• Title/Summary/Keyword: warning information

Search Result 700, Processing Time 0.026 seconds

TCP CAE : Improving Wireless TCP under Reverse Background Congestion through Comparative ACK-based Estimator (TCP CAE: ACK기반 역방향 네트워크의 혼잡 감지기법)

  • Kim, Jae-Hyun;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2008
  • TCP receivers deliver ACK packets to senders for reliable end-to-end transfer. When ACK packets are not transferred properly because of network congestion, the performance of TCP degrades. This paper proposes a reverse congestion warning mechanism and a congestion handling mechanism in heterogeneous networks with heavy background traffic in the backward direction. Help from TCP receivers or hardware such as routers and gateways other than the ACK packets themselves is not necessary. TCP senders compare the arrival intervals of ACK data passed from receivers and the difference in t imestamp values echoed by receivers. According to the simulation results using the NS-2 network simulator, the proposed scheme shows a performance elevation of 20% greater than Reno, 150% greater than New Reno, and 450% greater than Westwood, respectively, under heterogeneous networks and that the error rate of the radio link is 1% when the backward network is congested.

  • PDF

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

Numerical Simulation of Storm Surge and Wave due to Typhoon Kong-Rey of 2018 (2018년 태풍 콩레이에 대한 폭풍해일과 파랑 수치모의)

  • Kwon, Kab Keun;Jho, Myeong Hwan;Yoon, Sung Bum
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.4
    • /
    • pp.252-261
    • /
    • 2020
  • Numerical simulations of the storm surge and waves induced by the Typhoon Kong-Rey incident on the south coast of Korea in 2018 are conducted using the JMA-MSM weather field provided by the Japan Meteorological Agency, and the calculated surge heights are compared with the time history observed at harbours along the south-east coast. For the waves occurring coincidentally with the storm surges the calculated significant wave heights are compared with the data measured using the wave buoys operated by the KHOA (Korea Hydrographic and Oceanographic Agency) and the KMA (Korea Meteorological Administration), and the data observed at AWAC stations of the KIOST (Korea Institute of Ocean Science and Technology). Additional simulations are also performed based on the pressure and wind fields obtained using the best track information provided by the JTWC (Joint Typhoon Warning Center) of the United States, and the results are compared and analyzed. Based on the results of this study it is found that the reliable weather fields are essential for the accurate simulation of storm surges and waves.

밀리미터파 레이다 시스템을 이용한 전력선 검출

  • Kang, Gum-Sil;Yong, Sang-Soon;Kang, Song-Doug;Kim, Jong-Ah;Chang, Young-Jun
    • Aerospace Engineering and Technology
    • /
    • v.3 no.1
    • /
    • pp.242-250
    • /
    • 2004
  • This paper describes the detection method of wire-like obstacles using millimeter-wave radar system. Passive sensor like CCD camera can be used for the detection of high power electric cables on the hills or mountains and it can give very good quality of obstacle target information. But this system is very limited to use by bad weather condition. The detection capability for different diameters of wire targets using millimeter radar system have been accomplished. To simulate the target on the moving helicopter, rotating targets are used with fixed radar system. In the experiment 11mm, 16mm and 22mm diameter of wires have been detected in single, two and three wires in one position. The detected signal from single wire was very clear on gray level image. Three wires placed very closely together could be recognized in range, cross range image plane. For two and three wires, blur effect due to mutual scattering effect is observed.

  • PDF

A Way for Establishing Tsunami Scenario Data Base (지진해일 시나리오 DB 구축방안)

  • Lee, Duk-Kee;Ryoo, Yong-Gyu;Yang, Jun-Mo;Kim, Su-Kyung;Youn, Young-Hoon;Lee, Jun-Hee;Park, Jong-Chan
    • Journal of the Korean Geophysical Society
    • /
    • v.8 no.2
    • /
    • pp.93-96
    • /
    • 2005
  • Focal mechanism of the real and imaginary faults in the western coast of Japan has been assumed by examining the previous studies on the seismicity, seismic gap, fault behaviors, seismic zoning, and faults. In the area of no seismic information, the focal mechanism has been assumed to have the maximum influence on the tsunami height in the eastern coast of Korea. The tsunami height in a particular point of the eastern coast of Korea can vary up to 7 orders with the variation of the strike of the fault in a particular source point of the western coast of Japan with constant magnitude. Tsunami scenario DB including the arrival times and tsunami heights has been constructing by using the assumed focal mechanism of the western coast of Japan. Tsunami warning system will be reinforced by using this tsunami scenario DB near future.

