• Title/Summary/Keyword: broadcast

Search Result 8,475, Processing Time 0.036 seconds

A Runtime Inspection Technique with Intent Specification for Developing Robust Android Apps (강건한 안드로이드 어플리케이션 개발을 위한 실행시간 인텐트 명세 검사 기법)

  • Ko, Myungpil;Choi, Kwanghoon;Chang, Byeong-Mo
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.212-221
    • /
    • 2016
  • Android apps suffer from intent vulnerabilities in that they abnormally stop execution when Android components such as, activity, service, and broadcast receiver, take malformed intents. This paper proposes a method to prevent intent vulnerabilities by allowing programmers to write a specification on intents that a component expects to have, and by checking intents against the specification in runtime. By declaring intent specifications, we can solve the problem that one may miss writing conditional statements, which check the validity of intents, or one may mix those statements with another regular code, so making it difficult to maintain them. We perform an experiment by applying the proposed method to 7 Android apps, and confirm that many of abnormal termination of the apps because of malformed intents can be avoided by the intent specification based runtime assertion.

Clock Synchronization in Wireless Embedded Applications (무선 임베디드 환경에서의 시간 동기화)

  • No, Jin-Hong;Hong, Young-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.668-675
    • /
    • 2005
  • With the proliferation of wireless network and the advances of the embedded systems, the traditional distributed systems begin to include the wireless embedded systems. Clock synchronization in the distributed systems is one of the major issues that should be considered for diverse Purposes including synchronization, ordering, and consistency. Many clock synchronization algorithms have been proposed over the years. Since clock synchronization in wireless embedded systems should consider the low bandwidth of a network and the poor resources of a system, most traditional algorithms cannot be applied directly. We propose a clock synchronization algorithm in wireless embedded systems, extending IEEE 802.11 standard. The proposed algorithm can not only achieve high precision by loosening constraints and utilizing the characteristics of wireless broadcast but also provide continuous time synchronization by tolerating the message losses. In master/slave structure the master broadcasts the time information and the stave computes the clock skew and the drift to estimate the synchronized time of the master. The experiment results show that the achieved standard deviation by the Proposed scheme is within the bound of about 200 microseconds.

Weed Occurrence, Rice Growth, and Soil Temperature as Affected by Different Biodegradable Mulching Materials in Wet Seeded Rice

  • Yang, Woon-Ho;Kim, Jae-Hyun;Kim, Je-Kyu;Han, Hee-Suk;Shin, Jeong-Ju
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.48 no.1
    • /
    • pp.1-7
    • /
    • 2003
  • In spite water direct seeding cultivation of rice has advantages in terms of laborsaving and cost-down, it demonstrates uneven seedling establishment and difficult weed management. To select an applicable mat for mulching system of water seeded rice, weed occurrence, growth and yield performances of rice, and soil temperature were evaluated in several kinds of biodegradable mulching material. Field studies were conducted at the experimental farm of National Crop Experiment Station in 1999 and 2000. Among the mats tested in 1999, Safer-mat had the greatest effect on inhibiting weed occurrence and Lawn-mat demonstrated the least efficacy of weed control (EWC) value. In Safer-mat treatment, Ludwigia prostrata was the dominant weed species but Echinochloa crus-galli was not observed. Different kinds of mulching material from the mats studied in 1999 were tested in 2000. Biodegradable polyester (PES) coated on the recycled paper for newspaper press (RP) treatments showed similar or higher EWC values than non-mulched broadcast seed rice with 2 times of herbicide application (BC-herbicide) and Safer-mat that was the most effective mat on preventing weed appearance in 1999. Immediately after mat mulching on the surface of paddy soil, five pregerminated rice seeds were manually sown in each 3cm-hole formerly punctured at 30${\times}$14 cm spacing in 2000. All the 3 kinds of mulching material tested in 2000 had better seedling stand than BC-herbicide treatment. Rice yield in PES coated with 10 thickness on RP (PES10 $\mu\textrm{m}$+RP) was a little higher than in BC-herbicide treatment but the former produced less panicles in unit land area than the latter. PES10 $\mu\textrm{m}$+RP demonstrated a great effect on raising soil surface temperature than non-mulching treatment throughout the period of seedling establishment.

Crystal Growth and their photorefractive properties for optical memo (광메모리 단결정의 성장과 그 특성)

  • 유영문
    • Broadcasting and Media Magazine
    • /
    • v.6 no.1
    • /
    • pp.78-87
    • /
    • 2001
  • Seven kinds of most representative photorefractive crystals expected to contribute to the realization of the volume holographic storage were reviewed The growth conditions and problems for highly homogeneous optical qualities of the following crystals depending on the growth methods were discussed;(1) $LiNbO_3$ and $Bi_2SiO_{20}$ by Czochralski method (2) $Bi_{12}TiO_{20}$, $KNbO_3$ and $BaTiO_3$ by top seeded solution growth and (3) $(Sr_{1-x}Ba_{x})Nb_{2}O_{6}$ and $(K_{1-y}Na_y)_{2A-2}(Sr_{1-x}Ba_x)_{2-A}Nb_2O_6$ by Stepanov method, And then the figure of merits for the estimation of phororefractive materials on performances, such as $Q_1$, $Q_2$ and sensitivity, were discussed.

