• 제목/요약/키워드: MESSAGE model

검색결과 652건 처리시간 0.031초

IAR-GT: An Incentive Aware Routing based on Game Theory for Selfish Opportunistic Networks

  • Li, Li;Zhong, Xiaoxiong;Jiang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.152-171
    • /
    • 2019
  • In opportunistic networks, nodes may appear some selfishness while transmitting the message, however, most of the existing research works consider the individual selfishness or social selfishness respectively, and these two types of selfishness may coexist in opportunistic networks. In this paper, we propose an Incentive Aware Routing based on Game Theory for selfish OPPNETs, named IAR-GT, which uses Rubinstein-Stahl bargaining game model to incentivize selfish nodes cooperation in data forwarding. IAR-GT scheme not only considers the resources of nodes, but also uses a new method to calculate the social ties between them. Trace-driven simulations show that our incentive aware routing scheme achieves better performances than comparing schemes under two types of selfishness coexistence environments.

A Study on the Contents Security Management Model for Multi-platform Users

  • Joo, Hansol;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • 제10권2호
    • /
    • pp.10-14
    • /
    • 2021
  • Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.

Efficient Three-Party Password Authenticated Key Exchange for Client-to-Client Applications

  • Yang, Yanjiang;Bao, Feng
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.249-257
    • /
    • 2008
  • Nowadays, client-to-client applications such as online chat (e.g. MSN) and SMS (Short Message Services) are becoming increasingly prevalent. These client-to-client applications are revolutionizing the way we communicate. Three-party PAKE (password authenticated key exchange) protocols provide a means for the two communicating parties holding passwords to establishment a secure channel between them with the help of a common server. In this paper, we propose an efficient three-party PAKE protocol for the client-to-client applications, which has much better performance than the existing generic constructions. We also show that the proposed protocol is secure in a formal security model.

Development of a flux emergence simulation using parallel computing

  • 이환희;마가라 테츠야
    • 천문학회보
    • /
    • 제44권2호
    • /
    • pp.71.1-71.1
    • /
    • 2019
  • The solar magnetic field comes from the solar interior and is related to various phenomena on the Sun. To understand this process, many studies have been conducted to produce its evolution using a single flux rope. In this study, we are interested in the emergence of two flux ropes and their evolution, which takes longer than the emergence of a single flux rope. To construct it, we develop a flux emergence simulation by applying a parallel computing to reduce a computation time in a wider domain. The original simulation code had been written in Fortran 77. We modify it to a version of Fortran 90 with Message Passing Interface (MPI). The results of the original and new simulation are compared on the NEC SX-Aurora TSUBASA which is a vector engine processor. The parallelized version is faster than running on a single core and it shows a possibility to handle large amounts of calculation. Based on this model, we can construct a complex flux emergence system, such as an evolution of two magnetic flux ropes.

  • PDF

마케팅 효과 극대화 및 비용절감 효과성에 대한 기업용 메시징서비스 효율화 연구 (Study on the Cost Savings and Maximize Marketing Effect to Efficiency of Enterprise Messaging Service)

  • 장문익;정재훈;최명길
    • 디지털융복합연구
    • /
    • 제14권10호
    • /
    • pp.311-317
    • /
    • 2016
  • 스마트 커머스 시장에서 소비자는 개인 성향에 최적화된 개인화된 서비스와 소비자 취향을 고려한 맞춤형 쇼핑 경험을 원하고 있다. 즉, 소비자는 개인화된 맞춤형 서비스를 요구하고 있다. 이러한 요구에 따라 기업들은 메시징서비스를 소비자에게 제공하고 있지만, 각 개인에 맞춤형 서비스를 포함하지 못하고 있다. 따라서 본 연구는 메시징서비스에 개인화 서비스기술을 결합하여 기업용 메시징서비스의 통합 모형 및 시스템 구축방안을 제시하고, 이를 통해 마케팅 효과를 극대화하고 비용절감 효과를 분석한다. 제안된 통합 모형 작동방식은 고객 요구사항에 따라 개인화된 정보를 통해 개인화모형 적용하여 효과적인 개인화를 통한 메시징 전송 방안을 제시하고 있다. 본 연구의 개인화 통합모형은 검색서비스와 결합되었을 경우 매우 높은 효과가 있을 것으로 판단된다.

국가 대기질 예보 시스템의 모델링(기상 및 대기질) 계산속도 향상을 위한 전산환경 최적화 방안 (Optimization of the computing environment to improve the speed of the modeling (WRF and CMAQ) calculation of the National Air Quality Forecast System)

  • 명지수;김태희;이용희;서인석;장임석
    • 한국환경과학회지
    • /
    • 제27권8호
    • /
    • pp.723-735
    • /
    • 2018
  • In this study, to investigate an optimal configuration method for the modeling system, we performed an optimization experiment by controlling the types of compilers and libraries, and the number of CPU cores because it was important to provide reliable model data very quickly for the national air quality forecast. We were made up the optimization experiment of twelve according to compilers (PGI and Intel), MPIs (mvapich-2.0, mvapich-2.2, and mpich-3.2) and NetCDF (NetCDF-3.6.3 and NetCDF-4.1.3) and performed wall clock time measurement for the WRF and CMAQ models based on the built computing resources. In the result of the experiment according to the compiler and library type, the performance of the WRF (30 min 30 s) and CMAQ (47 min 22 s) was best when the combination of Intel complier, mavapich-2.0, and NetCDF-3.6.3 was applied. Additionally, in a result of optimization by the number of CPU cores, the WRF model was best performed with 140 cores (five calculation servers), and the CMAQ model with 120 cores (five calculation servers). While the WRF model demonstrated obvious differences depending on the number of CPU cores rather than the types of compilers and libraries, CMAQ model demonstrated the biggest differences on the combination of compilers and libraries.

