• Title/Summary/Keyword: networking services

Search Result 685, Processing Time 0.025 seconds

Big Data Analysis of Public Acceptance of Nuclear Power in Korea

  • Roh, Seungkook
    • Nuclear Engineering and Technology
    • /
    • v.49 no.4
    • /
    • pp.850-854
    • /
    • 2017
  • Public acceptance of nuclear power is important for the government, the major stakeholder of the industry, because consensus is required to drive actions. It is therefore no coincidence that the governments of nations operating nuclear reactors are endeavoring to enhance public acceptance of nuclear power, as better acceptance allows stable power generation and peaceful processing of nuclear wastes produced from nuclear reactors. Past research, however, has been limited to epistemological measurements using methods such as the Likert scale. In this research, we propose big data analysis as an attractive alternative and attempt to identify the attitudes of the public on nuclear power. Specifically, we used common big data analyses to analyze consumer opinions via SNS (Social Networking Services), using keyword analysis and opinion analysis. The keyword analysis identified the attitudes of the public toward nuclear power. The public felt positive toward nuclear power when Korea successfully exported nuclear reactors to the United Arab Emirates. With the Fukushima accident in 2011 and certain supplier scandals in 2012, however, the image of nuclear power was degraded and the negative image continues. It is recommended that the government focus on developing useful businesses and use cases of nuclear power in order to improve public acceptance.

An ID-based Blind Signature Scheme using the Gap Diffie-Hellman Group in Wireless Environments (무선환경에 적합한 GaP Diffie-Hellman 그룹을 사용한 ID 기반 은닉서명 방식)

  • 김현주;김수진;원동호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.720-728
    • /
    • 2003
  • Blind signature is such a signature scheme that conceals the contents of signature itself and who is the user of the signature make user's anonymity possible. For this reason, they are used in security services such as electronic cashes and electronic votes in which the behavior of actor should not be exposed. In this paper we propose an ID-based blind signature scheme from Gap Diffie-Hellman group. Its security is based on the hardness of Computational Diffie-Hellman Problem. Proposed scheme efficiently improve against existing blind signature scheme by using two-pass protocol between two users and by reducing computation process. Therefore it can be used efficiently in wireless PKI environment.

Distributed Objects' Grouping and Management for Supporting Real-time Service in CORBA Environments (CORBA 환경에서 실시간 서비스 지원을 위한 분산 객체의 그룹화 및 관리)

  • Sin, Gyeong-Min;Kim, Myeong-Hui;Ju, Su-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1241-1252
    • /
    • 1999
  • It is proposed in TINA, the open information telecommunication network architecture, that the definition of object group which is collection of objects provides a decrease of complex networking and a facility of object managing by service executing of application on distributed computing environment. Based on a new distributed object group model[13] we have been researched according to TINA specification, this paper proposed the object group model with the scheduler object and objects management mechanisms that can support real-time services on CORBA. To do this, we described the definition of object grouping and the requirements to suggest the object group model supporting real-time service, designed the object group structure and functional components containing in an object group using James Rumbaugh's modelling[12], and showed a class diagram of components in an object group. This paper designed IDLs of an object group manager and scheduler among the components, and finally showed the procedures of management and service interconnections between objects in the different object groups vi ETD.

  • PDF

A study on modeling of university information system using the soft systems methodology (소프트시스템 방법론을 이용한 대학정보시스템 모형개발에 관한 연구)

  • 오경묵
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.69-88
    • /
    • 1998
  • In real life, the problems that organizations face are often not well packaged: they are frequently complex and complicated, especially when it is concerned about computer network services. The principal aim of the study is to investigate what sort of network sytem will enable uni ersities to utilize the information resources they have and need in an effective and efficient way. Therfore seven stages of the Soft systems methodology were applied to get the optimal model, then networking, maintaining, monitoring and training sytems were developed as the result.