  • PDF

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

Sentiment Analysis Model with Semantic Topic Classification of Reviews (리뷰의 의미적 토픽 분류를 적용한 감성 분석 모델)

  • Lim, Myung Jin;Kim, Pankoo;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.69-77
    • /
    • 2020
  • Unlike the past, which was limited to terrestrial broadcasts, many dramas are currently being broadcast on cable channels and the Internet web. After watching the drama, viewers actively express their opinions through reviews and studies related to the analysis of these reviews are actively being conducted. Due to the nature of the drama, the genre is not clear, and due to the various age groups of viewers, reviews and ratings from other viewers help to decide which drama to watch. However, since it is difficult for viewers to check and analyze many reviews individually, a data analysis technique is required to automatically analyze them. Accordingly, this paper classifies the topics of reviews that have an important influence on drama selection and reclassifies them into semantic topics according to the similarity of words. In addition, we propose a model that classifies reviews into sentences according to semantic topics and sentiment analysis through sentiment words.

Analysis of the Causes of Casualties of Jecheon Sports Center Fire - Focus on an Initial Response and Management - (제천 스포츠센터 화재의 다수 사상자 발생원인 분석 -초기대응과 관리적인 측면을 중심으로-)

  • Lee, Eui-Pyeong
    • Fire Science and Engineering
    • /
    • v.32 no.5
    • /
    • pp.57-66
    • /
    • 2018
  • A sports center fire in Jecheon that caused 29 deaths and 40 injuries was analyzed based on initial response and management in order to investigate the causes of the casualties. The aspects of initial response included delay of reporting 119, not being guided to the exit for the body scrubber on the $2^{nd}$ floor for escape, opening the fire doors of the exits on the $1^{st}$ floor and $3^{rd}$ floor, not closing the fire door of the main stairs on the $3^{rd}$ floor, and not doing an emergency broadcast. The management aspects included closing the alarm valve of the sprinkler system on the $1^{st}$ floor, starting-stop of the fire pump controller, neglecting leakage of water and electricity between the false ceiling and ceiling in the parking lot, hiding the exit light in the ladies bathroom lounge on the $2^{nd}$ floor and piling up things in the exit, neglecting the button of an automatic door on the $2^{nd}$ floor, conventional fire safety management, insufficient inspection of fire equipment, and not working fire shutters and smoke exhaust windows.

A New Interference-Aware Dynamic Safety Interval Protocol for Vehicular Networks

  • Yoo, Hongseok;Chang, Chu Seock;Kim, Dongkyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • In IEEE 802.11p/1609-based vehicular networks, vehicles are allowed to exchange safety and control messages only within time periods, called control channel (CCH) interval, which are scheduled periodically. Currently, the length of the CCH interval is set to the fixed value (i.e. 50ms). However, the fixed-length intervals cannot be effective for dynamically changing traffic load. Hence, some protocols have been recently proposed to support variable-length CCH intervals in order to improve channel utilization. In existing protocols, the CCH interval is subdivided into safety and non-safety intervals, and the length of each interval is dynamically adjusted to accommodate the estimated traffic load. However, they do not consider the presence of hidden nodes. Consequently, messages transmitted in each interval are likely to overlap with simultaneous transmissions (i.e. interference) from hidden nodes. Particularly, life-critical safety messages which are exchanged within the safety interval can be unreliably delivered due to such interference, which deteriorates QoS of safety applications such as cooperative collision warning. In this paper, we therefore propose a new interference-aware Dynamic Safety Interval (DSI) protocol. DSI calculates the number of vehicles sharing the channel with the consideration of hidden nodes. The safety interval is derived based on the measured number of vehicles. From simulation study using the ns-2, we verified that DSI outperforms the existing protocols in terms of various metrics such as broadcast delivery ration, collision probability and safety message delay.

The Effect of Social Responsibility Characteristics and Consumer Attitude on Purchasing Intention (사회적 책임 관련 특성과 소비자태도가 구매의도에 미치는 영향)

  • Yu, Jiang Chuan;Lee, Seung Sin
    • Journal of Families and Better Life
    • /
    • v.34 no.1
    • /
    • pp.13-32
    • /
    • 2016
  • The goal of this study was to determine the effect of social responsibility characteristics and consumer attitude on consumer purchasing intention. And we used survey result data from 400 adults (200 males and 200 females) aged between 20 and 50 years for our research sample. Also, this study aims to look at the purchasing intention based on Fishbein's attitude model, in order to predict consumer purchasing behaviors on the products made by corporations that have good social responsibility. By using consumer consciousness of social responsibility and Consumer assessment on corporations' social responsibility, this study also intends to examine the ultimate effects on the intention. The following is a summary of the main results and suggestions. First, less than 30 percent of all consumers have experienced education on social responsibility, which is significantly low. Consumers' education experience had no effects on consumer purchasing intention. Consumers' education experience on social responsibility is surely related to purchasing intention, but gives no meaningful relations from the actual proof analysis, which is because of the problems of current consumer education programs. Government and official institutions, corporations, consumer groups should provide more educational opportunities than broadcast media, internet, school, and printed media. Second, according to the analysis result on Consumer consciousness of social responsibility, the assessment scores on social contribution and environmental protection are relatively lower than on consumer protection and energy resource saving. They tend to focus more on social responsibility related to individual interest rather than broader social responsibility as a member of society. Third, consumers have a positive attitude about corporation and its products made by corporations that have good social responsibility. Fourth, the most contributing factor on consumer purchasing intention is corporate consumer attitude. The next is product consumer attitude, Consumer consciousness of social responsibility, and Consumer assessment on corporations' social responsibility.