이동통신 시스템에서 입력 메시지 분리제어 방식을 통한 제어국의 성능 개선 (Performance Improvement of Base Station Controller using Separation Control Method of Input Messages for Mobile Communication Systems)

  • 원종권;박우구;이상호
    • 한국정보처리학회논문지
    • /
    • 제6권4호
    • /
    • pp.1058-1070
    • /
    • 1999
  • 이 논문은 이동통신 시스템의 제어국에 순간적으로 가해지는 다량의 입력 메시지에 대하여 효율적이고 신뢰성 있는 제어를 위하여 입력 메시지를 메시지 특성에 따라 분리한 다음 다중 프로세서를 사용하여 제어하는 모델을 제안한다. 제안 모델의 성능 개선에 필요한 요소들의 특성을 사전에 파악하기 위하여 M/M/c/K 큐잉 모델을 이용한다. 이 결과를 토대로 SLAM II를 이용한 시뮬레이션에 의해 입력 메시지에 대한 손실확률, 큐의 평균점유 길이의 분포, 프로세서 관리기(서버)의 점유율, 큐에서의 평균 대기 시간에 대하여 제안 모델과 기존 모델의 성능을 비교한다. 또한 과도한 입력 메시지로 인하여 과부하가 발생할 경우 두 입력 메시지에 대한 부하 제어 기능을 추가한 모델을 제안하고, 시뮬레이션에 의해 성능을 분석한다.

  • PDF

전송률을 고려한 WBAN 시스템 설계에 관한 연구 (Study on Wireless Body Area Network System Design Based on Transmission Rate)

  • 박주희
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권12호
    • /
    • pp.121-129
    • /
    • 2012
  • 본 논문에서는 IEEE 802.15.4에서 저속 데이터 전송률을 요구하는 응용을 운용하기 위한 WBAN 시스템 모델을 제안한다. 의료용 응용서비스는 상이한 데이터 전송률과 응급 메시지 전송을 요구하기 때문에 기존의 무선 센서 네트워크 기술을 참조할 수 없다. 이러한 기존 시스템의 문제점들을 해결하기 위하여 WBAN에 적합한 시스템 모델과 WBAN MAC 프로토콜에 관한 내용을 제안하였다. 첫째, 경쟁 구간에 우선순위 큐잉을 적용하여 MAC 명령어 프레임의 전송을 보장할 수 있는 시스템 모델을 제안하였다. 둘째, 제안한 시스템 모델을 사용하기 위해 MAC 프레임을 새롭게 정의하였다. 셋째, 경쟁구간에서 우선순위가 없는 데이터 프레임의 처리량 및 전송 성공 확률을 향상시킬 수 있는 데이터 전송률을 고려한 WBAN CSMA/CA 백오프 알고리즘을 제안하였다. 제안한 WBAN CSMA/CA 백오프 알고리즘은 BAN(Body Area Network) 및 WSN(Wireless Sensor Network)의 시뮬레이션이 가능한 OMNeT++의 Castalia를 이용하여 구현하였다. 시뮬레이션 결과 제안한 시스템 모델이 기존 방식과 비교하여 데이터 처리량이 개선되고, 충돌 확률이 감소함을 확인할 수 있었다.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

A Narrative Strategy of Storytelling Advertising Videos: Heineken's Case

  • Byun, Chan-Bok
    • 한국조리학회지
    • /
    • 제22권1호
    • /
    • pp.9-18
    • /
    • 2016
  • The purpose of this paper was to explore the narrative strategy of storytelling advertisement videos for a beer brand Heineken. Heineken was one of the most active advertisers who had made very impressive ad videos. The author selected five story driven advertisement videos which had been most frequently watched by Internet viewers. Those were "The Insider", "Odyssey 2011", "Heineken lip gross", "Italy Activation Milan AC vs. Real Madrid", "the Match". The five selected videos have 90 second running time. The target videos were repeatedly watched and the expected key image cuts and key verbal copies were captured as well. To categorize the narrative structure and key copies of each video, Fog, Budtz & Yakaboylu's four element model of storytelling and Gustav Freytag's three act structure or five stage model of a plot were exploited as underlying theories. Most of the ad videos had clear boundary between or among the stages of the plot and used emotional appeals including humor and sexual appeals. This paper found that the target videos used visual rhetorics to enhance the viewers' persuasion and comprehension. It also revealed that the target videos took advantage of football match as an emotional engagement to get ad viewers closely banded with Heineken.