• Title/Summary/Keyword: mutual communication

Search Result 786, Processing Time 0.031 seconds

Analysis of Relationship between Parent Attachment and Career Maturity of Middle School Students (중학생들의 부모애착과 진로성숙도의 관계분석)

  • Jung, Kyung-Hwa;Kim, Ki-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.475-482
    • /
    • 2018
  • This study analyzed whether differences in individual characteristics and parental attachment affect the career maturity of middle school students in grades 1-3 in Asan, South Korea. Individual characteristics included gender, grade, grades, parental education, and economic level, while parental attachment included mutual trust, alienation, and communication. Career maturity included determinism, objectivity, readiness, independence, and assurance. Results showed there were significant differences in gender, grades, and economic level. Only gender differences affected attachment to mothers, with female students exhibiting stronger effects than male students. Grades that both the father and the mother showed differences. The economic level differed only in father's attachment. The effects of parental attachment on career maturity were found to be higher in career maturity with lower father's alienation and higher mother's mutual trust. Career maturity did not affect the assurance variable. Mother's communication affected determinism and mutual trust affected objectivity. Father's mutual trust and mother's communication affected readiness, and father's alienation showed a negative relationship. Mother's mutual trust positively affected independence. These results may be a valuable reference for understanding the behavioral psychology of adolescents and their parents. However, there is a limit to the generalizability of this study.

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

MUTUAL COUPLING EFFECTS ON THE PERFORMANCE OF A SPACE-TAPERED RECTANGULAR PHASED ARRAY (공간체감된 구형 위상어레이의 성능에 미치는 상호결합의 영향)

  • Chang Byong-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.415-421
    • /
    • 2005
  • The radiating or receiving characteristics of array elements (i.e., antennas) are changed from those of isolated elements due to mutual coupling effects and the array performance becomes different from those originally designed by assuming isolated elements. The effects of mutual coupling on the performance of a rectangular array with triangular grid geometry of dipoles above a ground plane are discussed with respect to element pattern. The concept of element gain function is used to examine the effects of mutual coupling on the array performance in terms of sidelobe level in the uniformly spaced and space-tapered rectangular arrays with triangular grid geometry of dipoles. It was shown that the sidelobe performance improved in the space-tapered array compared to the uniformly spaced array in the presence of mutual coupling effects. Computer simulation results are presented.

The Mutual Information for Bit-Linear Linear-Dispersion Codes (BLLD 부호의 Mutual Information)

  • Jin, Xiang-Lan;Yang, Jae-Dong;Song, Kyoung-Young;No, Jong-Seon;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10A
    • /
    • pp.958-964
    • /
    • 2007
  • In this paper, we derive the relationship between the bit error probability (BEP) of maximum a posteriori (MAP) bit detection and the bit minimum mean square error (MMSE), that is, the BEP is greater than a quarter of the bit USE and less than a half of the bit MMSE. By using this result, the lower and upper bounds of the derivative of the mutual information are derived from the BEP and the lower and upper bounds are easily obtained in the multiple-input multiple-output (MIMO) communication systems with the bit-linear linear-dispersion (BLLD) codes in the Gaussian channel.

Design of a Mutual Exclusion Algorithm in Mobile Distributed Systems (이동 분산 시스템에서 상호배제 알고리즘의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.50-58
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF

Novel Mutual Inductance Formula for the Magnetic Resonance Wireless Power Transmission System Using Helical Coils (헬리컬 코일을 이용하는 자기 공진형 무선 전력 전송 시스템에서 새로운 상호 인덕턴스의 계산식 제안)

  • Jang, Ju-Yeop;Hur, Jung;Kim, Yong-Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.6
    • /
    • pp.669-681
    • /
    • 2012
  • In this paper, analytical calculations using a novel mutual inductance formula for a resonant wireless power transmission system using helical coils. The look-up table of critical variables during the mutual inductance calculation process was formulated. The calculation results for resonant frequency and insertion loss were compared with experimental results when the distance between the two helical coils in a structure where the transmission and reception is symmetrical was varied with 10 mm increments from 53 mm to 500 mm. On average, the resonant frequency showed a difference of 5.63 % between the experimental results and the calculation results. The insertion loss had an average difference 2.25 dB where the smallest difference of 0.33 dB occurred with 290 mm. It was found that the experimental results without using a balun were in greater agreement with the calculation results.

The Comparisons of Pronunciation Teaching in Lingua Franca Core and IMO Maritime English Model Course 3.17 for Global Communication at Sea

  • Choi, Seung-Hee;Park, Jin-Soo
    • Journal of Navigation and Port Research
    • /
    • v.40 no.5
    • /
    • pp.279-284
    • /
    • 2016
  • As the International Maritime English Organization (IMO) model course for Maritime English has been recently revised and updated, the requirements of current changes to both the 2010 STCW Manila Amendments and English education have been actively reviewed. In order to provide practical guidelines for language teaching, a wide range of new pedagogical approaches and their theoretical backgrounds are also suggested. However, considering the current spread of Business English as a Lingua Franca (BELF) and its critical importance in maritime communication, the pedagogical approaches need to be re-evaluated, specifically in terms of teaching pronunciation in order to emphasize clear and effective communication among international interlocutors. Therefore, the core pedagogical elements of pronunciation should be clearly set and provided with consideration for Lingua Franca Core (LFC), which places importance on mutual intelligibility rather than following the rules of native speakers. In this paper, the current trends of BELF in the maritime industry will thus be introduced. Following this, the importance of LFC in maritime communication will be outlined, and its key features will be discussed in terms of effectiveness and clarity of international maritime communications. Finally, a close comparison between LFC and the pronunciation guidelines suggested by the IMO Maritime English model course 3.17 will be conducted, and pedagogical implications for future teaching pronunciation in cross-cultural global maritime industry will be suggested.

A Key Distribution and Authentication Scheme based on X.25 Protocol (X.25 프로토콜 기반의 새로운 키 분배 및 인증방식)

  • Sohn, Ki-Wook;Park, Eung-Ki;Lee, Jin-Seok;Shin, Ki-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3078-3087
    • /
    • 1997
  • The information security is very important in computer communication network, and the security system has been developed in many aspects to provide secure communication. The secret key distribution and mutual user authentication are essential element in designing security system, then many algorithms and implementation schemes have been proposed. But they don't consider communication protocol, so they are not easy to adapt a real communication network' In this paper, we propose a key distriburion and mutual user authentication scheme based on X.25 protocol which is the most popular in packet communication, and the proposed scheme maintains a protocol transparency and can select communication mode, so the security system is more capable.

  • PDF

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.