• Title/Summary/Keyword: network service agent

Search Result 210, Processing Time 0.025 seconds

Cognitive Science based School Meal Service System Modeling and Implementation (인지과학 기반의 학교 급식 시스템 설계 및 구현)

  • Choi, Yue-Soon;Kim, Jeong-Ok;Shin, Hyun-Cheul;Park, Jong-Goo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.91-99
    • /
    • 2004
  • Nowadays, Providing lunch for schoolchildren was carried out from elementary school to high school in order to plot sound mind and body of students and improve eating habits of people and lighten packing lunch-basket of parents. In this paper, It manage burdensome affairs of user who engaged in work of providing lunch for school children, easily and quickly. Also implement system based on cognitive science through the reuseability, simplicity of use and a design paid attention to efficiency.

  • PDF

Design and Implementation of a Traceback System based on a Traceback Agent (역추적 에이전트를 이용한 역추적 시스템 설계 및 구현)

  • Jeong, Jong-Min;Lee, Ji-Yul;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.22 no.B
    • /
    • pp.147-153
    • /
    • 2002
  • It is very important to detect and remove original sources of DOS (Denial of Service) attacks or connection oriented/connectionless attacks. In this paper, we implement a traceback system that does not require the reaction of routers and administrators and does not need log data. We bring in a traceback server and traceback agents in each network and use sniffing and spoofing schemes. Finally, the traceback server detects attacking hosts using information transmitted from traceback agents.

  • PDF

Development of User-Centered Context Awareness System (사용자 중심의 상황 인지 시스템의 개발)

  • Jang, In-Woo;Woo, Chong-Woo
    • Journal of Information Technology Services
    • /
    • v.9 no.1
    • /
    • pp.113-125
    • /
    • 2010
  • Recently, a smart space with Ubiquitous Environment is expanding rapidly due to the development of Ubiquitous Sensor Network. Therefore, more appropriate and intelligent services of the context awareness system is being required. The previous context awareness system can provide a service to the user through the inference only on the current situation. But, it does not handle certain situation properly when the system provides abnormal result. Also it does not have any proper method of generating reliable semantic data from sensed raw data. In this paper, we are trying to solve the problems as the following approaches. First, the system recognizes abnormal result and corrects it by learning feedback from the user. Second, we suggest a method of converting sensed data into more reliable semantic data. Third, we build the system based on an Ontological context model that is capable of interoperability and reusability. Therefore, the context awareness system of our study can enhance the previous system that can generate more reliable context data, can provide more effective inference method, and can provide more intelligent system structure.

A Social network service agent based on the consuming multiple contents (다종 콘텐츠 소비 기반 소셜 네트워크 서비스 에이전트)

  • Lee, Seok-Pil;Shin, Saim;Park, Sung-Ju
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.11a
    • /
    • pp.88-91
    • /
    • 2012
  • 최근의 미디어 생성/소비 패턴은 UCC 같은 소비자가 직접 미디어를 생성하고 소비하는 프로세스가 등장하여 일반화되고 있다. 본 연구는 이러한 동향에 발맞추어 다종의 멀티미디어 콘텐츠의 소비를 바탕으로 이를 소셜 네트워킹화하고 이를 통해 개인화된 맞춤형 콘텐츠를 추천할 수 있는 추천 에이전트를 개발하였다. 방송/통신망 상에 존재하는 다양한 콘텐츠 중에 사용자의 선호패턴과 일치하는 콘텐츠들을 추천하여 서비스하는 본 시스템은 유무선 환경을 망라하는 다기종의 디바이스들을 위한 플랫폼들을 지원하고 있다.

  • PDF

The Method of Data Synchronization Among Devices for Personal Cloud Services (퍼스널 클라우드 서비스를 위한 임의의 단말간 컨텐츠 동기화 방법)

  • Choi, Eunjeong;Lee, Jeunwoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.6
    • /
    • pp.377-382
    • /
    • 2011
  • This paper describes the method of data synchronization among devices for personal cloud services. Existing data synchronization for mobile devices is based on a central server to mobile devices or a PC to a mobile device. However, the purpose of this paper is to share user data in heterogeneous environments, without depending on central server. This technology can be applied to synchronize personal data between a device and a personal cloud storage for personal cloud services. The ad hoc synchronization needs a sync agent service discovery module, a user authentication module, a network adapter, and an application data synchronization module. The method described in this paper is better than existing synchronization technology based on client-server in availability, performance, scalability quality attributes.