  • PDF

A Scheme to Support IP Mobility over Wireless ATM Networks (무선 ATM망에서 이동성 지원 기법)

  • 문영성;김영욱
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.573-580
    • /
    • 2003
  • Increasing user demand for the more bandwidths in wireless communications has motivated a new challenge to utilize the benefits of wireless ATM technology This paper focuses on how to provide IP services to a mobile user over wireless ATM networks. By enhancing the NHRP standard, several shortcomings are improved that are resulted from the naive combinations of Mobile IP over ATM and IP over wireless ATM. This paper presents a mobile location management algorithm that is referred to as the Mobile NHRP scheme. The mobile tracking procedure and the mobile locating procedure are explicitly defined in the proposed scheme. On the locating procedure, the source station may obtain the current location of the destination from NHSs(Next Hop Servers). Therefore the optimized connection can be setup directly. The total costs per move and per setup over ATM/IP overlaid networks are estimated.

An End-to-end IPSec Security Mechanism considering NAT-PT (NAT-PT를 고려한 단대단 IPSec 보안 메커니즘)

  • 현정식;황윤철;정윤수;이상호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.604-613
    • /
    • 2003
  • Network Address Translation-Protocol Translation(NAT-PT) is an IPv4/IPv6 translation mechanism, as defined in RFC2766, allowing IPv6-only devices to communicate with IPv4-only devices and vice versa. But NAT-PT has the restriction that applies to IPv4 NAT where NAT-PT does not provide end-to-end security, which is a major goal of IPSec. Therefore it cannot support security services such as confidentiality, authentication, and integrity. In this paper, we propose secure NAT-PT(SNAT-PT) and the corresponding secure host architecture to support IPSec security service. And also tunneling scheme using dummy IP header is presented to show the valid operation of end-to-end IPSec protocol on the proposed architectures.

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City

  • Sharma, Pradip Kumar;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.184-195
    • /
    • 2017
  • In recent decades, the ad hoc network for vehicles has been a core network technology to provide comfort and security to drivers in vehicle environments. However, emerging applications and services require major changes in underlying network models and computing that require new road network planning. Meanwhile, blockchain widely known as one of the disruptive technologies has emerged in recent years, is experiencing rapid development and has the potential to revolutionize intelligent transport systems. Blockchain can be used to build an intelligent, secure, distributed and autonomous transport system. It allows better utilization of the infrastructure and resources of intelligent transport systems, particularly effective for crowdsourcing technology. In this paper, we proposes a vehicle network architecture based on blockchain in the smart city (Block-VN). Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system. We are considering a new network system of vehicles, Block-VN, above them. In addition, we examine how the network of vehicles evolves with paradigms focused on networking and vehicular information. Finally, we discuss service scenarios and design principles for Block-VN.

Suggestion and Implementation of Improved Control Point for Remote Control Home-Network based on the UPnP (UPnP 기반의 홈-네트워크 원격제어를 위한 개선된 Control Point의 제안 및 구현)

  • Jeong, Jin-Gyu;Jin, Seon-Il;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.769-772
    • /
    • 2003
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility. The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this study is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform.

  • PDF

A Wireless MAC Scheduler based on Video Traces for One-to-one Video-on-demand Services in CDMA2000 1xEV-DO (CDMA2000 1xEV-DO 이동통신 망에서 일대일 주문형 비디오 서비스를 위한 비디오 트레이스 기반 무선 MAC 스케줄러)

  • Pyun, Ki-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.351-359
    • /
    • 2009
  • A wireless MAC scheduler for CDMA2000 IxEV-DO that provides a high level of quality-of-service(QoS) for video-on-demand(VOD) applications while achieving a reasonable level of system throughput is proposed, The proposed scheduler that exists in the MAC layer utilizes the video data information that resides in the application layer such that it improves the QoS for VOD applications. We show by simulations that our approach is better than the previous scheduler which is also based on video traces for VBR videos that have high variability between video frames.

A Scalable Secure Multicast Key Management Structure (확장성을 제공하는 안전한 멀티캐스트 키 관리 구조)

  • Park, Hee-Un;Lee, Im-Yeong;Park, Won-Joo;Lee, Jong-Tai;Sohn, Sung-Won
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.109-116
    • /
    • 2002
  • Through the increment of requirement for group oriented communication services, on the open network, the multicast infrastructure has become a widely discussed researching topic. However the research of the security properties that safety, efficiency and scaleability in a multicast structure, has not been enough. In this study, we discuss conventional multicast key management structures and propose a scalable secure multicast key management structure based on PKI(Public Key Infrastructure), IPSec, domain subgroup and structural two mode scheme. Also we certify to the usability of new proposed scheme from comparing it with conventional schemes in the part of safety, efficiency and scaleability.