) could help address psychological distress during the COVID-19 pandemic.

Dynamic Adjustment of the Pruning Threshold in Deep Compression (Deep Compression의 프루닝 문턱값 동적 조정)

  • Lee, Yeojin;Park, Hanhoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.3
    • /
    • pp.99-103
    • /
    • 2021
  • Recently, convolutional neural networks (CNNs) have been widely utilized due to their outstanding performance in various computer vision fields. However, due to their computational-intensive and high memory requirements, it is difficult to deploy CNNs on hardware platforms that have limited resources, such as mobile devices and IoT devices. To address these limitations, a neural network compression research is underway to reduce the size of neural networks while maintaining their performance. This paper proposes a CNN compression technique that dynamically adjusts the thresholds of pruning, one of the neural network compression techniques. Unlike the conventional pruning that experimentally or heuristically sets the thresholds that determine the weights to be pruned, the proposed technique can dynamically find the optimal thresholds that prevent accuracy degradation and output the light-weight neural network in less time. To validate the performance of the proposed technique, the LeNet was trained using the MNIST dataset and the light-weight LeNet could be automatically obtained 1.3 to 3 times faster without loss of accuracy.

ndnSIM based NDN Network Implementation and Performance Evaluation (ndnSIM 기반 NDN 네트워크 구현 및 성능 평가)

  • Park, Sanghyeon;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.725-730
    • /
    • 2022
  • Named Data Networking (NDN) is a representative technology of ICN that realizes the future Internet architecture. NDN searches for data by its content and not by its host IP address. The consumer generates an interest packet and sends it to the NDN network. The NDN network uses three tables such as CS, FIB, and PIT and forwards the received interest packet to the next hop. The producer transmits the data packet to the consumer through a name-based forwarding scheme. In this paper, we design and implement an ndnSIM-based NDN network and perform performance evaluation. We analyze the ndnSIM structure and develop a 6-node congested NDN network and a 9-node grid NDN network using ndnSIM. In the simulation, the performance of latency and throughput of the interest packet rate are measured. We analyze the effect of congestion on the latency and throughput of the NDN network. This approach will help researchers in the future.

Mobile Office Construction on a Geotechnical Information System (지반정보시스템 기반의 Mobile Office 구축)

  • Kim, Su-Young;Jung, Seung-Hyun;Kang, Yu-Jin;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.125-135
    • /
    • 2010
  • Mobile office is becoming common as advances in mobile devices such as PDAs, Smart-phones, or wireless Internet. In this paper, we construct a mobile office environment on a geotechnical information system(GIS). Especially, web services and XML technology combined with SOA (service oriented services) are adopted for various types of mobile devices and services in a minimum cost. Web service and XML can provide an excellent SW reusability, extensibility, and interoperability even for heterogeneous distributed systems. Applications can exploit web services by just knowing server's address. Prototype system integrates a client in Visual Basic.Net and server in Java via the web services and XML data exchange. We verify effectiveness of the approach through the implementation of prototype system.

Real-time wireless Audio/video Transmission Technique for Handheld Devices (휴대용 단말기를 위한 실시간 무선 영상 음성 전송 기술)

  • Yoon, Kyung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.111-117
    • /
    • 2009
  • Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.