An Intention-Response Model based on Mirror Neuron and Theory of Mind using Modular Behavior Selection Networks (모듈형 행동선택네트워크를 이용한 거울뉴런과 마음이론 기반의 의도대응 모델)

  • Chae, Yu-Jung;Cho, Sung-Bae
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.320-327
    • /
    • 2015
  • Although service robots in various fields are being commercialized, most of them have problems that depend on explicit commands by users and have difficulty to generate robust reactions of the robot in the unstable condition using insufficient sensor data. To solve these problems, we modeled mirror neuron and theory of mind systems, and applied them to a robot agent to show the usefulness. In order to implement quick and intuitive response of the mirror neuron, the proposed intention-response model utilized behavior selection networks considering external stimuli and a goal, and in order to perform reactions based on the long-term action plan of theory of mind system, we planned behaviors of the sub-goal unit using a hierarchical task network planning, and controled behavior selection network modules. Experiments with various scenarios revealed that appropriate reactions were generated according to external stimuli.

Distributed Binding Update Scheme for Fast Handoff in Non-Nested Network Mobility Environment (비 중첩 네트워크 이동성 환경에서 빠른 핸드오프를 위한 분산 바인딩 갱신 기법)

  • Kim, Hoon;Song, Ui-Sung
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.5
    • /
    • pp.81-88
    • /
    • 2007
  • To support the movement of a mobile network consisting of several mobile nodes, the IETF NEMO working group proposed NEMO basic support protocol using bi-directional tunneling between the home agent and the mobile router. Since NEMO basic support protocol is based on bi-directional tunneling, all communications to and from mobile nodes are suffer from inefficient routing all the cases. To solve the routing inefficiency problem, several proposals are proposed. However, those proposals results in new problems, such as binding update storm and changes in existing protocol. Especially, binding update storm problem may cause the delay in binding update, this subsequently causes the difficulty for a real time service and the handoff delay on the movement of mobile network. In this paper, we propose a new binding update scheme which reduces binding update latency and the handoff delay through the distribution of the transmission time of binding update messages. The performance of the proposed scheme is also evaluated to demonstrate its efficiency. Simulation results show that the proposed scheme can efficiently reduce the binding update latency.

  • PDF

Network analysis of issue diffusion on the sanitary pad cancer-causing agent via Twitter and Youtube (트위터와 유튜브를 통해 확산된 생리대 발암물질 이슈에 대한 네트워크 분석)

  • Hong, Juhyun
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.15-26
    • /
    • 2018
  • This study focused on the difference of the volume of sanitory pad issue and The aim of this study is to explore the relationship between the characteristics of SNS and the diffusion of issue in the process of crisis issue. SNS is categorized into communication diffusion, communication restriction,, diffusion, restriction base on the media interactivity and the user interactivity, In case of Twitter, media interactivity is low and user interactivity is low. In case of Youtube, media interactivity and user interactivity are all high. Crisiss issue is interactively diffused via Youtube compared to via Twitter. There was a negative public opinion in social media even if the government and the manufacturer said that there was no harm in the sanitary goods. In conclusion, this study highlights the importance of social media environment in the diffusion of information. The government prepared for the use of SNS in crisis because there was a negative opinion on the government and the manufacturer via SNS.

Implementation of QoS-Measuring System for Voice over IP (VoIP(Voice over Internet Protocol) 품질 측정을 위한 UA(User Agent) 및 서버 기능 연구)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.137-144
    • /
    • 2007
  • Advances in networking technology digital media, and codecs have made it possible for the Internet evolves into a Broadband convergence Network (BcN) and provides various services including Voice over Internet Protocol (VoIP) and IPTV over their high-speed IP networks. In order for the Internet to make a profit as traditional Public Switched Telephone Network (PSTN), it must provide high qualify VoIP services. Therefore, real time qualify measurement framework is the most important requisite to provide VoIP service. For this, IETF (Internet Engineering Task Force) defined RTCP-Extended Reports (RTCP-XR) that extend RTCP (Real-Time Transport Protocol Control Protocol). However, procedure and method tot actually VoIP qualify measurement did not recommended nothing but defined item to measure voice quality. Our objective in this paper is to describes a practical measuring framework for end-to-end QoS of switched voice packet in an IP environment. It includes concepts as well as step-by-step procedures for measuring packetized voice streams. It also proposes new formats that extend RTCP-XR's concept.

  • PDF

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF