• Title/Summary/Keyword: SEND

Search Result 1,446, Processing Time 0.023 seconds

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Code for Unplanned Encounters at Sea(CUES): Its Limitation and Recommendations for Improvement (해상에서의 우발적 조우 시 신호 규칙(CUES)의 제한점과 개선을 위한 제언)

  • Oh, Dongkeon
    • Strategy21
    • /
    • s.44
    • /
    • pp.323-351
    • /
    • 2018
  • Adopted in Western Pacific Naval Symposium(WPNS) 2014, Code for Unplanned Encounters at Sea(CUES) has been the most valuable output of WPNS history. Written and suggested by Australian Navy in 1999, the goal of CUES is to decrease the possibility of the naval conflict by establishing the code among international navies in the Western Pacific region. Facing many oppositions and requirement of People's Liberation Army Navy(PLAN) in WPNS 2012 and 2013, but it finally adopted in WPNS 2014, with many changes in detailed provisions. From then, navies in the Western Pacific region have followed CUES to prevent maritime conflicts in the region, CUES, however, sometimes does not work correctly. Contents of CUES is the mixture of the parts of Multinational Maritime Tactical Signal and Maneuvering Book(MTP) and International Regulations for Preventing Collision at Sea 1972(CORLEGs). There are means of radio communications such as frequency and signals, instructions for maneuvering and so on. Thus, it is not a new document for the U.S. Navy and its allies, but it requires training to implicate at sea for navies other than U.S. allies, like PLAN. Lots of provisions in CUES were changed because of the opposition of PLAN, and CUES has many shortcomings and practical limitations. First, since CUES is non-legally binding, and there are no methods to force the naval assets on the sea to follow. Second, CUES is only applied to naval assets; naval ships - warships, naval auxiliaries, and submarines - and naval aircraft. Third, the geographical scope in CUES is not clear. Fourth, there is no provision for submerged submarines. Finally, CUES has no time-based framework or roadmap for training. In this regard, there would be six recommendations for improvement. First, CUES should be reviewed by WPNS or other international institutions, while keeping non-binding status so that WPNS could send signals to the navies which do not answer CUES on the sea. Second, the participation of Maritime Law Enforcements(MLEs) such as coast guard is inevitable. Third, navies would use full text of MTP rather than current CUES, which extracts some parts of MTP. Fourth, CUES needs provisions with respect to submerged submarines, which recognizes as offensive weapons themselves. Fifth, the geographic scope of CUES should be clear. Since there are some countries in which claim that a rock with a concrete structure is their territory, CUES should be applied on every sea including EEZ and territorial seas. Finally, the detailed training plan is required to implicate CUES at sea. Rim of the Pacific (RIMPAC) is a good exercise to train CUES, because almost all WPNS member countries except six countries are participating in RIMPAC. CUES is a meaningful document not only for navies but also for nation-states in the region. To prevent escalation of conflict in the region, potentially caused by an unplanned collision at sea, CUES should be applied more strictly. CUES will continue to be in subsequent WPNS and therefore continue to improve in the effectiveness as both an operational and diplomatic agreement.

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF

High-Availability Web Server Cluster Employing Multiple Front-Ends for Small and Middle-sized Web Sites (중소형 사이트를 위한 다수의 전면 서버를 갖는 고가용성 웹 서버 클러스터)

  • Moon Jong-bae;Kim Myung-ho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.355-364
    • /
    • 2004
  • These days, various clustering technologies have been adopted to construct web sites. High performance hardware switches have good performance, but have disadvantage of high cost for constructing small and middle-sized web sites. Now a days, many sites have been constructed with the LVS (Linux Virtual Server), which is free of charge and has good performance. Having a centralized load balancing with one front-end, the LVS causes a bottleneck when it receives all at once. In the paper, we suggest a way to remove the LVS bottleneck by providing multiple front-ends. In this architecture, all of cluster nodes act as both a front-end and a back-end. When the load of a node receiving requests is not large enough, the node responds to the client directly. When the load of a node is large enough, the node send the request to a node which is selected by a scheduling algorithm. The scheduling algorithm is discussed to balance loads between servers. While single front-end cluster raises the throughput curvedly, the multiple front-end cluster raises the throughput linearly.

