• Title/Summary/Keyword: One-way Communication

Search Result 944, Processing Time 0.031 seconds

Improved Fuzzy Binarization Method with Trapezoid type Membership Function and Adaptive α_cut (사다리꼴 형태의 소속 함수와 동적 α_cut 을이용한 개선된 퍼지 이진화)

  • Woo, Hyun-su;Kim, Kwang-baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1852-1859
    • /
    • 2016
  • The effectiveness of a binarization algorithm in image processing depends on how to eliminate the uncertainty of determining threshold in a reasonable way and on minimizing information loss due to the binarization effect. Fuzzy binarization technique was proposed to handle that uncertainty with fuzzy logic. However, that method is known to be inefficient when the given image has low intensity contrast. In this paper, we propose an improved fuzzy binarization method to overcome such known drawbacks. Our method proposes a trapezoid type fuzzy membership function instead of most-frequently used triangle type one. We also propose an adaptive ${\alpha}$_cut determination policy. Our proposed method has less information loss than other algorithms since we do not use any stretching based preprocessing for enhancing the intensity contrast. In experiment, our proposed method is verified to be more effective in binarization with less information loss for many different types of images with low intensity contrast such as night scenery, lumber scoliosis, and lipoma images.

Typology Study on and Attendant Assistant Image of ODA(Official Development Assistance) Experts (공적개발원조(ODA) 전문가의 이미지에 관한 Q유형 분석)

  • Jeong, Baek;Kim, Kyoung-Won
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.117-141
    • /
    • 2016
  • This Research Paper was based on practical method to examine a subjectivity of ODA experts' images. It was used Q-methodology to solve the research problems. I found 4 types of images out throughout the process totally. The perception patterns came out in the research were divided into 4 types in Q-methodology. The results is following ; Those are separated 4 types like Type 1(called operationally individual type), Type 2(arbitrary type), Type 3(mellow type), Type 4(onlooking type). These types consist of each elements to evaluate ODA experts from the people minds. Therefore, This study give us one way to take an assessment of ODA projects. The results reveal that korean ODA policy more has to depend on the scientific evaluation of the person participated in each projects. And the findings demonstrate good questions in comparing with trends of ODA distributors of international development cooperation such as OECD/DAC.

  • PDF

Preprocessing-based speed profile calculation algorithm for radio-based train control (무선통신기반 열차간격제어를 위한 전처리 기반 속도프로파일 계산 알고리즘)

  • Oh, Sehchan;Kim, Kyunghee;Kim, Minsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6274-6281
    • /
    • 2015
  • Radio-based train control system has driving headway shortening effect by real-time train interval control using two-way radio communication between onboard and wayside systems, and reduces facility investment because it does not require any track-circuit. Automatic train protection(ATP), the most significant part of the radio-based train control system, makes sure a safe distance between preceding and following trains, based on real-time train location tracing. In this paper, we propose the overall ATP train interval control algorithm to control the safe interval between trains, and preprocessing-based speed profile calculation algorithm to improve the processing speed of the ATP. The proposed speed profile calculation algorithm calculates the permanent speed limit for track and train in advance and uses as the most restrictive speed profile. If the temporary speed limit is generated for a particular track section, it reflects the temporary speed limit to pre-calculated speed profile and improves calculation performance by updating the speed profile for the corresponding track section. To evaluate the performance of the proposed speed profile calculation algorithm, we analyze the proposed algorithm with O-notation and we can find that it is possible to improve the time complexity than the existing one. To verify the proposed ATP train interval control algorithm, we build the train interval control simulator. The experimental results show the safe train interval control is carried out in a variety of operating conditions.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Meta-analysis of Influencing Mediator Athletics on the Metabolic Syndrome Risk Factors Utilized Big Data Analysis (빅 데이터 분석을 활용한 대사증후군 위험요인에 관한 메타분석)

  • Yu, Ok-kyeong;Cha, Youn-soo;Jin, Chan-yong;Kim, Do-goan;Nam, Soo-tai
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2590-2596
    • /
    • 2015
  • A meta-analysis is a statistical integration method that delivers an opportunity to overview the entire result of integrating and analyzing many quantitative research results. This study will find meaningful mediator variables for criterion variables that affects between pre and post in the metabolic syndrome studies, on the basis of the results of a meta analysis. We reviewed a total of 36 studies related the metabolic syndrome published in Korean journals between 2000 and 2015, where a cause and effect relationship is established between variables that are specified in the conceptual model of this study. In this meta-analysis, the path between pre and post in the waist circumference showed the biggest effect size (r = .420). The second biggest effect size (r = -.402) was found the path between pre and post in the high density lipoprotein cholesterol. By the way, one the smallest effect size (r = .234) was obtained the path between pre and post in the diastolic blood pressure. Thus, we present the theoretical and practical implications of these results.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

A Study on Developing Education and Training System for Informationalization in Governmental Organization (정부조직의 정보화교육훈련 체계구축에 관한 연구)

  • 정해용;김상훈
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.1
    • /
    • pp.34-51
    • /
    • 1999
  • The effective use of IT(information technology) will increasingly become one of the key determinants for successful informationalization in govermental organization And the ability of the public officials in using IT or operating information system is essential to the effective use of IT. This study focuses on constructing a theoretical base of developing the education and training system for enhancing the IT ability of the public officials. In order to achieve this research goal, first this study suggests four categories of IT education and training for (1) the basic capability of IT use (2) the skills of operating information system (3) the management competence of performing strategic use of IT, (4) the expert skills for specific IT, and then derives concrete items for each category. With respect to these items, we empirically investigate the degree of necessity and the effective way of education and training according to tasks, positions and ability of the public officials. The data analyses are based on questionnaires responded by 300 public officials who attend the education and training programs held by the Training Institute of Ministry of Information and Communication. The results of this study can provide the theoretical basis for constructing the IT education and training system which is applicable to most of Korean organizations. Also they can be used as a practical guideline in developing and promoting specific IT education and training programs.

  • PDF

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.