  • PDF

Odor Cognition and Source Tracking of an Intelligent Robot based upon Wireless Sensor Network (센서 네트워크 기반 지능 로봇의 냄새 인식 및 추적)

  • Lee, Jae-Yeon;Kang, Geun-Taek;Lee, Won-Chang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.49-54
    • /
    • 2011
  • In this paper, we represent a mobile robot which can recognize chemical odor, measure concentration, and track its source indoors. The mobile robot has the function of smell that can sort several gases in experiment such as ammonia, ethanol, and their mixture with neural network algorithm and measure each gas concentration with fuzzy rules. In addition, it can not only navigate to the desired position with vision system by avoiding obstacles but also transmit odor information and warning messages earned from its own operations to other nodes by multi-hop communication in wireless sensor network. We suggest the way of odor sorting, concentration measurement, and source tracking for a mobile robot in wireless sensor network using a hybrid algorithm with vision system and gas sensors. The experimental studies prove that the efficiency of the proposed algorithm for odor recognition, concentration measurement, and source tracking.

Network vision of disaster prevention management for seashore reclaimed u-City (해안매립 신도시의 재해 예방관리 네트워크 비젼)

  • Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.117-129
    • /
    • 2009
  • This paper studied the safety management network system of infrastructure which constructed smart sensors, closed-circuit television(CCTV) and monitoring system. This safety management of infrastructure applied to bridge, cut slop and tunnel, embankment etc. The system applied to technologies of standardization guidelines, data acquirement technologies, data analysis and judgment technologies, system integration setup technology, and IT technologies. It was constructed safety management network system of various infrastructure to improve efficient management and operation for many infrastructure. Integrated safety management network system of infrastructure consisted of the real-time structural health monitoring system of each infrastructure, integrated control center, measured data transmission using i of tet web-based, collecting data using sf ver, early alarm system which the dangerous event of infrastructure occurred. Integrated control center consisted of conference room, control room to manage and analysis the data, server room to present the measured data and to collect the raw data. Early alarm system proposed realization of warning and response within 5 minute or less through development of sensor-based progress report and propagation automation system using the media such as MMS, VMS, EMS, FMS, SMS and web services of report and propagation. Based on this, the most effective u-Infrastructure Safety Management System is expected to be stably established at a less cost, thus making people's life more comfortable. Information obtained from such systems could be useful for maintenance or structural safety evaluation of existing structures, rapid evaluation of conditions of damaged structures after an earthquake, estimation of residual life of structures, repair and retrofitting of structures, maintenance, management or rehabilitation of historical structures.

  • PDF

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.

A Study on Big Data Anti-Money Laundering Systems Design through A Bank's Case Analysis (A 은행 사례 분석을 통한 빅데이터 기반 자금세탁방지 시스템 설계)

  • Kim, Sang-Wan;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.85-94
    • /
    • 2016
  • Traditional Anti-Money Laundering (AML) software applications monitor bank customer transactions on a daily basis using customer historical information and account profile data to provide a "whole picture" to bank management. With the advent of Big Data, these applications could be benefited from size, variety, and speed of unstructured data, which have not been used in AML applications before. This study analyses the weaknesses of a bank's current AML systems and proposes an AML systems taking advantage of Big Data. For example, early warning of AML risk can be improved by exposing identities and uncovering hidden relationships through predictive and entity analytics on real-time and outside data such as SNS data.

  • PDF

An Analysis of the Transient's Social Behavior in the Radiological Emergency Planning Zone (방사선 비상계획구역에서의 일시거주자의 사회행동 특성 분석)

  • Bang, Sun-Young;Lee, Gab-Bock;Chung, Yang-Geun;Lee, Jae-Eun
    • Journal of Radiation Protection and Research
    • /
    • v.32 no.2
    • /
    • pp.71-78
    • /
    • 2007
  • The purpose of this study is to analyze the social behavior, especially, the evacuation-related social behavior, of the transients in the radiological emergency planning zone(EPZ) of nuclear power plants. So, the meaning and kinds of the evacuation and the significance of the trip generation time(TGT) have been reviewed. The characteristics of the social behavior of the transient around Ulchin, Wolsong and Kori sites was analyzed through field surveys by using the questionnaire. The major findings of this research implications are as follows. First, for securing the safe evacuation, the alternatives to effectively provide the information on the evacuation warning may be prepared. Second, it is necessary to establish the education and training of transient's evacuation. Third, it is needed that the cause and background of the evacuation refusal are identified and the new response plan to secure transient's safety is prepared.