• Title/Summary/Keyword: message analysis

Search Result 935, Processing Time 0.025 seconds

Development and implementation of a project-based learning model using CMC and situated evaluation with message analysis (통신망을 활용한 프로젝트 학습 모형의 개발 및 적용과 메시지 분석을 이용한 상황적 평가)

  • Jun, Youngcook;Kim, Junghack;Park, Hongjune
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.4
    • /
    • pp.57-69
    • /
    • 2005
  • In this study we try to design and develop a mixed model of project-based learning with internet. In order to support the developed model, we separately developed a web-based tool, called Project Learning BBS. The classroom teaching for advertisement-photo production with the model has been carried out during May-July in 2002 and March-July in 2003 respectively with 40 students each. The overall activities of group collaborative work done during the teaching periods have been formatively evaluated with classroom observation, interviews and students' portfolios that were related to the processes of photo planning, video shooting and editing. It has also investigated how the students involved the web-based group discussion activities. In short, data analysis indicated that the participants accepted the proposed project-based learning model for their learning events in a positive way in order to increase the utilization of CMC.

  • PDF

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

New Method of Cooperative Spectrum Sharing for Interference Mitigation (간섭 완화를 위한 새로운 협력 스펙트럼 공유 기법)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.111-116
    • /
    • 2015
  • This article considers a model of cooperative spectrum sharing between primary and secondary systems in which transmission occurs in two phases. In this scheme, we introduce that a single secondary transmitter, ST, employs a quadrature-phase-based signal to present the secondary message, while the primary message is presented by an in-phase-based signal. This allows simultaneous spectrum sharing without mutual interference. Therefore, an interference constraint is not necessary to protect primary operating performance from being degraded by the secondary user operations. Theoretical analysis and Simulations are then provided to confirm the superiority of the proposed scheme over the the current conventional methods.

The Performance Test Effected by SDS Traffic in TETRA Network (TETRA 무선 기간망에서 SDS(Short Data Service)트래픽에 따른 성능 평가)

  • Song, Byeong-Kwon;Hwang, Gyu-Bin;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.376-378
    • /
    • 2008
  • This paper covers that modem performance test is effected by traffic and analysis of the result in TETRA network. The SDS is a method of the between PEIs transmission. And only SDS message type-4 is used to test. The range of the SDS message data length is from 10 to 140 bytes with an increment of 10 bytes. For each length transmitted 1000 times for each delay of inter-transmissions 0.5 second, 1.0 second and 1.5 second. The modem used in the test is the Unimo MU-1000MD by UNIMO Corp.

  • PDF

Representation of Multiple Message Authentication Codes using Bloom Filters (블룸 필터를 이용한 다수의 메시지 인증코드의 표현)

  • Son Ju-Hyung;Seo Seung-Woo;Kang Yu;Choe Jin-Gi;Moon Ho-Kun;Lee Myuong-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.365-369
    • /
    • 2006
  • Multiple Message Authentication Codes can be represented by one of the Short MAC, Bloom Filter or Compressed Bloom Filler to reduce communication overheads. However, this will inevitably increase false positive rate (fpr) which is a false authentication probability of adversarial messages in trade-off of communication efficiency. While the simple short MAC scheme has the lowest fpr, one cannot choose arbitrary authenticator size. Bloom filter, randomized data structure often used for membership queries, can represent multiple MACs more flexibly with slightly higher fpr. Furthermore, compressed Bloom filter has the same fpr with the short MAC while maintaining its flexibility. Through our detailed analysis, we show that pros and cons of the three schemes are scenario specific. Therefore one can choose appropriate scheme under given parameters to achieve both communication efficiency and security based on our results.

  • PDF

Performance Evaluation of Buffer Management Schemes for Implementing ATM Cell Reassembly Mechanism

  • Park, Gwang-Man;Kang, Sung-Yeol;Lie, Chang-Hoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.139-151
    • /
    • 1997
  • An ATM switching system may be designed so that communications between processors of its control part can be performed via its switching network rather than a separate inter-processor communications (IPC) network. In such a system, there should be interfaces to convent IPC traffic from message format to cell format and vice versa, that is, mechanisms to perform the SAR (Segmentation And Reassembly) sublayer functions. In this paper, we concern the cell reassembly mechanism among them, mainly focussed on buffer management schemes. We consider a few alternatives to implement cell reassembly function block, namely, separated buffering, reserved buffering and shared buffering in this paper. In case of separated and reserved buffering, we employ a continuous time Markov chain for the performance evaluation of cell reassembly mechanism, judicially defining the states of the mechanism. Performance measures such as measage loss probability, mean number of message queued in buffer and average reassembly delay are obtianed in closed forms. In case of shared buffering, we compare the alternatives for implementing cell reassembly function block using simulation because it is almost impossible to analyze the mechanism of shared buffering by analytical modeling. Some illustrations are given for the performance analysis of the alternatives to implement cell reassembly function block.

  • PDF

Performance Analysis of Deadlock-free Multicast Algorithms in Torus Networks (토러스 네트워크에서 무교착 멀티캐스트 알고리즘의 성능분석)

  • Won, Bok-Hee;Choi, Sang-Bang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.287-299
    • /
    • 2000
  • In this paper, we classify multicast methods into three categories, i.e., tree-based, path-based, and hybrid-based multicasts, for a multicomputer employing the bidirectional torus network and wormhole routing. We propose the dynamic partition multicast routing (DPMR) as a path-based algorithm. As a hybrid-based algorithm, we suggest the hybrid multicast routing (HMR), which employs the tree-based approach in the first phase of routing and the path-based approach in the second phase. Performance is measured in terms of the average latency for various message length to compare three multicast routing algorithms. We also compare the performance of wormhole routing having variable buffer size with virtual cut-through switching. The message latency for each switching method is compared using the DPMR algorithm to evaluate the buffer size trade-off on the performance.

  • PDF

Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

  • Kim, Dong-Kyue;Lee, Mun-Kyu;Kang, You-Sung;Chung, Sang-Hwa;Yoon, Won-Ju;Min, Jung-Ki;Kim, Ho-Won
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.755-768
    • /
    • 2007
  • A very promising application of active RFID systems is the electronic seal, an electronic device to guarantee the authenticity and integrity of freight containers. To provide freight containers with a high level of tamper resistance, the security of electronic seals must be ensured. In this paper, we present the design and implementation of an electronic seal protection system. First, we propose the eSeal Protection Protocol (ePP). Next, we implement and evaluate various cryptographic primitives as building blocks for our protocol. Our experimental results show that AES-CBC-MAC achieves the best performance among various schemes for message authentication and session key derivation. Finally, we implement a new electronic seal system equipped with ePP, and evaluate its performance using a real-world platform. Our evaluation shows that ePP guarantees a sufficient performance over an ARM9-based interrogator.

  • PDF

Development of an Electro-Optic Mooring System for Oceanographic Buoy

  • Keat, Kok-Choon;Park, Soo-Hong
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.176-181
    • /
    • 2009
  • This study is part of a project to develop and improve mooring systems for oceanographic use that include an electro-optical sensor, 1MHz Nortek Aquadopp Doppler Profiler and AIRMAR multipurpose Sensor. The adaption of Doppler current profilers to measure directional wave spectra has provided a new instrumentation approach to coastal and nearshore oceanographic studies. The HEIOB is developed are light weight and of a compact design, and can be easily installed in marine environment. Since there are no base station and gateways in marine environments, we selected CDMA and Orbcomm to send the data information. Therefore, the data can be sent by either e-mail service or Short Message Service (SMS). This paper will present some of scientific sensor results regarding real-time oceanographic and meteorological parameters such as wind spend, wind direction, wave direction, and etc. The modeling and test results highlight the engineering challenges associated with designing these systems for long lifetimes. It can also be used in future application to build wave observation buoy network in real-time using multiple ubiquitous buoys that share wave data and allow analysis of multipoint, multi-layer wave profiler.

An Acoustical Analysis of English Stops at the Initial and After-initial-/s/ Positions by Korean and American Speakers (한국인과 미국인의 초성 및 초성 /s/ 다음에 오는 영어 파열음 음향 분석)

  • Yang, Byunggon
    • Phonetics and Speech Sciences
    • /
    • v.5 no.3
    • /
    • pp.11-20
    • /
    • 2013
  • The purpose of this study is to compare the acoustic parameters of English stop consonants at the initial and after-initial-/s/ positions in a message produced by 47 Korean and American speakers in order to provide better pronunciation skills of English stops for Korean learners. A Praat script was developed to obtain voice onset time (VOT), maximum consonant intensity (maxCi), and rate of rise (ROR) from six target words with stops at the positions in the message. Results show that VOT and maxCi were significantly different between the two language groups while ROR wasn't. The Korean speakers generally produced the stop consonants with longer VOTs and higher consonant intensity. From the comparison of consonant groups at the two different positions, the Korean participants did not distinguish them as clearly as the American participants did at the after-initial-/s/ position. Finally a comparison of each language and sex group revealed that the major difference was attributed to stop consonants in the after-/s/ position. The author concluded that Korean speakers should be careful not to produce all the stops with longer VOTs and higher intensity. Further studies would be desirable to examine how Americans evaluate Korean speakers' English proficiency with modified acoustic values of English stops.