• Title/Summary/Keyword: Key message

Search Result 493, Processing Time 0.026 seconds

Formal Specification and Modeling Techniques of Component Workflow Variability (컴포넌트 워크플로우 가변성의 정형 명세 및 모델링 기법)

  • Lee, Jong-Kook;Cho, Eun-Sook;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.703-725
    • /
    • 2002
  • It is well recognized that component-based development (CBD) is an effective approach to manage the complexity of modem software development. To achieve the benefits of low-cost development and higher productivity, effective techniques to maximize component reusability should be developed. Component is a set of related concepts and objects, and provides a particular coarse-grained business service. Often, these components include various message flows among the objects in the component, called 'business workflow`. Blackbox components that include but hide business workflow provide higher reusability and productivity. A key difficulty of using blackbox components with business workflow is to let the workflow be customized by each enterprise. In this paper, we provide techniques to model the variability of family members and to customize the business workflow of components. Our approach is to provide formal specification on the component variability, and to define techniques to customize them by means of the formalism.

Efficient Braille Keyboard of Smart Phone for the Blind (전맹인을 위한 효율적인 스마트폰 점자키보드 시스템 기술)

  • Koo, Min-Su;Kim, Byung-Gyu;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.11-17
    • /
    • 2015
  • According to NIA (National Information Society Agency) report, digital divide is a vicious circle which makes quality interval of human's life between people who have information and relatively not. Especially in a smart phone society, there is a big problem between disabled people and normal people. This paper suggests a braille keyboard system for the blind to solve these problems. It is designed for portable use, convenience and quick text typing based on bluetooth communication technique. In text input test, all texts (Korean, English, number) were accurately expressed and typing speed was about 22 [c/m](characters per a minute). Especially, we design text2voice function to provide more accurate key input system. Popular applications such as call, alarm, message, kakao talk, internet, music, were performed without carring problems using the proposed braille keyboard system. The proposed technique is thought to contribute to eliminating the digital divide through the expansion of smartphone users.

Distribution of Inter-Contact Time: An Analysis-Based on Social Relationships

  • Wei, Kaimin;Duan, Renyong;Shi, Guangzhou;Xu, Ke
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.504-513
    • /
    • 2013
  • Communication in delay tolerant networks (DTNs) relies on message transport by mobile nodes, and a correct understanding of the node mobility characteristics is therefore crucial to the design of an efficient DTN routing protocol. However, previous work has mainly focused on uncovering all behaviors of node movement, which is not conducive to accurately detecting the specific movement characteristics of a different node. In this paper, we seek to address this problem based on a consideration of social relationships. We first consider social ties from both static and dynamic perspectives. For a static perspective, in addition to certain accidental events, social relations are considered for a long time granularity and tend to be stable over time. For a dynamic perspective, social relations are analyzed in a relatively short time granularity and are likely to change over time. Based on these perspectives, we adopted different efficient approaches to dividing node pairs into two classes, i.e., familiar and unfamiliar pairs. A threshold approach is used for static social ties whereas a density-based aggregation method is used for dynamic social relationships. Extensive experimental results show that both familiar and unfamiliar node pairs have the same inter-contact time distribution, which closely follows a power-law decay up to a certain point, beyond which it begins to exponentially decay. The results also demonstrate that the inter-contact time distribution of familiar pairs decays faster than that of unfamiliar pairs, whether from a static or dynamic perspective. In addition, we also analyze the reason for the difference between the inter-contact time distributions of both unfamiliar and familiar pairs.

High Performance Lossless Data Embedding Using a Moving Window (움직이는 창을 이용한 고성능 무손실 데이터 삽입 방법)

  • Kang, Ji-Hong;Jin, Honglin;Choe, Yoon-Sik
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.801-810
    • /
    • 2011
  • This paper proposes a new lossless data embedding algorithm on spatial domain of digital images. A single key parameter is required to embed and extract data in the algorithm instead of embedding any additional information such as the location map. A $3{\times}3$ window slides over the cover image by one pixel unit, and one bit can be embedded at each position of the window. So, the ideal embedding capacity equals to the number of pixels in an image. For further increase of embedding capacity, new weight parameters for the estimation of embedding target pixels have been used. As a result, significant increase in embedding capacity and better quality of the message-embedded image in high capacity embedding have been achieved. This algorithm is verified with simulations.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.

An Efficient Service Discovery for Mobile Ad Hoc Networks (모바일 애드-혹 네트워크를 위한 효율적인 서비스 디스커버리)

  • Kang, Eun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.947-954
    • /
    • 2009
  • In mobile ad hoc networks, service discovery to search for an available service is an important issue. In this paper, we propose an efficient service discovery protocol that is combined a dht-based service discovery scheme and a P2P caching-based information spreading scheme. Proposed scheme store key information in hashed zone and search services using it's information. To search quickly a service, it use its physical neighbors information which collected by 1-hop hello message between a node and its physical neighbors. We do not use a central look up server and do not rely on flooding. Hence, it uniquely balanced all node's load in mobile ad hoc networks and reduced the number of messages exchanged, network load and response time. The simulation results show that our protocol outperforms DHT-based and flooding protocols.

Xenomai-based Embedded Controller for High-Precision, Synchronized Motion Applications (고정밀 동기 모션 제어 응용을 위한 Xenomai 기반 임베디드 제어기)

  • Kim, Chaerin;Kim, Ikhwan;Kim, Taehyoun
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.173-182
    • /
    • 2015
  • Motion control systems are widely deployed in various industrial automation processes. The motion controller, which is a key element of motion control systems, has stringent real-time constraints. The controller must provide a short and deterministic control message transmission cycle, and minimize the actuation deviation among motor drives. To meet these requirements, hardware-based proprietary controllers have been prevalent. However, since it is becoming difficult for such an approach to meet increasing needs of system interoperability and scalability, nowadays, software-based universal motion controllers are regarded as their substitutes. Recently, embedded motion controller solutions are gaining attention due to low cost and relatively high performance. In this paper, we designed and implemented an embedded motion controller on an ARM-based evaluation board by using Xenomai real-time kernel and other open source software components. We also measured and analyzed the performance of our embedded controller under a realistic test-bed environment. The experimental results show that our embedded motion controller can provide relatively deterministic performance with synchronized control of three motor axis at 2 ms control cycle.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Scalable Cluster Overlay Source Routing Protocol (확장성을 갖는 클러스터 기반의 라우팅 프로토콜)

  • Jang, Kwang-Soo;Yang, Hyo-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.83-89
    • /
    • 2010
  • Scalable routing is one of the key challenges in designing and operating large scale MANETs. Performance of routing protocols proposed so far is only guaranteed under various limitation, i.e., dependent of the number of nodes in the network or needs the location information of destination node. Due to the dependency to the number of nodes in the network, as the number of nodes increases the performance of previous routing protocols degrade dramatically. We propose Cluster Overlay Dynamic Source Routing (CODSR) protocol. We conduct performance analysis by means of computer simulation under various conditions - diameter scaling and density scaling. Developed algorithm outperforms the DSR algorithm, e.g., more than 90% improvement as for the normalized routing load. Operation of CODSR is very simple and we show that the message and time complexity of CODSR is independent of the number of nodes in the network which makes CODSR highly scalable.