The Study on the Lighting Directing of Animation - Focusing on the Emotional Vocabulary that Appears in the 3D Animation Scene (애니메이션의 조명 연출에 대한 연구 - 3D 애니메이션 장면에서 나타나는 정서적 어휘를 중심으로)

  • Lee, Jong Han
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.349-374
    • /
    • 2014
  • The light is the language. Directors have to describe the scene component effectively his intention to configure the scene as an appropriately. After this act of the character, the layout of the props and scene lights will enter to the scene components. Those things help to audiences can understand narrative of work and emotion that producer want to send. Expressing their emotions especially using the lights by adjusting the colors and contrast makes audience to concentrate on work and understand naturally. This lighting technique clearly appears on early year theaters stage of England and Rembrandt's paintings. Properly dividing and controlling the lights dramatically increases the beauty of the work elements to express a variety of emotions such as worries and fear. Therefore, it can be evolve depending on director's intent of using lights on his work. Lights can increase involvement of human emotion through basic features that cognition of object, visualization of space-time and by artistic method in the product. This study will examine the role and how to use lighting to express the proper sentiment based on the narrative of the work. Making research named "Lighting Research of 3D animated film which applying light features to express emotion" previous study and have to combine emotional vocabulary and emotion-based theory for classifying the emotional language that can be applied on 3D animation. And choosing most emotional scene from 3D animation for analyze how they used lighting to expressing emotions. Directors trying to show up about the light role through light method that matched perfectly with an emotional language. Expecting this research work of directing 3D animations light for expressing emotional feelings will be continue successfully.

King's Status Reflected in The Joseon Dynasty's Document transmission System (조선 문서행이체제에 반영된 국왕의 위상)

  • Lee, Hyeongjung
    • The Korean Journal of Archival Studies
    • /
    • no.66
    • /
    • pp.203-227
    • /
    • 2020
  • This article explores the influence of the king in the Joseon dynasty's document transmission system, focusing on some exceptional cases. According to the Joseon's law, the form of official documents depended on rank differences between receiver and sender. However, there were cases of not following the general principles such as Byungjo(兵曹), Seungjeongwon(承政院) and Kyujanggak(奎章閣). Byungjo was a ministry in charge of military administration. Seungjeongwon was a royal secretary institution which assisted the king and delivered king's orders that existed from the early Joseon. Kyujanggak was a royal library and an assistant institution of the king that was established in the JeongJo(正祖) era. Byungjo was regarded as a relatively high-ranking institution when it sent and received military-related documents. Seungjeongwon and Kyujanggak could use Kwanmoon(關文) to upper rank institution. Kwanmoon was the document form used for institutions of the same or lower rank than itself. Conversely, higher rank institutions used Cheobjeong(牒呈) which was stipulated as a document form to using upper rank institution in law to send them. The reason that they could have privileges in transmission document system was that Joseon had an administrative system centered on the king. Byungjo was an institution entrusted with military power from King. Seungjeonwon and Kyujanggak took charge of the assistance and the delivery of King's order. so they could have a different system of receiving and sending document than the others. In conclusion, the Joseon Dynasty operated exceptions in document administration based on the existence of the king, it means Joseon's transmission document system was basically operated under the Confucian bureaucracy with the king as its peak.

Reengineering Template-Based Web Applications to Single Page AJAX Applications (단일 페이지 AJAX 애플리케이션을 위한 템플릿 기반 웹 애플리케이션 재공학 기법)

  • Oh, Jaewon;Choi, Hyeon Cheol;Lim, Seung Ho;Ahn, Woo Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.1-6
    • /
    • 2012
  • Web pages in a template-based web application (TWA) are automatically populated using a template shared by the pages with contents specific to the pages. So users can easily obtain information guided by a consistent structure of the template. Reduced duplicated code helps to increase the level of maintainability as well. However, TWA still has the interaction problem of classic web applications that each time a user clicks a hyperlink a new page is loaded, although a partial update of the page is desirable. This paper proposes a reengineering technique to transform the multi-page structure of legacy Java-based TWA to a single page one with partial page refresh. In this approach, hyperlinks in HTML code are refactored to AJAX-enabled event handlers to achieve the single page structure. In addition, JSP and Servlet code is transformed in order not to send data unnecessary for the partial update. The new single page consists of individual components that are updateable independently when interacting with a user. Therefore, our approach can improve interactivity and responsiveness towards a user while reducing CPU and network usage. The measurement of our technique applied to a typical TWA shows that our technique improves the response time of user requests over the TWA in the range from 1 to 87%.

The Viral Effect of Online Social Network on New Products Promotion: Investigating Information Diffusion on Twitter (신제품 프로모션에 대한 온라인 소셜네트워크의 구전효과 분석 : 트위터의 정보전달과정을 중심으로)

  • Kim, Hyung-Jin;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.107-130
    • /
    • 2012
  • In Twitter, a user can post a message below 140 characters on his/her account, and can also repost a message of other users who the user follows. The message posted by the user in turn can be seen and reposted by other users who follow the user, which is called Re-tweet (RT). While some messages spread widely, other messages have relatively less or no RT. What factors cause these quantity variances of RT originated from original messages? How can the messages become influential in online social networks? As an effort to answer the above questions, we focused on information vividness, message characteristics, and originator characteristics. In perspective of managerial implication, we expect that the findings of this paper will provide corporations with helpful insight on the Word-of-Mouth (WOM) effect for efficient and effective advertisements and communications when they send a message of new products or services through Social Network Services. In perspective of academic implication, we identify the effect of contents of a message on WOM, which has been dealt with by few social network researches.

The UPnP Expansion for Internet Home Network Electrical Appliance Control (인터넷 홈 네트워크 가전 제어를 위한 UPnP 확장)

  • Kim Kuk-Se;Park Chan-Mo;Lee Cheol-Seung;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.417-420
    • /
    • 2006
  • UPnP presents home network middleware for local home electrical appliances basedon internet protocols that is available access and control electrical appliances just in local home network. Itis designed to bring easy-to-use, flexible, standards-based connectivity to ad-hoc or unmanaged networks in the home, a small business, public spaces, or attached to the Internet. In this paper, Internet Gateway expands UPnP IGD(Internet Gateway Device) DCP(Device Control protocol) and UPnP IGP Bridge for Internet Home Network Electrical Appliance Control. UPnP IGD DCP is configurable initiation and sharing of internet connections, advanced connection-management features, management of host configuration service, and supports transparent Internet access by non-UPnP-certified devices. UPnP Bridge search for local home network devices by sending control messages. Control Point of UPnP Bridge search for devices of interest on the network and can control or be controlled all of functions by IGD DCP with control commands. Outside client, approach to UPnP IGD DCP, send control messages UPnP Bridge, and invoke each UPnP device. As a result, Electrical Appliance of Home Network base on UPnP, can control and be controlled via the Internet like ones in the one Home Network without modification of existing UPnP.

  • PDF

Energy-Efficient Multipath Routing Protocol for Supporting Mobile Events in Wireless Sensor Networks (무선 센서 네트워크에서 이동 이벤트를 지원하기 위한 에너지 효율적인 멀티패스 라우팅 프로토콜)

  • Kim, Hoewon;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.455-462
    • /
    • 2016
  • Wireless sensor networks have been researched to gather data about events on sensor fields from sources at sinks. Multipath routing is one of attractive approaches to reliably send data against the problem of frequent breakages on paths from sources to sinks due to node and link failures. As mobile events such as humans, animals, and vehicles are considered, sources may be continuously generated according to the movement of the mobile event. Thus, mobile events provide new challenging issue in multipath routing. However, the research on multipath routing mainly focus on both efficient multipath construction from sources to static sinks and fast multipath reconstruction against path breakages. Accordingly, the previous multipath routing protocols request each source continuously generated by a mobile event to construct individual multipath from the source to sinks. This induces the increase of multipath construction cost in the previous protocols in proportion to the number of source. Therefore, we propose efficient multipath routing protocol for supporting continuous sources generated by mobile events. In the proposed protocol, new source efficiently reconstructs its multipath by exploiting the existing multipath of previous sources. To do this, the proposed protocol selects one among three reconstruction methods: a local reconstruction, a global partial one, and a global full one. For a selection decision, we provide an analytical energy consumption cost model that calculates the summation of both the multipath reconstruction cost and the data forwarding cost. Simulation results show that the proposed protocol has better performance than the previous protocol to provide multipath routing for mobile events.